Windows
Analysis Report
UhsjR3ZFTD.exe
Overview
General Information
Sample name: | UhsjR3ZFTD.exerenamed because original name is a hash value |
Original sample name: | 639a67914a8e386632cee14f4694015aa7ae186666173159eb171233364f7620.exe |
Analysis ID: | 1583096 |
MD5: | 51648584ffb4a6398eb1cef4da20e457 |
SHA1: | 74f2facfc001a0b4f23b8d4ce24208aa0c5f84e2 |
SHA256: | 639a67914a8e386632cee14f4694015aa7ae186666173159eb171233364f7620 |
Tags: | exeuser-Chainskilabs |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- UhsjR3ZFTD.exe (PID: 5484 cmdline:
"C:\Users\ user\Deskt op\UhsjR3Z FTD.exe" MD5: 51648584FFB4A6398EB1CEF4DA20E457) - conhost.exe (PID: 6440 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - UhsjR3ZFTD.exe (PID: 3960 cmdline:
"C:\Users\ user\Deskt op\UhsjR3Z FTD.exe" MD5: 51648584FFB4A6398EB1CEF4DA20E457)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["abruptyopsn.shop", "cloudewahsj.shop", "noisycuttej.shop", "nearycrepso.shop", "tirepublicerj.shop", "wholersorie.shop", "framekgirus.shop", "fancywaxxers.shop", "rabidcowse.shop"], "Build id": "Zv86PG--UzeRR"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
Click to see the 2 entries |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-01T22:04:57.607657+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49712 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:04:58.679432+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49713 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:04:59.945904+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49714 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:05:01.080623+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49715 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:05:02.222016+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49717 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:05:04.498341+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49718 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:05:05.841345+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49720 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:05:08.033859+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49736 | 104.21.32.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-01T22:04:58.143694+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.6 | 49712 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:04:59.155272+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.6 | 49713 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:05:08.503939+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.6 | 49736 | 104.21.32.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-01T22:04:58.143694+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.6 | 49712 | 104.21.32.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-01T22:04:59.155272+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.6 | 49713 | 104.21.32.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-01T22:04:57.607657+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 49712 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:04:58.679432+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 49713 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:04:59.945904+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 49714 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:05:01.080623+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 49715 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:05:02.222016+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 49717 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:05:04.498341+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 49718 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:05:05.841345+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 49720 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:05:08.033859+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 49736 | 104.21.32.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-01T22:04:57.123034+0100 | 2058656 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 64545 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-01T22:05:04.933530+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.6 | 49718 | 104.21.32.1 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Code function: | 3_2_00419362 |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_006DB358 | |
Source: | Code function: | 0_2_006DB409 | |
Source: | Code function: | 3_2_006DB358 | |
Source: | Code function: | 3_2_006DB409 |
Source: | Code function: | 3_2_00426000 | |
Source: | Code function: | 3_2_0040C22D | |
Source: | Code function: | 3_2_00419362 | |
Source: | Code function: | 3_2_0043FB80 | |
Source: | Code function: | 3_2_0043DCE9 | |
Source: | Code function: | 3_2_0043DCE9 | |
Source: | Code function: | 3_2_00440480 | |
Source: | Code function: | 3_2_00408640 | |
Source: | Code function: | 3_2_0042BE8A | |
Source: | Code function: | 3_2_0042BE8A | |
Source: | Code function: | 3_2_0042A050 | |
Source: | Code function: | 3_2_0043E051 | |
Source: | Code function: | 3_2_0043E850 | |
Source: | Code function: | 3_2_0043D818 | |
Source: | Code function: | 3_2_00419820 | |
Source: | Code function: | 3_2_00419820 | |
Source: | Code function: | 3_2_0043F830 | |
Source: | Code function: | 3_2_0043F0CB | |
Source: | Code function: | 3_2_0042C0CD | |
Source: | Code function: | 3_2_00415882 | |
Source: | Code function: | 3_2_00415882 | |
Source: | Code function: | 3_2_004398A0 | |
Source: | Code function: | 3_2_004390A0 | |
Source: | Code function: | 3_2_0042C140 | |
Source: | Code function: | 3_2_00416148 | |
Source: | Code function: | 3_2_00416148 | |
Source: | Code function: | 3_2_00416148 | |
Source: | Code function: | 3_2_00416148 | |
Source: | Code function: | 3_2_0042895A | |
Source: | Code function: | 3_2_0042895A | |
Source: | Code function: | 3_2_00424974 | |
Source: | Code function: | 3_2_00424974 | |
Source: | Code function: | 3_2_00428100 | |
Source: | Code function: | 3_2_00440130 | |
Source: | Code function: | 3_2_004229CD | |
Source: | Code function: | 3_2_004229CD | |
Source: | Code function: | 3_2_0043E19A | |
Source: | Code function: | 3_2_0042C1A3 | |
Source: | Code function: | 3_2_0043C1B0 | |
Source: | Code function: | 3_2_0043F1B0 | |
Source: | Code function: | 3_2_00427A5A | |
Source: | Code function: | 3_2_0041CA60 | |
Source: | Code function: | 3_2_0041CA60 | |
Source: | Code function: | 3_2_0043E262 | |
Source: | Code function: | 3_2_00423A60 | |
Source: | Code function: | 3_2_0042C26C | |
Source: | Code function: | 3_2_0042C26C | |
Source: | Code function: | 3_2_0042BA79 | |
Source: | Code function: | 3_2_0043F2F6 | |
Source: | Code function: | 3_2_0042C282 | |
Source: | Code function: | 3_2_0042C282 | |
Source: | Code function: | 3_2_0043EA80 | |
Source: | Code function: | 3_2_00429A90 | |
Source: | Code function: | 3_2_00426340 | |
Source: | Code function: | 3_2_00426340 | |
Source: | Code function: | 3_2_00402B60 | |
Source: | Code function: | 3_2_00426360 | |
Source: | Code function: | 3_2_00426360 | |
Source: | Code function: | 3_2_00427B08 | |
Source: | Code function: | 3_2_0043F330 | |
Source: | Code function: | 3_2_004073C0 | |
Source: | Code function: | 3_2_004073C0 | |
Source: | Code function: | 3_2_0043F3C0 | |
Source: | Code function: | 3_2_0041C3CC | |
Source: | Code function: | 3_2_00420BD3 | |
Source: | Code function: | 3_2_004393D0 | |
Source: | Code function: | 3_2_0042238D | |
Source: | Code function: | 3_2_0042238D | |
Source: | Code function: | 3_2_0043C440 | |
Source: | Code function: | 3_2_0043F450 | |
Source: | Code function: | 3_2_00439C70 | |
Source: | Code function: | 3_2_00435410 | |
Source: | Code function: | 3_2_00421C80 | |
Source: | Code function: | 3_2_00416C90 | |
Source: | Code function: | 3_2_004274A5 | |
Source: | Code function: | 3_2_00427CB0 | |
Source: | Code function: | 3_2_00427CB0 | |
Source: | Code function: | 3_2_0043C510 | |
Source: | Code function: | 3_2_0043C510 | |
Source: | Code function: | 3_2_0043C510 | |
Source: | Code function: | 3_2_00414DC0 | |
Source: | Code function: | 3_2_00416C90 | |
Source: | Code function: | 3_2_004155DB | |
Source: | Code function: | 3_2_0041AD80 | |
Source: | Code function: | 3_2_0043FE20 | |
Source: | Code function: | 3_2_0041CECA | |
Source: | Code function: | 3_2_0043E6E0 | |
Source: | Code function: | 3_2_0040C6F0 | |
Source: | Code function: | 3_2_00408EF0 | |
Source: | Code function: | 3_2_0041DE90 | |
Source: | Code function: | 3_2_00418740 | |
Source: | Code function: | 3_2_00414777 | |
Source: | Code function: | 3_2_0041BFCA | |
Source: | Code function: | 3_2_004237D0 | |
Source: | Code function: | 3_2_00417FE1 | |
Source: | Code function: | 3_2_00417FE1 | |
Source: | Code function: | 3_2_00416F8D | |
Source: | Code function: | 3_2_00416F8D | |
Source: | Code function: | 3_2_00416F8D | |
Source: | Code function: | 3_2_00424F91 | |
Source: | Code function: | 3_2_00424F91 | |
Source: | Code function: | 3_2_0043DFB3 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 3_2_00432D70 |
Source: | Code function: | 3_2_00432D70 |
Source: | Code function: | 3_2_00432FE0 |
Source: | Code function: | 0_2_006E0412 | |
Source: | Code function: | 0_2_006D34A0 | |
Source: | Code function: | 0_2_006CDE42 | |
Source: | Code function: | 0_2_006DE6FE | |
Source: | Code function: | 0_2_006C973B | |
Source: | Code function: | 3_2_00421060 | |
Source: | Code function: | 3_2_00438860 | |
Source: | Code function: | 3_2_00426000 | |
Source: | Code function: | 3_2_00419362 | |
Source: | Code function: | 3_2_0043FB80 | |
Source: | Code function: | 3_2_0043BCE0 | |
Source: | Code function: | 3_2_004384F0 | |
Source: | Code function: | 3_2_00440480 | |
Source: | Code function: | 3_2_00418DF1 | |
Source: | Code function: | 3_2_004095A0 | |
Source: | Code function: | 3_2_00408640 | |
Source: | Code function: | 3_2_0040D6F8 | |
Source: | Code function: | 3_2_0042BE8A | |
Source: | Code function: | 3_2_00429040 | |
Source: | Code function: | 3_2_00438040 | |
Source: | Code function: | 3_2_0042A050 | |
Source: | Code function: | 3_2_00425850 | |
Source: | Code function: | 3_2_00432800 | |
Source: | Code function: | 3_2_00419820 | |
Source: | Code function: | 3_2_0043F0CB | |
Source: | Code function: | 3_2_004038D0 | |
Source: | Code function: | 3_2_004058E0 | |
Source: | Code function: | 3_2_004308E0 | |
Source: | Code function: | 3_2_004088F0 | |
Source: | Code function: | 3_2_0040D0FF | |
Source: | Code function: | 3_2_00415882 | |
Source: | Code function: | 3_2_0040A8A0 | |
Source: | Code function: | 3_2_004390A0 | |
Source: | Code function: | 3_2_00409140 | |
Source: | Code function: | 3_2_0041D940 | |
Source: | Code function: | 3_2_00416148 | |
Source: | Code function: | 3_2_00406160 | |
Source: | Code function: | 3_2_00433960 | |
Source: | Code function: | 3_2_0042F166 | |
Source: | Code function: | 3_2_00415966 | |
Source: | Code function: | 3_2_00424974 | |
Source: | Code function: | 3_2_00440130 | |
Source: | Code function: | 3_2_004229CD | |
Source: | Code function: | 3_2_004111E9 | |
Source: | Code function: | 3_2_0043C1B0 | |
Source: | Code function: | 3_2_0043F1B0 | |
Source: | Code function: | 3_2_00427A5A | |
Source: | Code function: | 3_2_0041D260 | |
Source: | Code function: | 3_2_00423A60 | |
Source: | Code function: | 3_2_0042C26C | |
Source: | Code function: | 3_2_0042CA35 | |
Source: | Code function: | 3_2_0042CAF1 | |
Source: | Code function: | 3_2_0043F2F6 | |
Source: | Code function: | 3_2_00404280 | |
Source: | Code function: | 3_2_0042C282 | |
Source: | Code function: | 3_2_0043EA80 | |
Source: | Code function: | 3_2_00426340 | |
Source: | Code function: | 3_2_0042CB4C | |
Source: | Code function: | 3_2_00426360 | |
Source: | Code function: | 3_2_0041AB00 | |
Source: | Code function: | 3_2_00437300 | |
Source: | Code function: | 3_2_00427B08 | |
Source: | Code function: | 3_2_00432B10 | |
Source: | Code function: | 3_2_0043F330 | |
Source: | Code function: | 3_2_00404BC0 | |
Source: | Code function: | 3_2_004073C0 | |
Source: | Code function: | 3_2_0043F3C0 | |
Source: | Code function: | 3_2_0041C3CC | |
Source: | Code function: | 3_2_004393D0 | |
Source: | Code function: | 3_2_00423BE0 | |
Source: | Code function: | 3_2_0040EB80 | |
Source: | Code function: | 3_2_0042238D | |
Source: | Code function: | 3_2_0043F450 | |
Source: | Code function: | 3_2_00439C70 | |
Source: | Code function: | 3_2_0042847D | |
Source: | Code function: | 3_2_00421C80 | |
Source: | Code function: | 3_2_0041DC90 | |
Source: | Code function: | 3_2_004274A5 | |
Source: | Code function: | 3_2_00427CB0 | |
Source: | Code function: | 3_2_00436554 | |
Source: | Code function: | 3_2_00432D70 | |
Source: | Code function: | 3_2_0040ED75 | |
Source: | Code function: | 3_2_0043150E | |
Source: | Code function: | 3_2_0043C510 | |
Source: | Code function: | 3_2_0041D530 | |
Source: | Code function: | 3_2_00414DC0 | |
Source: | Code function: | 3_2_00437DE0 | |
Source: | Code function: | 3_2_004065F0 | |
Source: | Code function: | 3_2_0042FDF9 | |
Source: | Code function: | 3_2_0040AD90 | |
Source: | Code function: | 3_2_00405DA0 | |
Source: | Code function: | 3_2_00436DB2 | |
Source: | Code function: | 3_2_0041FE7C | |
Source: | Code function: | 3_2_0043FE20 | |
Source: | Code function: | 3_2_00402ED0 | |
Source: | Code function: | 3_2_0040C6F0 | |
Source: | Code function: | 3_2_0041DE90 | |
Source: | Code function: | 3_2_00418740 | |
Source: | Code function: | 3_2_00428F6C | |
Source: | Code function: | 3_2_00414777 | |
Source: | Code function: | 3_2_004237D0 | |
Source: | Code function: | 3_2_00417FE1 | |
Source: | Code function: | 3_2_0041EFE0 | |
Source: | Code function: | 3_2_00416F8D | |
Source: | Code function: | 3_2_0042F7BC | |
Source: | Code function: | 3_2_006E0412 | |
Source: | Code function: | 3_2_006D34A0 | |
Source: | Code function: | 3_2_006CDE42 | |
Source: | Code function: | 3_2_006DE6FE | |
Source: | Code function: | 3_2_006C973B |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 3_2_00438860 |
Source: | Mutant created: |
Source: | Command line argument: | 0_2_006D50B0 | |
Source: | Command line argument: | 3_2_006D50B0 |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_006C9E1D | |
Source: | Code function: | 3_2_0043F005 | |
Source: | Code function: | 3_2_00445409 | |
Source: | Code function: | 3_2_00448677 | |
Source: | Code function: | 3_2_006C9E1D |
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Code function: | 0_2_006DB358 | |
Source: | Code function: | 0_2_006DB409 | |
Source: | Code function: | 3_2_006DB358 | |
Source: | Code function: | 3_2_006DB409 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 3_2_0043D910 |
Source: | Code function: | 0_2_006D1AC0 |
Source: | Code function: | 0_2_006F019E | |
Source: | Code function: | 0_2_006C1BA0 | |
Source: | Code function: | 3_2_006C1BA0 |
Source: | Code function: | 0_2_006D6C90 |
Source: | Code function: | 0_2_006C9AC7 | |
Source: | Code function: | 0_2_006D1AC0 | |
Source: | Code function: | 0_2_006C9AD3 | |
Source: | Code function: | 0_2_006C9713 | |
Source: | Code function: | 3_2_006C9AC7 | |
Source: | Code function: | 3_2_006D1AC0 | |
Source: | Code function: | 3_2_006C9AD3 | |
Source: | Code function: | 3_2_006C9713 |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Code function: | 0_2_006F019E |
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | Jump to behavior |
Source: | Code function: | 3_2_00438040 |
Source: | Code function: | 0_2_006D6065 | |
Source: | Code function: | 0_2_006DA8F8 | |
Source: | Code function: | 0_2_006DA9A0 | |
Source: | Code function: | 0_2_006DABF3 | |
Source: | Code function: | 0_2_006DAC60 | |
Source: | Code function: | 0_2_006D656D | |
Source: | Code function: | 0_2_006DAD35 | |
Source: | Code function: | 0_2_006DAD80 | |
Source: | Code function: | 0_2_006DAE27 | |
Source: | Code function: | 0_2_006DA6A7 | |
Source: | Code function: | 0_2_006DAF2D | |
Source: | Code function: | 3_2_006D6065 | |
Source: | Code function: | 3_2_006DA8F8 | |
Source: | Code function: | 3_2_006DA9A0 | |
Source: | Code function: | 3_2_006DABF3 | |
Source: | Code function: | 3_2_006DAC60 | |
Source: | Code function: | 3_2_006D656D | |
Source: | Code function: | 3_2_006DAD35 | |
Source: | Code function: | 3_2_006DAD80 | |
Source: | Code function: | 3_2_006DAE27 | |
Source: | Code function: | 3_2_006DA6A7 | |
Source: | Code function: | 3_2_006DAF2D |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_006CA395 |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 211 Process Injection | 21 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Screen Capture | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 2 Command and Scripting Interpreter | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 211 Process Injection | LSASS Memory | 241 Security Software Discovery | Remote Desktop Protocol | 1 Archive Collected Data | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 1 PowerShell | Logon Script (Windows) | Logon Script (Windows) | 11 Deobfuscate/Decode Files or Information | Security Account Manager | 21 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | 41 Data from Local System | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 3 Obfuscated Files or Information | NTDS | 1 Process Discovery | Distributed Component Object Model | 2 Clipboard Data | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Software Packing | LSA Secrets | 11 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 43 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
32% | ReversingLabs | |||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
fancywaxxers.shop | 104.21.32.1 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.32.1 | fancywaxxers.shop | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1583096 |
Start date and time: | 2025-01-01 22:04:06 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 16s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | UhsjR3ZFTD.exerenamed because original name is a hash value |
Original Sample Name: | 639a67914a8e386632cee14f4694015aa7ae186666173159eb171233364f7620.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@4/0@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 20.242.39.171, 2.22.50.131, 2.22.50.144, 13.107.246.45, 20.12.23.50
- Excluded domains from analysis (whitelisted): client.wns.windows.com, fe3.delivery.mp.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, glb.cws.prod.dcat.dsp.trafficmanager.net, ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: UhsjR3ZFTD.exe
Time | Type | Description |
---|---|---|
16:04:56 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.32.1 | Get hash | malicious | CMSBrute | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
fancywaxxers.shop | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
File type: | |
Entropy (8bit): | 7.82486074666969 |
TrID: |
|
File name: | UhsjR3ZFTD.exe |
File size: | 835'112 bytes |
MD5: | 51648584ffb4a6398eb1cef4da20e457 |
SHA1: | 74f2facfc001a0b4f23b8d4ce24208aa0c5f84e2 |
SHA256: | 639a67914a8e386632cee14f4694015aa7ae186666173159eb171233364f7620 |
SHA512: | c77036be9e73e12b43f02fd48dbe4f49469f0a21baf83bf23d43bb6678a52e4702cacaa05baeb189e10726ce1d5797b67d3bf8f98844632c04913ec3df46acfa |
SSDEEP: | 24576:5B2uFkvh/nrd8NhhG5idard8NhhG5idct:5B2lneh8eaeh8e0 |
TLSH: | 8905022274D0C072ED63253798F99BBA962EA9510B219CCF47884F6A8F713C19B3475F |
File Content Preview: | MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....Bug.................H..........@.............@.......................................@.....................................(.. |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x40a340 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x677542F8 [Wed Jan 1 13:28:24 2025 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 3ccbd572e5c574aa059c8de8b80553b8 |
Signature Valid: | false |
Signature Issuer: | CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 5F1B6B6C408DB2B4D60BAA489E9A0E5A |
Thumbprint SHA-1: | 15F760D82C79D22446CC7D4806540BF632B1E104 |
Thumbprint SHA-256: | 28AF76241322F210DA473D9569EFF6F27124C4CA9F43933DA547E8D068B0A95D |
Serial: | 0997C56CAA59055394D9A9CDB8BEEB56 |
Instruction |
---|
call 00007EFFBCBFFE9Ah |
jmp 00007EFFBCBFFCFDh |
mov ecx, dword ptr [004307C0h] |
push esi |
push edi |
mov edi, BB40E64Eh |
mov esi, FFFF0000h |
cmp ecx, edi |
je 00007EFFBCBFFE96h |
test esi, ecx |
jne 00007EFFBCBFFEB8h |
call 00007EFFBCBFFEC1h |
mov ecx, eax |
cmp ecx, edi |
jne 00007EFFBCBFFE99h |
mov ecx, BB40E64Fh |
jmp 00007EFFBCBFFEA0h |
test esi, ecx |
jne 00007EFFBCBFFE9Ch |
or eax, 00004711h |
shl eax, 10h |
or ecx, eax |
mov dword ptr [004307C0h], ecx |
not ecx |
pop edi |
mov dword ptr [00430800h], ecx |
pop esi |
ret |
push ebp |
mov ebp, esp |
sub esp, 14h |
lea eax, dword ptr [ebp-0Ch] |
xorps xmm0, xmm0 |
push eax |
movlpd qword ptr [ebp-0Ch], xmm0 |
call dword ptr [0042E8F8h] |
mov eax, dword ptr [ebp-08h] |
xor eax, dword ptr [ebp-0Ch] |
mov dword ptr [ebp-04h], eax |
call dword ptr [0042E8B0h] |
xor dword ptr [ebp-04h], eax |
call dword ptr [0042E8ACh] |
xor dword ptr [ebp-04h], eax |
lea eax, dword ptr [ebp-14h] |
push eax |
call dword ptr [0042E940h] |
mov eax, dword ptr [ebp-10h] |
lea ecx, dword ptr [ebp-04h] |
xor eax, dword ptr [ebp-14h] |
xor eax, dword ptr [ebp-04h] |
xor eax, ecx |
leave |
ret |
mov eax, 00004000h |
ret |
push 00431AB0h |
call dword ptr [0042E918h] |
ret |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
mov al, 01h |
ret |
push 00030000h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x2e6d0 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x35000 | 0xe8 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0xc9800 | 0x2628 | .BSS |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x36000 | 0x1b9c | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x2a9a8 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x26e40 | 0xc0 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2e84c | 0x154 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x247fa | 0x24800 | b135cf9668d8a70b51fd4c459fb035bf | False | 0.5549349850171232 | data | 6.561271665586601 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x26000 | 0x9f14 | 0xa000 | 87c5c6312d66ce557738ea7321694150 | False | 0.4290283203125 | DOS executable (COM) | 4.923021283143106 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x30000 | 0x2278 | 0x1600 | 7c5c184c1d21197b7c3ea737bb7ce3bb | False | 0.39506392045454547 | data | 4.583345807041613 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.CODE | 0x33000 | 0x4 | 0x200 | bf619eac0cdf3f68d496ea9344137e8b | False | 0.02734375 | data | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.tls | 0x34000 | 0x9 | 0x200 | 1f354d76203061bfdd5a53dae48d5435 | False | 0.033203125 | data | 0.020393135236084953 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x35000 | 0xe8 | 0x200 | c23dec9445c3ffba4b3e55bbbe0cebde | False | 0.306640625 | data | 2.344915704357875 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x36000 | 0x1b9c | 0x1c00 | e64b1e55f23b9808d12a59ad4d38544a | False | 0.7752511160714286 | data | 6.540312202227692 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.BSS | 0x38000 | 0x4b800 | 0x4b800 | 9ad37d9b1d74e0f82e8e2c1c64c0c8af | False | 1.0003265987168874 | data | 7.999500592046876 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.BSS | 0x84000 | 0x4b800 | 0x4b800 | 9ad37d9b1d74e0f82e8e2c1c64c0c8af | False | 1.0003265987168874 | data | 7.999500592046876 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_MANIFEST | 0x35060 | 0x87 | XML 1.0 document, ASCII text | English | United States | 0.8222222222222222 |
DLL | Import |
---|---|
KERNEL32.dll | AcquireSRWLockExclusive, CloseHandle, CompareStringW, CreateFileW, CreateThread, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetFileSize, GetFileSizeEx, GetFileType, GetLastError, GetLocaleInfoW, GetModuleFileNameA, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, GetUserDefaultLCID, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, LCMapStringEx, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadConsoleW, ReadFile, ReleaseSRWLockExclusive, RtlUnwind, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, SleepConditionVariableSRW, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, WaitForSingleObject, WakeAllConditionVariable, WideCharToMultiByte, WriteConsoleW, WriteFile |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-01T22:04:57.123034+0100 | 2058656 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fancywaxxers .shop) | 1 | 192.168.2.6 | 64545 | 1.1.1.1 | 53 | UDP |
2025-01-01T22:04:57.607657+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.6 | 49712 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:04:57.607657+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49712 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:04:58.143694+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.6 | 49712 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:04:58.143694+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.6 | 49712 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:04:58.679432+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.6 | 49713 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:04:58.679432+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49713 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:04:59.155272+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.6 | 49713 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:04:59.155272+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.6 | 49713 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:04:59.945904+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.6 | 49714 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:04:59.945904+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49714 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:05:01.080623+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.6 | 49715 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:05:01.080623+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49715 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:05:02.222016+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.6 | 49717 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:05:02.222016+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49717 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:05:04.498341+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.6 | 49718 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:05:04.498341+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49718 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:05:04.933530+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.6 | 49718 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:05:05.841345+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.6 | 49720 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:05:05.841345+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49720 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:05:08.033859+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.6 | 49736 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:05:08.033859+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49736 | 104.21.32.1 | 443 | TCP |
2025-01-01T22:05:08.503939+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.6 | 49736 | 104.21.32.1 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 1, 2025 22:04:57.141161919 CET | 49712 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:57.141205072 CET | 443 | 49712 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:57.141273975 CET | 49712 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:57.144129992 CET | 49712 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:57.144150972 CET | 443 | 49712 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:57.607507944 CET | 443 | 49712 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:57.607656956 CET | 49712 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:57.616532087 CET | 49712 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:57.616548061 CET | 443 | 49712 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:57.616774082 CET | 443 | 49712 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:57.666836023 CET | 49712 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:57.715451002 CET | 49712 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:57.715488911 CET | 49712 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:57.715635061 CET | 443 | 49712 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:58.143702984 CET | 443 | 49712 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:58.143791914 CET | 443 | 49712 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:58.143846035 CET | 49712 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:58.145714045 CET | 49712 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:58.145736933 CET | 443 | 49712 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:58.145749092 CET | 49712 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:58.145755053 CET | 443 | 49712 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:58.208794117 CET | 49713 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:58.208842039 CET | 443 | 49713 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:58.208910942 CET | 49713 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:58.220684052 CET | 49713 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:58.220714092 CET | 443 | 49713 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:58.679351091 CET | 443 | 49713 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:58.679431915 CET | 49713 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:58.681804895 CET | 49713 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:58.681828976 CET | 443 | 49713 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:58.682056904 CET | 443 | 49713 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:58.684286118 CET | 49713 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:58.684366941 CET | 49713 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:58.684386015 CET | 443 | 49713 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:59.155289888 CET | 443 | 49713 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:59.155349970 CET | 443 | 49713 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:59.155380964 CET | 443 | 49713 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:59.155407906 CET | 443 | 49713 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:59.155452967 CET | 443 | 49713 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:59.155481100 CET | 443 | 49713 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:59.155503988 CET | 49713 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:59.155528069 CET | 443 | 49713 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:59.155541897 CET | 49713 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:59.155738115 CET | 443 | 49713 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:59.155764103 CET | 443 | 49713 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:59.155783892 CET | 49713 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:59.155786991 CET | 443 | 49713 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:59.155803919 CET | 443 | 49713 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:59.155838013 CET | 49713 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:59.159970999 CET | 443 | 49713 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:59.160049915 CET | 49713 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:59.242549896 CET | 443 | 49713 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:59.242599964 CET | 443 | 49713 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:59.242625952 CET | 443 | 49713 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:59.242722988 CET | 443 | 49713 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:59.242734909 CET | 49713 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:59.242974997 CET | 49713 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:59.243025064 CET | 49713 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:59.243041039 CET | 443 | 49713 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:59.243056059 CET | 49713 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:59.243061066 CET | 443 | 49713 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:59.488111973 CET | 49714 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:59.488156080 CET | 443 | 49714 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:59.488250971 CET | 49714 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:59.488595009 CET | 49714 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:59.488607883 CET | 443 | 49714 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:59.945765972 CET | 443 | 49714 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:59.945904016 CET | 49714 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:59.947271109 CET | 49714 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:59.947290897 CET | 443 | 49714 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:59.947524071 CET | 443 | 49714 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:04:59.948836088 CET | 49714 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:59.948983908 CET | 49714 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:04:59.949035883 CET | 443 | 49714 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:00.514718056 CET | 443 | 49714 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:00.514807940 CET | 443 | 49714 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:00.514883041 CET | 49714 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:00.515080929 CET | 49714 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:00.515100956 CET | 443 | 49714 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:00.620748997 CET | 49715 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:00.620805025 CET | 443 | 49715 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:00.620914936 CET | 49715 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:00.621349096 CET | 49715 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:00.621361971 CET | 443 | 49715 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:01.080446959 CET | 443 | 49715 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:01.080622911 CET | 49715 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:01.082247972 CET | 49715 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:01.082268953 CET | 443 | 49715 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:01.082511902 CET | 443 | 49715 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:01.083724976 CET | 49715 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:01.083849907 CET | 49715 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:01.083879948 CET | 443 | 49715 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:01.083940029 CET | 49715 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:01.131342888 CET | 443 | 49715 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:01.572092056 CET | 443 | 49715 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:01.572196007 CET | 443 | 49715 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:01.572326899 CET | 49715 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:01.572526932 CET | 49715 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:01.572546005 CET | 443 | 49715 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:01.758465052 CET | 49717 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:01.758497953 CET | 443 | 49717 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:01.758565903 CET | 49717 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:01.758945942 CET | 49717 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:01.758955002 CET | 443 | 49717 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:02.221824884 CET | 443 | 49717 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:02.222016096 CET | 49717 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:02.223598957 CET | 49717 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:02.223611116 CET | 443 | 49717 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:02.223851919 CET | 443 | 49717 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:02.225168943 CET | 49717 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:02.225357056 CET | 49717 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:02.225392103 CET | 443 | 49717 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:02.225482941 CET | 49717 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:02.225491047 CET | 443 | 49717 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:02.804852009 CET | 443 | 49717 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:02.804965973 CET | 443 | 49717 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:02.805022955 CET | 49717 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:02.805371046 CET | 49717 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:02.805386066 CET | 443 | 49717 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:04.031783104 CET | 49718 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:04.031840086 CET | 443 | 49718 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:04.031924009 CET | 49718 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:04.032331944 CET | 49718 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:04.032349110 CET | 443 | 49718 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:04.498105049 CET | 443 | 49718 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:04.498341084 CET | 49718 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:04.499821901 CET | 49718 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:04.499840021 CET | 443 | 49718 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:04.500087976 CET | 443 | 49718 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:04.502446890 CET | 49718 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:04.502563000 CET | 49718 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:04.502571106 CET | 443 | 49718 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:04.933545113 CET | 443 | 49718 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:04.933659077 CET | 443 | 49718 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:04.933820963 CET | 49718 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:04.933959961 CET | 49718 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:04.933978081 CET | 443 | 49718 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:05.389291048 CET | 49720 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:05.389334917 CET | 443 | 49720 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:05.389447927 CET | 49720 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:05.389786005 CET | 49720 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:05.389801979 CET | 443 | 49720 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:05.841263056 CET | 443 | 49720 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:05.841345072 CET | 49720 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:05.842871904 CET | 49720 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:05.842888117 CET | 443 | 49720 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:05.843116045 CET | 443 | 49720 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:05.885652065 CET | 49720 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:05.896584034 CET | 49720 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:05.897423983 CET | 49720 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:05.897449970 CET | 443 | 49720 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:05.897557020 CET | 49720 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:05.897586107 CET | 443 | 49720 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:05.897680998 CET | 49720 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:05.897696972 CET | 443 | 49720 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:05.897802114 CET | 49720 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:05.897836924 CET | 443 | 49720 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:05.897974968 CET | 49720 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:05.898008108 CET | 443 | 49720 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:05.898144007 CET | 49720 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:05.898171902 CET | 49720 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:05.907521963 CET | 443 | 49720 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:05.907668114 CET | 49720 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:05.907696009 CET | 443 | 49720 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:05.907715082 CET | 49720 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:05.907743931 CET | 443 | 49720 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:05.907816887 CET | 49720 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:05.907852888 CET | 49720 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:05.907876015 CET | 49720 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:05.912355900 CET | 443 | 49720 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:05.912496090 CET | 49720 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:05.912530899 CET | 443 | 49720 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:05.912556887 CET | 49720 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:05.912594080 CET | 49720 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:05.912992001 CET | 443 | 49720 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:07.540271997 CET | 443 | 49720 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:07.540381908 CET | 443 | 49720 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:07.540445089 CET | 49720 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:07.540580034 CET | 49720 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:07.540599108 CET | 443 | 49720 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:07.558578014 CET | 49736 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:07.558619022 CET | 443 | 49736 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:07.558695078 CET | 49736 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:07.559012890 CET | 49736 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:07.559026003 CET | 443 | 49736 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:08.033792973 CET | 443 | 49736 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:08.033859015 CET | 49736 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:08.035224915 CET | 49736 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:08.035233974 CET | 443 | 49736 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:08.035475016 CET | 443 | 49736 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:08.036554098 CET | 49736 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:08.036576033 CET | 49736 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:08.036608934 CET | 443 | 49736 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:08.503876925 CET | 443 | 49736 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:08.504015923 CET | 443 | 49736 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:08.504070044 CET | 49736 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:08.504194021 CET | 49736 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:08.504209995 CET | 443 | 49736 | 104.21.32.1 | 192.168.2.6 |
Jan 1, 2025 22:05:08.504240036 CET | 49736 | 443 | 192.168.2.6 | 104.21.32.1 |
Jan 1, 2025 22:05:08.504245043 CET | 443 | 49736 | 104.21.32.1 | 192.168.2.6 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 1, 2025 22:04:57.123034000 CET | 64545 | 53 | 192.168.2.6 | 1.1.1.1 |
Jan 1, 2025 22:04:57.135765076 CET | 53 | 64545 | 1.1.1.1 | 192.168.2.6 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 1, 2025 22:04:57.123034000 CET | 192.168.2.6 | 1.1.1.1 | 0x575 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 1, 2025 22:04:57.135765076 CET | 1.1.1.1 | 192.168.2.6 | 0x575 | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false | ||
Jan 1, 2025 22:04:57.135765076 CET | 1.1.1.1 | 192.168.2.6 | 0x575 | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false | ||
Jan 1, 2025 22:04:57.135765076 CET | 1.1.1.1 | 192.168.2.6 | 0x575 | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false | ||
Jan 1, 2025 22:04:57.135765076 CET | 1.1.1.1 | 192.168.2.6 | 0x575 | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false | ||
Jan 1, 2025 22:04:57.135765076 CET | 1.1.1.1 | 192.168.2.6 | 0x575 | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false | ||
Jan 1, 2025 22:04:57.135765076 CET | 1.1.1.1 | 192.168.2.6 | 0x575 | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false | ||
Jan 1, 2025 22:04:57.135765076 CET | 1.1.1.1 | 192.168.2.6 | 0x575 | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.6 | 49712 | 104.21.32.1 | 443 | 3960 | C:\Users\user\Desktop\UhsjR3ZFTD.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-01 21:04:57 UTC | 264 | OUT | |
2025-01-01 21:04:57 UTC | 8 | OUT | |
2025-01-01 21:04:58 UTC | 1126 | IN | |
2025-01-01 21:04:58 UTC | 7 | IN | |
2025-01-01 21:04:58 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.6 | 49713 | 104.21.32.1 | 443 | 3960 | C:\Users\user\Desktop\UhsjR3ZFTD.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-01 21:04:58 UTC | 265 | OUT | |
2025-01-01 21:04:58 UTC | 47 | OUT | |
2025-01-01 21:04:59 UTC | 1127 | IN | |
2025-01-01 21:04:59 UTC | 242 | IN | |
2025-01-01 21:04:59 UTC | 1369 | IN | |
2025-01-01 21:04:59 UTC | 1369 | IN | |
2025-01-01 21:04:59 UTC | 1369 | IN | |
2025-01-01 21:04:59 UTC | 1369 | IN | |
2025-01-01 21:04:59 UTC | 1369 | IN | |
2025-01-01 21:04:59 UTC | 1369 | IN | |
2025-01-01 21:04:59 UTC | 1369 | IN | |
2025-01-01 21:04:59 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.6 | 49714 | 104.21.32.1 | 443 | 3960 | C:\Users\user\Desktop\UhsjR3ZFTD.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-01 21:04:59 UTC | 280 | OUT | |
2025-01-01 21:04:59 UTC | 12841 | OUT | |
2025-01-01 21:05:00 UTC | 1134 | IN | |
2025-01-01 21:05:00 UTC | 20 | IN | |
2025-01-01 21:05:00 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.6 | 49715 | 104.21.32.1 | 443 | 3960 | C:\Users\user\Desktop\UhsjR3ZFTD.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-01 21:05:01 UTC | 280 | OUT | |
2025-01-01 21:05:01 UTC | 15087 | OUT | |
2025-01-01 21:05:01 UTC | 1139 | IN | |
2025-01-01 21:05:01 UTC | 20 | IN | |
2025-01-01 21:05:01 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.6 | 49717 | 104.21.32.1 | 443 | 3960 | C:\Users\user\Desktop\UhsjR3ZFTD.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-01 21:05:02 UTC | 277 | OUT | |
2025-01-01 21:05:02 UTC | 15331 | OUT | |
2025-01-01 21:05:02 UTC | 4596 | OUT | |
2025-01-01 21:05:02 UTC | 1139 | IN | |
2025-01-01 21:05:02 UTC | 20 | IN | |
2025-01-01 21:05:02 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.6 | 49718 | 104.21.32.1 | 443 | 3960 | C:\Users\user\Desktop\UhsjR3ZFTD.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-01 21:05:04 UTC | 272 | OUT | |
2025-01-01 21:05:04 UTC | 1185 | OUT | |
2025-01-01 21:05:04 UTC | 1132 | IN | |
2025-01-01 21:05:04 UTC | 20 | IN | |
2025-01-01 21:05:04 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.6 | 49720 | 104.21.32.1 | 443 | 3960 | C:\Users\user\Desktop\UhsjR3ZFTD.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-01 21:05:05 UTC | 278 | OUT | |
2025-01-01 21:05:05 UTC | 15331 | OUT | |
2025-01-01 21:05:05 UTC | 15331 | OUT | |
2025-01-01 21:05:05 UTC | 15331 | OUT | |
2025-01-01 21:05:05 UTC | 15331 | OUT | |
2025-01-01 21:05:05 UTC | 15331 | OUT | |
2025-01-01 21:05:05 UTC | 15331 | OUT | |
2025-01-01 21:05:05 UTC | 15331 | OUT | |
2025-01-01 21:05:05 UTC | 15331 | OUT | |
2025-01-01 21:05:05 UTC | 15331 | OUT | |
2025-01-01 21:05:05 UTC | 15331 | OUT | |
2025-01-01 21:05:07 UTC | 1139 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.6 | 49736 | 104.21.32.1 | 443 | 3960 | C:\Users\user\Desktop\UhsjR3ZFTD.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-01 21:05:08 UTC | 265 | OUT | |
2025-01-01 21:05:08 UTC | 82 | OUT | |
2025-01-01 21:05:08 UTC | 1131 | IN | |
2025-01-01 21:05:08 UTC | 54 | IN | |
2025-01-01 21:05:08 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 16:04:55 |
Start date: | 01/01/2025 |
Path: | C:\Users\user\Desktop\UhsjR3ZFTD.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x6c0000 |
File size: | 835'112 bytes |
MD5 hash: | 51648584FFB4A6398EB1CEF4DA20E457 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 16:04:55 |
Start date: | 01/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff66e660000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 16:04:55 |
Start date: | 01/01/2025 |
Path: | C:\Users\user\Desktop\UhsjR3ZFTD.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x6c0000 |
File size: | 835'112 bytes |
MD5 hash: | 51648584FFB4A6398EB1CEF4DA20E457 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Execution Graph
Execution Coverage: | 8.2% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 2.8% |
Total number of Nodes: | 2000 |
Total number of Limit Nodes: | 33 |
Graph
Function 006F019E Relevance: 42.3, APIs: 10, Strings: 14, Instructions: 295threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006C1C10 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 108libraryfileloaderCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006C20B0 Relevance: 14.1, APIs: 6, Strings: 2, Instructions: 54libraryloadersynchronizationCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006D62B2 Relevance: 10.6, APIs: 4, Strings: 2, Instructions: 74COMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006D6A9A Relevance: 7.7, APIs: 5, Instructions: 197COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006C1DB0 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 78librarymemoryloaderCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006D6F18 Relevance: 3.2, APIs: 2, Instructions: 177COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006D6E02 Relevance: 3.1, APIs: 2, Instructions: 65COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006C2010 Relevance: 3.0, APIs: 2, Instructions: 33COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006D5327 Relevance: 3.0, APIs: 2, Instructions: 22memoryCOMMONLIBRARYCODE
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006C14C0 Relevance: 1.8, APIs: 1, Instructions: 308COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006D74A7 Relevance: 1.6, APIs: 1, Instructions: 142COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006C85D0 Relevance: 1.6, APIs: 1, Instructions: 116COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006D5361 Relevance: 1.5, APIs: 1, Instructions: 32memoryCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006DAE27 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 85COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006D34A0 Relevance: 6.5, APIs: 4, Instructions: 455COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006DB409 Relevance: 6.2, APIs: 4, Instructions: 205COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006C9AD3 Relevance: 6.1, APIs: 4, Instructions: 70COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006CA395 Relevance: 6.0, APIs: 4, Instructions: 25timethreadCOMMONLIBRARYCODE
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006DA9A0 Relevance: 4.7, APIs: 3, Instructions: 205COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006C973B Relevance: 1.7, APIs: 1, Instructions: 242COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006DB358 Relevance: 1.7, APIs: 1, Instructions: 199fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006DAC60 Relevance: 1.6, APIs: 1, Instructions: 83COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006CDE42 Relevance: 1.6, Strings: 1, Instructions: 318COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006DAD80 Relevance: 1.6, APIs: 1, Instructions: 63COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006DAF2D Relevance: 1.5, APIs: 1, Instructions: 48COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006C9AC7 Relevance: 1.5, APIs: 1, Instructions: 3COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006D6C90 Relevance: 1.3, APIs: 1, Instructions: 5memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006C1BA0 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006D8226 Relevance: 10.8, APIs: 7, Instructions: 329COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006D49BC Relevance: 10.8, APIs: 2, Strings: 4, Instructions: 301COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006E2DAC Relevance: 9.3, APIs: 6, Instructions: 292COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006CF258 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 42libraryloaderCOMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006DF5C1 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 27libraryCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006DB1E6 Relevance: 6.1, APIs: 4, Instructions: 82COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006CCA72 Relevance: 6.1, APIs: 4, Instructions: 79COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006DC5DE Relevance: 6.1, APIs: 4, Instructions: 74COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006D9D96 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 191COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006D4DE0 Relevance: 5.4, APIs: 1, Strings: 2, Instructions: 122COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006D464C Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 97COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 5.2% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 55% |
Total number of Nodes: | 313 |
Total number of Limit Nodes: | 24 |
Graph
Function 00438860 Relevance: 32.2, APIs: 11, Strings: 7, Instructions: 666memorycomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00419362 Relevance: 17.9, APIs: 1, Strings: 9, Instructions: 390encryptionCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408640 Relevance: 7.7, APIs: 5, Instructions: 220threadCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440480 Relevance: 2.8, Strings: 2, Instructions: 345COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426000 Relevance: 2.8, Strings: 2, Instructions: 286COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040C22D Relevance: 2.6, Strings: 2, Instructions: 102COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043D910 Relevance: 1.5, APIs: 1, Instructions: 14libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043DCE9 Relevance: 1.4, Strings: 1, Instructions: 121COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043FB80 Relevance: .2, Instructions: 232COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409D5E Relevance: 1.6, APIs: 1, Instructions: 83libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043D880 Relevance: 1.6, APIs: 1, Instructions: 55COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00436805 Relevance: 1.5, APIs: 1, Instructions: 44COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042DE0C Relevance: 1.5, APIs: 1, Instructions: 26COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004316B2 Relevance: 1.5, APIs: 1, Instructions: 23COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040C660 Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040C69E Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E6A5 Relevance: 1.5, APIs: 1, Instructions: 17COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043BCB0 Relevance: 1.5, APIs: 1, Instructions: 13memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043BC90 Relevance: 1.5, APIs: 1, Instructions: 9memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042238D Relevance: 13.0, Strings: 10, Instructions: 549COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00438040 Relevance: 10.2, Strings: 8, Instructions: 194COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006DAE27 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 85COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426360 Relevance: 6.9, Strings: 5, Instructions: 628COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00418740 Relevance: 6.6, Strings: 5, Instructions: 346COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408EF0 Relevance: 6.5, Strings: 5, Instructions: 259COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006D34A0 Relevance: 6.5, APIs: 4, Instructions: 455COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006DB409 Relevance: 6.2, APIs: 4, Instructions: 205COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006C9AD3 Relevance: 6.1, APIs: 4, Instructions: 70COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041DE90 Relevance: 4.6, Strings: 3, Instructions: 867COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00417FE1 Relevance: 4.3, Strings: 3, Instructions: 580COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041C3CC Relevance: 4.3, Strings: 3, Instructions: 574COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00439C70 Relevance: 4.2, Strings: 3, Instructions: 441COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004274A5 Relevance: 4.1, Strings: 3, Instructions: 362COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00414777 Relevance: 3.9, Strings: 3, Instructions: 188COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00424974 Relevance: 3.2, Strings: 2, Instructions: 715COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043C510 Relevance: 3.2, Strings: 2, Instructions: 701COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426340 Relevance: 3.2, Strings: 2, Instructions: 688COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00414DC0 Relevance: 3.0, Strings: 2, Instructions: 530COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040C6F0 Relevance: 3.0, Strings: 2, Instructions: 519COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00416C90 Relevance: 2.7, Strings: 2, Instructions: 196COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E262 Relevance: 2.6, Strings: 2, Instructions: 148COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E850 Relevance: 2.6, Strings: 2, Instructions: 76COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042C1A3 Relevance: 2.6, Strings: 2, Instructions: 63COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00423A60 Relevance: 1.7, APIs: 1, Instructions: 240COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042A050 Relevance: 1.7, Strings: 1, Instructions: 428COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041CA60 Relevance: 1.7, Strings: 1, Instructions: 414COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440130 Relevance: 1.6, Strings: 1, Instructions: 312COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041CECA Relevance: 1.5, Strings: 1, Instructions: 217COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043F830 Relevance: 1.4, Strings: 1, Instructions: 143COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004155DB Relevance: 1.4, Strings: 1, Instructions: 105COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041BFCA Relevance: 1.3, Strings: 1, Instructions: 91COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042BA79 Relevance: 1.3, Strings: 1, Instructions: 88COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042C140 Relevance: 1.3, Strings: 1, Instructions: 62COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E6E0 Relevance: 1.3, Strings: 1, Instructions: 49COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00416148 Relevance: 1.0, Instructions: 974COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043F0CB Relevance: .7, Instructions: 655COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004073C0 Relevance: .6, Instructions: 608COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043F1B0 Relevance: .6, Instructions: 590COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043F2F6 Relevance: .5, Instructions: 483COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043F330 Relevance: .5, Instructions: 478COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00421C80 Relevance: .5, Instructions: 462COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004393D0 Relevance: .5, Instructions: 453COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043F450 Relevance: .5, Instructions: 452COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043F3C0 Relevance: .4, Instructions: 443COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00428100 Relevance: .3, Instructions: 281COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043FE20 Relevance: .3, Instructions: 272COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004390A0 Relevance: .3, Instructions: 256COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043C1B0 Relevance: .3, Instructions: 252COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042895A Relevance: .2, Instructions: 249COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043EA80 Relevance: .2, Instructions: 164COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004398A0 Relevance: .1, Instructions: 146COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041AD80 Relevance: .1, Instructions: 131COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E051 Relevance: .1, Instructions: 118COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00424F91 Relevance: .1, Instructions: 114COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043C440 Relevance: .1, Instructions: 82COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415882 Relevance: .1, Instructions: 80COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00435410 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00429A90 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042C0CD Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E19A Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402B60 Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043DFB3 Relevance: .0, Instructions: 43COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00420BD3 Relevance: .0, Instructions: 11COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043D818 Relevance: .0, Instructions: 10COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006C1C10 Relevance: 12.4, APIs: 6, Strings: 1, Instructions: 108libraryloaderCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006C20B0 Relevance: 12.3, APIs: 5, Strings: 2, Instructions: 54libraryloadersynchronizationCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006D8226 Relevance: 10.8, APIs: 7, Instructions: 329COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006D49BC Relevance: 10.8, APIs: 2, Strings: 4, Instructions: 301COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006D62B2 Relevance: 10.6, APIs: 4, Strings: 2, Instructions: 74COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006E2DAC Relevance: 9.3, APIs: 6, Instructions: 292COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006CF258 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 42libraryloaderCOMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006D6A9A Relevance: 7.7, APIs: 5, Instructions: 197COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006DF5C1 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 27libraryCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006DB1E6 Relevance: 6.1, APIs: 4, Instructions: 82COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006CCA72 Relevance: 6.1, APIs: 4, Instructions: 79COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006DC5DE Relevance: 6.1, APIs: 4, Instructions: 74COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006CA395 Relevance: 6.0, APIs: 4, Instructions: 25timethreadCOMMONLIBRARYCODE
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006D9D96 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 191COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006D4DE0 Relevance: 5.4, APIs: 1, Strings: 2, Instructions: 122COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006D9AFA Relevance: 5.4, APIs: 1, Strings: 2, Instructions: 113COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006D464C Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 97COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006C1DB0 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 78libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|