Windows
Analysis Report
file.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- file.exe (PID: 6496 cmdline:
"C:\Users\ user\Deskt op\file.ex e" MD5: E9F13D0B330A73ECE569B6115D2AC4F0) - conhost.exe (PID: 6520 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - file.exe (PID: 6664 cmdline:
"C:\Users\ user\Deskt op\file.ex e" MD5: E9F13D0B330A73ECE569B6115D2AC4F0) - WerFault.exe (PID: 7000 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 6 496 -s 160 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["abruptyopsn.shop", "noisycuttej.shop", "cloudewahsj.shop", "wholersorie.shop", "tirepublicerj.shop", "rabidcowse.shop", "framekgirus.shop", "nearycrepso.shop"], "Build id": "XpLY32--"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-04T22:58:08.034243+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49733 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:09.019156+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49735 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:10.221347+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49737 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:11.328741+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49740 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:12.715275+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49742 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:13.997441+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49744 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:15.331970+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49745 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:17.342354+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49746 | 104.21.64.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-04T22:58:08.548914+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49733 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:09.491546+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49735 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:17.803148+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49746 | 104.21.64.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-04T22:58:08.548914+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49733 | 104.21.64.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-04T22:58:09.491546+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.4 | 49735 | 104.21.64.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-04T22:58:08.034243+0100 | 2058629 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49733 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:09.019156+0100 | 2058629 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49735 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:10.221347+0100 | 2058629 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49737 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:11.328741+0100 | 2058629 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49740 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:12.715275+0100 | 2058629 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49742 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:13.997441+0100 | 2058629 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49744 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:15.331970+0100 | 2058629 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49745 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:17.342354+0100 | 2058629 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49746 | 104.21.64.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-04T22:58:07.459055+0100 | 2058628 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 50365 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-04T22:58:11.823080+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49740 | 104.21.64.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-04T22:58:15.336589+0100 | 2843864 | 1 | A Network Trojan was detected | 192.168.2.4 | 49745 | 104.21.64.1 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Code function: | 2_2_00415D89 |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 2_2_00441816 | |
Source: | Code function: | 2_2_0043D0D0 | |
Source: | Code function: | 2_2_0043D0D0 | |
Source: | Code function: | 2_2_0040C080 | |
Source: | Code function: | 2_2_004442E0 | |
Source: | Code function: | 2_2_00418BA2 | |
Source: | Code function: | 2_2_00444C20 | |
Source: | Code function: | 2_2_00430F03 | |
Source: | Code function: | 2_2_0042F716 | |
Source: | Code function: | 2_2_00417054 | |
Source: | Code function: | 2_2_0041B021 | |
Source: | Code function: | 2_2_0041B021 | |
Source: | Code function: | 2_2_004438E0 | |
Source: | Code function: | 2_2_004438F9 | |
Source: | Code function: | 2_2_004438FB | |
Source: | Code function: | 2_2_00422880 | |
Source: | Code function: | 2_2_00427885 | |
Source: | Code function: | 2_2_0041F170 | |
Source: | Code function: | 2_2_004421E9 | |
Source: | Code function: | 2_2_004421E9 | |
Source: | Code function: | 2_2_0041618C | |
Source: | Code function: | 2_2_0041BA52 | |
Source: | Code function: | 2_2_0041BA52 | |
Source: | Code function: | 2_2_0041BA52 | |
Source: | Code function: | 2_2_00402210 | |
Source: | Code function: | 2_2_0043A230 | |
Source: | Code function: | 2_2_00431AF5 | |
Source: | Code function: | 2_2_0040B280 | |
Source: | Code function: | 2_2_00440A90 | |
Source: | Code function: | 2_2_00441B50 | |
Source: | Code function: | 2_2_00409360 | |
Source: | Code function: | 2_2_00422370 | |
Source: | Code function: | 2_2_0042FB7D | |
Source: | Code function: | 2_2_00408320 | |
Source: | Code function: | 2_2_00419B30 | |
Source: | Code function: | 2_2_0041F3E0 | |
Source: | Code function: | 2_2_0041B3F2 | |
Source: | Code function: | 2_2_0041AB90 | |
Source: | Code function: | 2_2_00428C62 | |
Source: | Code function: | 2_2_00427C10 | |
Source: | Code function: | 2_2_00414C30 | |
Source: | Code function: | 2_2_00418492 | |
Source: | Code function: | 2_2_0043CD40 | |
Source: | Code function: | 2_2_0042C5E0 | |
Source: | Code function: | 2_2_0041B58F | |
Source: | Code function: | 2_2_004195B6 | |
Source: | Code function: | 2_2_004195B6 | |
Source: | Code function: | 2_2_0043E6E0 | |
Source: | Code function: | 2_2_0043E6E0 | |
Source: | Code function: | 2_2_00430F4E | |
Source: | Code function: | 2_2_00430F54 | |
Source: | Code function: | 2_2_0041A770 | |
Source: | Code function: | 2_2_00427FC0 | |
Source: | Code function: | 2_2_00427FC0 | |
Source: | Code function: | 2_2_004437D0 | |
Source: | Code function: | 2_2_0042A7F0 | |
Source: | Code function: | 2_2_0042A7F0 | |
Source: | Code function: | 2_2_00427FFD | |
Source: | Code function: | 2_2_0042AF92 | |
Source: | Code function: | 2_2_0042AF92 | |
Source: | Code function: | 2_2_0042AFB0 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 2_2_00437A60 |
Source: | Code function: | 2_2_00437A60 |
Source: | Code function: | 2_2_00437C10 |
Source: | Code function: | 2_2_0043D0D0 | |
Source: | Code function: | 2_2_0040E16E | |
Source: | Code function: | 2_2_00408A60 | |
Source: | Code function: | 2_2_004442E0 | |
Source: | Code function: | 2_2_00421B30 | |
Source: | Code function: | 2_2_00418BA2 | |
Source: | Code function: | 2_2_00444C20 | |
Source: | Code function: | 2_2_0043CE90 | |
Source: | Code function: | 2_2_00428750 | |
Source: | Code function: | 2_2_00425713 | |
Source: | Code function: | 2_2_0042F716 | |
Source: | Code function: | 2_2_00437850 | |
Source: | Code function: | 2_2_0041906A | |
Source: | Code function: | 2_2_00426010 | |
Source: | Code function: | 2_2_004438E0 | |
Source: | Code function: | 2_2_004180F0 | |
Source: | Code function: | 2_2_004438F9 | |
Source: | Code function: | 2_2_004438FB | |
Source: | Code function: | 2_2_00427885 | |
Source: | Code function: | 2_2_0041D8B0 | |
Source: | Code function: | 2_2_00406950 | |
Source: | Code function: | 2_2_00444950 | |
Source: | Code function: | 2_2_0043210B | |
Source: | Code function: | 2_2_00403910 | |
Source: | Code function: | 2_2_00429917 | |
Source: | Code function: | 2_2_00406120 | |
Source: | Code function: | 2_2_0040B92C | |
Source: | Code function: | 2_2_0042F1C1 | |
Source: | Code function: | 2_2_004239EB | |
Source: | Code function: | 2_2_00421180 | |
Source: | Code function: | 2_2_0041618C | |
Source: | Code function: | 2_2_0043099F | |
Source: | Code function: | 2_2_0041F9A0 | |
Source: | Code function: | 2_2_0041D1B0 | |
Source: | Code function: | 2_2_0042E9B0 | |
Source: | Code function: | 2_2_0041BA52 | |
Source: | Code function: | 2_2_0043025E | |
Source: | Code function: | 2_2_0042621B | |
Source: | Code function: | 2_2_0042BA20 | |
Source: | Code function: | 2_2_00417222 | |
Source: | Code function: | 2_2_00443A30 | |
Source: | Code function: | 2_2_00443AC0 | |
Source: | Code function: | 2_2_004302CD | |
Source: | Code function: | 2_2_0040F2D0 | |
Source: | Code function: | 2_2_0040B280 | |
Source: | Code function: | 2_2_004352B0 | |
Source: | Code function: | 2_2_00402B40 | |
Source: | Code function: | 2_2_00443B60 | |
Source: | Code function: | 2_2_00409B70 | |
Source: | Code function: | 2_2_00422370 | |
Source: | Code function: | 2_2_00429B7B | |
Source: | Code function: | 2_2_0042FB7D | |
Source: | Code function: | 2_2_00405B00 | |
Source: | Code function: | 2_2_00440B00 | |
Source: | Code function: | 2_2_00428B10 | |
Source: | Code function: | 2_2_00419B30 | |
Source: | Code function: | 2_2_00411BDE | |
Source: | Code function: | 2_2_004123EC | |
Source: | Code function: | 2_2_00428C62 | |
Source: | Code function: | 2_2_0043C460 | |
Source: | Code function: | 2_2_0043B410 | |
Source: | Code function: | 2_2_00441C26 | |
Source: | Code function: | 2_2_004064C0 | |
Source: | Code function: | 2_2_0042F4E1 | |
Source: | Code function: | 2_2_004324EE | |
Source: | Code function: | 2_2_0041D4A0 | |
Source: | Code function: | 2_2_00408D10 | |
Source: | Code function: | 2_2_0043E520 | |
Source: | Code function: | 2_2_00442DCA | |
Source: | Code function: | 2_2_00415DD8 | |
Source: | Code function: | 2_2_00425DA0 | |
Source: | Code function: | 2_2_004085B0 | |
Source: | Code function: | 2_2_00447648 | |
Source: | Code function: | 2_2_00409660 | |
Source: | Code function: | 2_2_00404E20 | |
Source: | Code function: | 2_2_0043C6C0 | |
Source: | Code function: | 2_2_0043E6E0 | |
Source: | Code function: | 2_2_004186E5 | |
Source: | Code function: | 2_2_00444680 | |
Source: | Code function: | 2_2_0041DE90 | |
Source: | Code function: | 2_2_0043DF60 | |
Source: | Code function: | 2_2_00429F7C | |
Source: | Code function: | 2_2_00433707 | |
Source: | Code function: | 2_2_00402F10 | |
Source: | Code function: | 2_2_00427FC0 | |
Source: | Code function: | 2_2_004437D0 | |
Source: | Code function: | 2_2_00433FDF | |
Source: | Code function: | 2_2_004127E0 | |
Source: | Code function: | 2_2_0042A7F0 | |
Source: | Code function: | 2_2_00434FF0 | |
Source: | Code function: | 2_2_0042AF92 |
Source: | Code function: | ||
Source: | Code function: |
Source: | Process created: |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Classification label: |
Source: | Code function: | 2_2_0043D0D0 |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Static PE information: |
Source: | Code function: | 2_2_004499A2 | |
Source: | Code function: | 2_2_0044AAD5 | |
Source: | Code function: | 2_2_00447979 |
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 2_2_00442080 |
Source: | Code function: | 0_2_024F7F41 | |
Source: | Code function: | 0_2_024F80BE |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Code function: | 0_2_024F7F41 |
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 211 Process Injection | 23 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 1 Query Registry | Remote Services | 1 Screen Capture | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Disable or Modify Tools | LSASS Memory | 231 Security Software Discovery | Remote Desktop Protocol | 11 Archive Collected Data | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 211 Process Injection | Security Account Manager | 23 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | 31 Data from Local System | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 111 Deobfuscate/Decode Files or Information | NTDS | 1 Process Discovery | Distributed Component Object Model | 2 Clipboard Data | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 3 Obfuscated Files or Information | LSA Secrets | 1 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 11 Software Packing | Cached Domain Credentials | 22 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 Timestomp | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 DLL Side-Loading | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
39% | ReversingLabs | Win32.Trojan.Nekark | ||
44% | Virustotal | Browse | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
tirepublicerj.shop | 104.21.64.1 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
true |
| unknown | |
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.64.1 | tirepublicerj.shop | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1584228 |
Start date and time: | 2025-01-04 22:57:05 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 54s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 10 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | file.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@5/5@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 20.189.173.20, 40.126.32.136, 172.202.163.200, 13.107.246.45
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
16:58:07 | API Interceptor | |
16:58:28 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.64.1 | Get hash | malicious | CMSBrute | Browse |
| |
Get hash | malicious | FormBook | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | Blank Grabber | Browse |
| ||
Get hash | malicious | Blank Grabber | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_6fc0c6414e325294145af42a306ed092fe2ab813_fef88e97_35b9d2f3-f8fe-4576-80ac-97efb64f4355\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.8843944994528008 |
Encrypted: | false |
SSDEEP: | 192:Pg6BuZv5PxA0LR3VIxaGGzuiFcyZ24IO8yB:YoG55bLR38aHzuiFcyY4IO8i |
MD5: | 5E97E250F5B90218E5B1E749CA569A92 |
SHA1: | CD77A9BD82EBEB5D9D270499B547CA7D8C53034B |
SHA-256: | 3D7F83E3EBBF79708A521F35782AA8481489DD84689C824127FB1F0B755CF689 |
SHA-512: | 627EB8C36F475229B37A79BD05ACC7D5AE2C137DAA5B6D3089C9DE06C33EF2A5CDC1172651F2E1AEFF39F56AC1644BB85E4E480B3BD8B91B4432175A89C81C48 |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 153012 |
Entropy (8bit): | 3.7291700678866038 |
Encrypted: | false |
SSDEEP: | 1536:aKqs1UuBojR+pN4uE2aOuKLTgNAR7ZMtT1tbsCDNcOoOV4Z:5qs1wI4uEq/LTgkwBB/oOV4 |
MD5: | 21329B7956618E4D438785662BBE53DE |
SHA1: | 74CE125156EB344DC44CD160AB9B6876E5AF53EE |
SHA-256: | CA214AFD35711718C699DDC92468C999E4ECD692BE3C5ACF5B8DB3755A67815F |
SHA-512: | B0910FDDD5113F345BF3E63ECB50C390A8B29BA284A1DCE22BD5689CC64FD7E350A1F5AE9077E4FD5ED4E7BFD15C7A79FB7EFF94E993D99AC94BC778FAD5EE1D |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8356 |
Entropy (8bit): | 3.688024919952929 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJ3CjH6c6Y9QSUTnYgmf6VVJ3prj89bnbZsfstjm:R6lXJEH6c6YKSUTnYgmf8VJunbyfK6 |
MD5: | 698564804E7E81093D9A200E16830F0F |
SHA1: | 37DC11F0AC2C373FF86E37CF512DDFE9D25BD9F8 |
SHA-256: | F8B520C6A974E0790ABFF8380A97AF0B9A78FF6A5B036E22F12B1F3B18614B76 |
SHA-512: | 08324641798F5428A2FED0B524B1877684D66F68968BCD6CEA20AB62691EFC004B1FD737A6DA116B684489558EEB4B9DC0AF4EBAA3BCA26F1B24F030EEE1622A |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4720 |
Entropy (8bit): | 4.428868521094459 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsmhJg77aI9yVWpW8VYtYm8M4JtR0dxPcf6FKo+q8vER0dxPcfvQQlBFd:uIjfII74k7V1JtRlf+KERlfoQlBFd |
MD5: | 67429910F17DDF9E51B49593A26D3E89 |
SHA1: | 1A288451ED25FB441BB0DCB47B2B590094931396 |
SHA-256: | 85BF9A26425C710F1BA3D6FCACCC258669EE8BD95865BC506B55FB90FAD49FEC |
SHA-512: | 3CC696675BA03076F3DFD4BAD7B72F149075B7B4C28B5308824FC51994AC90AA90D33FA5B24D240904E60611A9F88145FF1F636D33F383EFBFC09FA4B12E7F3A |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.4655873110375905 |
Encrypted: | false |
SSDEEP: | 6144:eIXfpi67eLPU9skLmb0b40WSPKaJG8nAgejZMMhA2gX4WABl0uNPdwBCswSb1m:zXD940WlLZMM6YFH1+1m |
MD5: | 68966FD0980199EFDFE1999D24E4786B |
SHA1: | C5953B62EA8E5B1DCBE8CB8C52F9D37660A623B1 |
SHA-256: | C856470B5EE731A2AE84BE6FBDEC705B0C0F66D94103A0ED86DC0BCEE0AF4D4B |
SHA-512: | A5698EF42A51C4091A1F2E01503057512DF5E4D280C4BD8E8F71DBDCB6A2178E783A8AA61815E6E91AEF7F2EB43223091F767ED8FA7E2E0B27F4744A6CD53BFD |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.898283829047742 |
TrID: |
|
File name: | file.exe |
File size: | 390'696 bytes |
MD5: | e9f13d0b330a73ece569b6115d2ac4f0 |
SHA1: | ae46dcc7a771c7adf161ddd0f48b6b5b5f22bfda |
SHA256: | 9c4afe3e68312e44bbaa3f122a251bb087f72d94adf8d432bdd8382087086c92 |
SHA512: | d1281ae02e0430d01339213c737c3aec2675b6a6983d6da170bc0afcaee1b70a89b654baa250d7e69211219f315a28ec22b5f7faa1ea5382144e7a85630bc267 |
SSDEEP: | 6144:72pwktDrDuMt4Bgj04zLS/70E7IodJ6vsVzsooEAPmIV49g2/GzrtXAlGSIxj76o:L4Cj45zA7Fv6vsVOzm9t/Gzr9AsVP6Qt |
TLSH: | CA8402092BC48320C5D4263291E34D211FE6B6576AF3EA89BDC545EB0A46FE05E4BBDC |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...AL................0.................. ........@.. .......................@............`................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x40dade |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0xB98C4C41 [Thu Aug 23 20:32:01 2068 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Signature Valid: | false |
Signature Issuer: | CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 5F1B6B6C408DB2B4D60BAA489E9A0E5A |
Thumbprint SHA-1: | 15F760D82C79D22446CC7D4806540BF632B1E104 |
Thumbprint SHA-256: | 28AF76241322F210DA473D9569EFF6F27124C4CA9F43933DA547E8D068B0A95D |
Serial: | 0997C56CAA59055394D9A9CDB8BEEB56 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xda90 | 0x4b | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xe000 | 0x598 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x5d000 | 0x2628 | .BSS |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x10000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0xda41 | 0x1c | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0xbae4 | 0xbc00 | 19f0b50531f98a20a9a65d39c849687c | False | 0.5685048204787234 | data | 6.109180699584785 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0xe000 | 0x598 | 0x600 | 0952258526daaa3e0a687f3a06f53a5d | False | 0.4114583333333333 | data | 4.03365806651715 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x10000 | 0xc | 0x200 | 8213ad787590c8df00be095c16f90f29 | False | 0.044921875 | data | 0.08153941234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.BSS | 0x12000 | 0x50800 | 0x50800 | 2222f87b85ae0a7a267bc50cd850219a | False | 1.0003366411102483 | data | 7.999369568013561 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0xe0a0 | 0x30c | data | 0.41923076923076924 | ||
RT_MANIFEST | 0xe3ac | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-04T22:58:07.459055+0100 | 2058628 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (tirepublicerj .shop) | 1 | 192.168.2.4 | 50365 | 1.1.1.1 | 53 | UDP |
2025-01-04T22:58:08.034243+0100 | 2058629 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (tirepublicerj .shop in TLS SNI) | 1 | 192.168.2.4 | 49733 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:08.034243+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49733 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:08.548914+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49733 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:08.548914+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49733 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:09.019156+0100 | 2058629 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (tirepublicerj .shop in TLS SNI) | 1 | 192.168.2.4 | 49735 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:09.019156+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49735 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:09.491546+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.4 | 49735 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:09.491546+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49735 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:10.221347+0100 | 2058629 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (tirepublicerj .shop in TLS SNI) | 1 | 192.168.2.4 | 49737 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:10.221347+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49737 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:11.328741+0100 | 2058629 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (tirepublicerj .shop in TLS SNI) | 1 | 192.168.2.4 | 49740 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:11.328741+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49740 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:11.823080+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49740 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:12.715275+0100 | 2058629 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (tirepublicerj .shop in TLS SNI) | 1 | 192.168.2.4 | 49742 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:12.715275+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49742 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:13.997441+0100 | 2058629 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (tirepublicerj .shop in TLS SNI) | 1 | 192.168.2.4 | 49744 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:13.997441+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49744 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:15.331970+0100 | 2058629 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (tirepublicerj .shop in TLS SNI) | 1 | 192.168.2.4 | 49745 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:15.331970+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49745 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:15.336589+0100 | 2843864 | ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 | 1 | 192.168.2.4 | 49745 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:17.342354+0100 | 2058629 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (tirepublicerj .shop in TLS SNI) | 1 | 192.168.2.4 | 49746 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:17.342354+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49746 | 104.21.64.1 | 443 | TCP |
2025-01-04T22:58:17.803148+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49746 | 104.21.64.1 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 4, 2025 22:58:07.477515936 CET | 49733 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:07.477565050 CET | 443 | 49733 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:07.477632999 CET | 49733 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:07.480812073 CET | 49733 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:07.480829000 CET | 443 | 49733 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:08.034168959 CET | 443 | 49733 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:08.034243107 CET | 49733 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:08.039426088 CET | 49733 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:08.039438963 CET | 443 | 49733 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:08.039817095 CET | 443 | 49733 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:08.093066931 CET | 49733 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:08.129007101 CET | 49733 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:08.129065990 CET | 49733 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:08.129118919 CET | 443 | 49733 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:08.548911095 CET | 443 | 49733 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:08.549027920 CET | 443 | 49733 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:08.549179077 CET | 49733 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:08.550983906 CET | 49733 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:08.551017046 CET | 443 | 49733 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:08.551039934 CET | 49733 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:08.551047087 CET | 443 | 49733 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:08.558742046 CET | 49735 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:08.558780909 CET | 443 | 49735 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:08.558873892 CET | 49735 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:08.559150934 CET | 49735 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:08.559166908 CET | 443 | 49735 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:09.019071102 CET | 443 | 49735 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:09.019155979 CET | 49735 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:09.025194883 CET | 49735 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:09.025224924 CET | 443 | 49735 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:09.025451899 CET | 443 | 49735 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:09.028140068 CET | 49735 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:09.028189898 CET | 49735 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:09.028213978 CET | 443 | 49735 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:09.491539001 CET | 443 | 49735 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:09.491607904 CET | 443 | 49735 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:09.491655111 CET | 443 | 49735 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:09.491714001 CET | 443 | 49735 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:09.491718054 CET | 49735 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:09.491748095 CET | 443 | 49735 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:09.491763115 CET | 49735 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:09.491786957 CET | 443 | 49735 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:09.491827965 CET | 49735 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:09.491830111 CET | 443 | 49735 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:09.491842985 CET | 443 | 49735 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:09.491878033 CET | 49735 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:09.492322922 CET | 443 | 49735 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:09.498073101 CET | 443 | 49735 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:09.498120070 CET | 443 | 49735 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:09.498142958 CET | 49735 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:09.498163939 CET | 443 | 49735 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:09.499347925 CET | 49735 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:09.579449892 CET | 443 | 49735 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:09.579541922 CET | 443 | 49735 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:09.579575062 CET | 443 | 49735 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:09.579612017 CET | 49735 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:09.579629898 CET | 443 | 49735 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:09.579678059 CET | 49735 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:09.579724073 CET | 443 | 49735 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:09.579773903 CET | 49735 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:09.579894066 CET | 49735 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:09.579909086 CET | 443 | 49735 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:09.579924107 CET | 49735 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:09.579930067 CET | 443 | 49735 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:09.715475082 CET | 49737 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:09.715533972 CET | 443 | 49737 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:09.715601921 CET | 49737 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:09.716062069 CET | 49737 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:09.716080904 CET | 443 | 49737 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:10.221235991 CET | 443 | 49737 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:10.221347094 CET | 49737 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:10.222412109 CET | 49737 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:10.222423077 CET | 443 | 49737 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:10.222664118 CET | 443 | 49737 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:10.229598999 CET | 49737 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:10.229731083 CET | 49737 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:10.229764938 CET | 443 | 49737 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:10.229890108 CET | 49737 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:10.229898930 CET | 443 | 49737 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:10.848170996 CET | 443 | 49737 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:10.848289013 CET | 443 | 49737 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:10.848495960 CET | 49737 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:10.848576069 CET | 49737 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:10.848596096 CET | 443 | 49737 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:10.865011930 CET | 49740 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:10.865048885 CET | 443 | 49740 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:10.865201950 CET | 49740 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:10.865513086 CET | 49740 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:10.865526915 CET | 443 | 49740 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:11.328669071 CET | 443 | 49740 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:11.328741074 CET | 49740 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:11.330002069 CET | 49740 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:11.330007076 CET | 443 | 49740 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:11.330234051 CET | 443 | 49740 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:11.338871002 CET | 49740 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:11.338983059 CET | 49740 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:11.339001894 CET | 443 | 49740 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:11.823075056 CET | 443 | 49740 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:11.823189974 CET | 443 | 49740 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:11.823266029 CET | 49740 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:11.844310045 CET | 49740 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:11.844329119 CET | 443 | 49740 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:12.220915079 CET | 49742 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:12.220966101 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:12.221041918 CET | 49742 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:12.242572069 CET | 49742 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:12.242589951 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:12.715194941 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:12.715275049 CET | 49742 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:12.717034101 CET | 49742 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:12.717041016 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:12.717282057 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:12.725873947 CET | 49742 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:12.726010084 CET | 49742 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:12.726047993 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:12.726119041 CET | 49742 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:12.726130009 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:13.328754902 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:13.328852892 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:13.328931093 CET | 49742 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:13.329130888 CET | 49742 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:13.329144001 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:13.530878067 CET | 49744 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:13.530926943 CET | 443 | 49744 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:13.531084061 CET | 49744 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:13.534310102 CET | 49744 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:13.534326077 CET | 443 | 49744 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:13.997315884 CET | 443 | 49744 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:13.997441053 CET | 49744 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:13.998975039 CET | 49744 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:13.998985052 CET | 443 | 49744 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:13.999214888 CET | 443 | 49744 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:14.008567095 CET | 49744 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:14.008651018 CET | 49744 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:14.008656979 CET | 443 | 49744 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:14.495029926 CET | 443 | 49744 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:14.495150089 CET | 443 | 49744 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:14.495246887 CET | 49744 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:14.495518923 CET | 49744 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:14.495537043 CET | 443 | 49744 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:14.847070932 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:14.847110033 CET | 443 | 49745 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:14.847208023 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:14.847548962 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:14.847562075 CET | 443 | 49745 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:15.331903934 CET | 443 | 49745 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:15.331969976 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:15.333563089 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:15.333581924 CET | 443 | 49745 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:15.333823919 CET | 443 | 49745 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:15.335072994 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:15.335871935 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:15.335905075 CET | 443 | 49745 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:15.335990906 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:15.336028099 CET | 443 | 49745 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:15.336119890 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:15.336185932 CET | 443 | 49745 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:15.336308956 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:15.336334944 CET | 443 | 49745 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:15.336461067 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:15.336483002 CET | 443 | 49745 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:15.336658955 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:15.336695910 CET | 443 | 49745 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:15.336704969 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:15.336802006 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:15.336838961 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:15.345963001 CET | 443 | 49745 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:15.346142054 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:15.346169949 CET | 443 | 49745 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:15.346195936 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:15.346214056 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:15.346267939 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:15.346288919 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:15.350990057 CET | 443 | 49745 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:15.351104021 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:15.351133108 CET | 443 | 49745 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:16.857780933 CET | 443 | 49745 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:16.857892036 CET | 443 | 49745 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:16.857959986 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:16.858196020 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:16.858216047 CET | 443 | 49745 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:16.863373995 CET | 49746 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:16.863423109 CET | 443 | 49746 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:16.863517046 CET | 49746 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:16.863807917 CET | 49746 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:16.863820076 CET | 443 | 49746 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:17.342168093 CET | 443 | 49746 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:17.342354059 CET | 49746 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:17.344381094 CET | 49746 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:17.344393015 CET | 443 | 49746 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:17.344635963 CET | 443 | 49746 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:17.345947027 CET | 49746 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:17.345968962 CET | 49746 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:17.346021891 CET | 443 | 49746 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:17.803164005 CET | 443 | 49746 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:17.803267002 CET | 443 | 49746 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:17.803340912 CET | 49746 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:17.803514957 CET | 49746 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:17.803540945 CET | 443 | 49746 | 104.21.64.1 | 192.168.2.4 |
Jan 4, 2025 22:58:17.803558111 CET | 49746 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 4, 2025 22:58:17.803565979 CET | 443 | 49746 | 104.21.64.1 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 4, 2025 22:58:07.459054947 CET | 50365 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 4, 2025 22:58:07.472575903 CET | 53 | 50365 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 4, 2025 22:58:07.459054947 CET | 192.168.2.4 | 1.1.1.1 | 0xa231 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 4, 2025 22:58:07.472575903 CET | 1.1.1.1 | 192.168.2.4 | 0xa231 | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false | ||
Jan 4, 2025 22:58:07.472575903 CET | 1.1.1.1 | 192.168.2.4 | 0xa231 | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false | ||
Jan 4, 2025 22:58:07.472575903 CET | 1.1.1.1 | 192.168.2.4 | 0xa231 | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false | ||
Jan 4, 2025 22:58:07.472575903 CET | 1.1.1.1 | 192.168.2.4 | 0xa231 | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false | ||
Jan 4, 2025 22:58:07.472575903 CET | 1.1.1.1 | 192.168.2.4 | 0xa231 | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false | ||
Jan 4, 2025 22:58:07.472575903 CET | 1.1.1.1 | 192.168.2.4 | 0xa231 | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false | ||
Jan 4, 2025 22:58:07.472575903 CET | 1.1.1.1 | 192.168.2.4 | 0xa231 | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49733 | 104.21.64.1 | 443 | 6664 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-04 21:58:08 UTC | 265 | OUT | |
2025-01-04 21:58:08 UTC | 8 | OUT | |
2025-01-04 21:58:08 UTC | 1132 | IN | |
2025-01-04 21:58:08 UTC | 7 | IN | |
2025-01-04 21:58:08 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49735 | 104.21.64.1 | 443 | 6664 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-04 21:58:09 UTC | 266 | OUT | |
2025-01-04 21:58:09 UTC | 42 | OUT | |
2025-01-04 21:58:09 UTC | 1135 | IN | |
2025-01-04 21:58:09 UTC | 234 | IN | |
2025-01-04 21:58:09 UTC | 1369 | IN | |
2025-01-04 21:58:09 UTC | 1369 | IN | |
2025-01-04 21:58:09 UTC | 173 | IN | |
2025-01-04 21:58:09 UTC | 1369 | IN | |
2025-01-04 21:58:09 UTC | 1369 | IN | |
2025-01-04 21:58:09 UTC | 1369 | IN | |
2025-01-04 21:58:09 UTC | 1369 | IN | |
2025-01-04 21:58:09 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49737 | 104.21.64.1 | 443 | 6664 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-04 21:58:10 UTC | 282 | OUT | |
2025-01-04 21:58:10 UTC | 15331 | OUT | |
2025-01-04 21:58:10 UTC | 2815 | OUT | |
2025-01-04 21:58:10 UTC | 1133 | IN | |
2025-01-04 21:58:10 UTC | 20 | IN | |
2025-01-04 21:58:10 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49740 | 104.21.64.1 | 443 | 6664 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-04 21:58:11 UTC | 274 | OUT | |
2025-01-04 21:58:11 UTC | 8725 | OUT | |
2025-01-04 21:58:11 UTC | 1137 | IN | |
2025-01-04 21:58:11 UTC | 20 | IN | |
2025-01-04 21:58:11 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49742 | 104.21.64.1 | 443 | 6664 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-04 21:58:12 UTC | 279 | OUT | |
2025-01-04 21:58:12 UTC | 15331 | OUT | |
2025-01-04 21:58:12 UTC | 5071 | OUT | |
2025-01-04 21:58:13 UTC | 1135 | IN | |
2025-01-04 21:58:13 UTC | 20 | IN | |
2025-01-04 21:58:13 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49744 | 104.21.64.1 | 443 | 6664 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-04 21:58:14 UTC | 280 | OUT | |
2025-01-04 21:58:14 UTC | 976 | OUT | |
2025-01-04 21:58:14 UTC | 1132 | IN | |
2025-01-04 21:58:14 UTC | 20 | IN | |
2025-01-04 21:58:14 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49745 | 104.21.64.1 | 443 | 6664 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-04 21:58:15 UTC | 286 | OUT | |
2025-01-04 21:58:15 UTC | 15331 | OUT | |
2025-01-04 21:58:15 UTC | 15331 | OUT | |
2025-01-04 21:58:15 UTC | 15331 | OUT | |
2025-01-04 21:58:15 UTC | 15331 | OUT | |
2025-01-04 21:58:15 UTC | 15331 | OUT | |
2025-01-04 21:58:15 UTC | 15331 | OUT | |
2025-01-04 21:58:15 UTC | 15331 | OUT | |
2025-01-04 21:58:15 UTC | 15331 | OUT | |
2025-01-04 21:58:15 UTC | 15331 | OUT | |
2025-01-04 21:58:15 UTC | 15331 | OUT | |
2025-01-04 21:58:16 UTC | 1133 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49746 | 104.21.64.1 | 443 | 6664 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-04 21:58:17 UTC | 266 | OUT | |
2025-01-04 21:58:17 UTC | 77 | OUT | |
2025-01-04 21:58:17 UTC | 1127 | IN | |
2025-01-04 21:58:17 UTC | 54 | IN | |
2025-01-04 21:58:17 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 16:58:06 |
Start date: | 04/01/2025 |
Path: | C:\Users\user\Desktop\file.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x100000 |
File size: | 390'696 bytes |
MD5 hash: | E9F13D0B330A73ECE569B6115D2AC4F0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 16:58:06 |
Start date: | 04/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 16:58:06 |
Start date: | 04/01/2025 |
Path: | C:\Users\user\Desktop\file.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xb00000 |
File size: | 390'696 bytes |
MD5 hash: | E9F13D0B330A73ECE569B6115D2AC4F0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 5 |
Start time: | 16:58:06 |
Start date: | 04/01/2025 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x610000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 11.1% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 57.1% |
Total number of Nodes: | 14 |
Total number of Limit Nodes: | 2 |
Graph
Function 024F7F41 Relevance: 40.5, APIs: 10, Strings: 13, Instructions: 294threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 024F80BE Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 82threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 023628C1 Relevance: 1.7, APIs: 1, Instructions: 219memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 023606E0 Relevance: 1.6, APIs: 1, Instructions: 54memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 7.6% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 48.7% |
Total number of Nodes: | 189 |
Total number of Limit Nodes: | 16 |
Graph
Function 0043D0D0 Relevance: 32.5, APIs: 11, Strings: 7, Instructions: 957memorycomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00421B30 Relevance: 9.3, Strings: 7, Instructions: 527COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408A60 Relevance: 7.7, APIs: 5, Instructions: 216threadCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040C080 Relevance: 6.4, Strings: 5, Instructions: 104COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00418BA2 Relevance: 5.4, Strings: 4, Instructions: 367COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00428750 Relevance: 4.1, Strings: 3, Instructions: 328COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00430F54 Relevance: 3.1, APIs: 2, Instructions: 96COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00430F4E Relevance: 3.1, APIs: 2, Instructions: 81COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415D89 Relevance: 1.6, APIs: 1, Instructions: 141COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00430F03 Relevance: 1.6, APIs: 1, Instructions: 79COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00444C20 Relevance: 1.6, Strings: 1, Instructions: 312COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00442080 Relevance: 1.5, APIs: 1, Instructions: 14libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004442E0 Relevance: .3, Instructions: 321COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F4E1 Relevance: .2, Instructions: 198COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043CE90 Relevance: .2, Instructions: 166COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441B50 Relevance: .1, Instructions: 110COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441816 Relevance: .1, Instructions: 58COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004423C5 Relevance: 3.0, APIs: 2, Instructions: 26COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00436312 Relevance: 1.7, APIs: 1, Instructions: 163memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F222 Relevance: 1.6, APIs: 1, Instructions: 69COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043B967 Relevance: 1.6, APIs: 1, Instructions: 67COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00442020 Relevance: 1.5, APIs: 1, Instructions: 30memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00437180 Relevance: 1.5, APIs: 1, Instructions: 24COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00434865 Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040D400 Relevance: 1.5, APIs: 1, Instructions: 17COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040D433 Relevance: 1.5, APIs: 1, Instructions: 17COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004404E2 Relevance: 1.5, APIs: 1, Instructions: 13memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004404B0 Relevance: 1.5, APIs: 1, Instructions: 9memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004127E0 Relevance: 183.9, APIs: 3, Strings: 101, Instructions: 1937COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042621B Relevance: 33.7, Strings: 26, Instructions: 1202COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041618C Relevance: 14.8, Strings: 11, Instructions: 1044COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409B70 Relevance: 11.7, Strings: 9, Instructions: 418COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040B280 Relevance: 10.4, Strings: 8, Instructions: 384COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409360 Relevance: 10.3, Strings: 8, Instructions: 272COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409660 Relevance: 9.2, Strings: 7, Instructions: 448COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043C6C0 Relevance: 9.1, Strings: 7, Instructions: 361COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00428B10 Relevance: 8.0, Strings: 6, Instructions: 513COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427FC0 Relevance: 5.4, Strings: 4, Instructions: 431COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041906A Relevance: 5.3, Strings: 4, Instructions: 328COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004437D0 Relevance: 4.4, Strings: 3, Instructions: 647COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004438E0 Relevance: 4.3, Strings: 3, Instructions: 577COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004438FB Relevance: 4.3, Strings: 3, Instructions: 566COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004438F9 Relevance: 4.3, Strings: 3, Instructions: 565COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440B00 Relevance: 4.3, Strings: 3, Instructions: 555COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00443A30 Relevance: 4.2, Strings: 3, Instructions: 488COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004239EB Relevance: 4.2, Strings: 3, Instructions: 458COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00422370 Relevance: 4.2, Strings: 3, Instructions: 457COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00443AC0 Relevance: 4.2, Strings: 3, Instructions: 453COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00421180 Relevance: 4.2, Strings: 3, Instructions: 428COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043099F Relevance: 4.0, Strings: 3, Instructions: 251COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040F2D0 Relevance: 3.9, Strings: 3, Instructions: 168COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404E20 Relevance: 3.3, Strings: 2, Instructions: 792COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041F9A0 Relevance: 3.3, Strings: 2, Instructions: 771COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042BA20 Relevance: 3.1, APIs: 2, Instructions: 146COMMON
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00422880 Relevance: 3.0, Strings: 2, Instructions: 455COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00443B60 Relevance: 2.9, Strings: 2, Instructions: 441COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00429F7C Relevance: 2.9, Strings: 2, Instructions: 421COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004195B6 Relevance: 2.9, Strings: 2, Instructions: 363COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F1C1 Relevance: 2.8, Strings: 2, Instructions: 284COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043025E Relevance: 2.8, Strings: 2, Instructions: 282COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004302CD Relevance: 2.8, Strings: 2, Instructions: 281COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004123EC Relevance: 2.8, Strings: 2, Instructions: 271COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415DD8 Relevance: 2.7, Strings: 2, Instructions: 215COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427885 Relevance: 2.7, Strings: 2, Instructions: 211COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E6E0 Relevance: 2.0, Strings: 1, Instructions: 749COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042AF92 Relevance: 2.0, Strings: 1, Instructions: 719COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004324EE Relevance: 1.8, Strings: 1, Instructions: 514COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426010 Relevance: 1.7, APIs: 1, Instructions: 205COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00447648 Relevance: 1.6, Strings: 1, Instructions: 396COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043DF60 Relevance: 1.6, Strings: 1, Instructions: 391COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00414C30 Relevance: 1.6, Strings: 1, Instructions: 384COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004085B0 Relevance: 1.6, Strings: 1, Instructions: 314COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043B410 Relevance: 1.5, Strings: 1, Instructions: 299COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041BA52 Relevance: 1.5, Strings: 1, Instructions: 293COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406120 Relevance: 1.5, Strings: 1, Instructions: 265COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00444950 Relevance: 1.5, Strings: 1, Instructions: 257COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004180F0 Relevance: 1.5, Strings: 1, Instructions: 255COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042AFB0 Relevance: 1.5, Strings: 1, Instructions: 222COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041D8B0 Relevance: 1.5, Strings: 1, Instructions: 202COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00418492 Relevance: 1.4, Strings: 1, Instructions: 158COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00417054 Relevance: 1.4, Strings: 1, Instructions: 146COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00442DCA Relevance: 1.4, Strings: 1, Instructions: 130COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004421E9 Relevance: 1.3, Strings: 1, Instructions: 96COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041B58F Relevance: 1.3, Strings: 1, Instructions: 79COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427FFD Relevance: 1.3, Strings: 1, Instructions: 67COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406950 Relevance: .7, Instructions: 665COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402F10 Relevance: .7, Instructions: 657COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004352B0 Relevance: .6, Instructions: 627COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403910 Relevance: .6, Instructions: 600COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405B00 Relevance: .5, Instructions: 539COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00428C62 Relevance: .4, Instructions: 434COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00433FDF Relevance: .4, Instructions: 423COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040B92C Relevance: .4, Instructions: 383COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004186E5 Relevance: .4, Instructions: 379COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00433707 Relevance: .3, Instructions: 348COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041D4A0 Relevance: .3, Instructions: 337COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004064C0 Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441C26 Relevance: .3, Instructions: 289COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427C10 Relevance: .3, Instructions: 277COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041D1B0 Relevance: .3, Instructions: 274COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043210B Relevance: .2, Instructions: 246COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00444680 Relevance: .2, Instructions: 244COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00434FF0 Relevance: .2, Instructions: 240COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041F170 Relevance: .2, Instructions: 204COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041AB90 Relevance: .2, Instructions: 196COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043C460 Relevance: .2, Instructions: 189COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00437850 Relevance: .2, Instructions: 188COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041A770 Relevance: .2, Instructions: 170COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402210 Relevance: .2, Instructions: 166COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043CD40 Relevance: .1, Instructions: 143COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408D10 Relevance: .1, Instructions: 123COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E520 Relevance: .1, Instructions: 117COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041B021 Relevance: .1, Instructions: 114COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042E9B0 Relevance: .1, Instructions: 114COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00431AF5 Relevance: .1, Instructions: 109COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408320 Relevance: .1, Instructions: 107COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402B40 Relevance: .1, Instructions: 102COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041B3F2 Relevance: .1, Instructions: 96COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043A230 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042C5E0 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440A90 Relevance: .0, Instructions: 46COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041F3E0 Relevance: .0, Instructions: 21COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|