Windows
Analysis Report
loader.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- loader.exe (PID: 7320 cmdline:
"C:\Users\ user\Deskt op\loader. exe" MD5: 756CC98F850799FC6783BD07E91CAB52) - conhost.exe (PID: 7328 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - loader.exe (PID: 7388 cmdline:
"C:\Users\ user\Deskt op\loader. exe" MD5: 756CC98F850799FC6783BD07E91CAB52) - WerFault.exe (PID: 7480 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 320 -s 940 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["undesirabkel.click", "rabidcowse.shop", "tirepublicerj.shop", "nearycrepso.shop", "noisycuttej.shop", "framekgirus.shop", "cloudewahsj.shop", "abruptyopsn.shop", "wholersorie.shop"], "Build id": "LPnhqo--hcjjgmpsojvf"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T19:28:05.273757+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49730 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:06.272985+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49732 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:07.385844+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49734 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:08.797316+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49737 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:09.936606+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49739 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:11.187401+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49742 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:12.489654+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49744 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:16.025216+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49747 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T19:28:05.774460+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:06.754386+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49732 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:16.531093+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49747 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T19:28:05.774460+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T19:28:06.754386+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.4 | 49732 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T19:28:05.273757+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49730 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:06.272985+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49732 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:07.385844+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49734 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:08.797316+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49737 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:09.936606+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49739 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:11.187401+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49742 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:12.489654+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49744 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:16.025216+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49747 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T19:28:04.783111+0100 | 2058550 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 59795 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T19:28:09.331455+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49737 | 188.114.97.3 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Code function: | 2_2_00419B52 |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 2_2_0040A01E | |
Source: | Code function: | 2_2_0040A01E | |
Source: | Code function: | 2_2_0040A2AA | |
Source: | Code function: | 2_2_0043CB40 | |
Source: | Code function: | 2_2_0042FCB0 | |
Source: | Code function: | 2_2_0042FCB0 | |
Source: | Code function: | 2_2_0040CFC7 | |
Source: | Code function: | 2_2_0040CFC7 | |
Source: | Code function: | 2_2_0040AFA0 | |
Source: | Code function: | 2_2_00430850 | |
Source: | Code function: | 2_2_0042A860 | |
Source: | Code function: | 2_2_00439060 | |
Source: | Code function: | 2_2_00409000 | |
Source: | Code function: | 2_2_0042F0C5 | |
Source: | Code function: | 2_2_0042B8E0 | |
Source: | Code function: | 2_2_004308B5 | |
Source: | Code function: | 2_2_00444140 | |
Source: | Code function: | 2_2_0041B160 | |
Source: | Code function: | 2_2_0043E101 | |
Source: | Code function: | 2_2_0043E101 | |
Source: | Code function: | 2_2_0043E101 | |
Source: | Code function: | 2_2_0043D900 | |
Source: | Code function: | 2_2_00419102 | |
Source: | Code function: | 2_2_00419102 | |
Source: | Code function: | 2_2_0042810F | |
Source: | Code function: | 2_2_00440110 | |
Source: | Code function: | 2_2_0042F131 | |
Source: | Code function: | 2_2_0040A9D4 | |
Source: | Code function: | 2_2_004311E3 | |
Source: | Code function: | 2_2_004219E0 | |
Source: | Code function: | 2_2_00409AD0 | |
Source: | Code function: | 2_2_00409AD0 | |
Source: | Code function: | 2_2_0041BC81 | |
Source: | Code function: | 2_2_004092F0 | |
Source: | Code function: | 2_2_00405AB0 | |
Source: | Code function: | 2_2_00405AB0 | |
Source: | Code function: | 2_2_0041C34B | |
Source: | Code function: | 2_2_0041C34B | |
Source: | Code function: | 2_2_0041C34B | |
Source: | Code function: | 2_2_0042B8E0 | |
Source: | Code function: | 2_2_0042EB92 | |
Source: | Code function: | 2_2_0040ABA5 | |
Source: | Code function: | 2_2_0040B460 | |
Source: | Code function: | 2_2_0042C400 | |
Source: | Code function: | 2_2_0042DC10 | |
Source: | Code function: | 2_2_00415C18 | |
Source: | Code function: | 2_2_0042E4C0 | |
Source: | Code function: | 2_2_00428CE0 | |
Source: | Code function: | 2_2_00428CE0 | |
Source: | Code function: | 2_2_004274F0 | |
Source: | Code function: | 2_2_004274F0 | |
Source: | Code function: | 2_2_0041DC80 | |
Source: | Code function: | 2_2_0041DC80 | |
Source: | Code function: | 2_2_00417485 | |
Source: | Code function: | 2_2_00440490 | |
Source: | Code function: | 2_2_004414B4 | |
Source: | Code function: | 2_2_0041B4B9 | |
Source: | Code function: | 2_2_0041B56E | |
Source: | Code function: | 2_2_00416517 | |
Source: | Code function: | 2_2_00416517 | |
Source: | Code function: | 2_2_0043DD20 | |
Source: | Code function: | 2_2_0041FDE0 | |
Source: | Code function: | 2_2_00407610 | |
Source: | Code function: | 2_2_00407610 | |
Source: | Code function: | 2_2_004156F7 | |
Source: | Code function: | 2_2_004156F7 | |
Source: | Code function: | 2_2_00443E80 | |
Source: | Code function: | 2_2_0041E700 | |
Source: | Code function: | 2_2_004307F7 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 2_2_00436B80 |
Source: | Code function: | 2_2_03AA1000 |
Source: | Code function: | 2_2_00436B80 |
Source: | Code function: | 2_2_0043759A |
Source: | Code function: | 0_2_00BE0870 | |
Source: | Code function: | 0_2_00BE0861 | |
Source: | Code function: | 2_2_0040A01E | |
Source: | Code function: | 2_2_00428960 | |
Source: | Code function: | 2_2_0040D973 | |
Source: | Code function: | 2_2_0043C900 | |
Source: | Code function: | 2_2_004089B0 | |
Source: | Code function: | 2_2_00439A02 | |
Source: | Code function: | 2_2_00425A91 | |
Source: | Code function: | 2_2_0043CB40 | |
Source: | Code function: | 2_2_00443B40 | |
Source: | Code function: | 2_2_00419B52 | |
Source: | Code function: | 2_2_004223B0 | |
Source: | Code function: | 2_2_00444410 | |
Source: | Code function: | 2_2_0042FCB0 | |
Source: | Code function: | 2_2_004126F0 | |
Source: | Code function: | 2_2_0040AFA0 | |
Source: | Code function: | 2_2_0043C050 | |
Source: | Code function: | 2_2_0042F85B | |
Source: | Code function: | 2_2_0042A860 | |
Source: | Code function: | 2_2_00406830 | |
Source: | Code function: | 2_2_00429838 | |
Source: | Code function: | 2_2_004260D0 | |
Source: | Code function: | 2_2_004280D0 | |
Source: | Code function: | 2_2_004430D0 | |
Source: | Code function: | 2_2_004038E0 | |
Source: | Code function: | 2_2_0042B8E0 | |
Source: | Code function: | 2_2_004368E0 | |
Source: | Code function: | 2_2_00444140 | |
Source: | Code function: | 2_2_0043B15C | |
Source: | Code function: | 2_2_0043E101 | |
Source: | Code function: | 2_2_0043D900 | |
Source: | Code function: | 2_2_0040C1CF | |
Source: | Code function: | 2_2_004431E0 | |
Source: | Code function: | 2_2_0041A190 | |
Source: | Code function: | 2_2_004231A0 | |
Source: | Code function: | 2_2_00420260 | |
Source: | Code function: | 2_2_0041BA1B | |
Source: | Code function: | 2_2_00409AD0 | |
Source: | Code function: | 2_2_00402AE0 | |
Source: | Code function: | 2_2_004432E0 | |
Source: | Code function: | 2_2_004162E6 | |
Source: | Code function: | 2_2_0041728C | |
Source: | Code function: | 2_2_00404290 | |
Source: | Code function: | 2_2_00405AB0 | |
Source: | Code function: | 2_2_0043C2B0 | |
Source: | Code function: | 2_2_00426350 | |
Source: | Code function: | 2_2_00411B5A | |
Source: | Code function: | 2_2_00443370 | |
Source: | Code function: | 2_2_00442B00 | |
Source: | Code function: | 2_2_0042B310 | |
Source: | Code function: | 2_2_00431B23 | |
Source: | Code function: | 2_2_0041CB22 | |
Source: | Code function: | 2_2_0042B8E0 | |
Source: | Code function: | 2_2_004063A0 | |
Source: | Code function: | 2_2_0042A3A9 | |
Source: | Code function: | 2_2_0040B460 | |
Source: | Code function: | 2_2_0043546D | |
Source: | Code function: | 2_2_00443400 | |
Source: | Code function: | 2_2_00415C18 | |
Source: | Code function: | 2_2_0042FC19 | |
Source: | Code function: | 2_2_00414C30 | |
Source: | Code function: | 2_2_0042E4C0 | |
Source: | Code function: | 2_2_00428CC0 | |
Source: | Code function: | 2_2_00440CD0 | |
Source: | Code function: | 2_2_00428CE0 | |
Source: | Code function: | 2_2_004274F0 | |
Source: | Code function: | 2_2_0041DC80 | |
Source: | Code function: | 2_2_00417485 | |
Source: | Code function: | 2_2_004084B0 | |
Source: | Code function: | 2_2_00429D4A | |
Source: | Code function: | 2_2_00427D60 | |
Source: | Code function: | 2_2_00440500 | |
Source: | Code function: | 2_2_00416517 | |
Source: | Code function: | 2_2_00426531 | |
Source: | Code function: | 2_2_004345C0 | |
Source: | Code function: | 2_2_004095F0 | |
Source: | Code function: | 2_2_00430D90 | |
Source: | Code function: | 2_2_00404DB0 | |
Source: | Code function: | 2_2_004325B5 | |
Source: | Code function: | 2_2_0041CB22 | |
Source: | Code function: | 2_2_00407610 | |
Source: | Code function: | 2_2_00408E10 | |
Source: | Code function: | 2_2_00417E35 | |
Source: | Code function: | 2_2_004366C0 | |
Source: | Code function: | 2_2_0041C6D0 | |
Source: | Code function: | 2_2_00402EE0 | |
Source: | Code function: | 2_2_00435EF3 | |
Source: | Code function: | 2_2_00443E80 | |
Source: | Code function: | 2_2_0040A68C | |
Source: | Code function: | 2_2_0040DE8E | |
Source: | Code function: | 2_2_0043069B | |
Source: | Code function: | 2_2_0043DEA0 | |
Source: | Code function: | 2_2_00432EA5 | |
Source: | Code function: | 2_2_00439EBB | |
Source: | Code function: | 2_2_0042AF62 | |
Source: | Code function: | 2_2_0041DFE0 |
Source: | Code function: | ||
Source: | Code function: |
Source: | Process created: |
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Classification label: |
Source: | Code function: | 2_2_0043CB40 |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | String found in binary or memory: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 2_2_0044C2EC | |
Source: | Code function: | 2_2_0044BAB0 | |
Source: | Code function: | 2_2_00446BFF | |
Source: | Code function: | 2_2_0044B766 |
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_2-14832 |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 2_2_00441AA0 |
Source: | Code function: | 0_2_02A18621 | |
Source: | Code function: | 0_2_02A1879E |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Code function: | 0_2_02A18621 |
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Disable or Modify Tools | 2 OS Credential Dumping | 1 File and Directory Discovery | Remote Services | 11 Archive Collected Data | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 2 Command and Scripting Interpreter | Boot or Logon Initialization Scripts | 211 Process Injection | 111 Deobfuscate/Decode Files or Information | LSASS Memory | 22 System Information Discovery | Remote Desktop Protocol | 31 Data from Local System | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 1 PowerShell | Logon Script (Windows) | Logon Script (Windows) | 3 Obfuscated Files or Information | Security Account Manager | 1 Query Registry | SMB/Windows Admin Shares | 1 Screen Capture | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 11 Software Packing | NTDS | 231 Security Software Discovery | Distributed Component Object Model | 3 Clipboard Data | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Timestomp | LSA Secrets | 23 Virtualization/Sandbox Evasion | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 1 Process Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 23 Virtualization/Sandbox Evasion | DCSync | 1 Application Window Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 211 Process Injection | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
32% | ReversingLabs | Win32.Trojan.Generic | ||
100% | Avira | TR/Dropper.MSIL.Gen | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
undesirabkel.click | 188.114.97.3 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
true |
| unknown | |
false | high | ||
false | high | ||
false | high | ||
true |
| unknown | |
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
188.114.97.3 | undesirabkel.click | European Union | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1584534 |
Start date and time: | 2025-01-05 19:27:10 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 41s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 10 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | loader.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@5/5@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 20.42.65.92, 40.126.32.72, 52.149.20.212, 13.107.246.45
- Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: loader.exe
Time | Type | Description |
---|---|---|
13:28:04 | API Interceptor | |
13:28:15 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
188.114.97.3 | Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
undesirabkel.click | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC, PureLog Stealer | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loader.exe_bf5bb1cb7ed6bbe96185736026b7345197bc6_d3a0ac04_c9aa6422-b519-42fe-80ae-02101ce9fdd4\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.8829047368971201 |
Encrypted: | false |
SSDEEP: | 96:6q2uFc3cygcKLqRBs0hLjTOAqyS3QXIDcQlc6VcEdcw3F+BHUHZ0ownOgHkEwH3Q:/m3cxqRBoA0LR3UaGGzuiFcTZ24IO8C |
MD5: | C8FE172A0F7715E051A5CA48FA322A30 |
SHA1: | 6A021ADFC83364FD79C7B819E8B1F3159C076B09 |
SHA-256: | B92712FD66D0E1F643F96E30B0B88B73407BB75BE0BF8592E32B8A1EE4964446 |
SHA-512: | 801FF6E9AC84A4BE583680ADF075E9571E0318C2C35D19B4C7A3502FAE1DCD651CEDD60586C2839C0B5AC703DD30D268D07AC5EBE9155B41F89DEEE043D0553B |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 162689 |
Entropy (8bit): | 3.6470697976724864 |
Encrypted: | false |
SSDEEP: | 1536:hKPkNuBojR1pN4uE2aOALhhDLTgckAjyFtTS+CDcNWb5I:csrp4uEqohhDLTgc4udcN++ |
MD5: | 5737D69DFBCEE9C895BEB03A919BC972 |
SHA1: | 69B4A893820D3D34D04A4DE6F7772A4505D10558 |
SHA-256: | 1A76C441803C25E4B4559FA9F78A38CA1BE98EC10FBFED5C47C290522AEB83E2 |
SHA-512: | 04184FFDEA55F1EB42953195704F087CC094069FCA4A31BB017485A72E111143898AD2B9A29E59E15E2A2D293ED0349B00214F27C4CDD29711DEF46331C5D8AA |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8374 |
Entropy (8bit): | 3.684882250212788 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJ2jS6lzQZp6Y93SU9pGgmfFVJupr089b8XsfnoUm:R6lXJYS6lzC6YNSU9pGgmfFVJ68cfK |
MD5: | 193E888914733E570ED10C7B6C0C3745 |
SHA1: | 745E1BE23A3424E0EBB97A8719F1985B11C34DF9 |
SHA-256: | BF255965D84DD2F2FB6C1D597F73F57FAAE0F7DEA8650073E56D507F6A59B2D8 |
SHA-512: | 9ACC45B393DA9E5ED1D5EBBEF41C3F4685C062B8BF6488D204DADC895CFF9469B1F25AD95C67E31C5D04831728CDD31DFBCB139F6C732798F6E297BE7BAA2B80 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4672 |
Entropy (8bit): | 4.4310659609846335 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zskJg77aI9ACSVWpW8VY6Ym8M4JgdxPcf6FJ+q8vAdxPcfF/nA1d:uIjfiI7qCSk7VSJxf2KRfF/nA1d |
MD5: | DDC1E3CBECB580E37F8782BD462C0F32 |
SHA1: | 1CEBB0B81318306CCBBFF95CED8FE47BE575574B |
SHA-256: | 329DC81143B8CB11288CFEC1CEB642E904F951EE7E89571E95D7383BB2B91C10 |
SHA-512: | 568996248E68325A2BE3071B11AEEC0DBA252961F6ADA5E5F3E757237B5828177C4040B2401F27F41CC501DC98D87F1CB2C8689FFCA04F68AA3E43E398CA1E99 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.465485320834446 |
Encrypted: | false |
SSDEEP: | 6144:8IXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNudwBCswSbB:BXD94+WlLZMM6YFHA+B |
MD5: | B680F4F0AEC74C85D327016C3D3890F5 |
SHA1: | 70F1F5177A484234479F5FE9A2E0067AE64DDBA2 |
SHA-256: | EF4AC039AC51F147090221153C6AE686616EF2260827F105243AB062B677CE23 |
SHA-512: | 64DDF0DF79669E09DD01EB4476570A265FA953429596659DCF52986AC150CA381A1AAEBB82EDFE32F458CE5786896FADC09D825AD9397DCAC31B0C1A93B334CD |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 0.5726337847479376 |
TrID: |
|
File name: | loader.exe |
File size: | 8'750'080 bytes |
MD5: | 756cc98f850799fc6783bd07e91cab52 |
SHA1: | 5e00f9dfdf3ebeeb9a7fa9177081704f200796cd |
SHA256: | 64a3d0f8623f9f27d8275349698641464a6d16295ece889c47611c9b84d90927 |
SHA512: | 812ca872181a465da7520a1d35650e627be0dcf9c0e69b565d922e769a03435fd96c5de2c1c5bd7886b612150553e3f4ce2dc66eba7bcfab48347d483b22eee1 |
SSDEEP: | 6144:79vDaZsyLEytXezKn30u5V8htQ0XFLcr7Hf/ouoM9QhP6INgaQZMyKl1mRYeK+s:xraZLQytXezKku5WXWr7frf/KlQeVl |
TLSH: | EA9612759987DAB1D20E9C3454A3009349F5A749A307BF8FFE9A4618DB137CF2092DC6 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....C,...............0.................. ........@.. ....................................`................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x40a4be |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0xB22C430A [Sun Sep 21 17:53:14 2064 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xa470 | 0x4b | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xc000 | 0x242 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xe000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0xa422 | 0x1c | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x84c4 | 0x8600 | e05f1acca24b974a8126be170dff517b | False | 0.5043726679104478 | data | 5.950953039580874 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0xc000 | 0x242 | 0x400 | 14d8e51a66bfa2cb04d0bad62fb2e968 | False | 0.3037109375 | data | 3.5160679793070893 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xe000 | 0xc | 0x200 | 15941323991b3ba9288d6bda059fba10 | False | 0.044921875 | data | 0.08153941234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.bss | 0x10000 | 0x4f400 | 0x4f400 | 492e2e4d4bf828eda49671d796af379c | False | 1.0003265477129337 | data | 7.999441028712607 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_MANIFEST | 0xc058 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T19:28:04.783111+0100 | 2058550 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (undesirabkel .click) | 1 | 192.168.2.4 | 59795 | 1.1.1.1 | 53 | UDP |
2025-01-05T19:28:05.273757+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49730 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:05.273757+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49730 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:05.774460+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49730 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:05.774460+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49730 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:06.272985+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49732 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:06.272985+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49732 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:06.754386+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.4 | 49732 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:06.754386+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49732 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:07.385844+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49734 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:07.385844+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49734 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:08.797316+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49737 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:08.797316+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49737 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:09.331455+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49737 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:09.936606+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49739 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:09.936606+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49739 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:11.187401+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49742 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:11.187401+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49742 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:12.489654+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49744 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:12.489654+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49744 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:16.025216+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49747 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:16.025216+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49747 | 188.114.97.3 | 443 | TCP |
2025-01-05T19:28:16.531093+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49747 | 188.114.97.3 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 5, 2025 19:28:04.802619934 CET | 49730 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:04.802673101 CET | 443 | 49730 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:04.802834988 CET | 49730 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:04.805480957 CET | 49730 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:04.805495024 CET | 443 | 49730 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:05.273679018 CET | 443 | 49730 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:05.273756981 CET | 49730 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:05.278239965 CET | 49730 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:05.278251886 CET | 443 | 49730 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:05.278491974 CET | 443 | 49730 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:05.325757027 CET | 49730 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:05.365035057 CET | 49730 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:05.365273952 CET | 49730 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:05.365298986 CET | 443 | 49730 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:05.774455070 CET | 443 | 49730 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:05.774555922 CET | 443 | 49730 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:05.774633884 CET | 49730 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:05.776495934 CET | 49730 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:05.776510954 CET | 443 | 49730 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:05.776843071 CET | 49730 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:05.776849031 CET | 443 | 49730 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:05.783849001 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:05.783886909 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:05.783948898 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:05.784204006 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:05.784216881 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:06.272886992 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:06.272984982 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:06.300836086 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:06.300849915 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:06.301126957 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:06.302745104 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:06.302860975 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:06.302875996 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:06.754390955 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:06.754443884 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:06.754482031 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:06.754514933 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:06.754524946 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:06.754539013 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:06.754559040 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:06.754571915 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:06.754607916 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:06.754607916 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:06.754621029 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:06.754657984 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:06.754663944 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:06.755091906 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:06.755126953 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:06.755134106 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:06.755141020 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:06.755191088 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:06.759062052 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:06.810142994 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:06.844696045 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:06.846612930 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:06.846647024 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:06.846672058 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:06.846681118 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:06.846726894 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:06.846733093 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:06.846746922 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:06.846796036 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:06.846946955 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:06.846957922 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:06.846967936 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:06.846973896 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:06.928878069 CET | 49734 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:06.928896904 CET | 443 | 49734 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:06.929008007 CET | 49734 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:06.929327011 CET | 49734 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:06.929337978 CET | 443 | 49734 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:07.385766983 CET | 443 | 49734 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:07.385843992 CET | 49734 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:07.387260914 CET | 49734 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:07.387265921 CET | 443 | 49734 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:07.387504101 CET | 443 | 49734 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:07.394431114 CET | 49734 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:07.394575119 CET | 49734 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:07.394608974 CET | 443 | 49734 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:07.394673109 CET | 49734 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:07.394681931 CET | 443 | 49734 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:08.302692890 CET | 443 | 49734 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:08.302799940 CET | 443 | 49734 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:08.303229094 CET | 49734 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:08.303389072 CET | 49734 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:08.303400040 CET | 443 | 49734 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:08.321259975 CET | 49737 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:08.321290016 CET | 443 | 49737 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:08.321377039 CET | 49737 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:08.321628094 CET | 49737 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:08.321641922 CET | 443 | 49737 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:08.797213078 CET | 443 | 49737 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:08.797316074 CET | 49737 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:08.798530102 CET | 49737 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:08.798537016 CET | 443 | 49737 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:08.798760891 CET | 443 | 49737 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:08.809423923 CET | 49737 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:08.809533119 CET | 49737 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:08.809565067 CET | 443 | 49737 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:09.331459999 CET | 443 | 49737 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:09.331563950 CET | 443 | 49737 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:09.331630945 CET | 49737 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:09.357018948 CET | 49737 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:09.357036114 CET | 443 | 49737 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:09.449690104 CET | 49739 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:09.449742079 CET | 443 | 49739 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:09.449809074 CET | 49739 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:09.450464964 CET | 49739 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:09.450483084 CET | 443 | 49739 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:09.936507940 CET | 443 | 49739 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:09.936605930 CET | 49739 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:09.938374996 CET | 49739 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:09.938386917 CET | 443 | 49739 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:09.938621044 CET | 443 | 49739 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:09.940077066 CET | 49739 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:09.940210104 CET | 49739 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:09.940246105 CET | 443 | 49739 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:09.940325022 CET | 49739 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:09.940335989 CET | 443 | 49739 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:10.567162037 CET | 443 | 49739 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:10.567262888 CET | 443 | 49739 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:10.567358971 CET | 49739 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:10.567548990 CET | 49739 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:10.567559004 CET | 443 | 49739 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:10.709353924 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:10.709383965 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:10.709465981 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:10.709856987 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:10.709868908 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:11.187196970 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:11.187401056 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:11.188688040 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:11.188695908 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:11.188936949 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:11.196902990 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:11.196995974 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:11.197000980 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:11.651036024 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:11.651135921 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:11.651191950 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:11.651351929 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:11.651366949 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:11.997894049 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:11.997924089 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:11.997994900 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:11.998253107 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:11.998262882 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:12.489573002 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:12.489654064 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:12.490909100 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:12.490917921 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:12.491131067 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:12.492393970 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:12.493160963 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:12.493185043 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:12.493289948 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:12.493325949 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:12.493449926 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:12.493482113 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:12.493619919 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:12.493649006 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:12.493796110 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:12.493828058 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:12.494004965 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:12.494033098 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:12.494040966 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:12.494052887 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:12.494234085 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:12.494262934 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:12.494283915 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:12.494425058 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:12.494460106 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:12.503329992 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:12.503532887 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:12.503559113 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:12.503585100 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:12.503598928 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:12.503629923 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:12.508178949 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:15.562730074 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:15.562829971 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:15.562985897 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:15.563051939 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:15.563072920 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:15.567374945 CET | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:15.567409992 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:15.567488909 CET | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:15.567815065 CET | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:15.567828894 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:16.025156975 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:16.025216103 CET | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:16.026499987 CET | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:16.026506901 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:16.026710987 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:16.027962923 CET | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:16.027987957 CET | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:16.028018951 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:16.531112909 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:16.531155109 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:16.531183004 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:16.531210899 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:16.531212091 CET | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:16.531241894 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:16.531258106 CET | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:16.531277895 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:16.531306028 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:16.531336069 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:16.531342030 CET | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:16.531348944 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:16.531371117 CET | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:16.531838894 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:16.531862020 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:16.531888008 CET | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:16.531896114 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:16.531944036 CET | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:16.532278061 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:16.532341957 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:16.532385111 CET | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:16.532439947 CET | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:16.532454014 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Jan 5, 2025 19:28:16.532466888 CET | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 5, 2025 19:28:16.532471895 CET | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 5, 2025 19:28:04.783111095 CET | 59795 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 5, 2025 19:28:04.796850920 CET | 53 | 59795 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 5, 2025 19:28:04.783111095 CET | 192.168.2.4 | 1.1.1.1 | 0xbb64 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 5, 2025 19:28:04.796850920 CET | 1.1.1.1 | 192.168.2.4 | 0xbb64 | No error (0) | 188.114.97.3 | A (IP address) | IN (0x0001) | false | ||
Jan 5, 2025 19:28:04.796850920 CET | 1.1.1.1 | 192.168.2.4 | 0xbb64 | No error (0) | 188.114.96.3 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49730 | 188.114.97.3 | 443 | 7388 | C:\Users\user\Desktop\loader.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 18:28:05 UTC | 265 | OUT | |
2025-01-05 18:28:05 UTC | 8 | OUT | |
2025-01-05 18:28:05 UTC | 1129 | IN | |
2025-01-05 18:28:05 UTC | 7 | IN | |
2025-01-05 18:28:05 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49732 | 188.114.97.3 | 443 | 7388 | C:\Users\user\Desktop\loader.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 18:28:06 UTC | 266 | OUT | |
2025-01-05 18:28:06 UTC | 54 | OUT | |
2025-01-05 18:28:06 UTC | 1131 | IN | |
2025-01-05 18:28:06 UTC | 238 | IN | |
2025-01-05 18:28:06 UTC | 1369 | IN | |
2025-01-05 18:28:06 UTC | 1369 | IN | |
2025-01-05 18:28:06 UTC | 1369 | IN | |
2025-01-05 18:28:06 UTC | 1369 | IN | |
2025-01-05 18:28:06 UTC | 1369 | IN | |
2025-01-05 18:28:06 UTC | 304 | IN | |
2025-01-05 18:28:06 UTC | 1369 | IN | |
2025-01-05 18:28:06 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49734 | 188.114.97.3 | 443 | 7388 | C:\Users\user\Desktop\loader.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 18:28:07 UTC | 278 | OUT | |
2025-01-05 18:28:07 UTC | 15331 | OUT | |
2025-01-05 18:28:07 UTC | 2803 | OUT | |
2025-01-05 18:28:08 UTC | 1139 | IN | |
2025-01-05 18:28:08 UTC | 20 | IN | |
2025-01-05 18:28:08 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49737 | 188.114.97.3 | 443 | 7388 | C:\Users\user\Desktop\loader.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 18:28:08 UTC | 274 | OUT | |
2025-01-05 18:28:08 UTC | 8737 | OUT | |
2025-01-05 18:28:09 UTC | 1127 | IN | |
2025-01-05 18:28:09 UTC | 20 | IN | |
2025-01-05 18:28:09 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49739 | 188.114.97.3 | 443 | 7388 | C:\Users\user\Desktop\loader.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 18:28:09 UTC | 284 | OUT | |
2025-01-05 18:28:09 UTC | 15331 | OUT | |
2025-01-05 18:28:09 UTC | 5113 | OUT | |
2025-01-05 18:28:10 UTC | 1133 | IN | |
2025-01-05 18:28:10 UTC | 20 | IN | |
2025-01-05 18:28:10 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49742 | 188.114.97.3 | 443 | 7388 | C:\Users\user\Desktop\loader.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 18:28:11 UTC | 283 | OUT | |
2025-01-05 18:28:11 UTC | 1286 | OUT | |
2025-01-05 18:28:11 UTC | 1132 | IN | |
2025-01-05 18:28:11 UTC | 20 | IN | |
2025-01-05 18:28:11 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49744 | 188.114.97.3 | 443 | 7388 | C:\Users\user\Desktop\loader.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 18:28:12 UTC | 285 | OUT | |
2025-01-05 18:28:12 UTC | 15331 | OUT | |
2025-01-05 18:28:12 UTC | 15331 | OUT | |
2025-01-05 18:28:12 UTC | 15331 | OUT | |
2025-01-05 18:28:12 UTC | 15331 | OUT | |
2025-01-05 18:28:12 UTC | 15331 | OUT | |
2025-01-05 18:28:12 UTC | 15331 | OUT | |
2025-01-05 18:28:12 UTC | 15331 | OUT | |
2025-01-05 18:28:12 UTC | 15331 | OUT | |
2025-01-05 18:28:12 UTC | 15331 | OUT | |
2025-01-05 18:28:12 UTC | 15331 | OUT | |
2025-01-05 18:28:15 UTC | 1141 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49747 | 188.114.97.3 | 443 | 7388 | C:\Users\user\Desktop\loader.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 18:28:16 UTC | 266 | OUT | |
2025-01-05 18:28:16 UTC | 89 | OUT | |
2025-01-05 18:28:16 UTC | 1131 | IN | |
2025-01-05 18:28:16 UTC | 238 | IN | |
2025-01-05 18:28:16 UTC | 1369 | IN | |
2025-01-05 18:28:16 UTC | 1369 | IN | |
2025-01-05 18:28:16 UTC | 1369 | IN | |
2025-01-05 18:28:16 UTC | 1369 | IN | |
2025-01-05 18:28:16 UTC | 1369 | IN | |
2025-01-05 18:28:16 UTC | 1369 | IN | |
2025-01-05 18:28:16 UTC | 1369 | IN | |
2025-01-05 18:28:16 UTC | 1369 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 13:28:03 |
Start date: | 05/01/2025 |
Path: | C:\Users\user\Desktop\loader.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x550000 |
File size: | 8'750'080 bytes |
MD5 hash: | 756CC98F850799FC6783BD07E91CAB52 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 13:28:03 |
Start date: | 05/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 13:28:03 |
Start date: | 05/01/2025 |
Path: | C:\Users\user\Desktop\loader.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xec0000 |
File size: | 8'750'080 bytes |
MD5 hash: | 756CC98F850799FC6783BD07E91CAB52 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 5 |
Start time: | 13:28:03 |
Start date: | 05/01/2025 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x7c0000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 9.2% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 44.4% |
Total number of Nodes: | 18 |
Total number of Limit Nodes: | 2 |
Graph
Function 02A18621 Relevance: 40.5, APIs: 10, Strings: 13, Instructions: 294threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02A1879E Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 82threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BE2E2F Relevance: 1.6, APIs: 1, Instructions: 58memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BE06E8 Relevance: 1.6, APIs: 1, Instructions: 54memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BE0861 Relevance: 2.7, Strings: 2, Instructions: 152COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BE0870 Relevance: 2.6, Strings: 2, Instructions: 149COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 8.9% |
Dynamic/Decrypted Code Coverage: | 6.4% |
Signature Coverage: | 30.9% |
Total number of Nodes: | 249 |
Total number of Limit Nodes: | 16 |
Graph
Function 004126F0 Relevance: 119.3, APIs: 3, Strings: 64, Instructions: 2032COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043CB40 Relevance: 28.9, APIs: 11, Strings: 5, Instructions: 914memorycomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03AA1000 Relevance: 19.6, APIs: 13, Instructions: 81clipboardsleepmemoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004089B0 Relevance: 7.8, APIs: 5, Instructions: 286threadCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00419B52 Relevance: 5.7, APIs: 1, Strings: 2, Instructions: 426encryptionCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040AFA0 Relevance: 4.1, Strings: 3, Instructions: 382COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040CFC7 Relevance: 2.7, Strings: 2, Instructions: 248COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040A2AA Relevance: 2.6, Strings: 2, Instructions: 82COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441AA0 Relevance: 1.5, APIs: 1, Instructions: 14libraryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040A01E Relevance: .2, Instructions: 166COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F72A Relevance: 1.6, APIs: 1, Instructions: 83COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F726 Relevance: 1.6, APIs: 1, Instructions: 71COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00442130 Relevance: 1.5, APIs: 1, Instructions: 40COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441A42 Relevance: 1.5, APIs: 1, Instructions: 26memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00434DC8 Relevance: 1.5, APIs: 1, Instructions: 23COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00432178 Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040CF60 Relevance: 1.5, APIs: 1, Instructions: 18COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040CF95 Relevance: 1.5, APIs: 1, Instructions: 17COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043FED0 Relevance: 1.5, APIs: 1, Instructions: 15memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043FEB0 Relevance: 1.5, APIs: 1, Instructions: 9memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040B460 Relevance: 14.2, Strings: 11, Instructions: 467COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00428CE0 Relevance: 13.1, Strings: 10, Instructions: 601COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004219E0 Relevance: 7.9, Strings: 6, Instructions: 442COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040A9D4 Relevance: 7.6, Strings: 6, Instructions: 68COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409AD0 Relevance: 6.6, Strings: 5, Instructions: 379COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00416517 Relevance: 4.9, Strings: 3, Instructions: 1124COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041B160 Relevance: 4.0, Strings: 3, Instructions: 286COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042E4C0 Relevance: 4.0, Strings: 3, Instructions: 258COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F131 Relevance: 3.9, Strings: 3, Instructions: 167COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004092F0 Relevance: 2.8, Strings: 2, Instructions: 286COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F0C5 Relevance: 2.7, Strings: 2, Instructions: 172COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042810F Relevance: 2.6, Strings: 2, Instructions: 69COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E101 Relevance: 2.0, Strings: 1, Instructions: 744COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415C18 Relevance: 1.7, Strings: 1, Instructions: 431COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043D900 Relevance: 1.7, Strings: 1, Instructions: 404COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042DC10 Relevance: 1.6, Strings: 1, Instructions: 385COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004274F0 Relevance: 1.6, Strings: 1, Instructions: 347COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041E700 Relevance: 1.4, Strings: 1, Instructions: 164COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041B56E Relevance: 1.4, Strings: 1, Instructions: 145COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004308B5 Relevance: 1.3, Strings: 1, Instructions: 60COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407610 Relevance: .6, Instructions: 625COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405AB0 Relevance: .4, Instructions: 448COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004156F7 Relevance: .4, Instructions: 411COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041C34B Relevance: .3, Instructions: 308COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041DC80 Relevance: .3, Instructions: 298COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00444140 Relevance: .3, Instructions: 256COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00443E80 Relevance: .2, Instructions: 244COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00419102 Relevance: .2, Instructions: 226COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042EB92 Relevance: .2, Instructions: 184COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004414B4 Relevance: .2, Instructions: 152COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043DD20 Relevance: .1, Instructions: 149COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041B4B9 Relevance: .1, Instructions: 117COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409000 Relevance: .1, Instructions: 79COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440110 Relevance: .1, Instructions: 76COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00439060 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042C400 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00430850 Relevance: .1, Instructions: 62COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004307F7 Relevance: .1, Instructions: 55COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041BC81 Relevance: .0, Instructions: 50COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440490 Relevance: .0, Instructions: 46COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004311E3 Relevance: .0, Instructions: 34COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040ABA5 Relevance: .0, Instructions: 29COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041FDE0 Relevance: .0, Instructions: 21COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|