Windows
Analysis Report
Installer.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Installer.exe (PID: 7412 cmdline:
"C:\Users\ user\Deskt op\Install er.exe" MD5: D6C51AF8146503EEBC3A023123936D29) - conhost.exe (PID: 7420 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - Installer.exe (PID: 7480 cmdline:
"C:\Users\ user\Deskt op\Install er.exe" MD5: D6C51AF8146503EEBC3A023123936D29) - WerFault.exe (PID: 7564 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 412 -s 164 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["tirepublicerj.shop", "wholersorie.shop", "noisycuttej.shop", "framekgirus.shop", "nearycrepso.shop", "rabidcowse.shop", "fancywaxxers.shop", "abruptyopsn.shop", "cloudewahsj.shop"], "Build id": "yau6Na--1666242818"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T19:40:59.108516+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49730 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:00.236523+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49732 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:01.655742+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49734 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:02.758603+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49738 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:03.792134+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49739 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:05.167559+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49741 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:06.604372+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49742 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:08.742208+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49743 | 104.21.32.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T19:40:59.744568+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:00.750160+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49732 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:09.245583+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49743 | 104.21.32.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T19:40:59.744568+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 104.21.32.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T19:41:00.750160+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.4 | 49732 | 104.21.32.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T19:40:59.108516+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49730 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:00.236523+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49732 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:01.655742+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49734 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:02.758603+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49738 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:03.792134+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49739 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:05.167559+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49741 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:06.604372+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49742 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:08.742208+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49743 | 104.21.32.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T19:40:58.597126+0100 | 2058656 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 54217 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T19:41:05.671560+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49741 | 104.21.32.1 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Code function: | 2_2_0041616F |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 2_2_00426970 | |
Source: | Code function: | 2_2_004453C0 | |
Source: | Code function: | 2_2_0043DCC0 | |
Source: | Code function: | 2_2_0040D7E3 | |
Source: | Code function: | 2_2_0041C079 | |
Source: | Code function: | 2_2_0042C006 | |
Source: | Code function: | 2_2_004150C0 | |
Source: | Code function: | 2_2_004150C0 | |
Source: | Code function: | 2_2_0041A8F0 | |
Source: | Code function: | 2_2_0041A8F0 | |
Source: | Code function: | 2_2_00428898 | |
Source: | Code function: | 2_2_004310BA | |
Source: | Code function: | 2_2_00431150 | |
Source: | Code function: | 2_2_0040F15C | |
Source: | Code function: | 2_2_00432966 | |
Source: | Code function: | 2_2_0043106C | |
Source: | Code function: | 2_2_0041E930 | |
Source: | Code function: | 2_2_004311C0 | |
Source: | Code function: | 2_2_004429A0 | |
Source: | Code function: | 2_2_004311B1 | |
Source: | Code function: | 2_2_0042CA41 | |
Source: | Code function: | 2_2_00409200 | |
Source: | Code function: | 2_2_0041821B | |
Source: | Code function: | 2_2_0043EAD0 | |
Source: | Code function: | 2_2_0043F2A0 | |
Source: | Code function: | 2_2_0043F2A0 | |
Source: | Code function: | 2_2_0043F2A0 | |
Source: | Code function: | 2_2_0042FB40 | |
Source: | Code function: | 2_2_0041A368 | |
Source: | Code function: | 2_2_004223E6 | |
Source: | Code function: | 2_2_0040B3A0 | |
Source: | Code function: | 2_2_00415BA0 | |
Source: | Code function: | 2_2_0042C44F | |
Source: | Code function: | 2_2_0042A450 | |
Source: | Code function: | 2_2_00444C10 | |
Source: | Code function: | 2_2_0042A430 | |
Source: | Code function: | 2_2_0043AC30 | |
Source: | Code function: | 2_2_0042CC9C | |
Source: | Code function: | 2_2_004094A0 | |
Source: | Code function: | 2_2_0042DCA0 | |
Source: | Code function: | 2_2_0041BD50 | |
Source: | Code function: | 2_2_0041FD70 | |
Source: | Code function: | 2_2_0040E579 | |
Source: | Code function: | 2_2_0040E579 | |
Source: | Code function: | 2_2_0041D510 | |
Source: | Code function: | 2_2_0040D520 | |
Source: | Code function: | 2_2_00407640 | |
Source: | Code function: | 2_2_00407640 | |
Source: | Code function: | 2_2_00429670 | |
Source: | Code function: | 2_2_00429670 | |
Source: | Code function: | 2_2_00408E10 | |
Source: | Code function: | 2_2_0042A630 | |
Source: | Code function: | 2_2_0042A630 | |
Source: | Code function: | 2_2_0043EEC0 | |
Source: | Code function: | 2_2_0042C68E | |
Source: | Code function: | 2_2_0043169D | |
Source: | Code function: | 2_2_0042F6A0 | |
Source: | Code function: | 2_2_004296AB | |
Source: | Code function: | 2_2_00441740 | |
Source: | Code function: | 2_2_0042AF1D | |
Source: | Code function: | 2_2_0041FFE0 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | TCP traffic: |
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 2_2_00438A00 |
Source: | Code function: | 2_2_03301000 |
Source: | Code function: | 2_2_00438A00 |
Source: | Code function: | 2_2_00438BA0 |
Source: | Code function: | 0_2_010B0861 | |
Source: | Code function: | 0_2_010B0870 | |
Source: | Code function: | 2_2_0041616F | |
Source: | Code function: | 2_2_00426970 | |
Source: | Code function: | 2_2_0040E9C9 | |
Source: | Code function: | 2_2_0043DA40 | |
Source: | Code function: | 2_2_00422A9B | |
Source: | Code function: | 2_2_00412BE0 | |
Source: | Code function: | 2_2_00423410 | |
Source: | Code function: | 2_2_0043DCC0 | |
Source: | Code function: | 2_2_004454A0 | |
Source: | Code function: | 2_2_0040AE20 | |
Source: | Code function: | 2_2_00445E20 | |
Source: | Code function: | 2_2_00429F30 | |
Source: | Code function: | 2_2_0040D7E3 | |
Source: | Code function: | 2_2_0041B840 | |
Source: | Code function: | 2_2_0043F040 | |
Source: | Code function: | 2_2_00406860 | |
Source: | Code function: | 2_2_00444870 | |
Source: | Code function: | 2_2_0042C006 | |
Source: | Code function: | 2_2_00420818 | |
Source: | Code function: | 2_2_00412030 | |
Source: | Code function: | 2_2_004150C0 | |
Source: | Code function: | 2_2_0041A8F0 | |
Source: | Code function: | 2_2_004378FB | |
Source: | Code function: | 2_2_00445880 | |
Source: | Code function: | 2_2_00436090 | |
Source: | Code function: | 2_2_00428898 | |
Source: | Code function: | 2_2_0041C8BF | |
Source: | Code function: | 2_2_00444960 | |
Source: | Code function: | 2_2_00444979 | |
Source: | Code function: | 2_2_0044497B | |
Source: | Code function: | 2_2_00427100 | |
Source: | Code function: | 2_2_00432131 | |
Source: | Code function: | 2_2_004039C0 | |
Source: | Code function: | 2_2_0043D1D0 | |
Source: | Code function: | 2_2_00426191 | |
Source: | Code function: | 2_2_004099A0 | |
Source: | Code function: | 2_2_0041E200 | |
Source: | Code function: | 2_2_00437209 | |
Source: | Code function: | 2_2_0041821B | |
Source: | Code function: | 2_2_00445220 | |
Source: | Code function: | 2_2_00444AC0 | |
Source: | Code function: | 2_2_0043EAD0 | |
Source: | Code function: | 2_2_00419F95 | |
Source: | Code function: | 2_2_0043C2DE | |
Source: | Code function: | 2_2_0043F2A0 | |
Source: | Code function: | 2_2_00417B48 | |
Source: | Code function: | 2_2_00445B60 | |
Source: | Code function: | 2_2_00405B70 | |
Source: | Code function: | 2_2_00404370 | |
Source: | Code function: | 2_2_00417306 | |
Source: | Code function: | 2_2_0043BB2E | |
Source: | Code function: | 2_2_0040BB3C | |
Source: | Code function: | 2_2_0043533C | |
Source: | Code function: | 2_2_004063D0 | |
Source: | Code function: | 2_2_004223E6 | |
Source: | Code function: | 2_2_00402BA0 | |
Source: | Code function: | 2_2_0040B3A0 | |
Source: | Code function: | 2_2_00415BA0 | |
Source: | Code function: | 2_2_0043B44E | |
Source: | Code function: | 2_2_0041CC70 | |
Source: | Code function: | 2_2_00436400 | |
Source: | Code function: | 2_2_00432413 | |
Source: | Code function: | 2_2_00444C10 | |
Source: | Code function: | 2_2_0043D430 | |
Source: | Code function: | 2_2_0041B4F0 | |
Source: | Code function: | 2_2_004424F7 | |
Source: | Code function: | 2_2_004094A0 | |
Source: | Code function: | 2_2_00433CB6 | |
Source: | Code function: | 2_2_0041D510 | |
Source: | Code function: | 2_2_004385C0 | |
Source: | Code function: | 2_2_004105CB | |
Source: | Code function: | 2_2_00407640 | |
Source: | Code function: | 2_2_00429670 | |
Source: | Code function: | 2_2_0041E610 | |
Source: | Code function: | 2_2_0042A630 | |
Source: | Code function: | 2_2_00427EF4 | |
Source: | Code function: | 2_2_00404E90 | |
Source: | Code function: | 2_2_0041DEA0 | |
Source: | Code function: | 2_2_00441F40 | |
Source: | Code function: | 2_2_00432F50 | |
Source: | Code function: | 2_2_0042FF00 | |
Source: | Code function: | 2_2_0042B706 | |
Source: | Code function: | 2_2_0042AF1D | |
Source: | Code function: | 2_2_00420F8A | |
Source: | Code function: | 2_2_00419F95 | |
Source: | Code function: | 2_2_00402FA0 | |
Source: | Code function: | 2_2_004417B0 |
Source: | Process created: |
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Classification label: |
Source: | Code function: | 2_2_0043DCC0 |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | String found in binary or memory: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Static PE information: |
Source: | Code function: | 0_2_010B0E31 | |
Source: | Code function: | 2_2_0044DB28 | |
Source: | Code function: | 2_2_0044DB28 | |
Source: | Code function: | 2_2_0044DD06 |
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_2-15031 |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 2_2_00442EE0 |
Source: | Code function: | 0_2_02D68639 | |
Source: | Code function: | 0_2_02D687B6 |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Code function: | 0_2_02D68639 |
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Disable or Modify Tools | 2 OS Credential Dumping | 1 File and Directory Discovery | Remote Services | 11 Archive Collected Data | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 2 Command and Scripting Interpreter | Boot or Logon Initialization Scripts | 211 Process Injection | 111 Deobfuscate/Decode Files or Information | LSASS Memory | 22 System Information Discovery | Remote Desktop Protocol | 31 Data from Local System | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 1 PowerShell | Logon Script (Windows) | Logon Script (Windows) | 3 Obfuscated Files or Information | Security Account Manager | 1 Query Registry | SMB/Windows Admin Shares | 1 Screen Capture | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 11 Software Packing | NTDS | 231 Security Software Discovery | Distributed Component Object Model | 3 Clipboard Data | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Timestomp | LSA Secrets | 23 Virtualization/Sandbox Evasion | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 1 Process Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 23 Virtualization/Sandbox Evasion | DCSync | 1 Application Window Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 211 Process Injection | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
29% | ReversingLabs | Win32.Exploit.PureLogStealer | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
fancywaxxers.shop | 104.21.32.1 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.32.1 | fancywaxxers.shop | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1584539 |
Start date and time: | 2025-01-05 19:40:08 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 36s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 10 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Installer.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@5/5@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 20.42.73.29, 40.126.32.138, 52.149.20.212, 13.107.246.45
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, 6.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: Installer.exe
Time | Type | Description |
---|---|---|
13:40:58 | API Interceptor | |
13:41:38 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.32.1 | Get hash | malicious | CMSBrute | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
fancywaxxers.shop | Get hash | malicious | LummaC, PureLog Stealer | Browse |
| |
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc, Vidar, XWorm | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Installer.exe_61f0d4476017257c8adec5146cd9cfc793936bf_754596bf_efc50b0d-12ec-41bf-acb3-e7992197b463\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.8858192282900352 |
Encrypted: | false |
SSDEEP: | 192:r8/dNTAoMCA0LR3kaGGzuiFc+Z24IO8XqA:gnDMCbLR3kaHzuiFc+Y4IO8Xq |
MD5: | 61A5B84F8DC70D26B9CF65C95A396462 |
SHA1: | 184822BAEAF27CAB3A4BD5DB1EACD0662F3C986D |
SHA-256: | 3A63EE6799E4575D8E7D3EE6EF05593007F4E463B0C8B959DC2D12CE6C4DF95C |
SHA-512: | A79A2FDBA150EE8A3B27CB38BE6DCCEE3C60D52DCCF8AA46A8A49C3BF233F5A7F2FECD44A31267555110BA1669A5711CD2A1EFF8444C57AEDAC2C2D306EBCEAE |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 152987 |
Entropy (8bit): | 3.762911781734369 |
Encrypted: | false |
SSDEEP: | 1536:NVvGps1zuBojRypN4uE2aOyLTgCodIAPvDLCD3tT791ZcQVhJ97q1:nvGiHU4uEqyLTgRddedf9/cQF97q |
MD5: | A0CAD432F94CF924FCFAE129E2554404 |
SHA1: | D1D85D618A70ABCEF4F011479E27D52A759BF39C |
SHA-256: | 806D332EBF60E81D4C093142CD8F17CA7B8D3302CE9A93BAA4670CF50A2F17A0 |
SHA-512: | 3926EC54CCE81BD0944FD715E8F6B8FF46790244A767BF03BDB92F9285298E229EA70756D75E69F7930A9BCB9CA489FC52BFA582F36C0FF9AA978992D202039F |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8374 |
Entropy (8bit): | 3.6886228982472855 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJnj6E6Y9VSUegmfgVJgprp89brXsfb5m:R6lXJj6E6Y/SUegmfgVJjrcfo |
MD5: | AF3D213A52B0CE9C0B55C9774BBA0E9E |
SHA1: | F7173790A09B6275919D70FCECB00E4C0B8DC747 |
SHA-256: | 0A8F122AF583781543185462966C4F935667F9240D9E60ED82DBC4ED11EEF79B |
SHA-512: | 4D3C0AF703B67ECB783BCE8046B34F3E5AD3A629896A0D13B703C55D9ADFD7C376A7A1501527A812948667265376722181B281E909FF5FA1BAB587700BFCF365 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4687 |
Entropy (8bit): | 4.437022783226741 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zs6Jg77aI9pWWpW8VYOYm8M4JgZjdxPcf6Fsj+q8vnjdxPcfjwTtSn2S/:uIjfII7X37VOJtfLKcfjwTonZLdd |
MD5: | B3F518FF70A8398067E35BC5D5C687A1 |
SHA1: | 0B6C2452B48018550601242BAE5668CDFA166DFB |
SHA-256: | DB6132F7B8BBD06C546D140F8585FF11C9E505577DBA04FC002118946F959CF5 |
SHA-512: | 2806E30E15051E0BB2D3B06ECE2CD46F7460B3891BC3AFB11100A2F78A29943E67EBA73C7771DE03821ACE40774CA9817CF44412FF9AF3DBA663BD12EE698417 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.4655107045655065 |
Encrypted: | false |
SSDEEP: | 6144:IIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNidwBCswSbt:dXD94+WlLZMM6YFHI+t |
MD5: | 028F7177B81C46B917BF5517D6BCDC1B |
SHA1: | 63AEDEBDF5EA3B30613089FB0E8D198B0B6B2693 |
SHA-256: | B21500241190E39713BDCADD96C2AEABDA85043F0A4346AA83EDBF65ED3B0E7E |
SHA-512: | 8486AB5F9D6FD9530DDA90D2C531AB2F5BAED5077D8753E007935EE9A3615EC7B15B37659666836EA7121F7B459105D23EBAC287F1D538327EBF9A9D32263A39 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.933939205964555 |
TrID: |
|
File name: | Installer.exe |
File size: | 370'176 bytes |
MD5: | d6c51af8146503eebc3a023123936d29 |
SHA1: | d5cf6cd9eae11dc0323d05604b265ce270746ae8 |
SHA256: | 739cf0a20292e03993ee29ea156dbcc281e7316a319d5dbbf8a7b0895aed09bb |
SHA512: | 673b019b51e5b76c9f2d8692b3cdc1bc1257ee9372f66febe0aadad50f432452316f2547e89a650a4cea31af1006cde27b470d04c2c547edebc96cc619864d66 |
SSDEEP: | 6144:39Yyo0Z69k9/jaTn6zX+zvsWd5okfthPaYwB/S3x7kH1hvGLZd7eGsYal8dJGQhE:NJo0ZKWjIn6z+zvvd5Pthq/W7+1pGLZc |
TLSH: | 0B7412AE6287D12AD16D853214E3C84342B45B48BC47FB9A3F4D720AEF727AF1793641 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....C,...............0.................. ........@.. ....................... ......F~....`................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x40a4be |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0xB22C430A [Sun Sep 21 17:53:14 2064 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xa470 | 0x4b | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xc000 | 0x242 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xe000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0xa422 | 0x1c | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x84c4 | 0x8600 | e05f1acca24b974a8126be170dff517b | False | 0.5043726679104478 | data | 5.950953039580874 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0xc000 | 0x242 | 0x400 | 14d8e51a66bfa2cb04d0bad62fb2e968 | False | 0.3037109375 | data | 3.5160679793070893 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xe000 | 0xc | 0x200 | 15941323991b3ba9288d6bda059fba10 | False | 0.044921875 | data | 0.08153941234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.bss | 0x10000 | 0x51600 | 0x51600 | b7160c756eaff299501b4b3513377cb2 | False | 1.000333021313364 | data | 7.999375972304333 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_MANIFEST | 0xc058 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T19:40:58.597126+0100 | 2058656 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fancywaxxers .shop) | 1 | 192.168.2.4 | 54217 | 1.1.1.1 | 53 | UDP |
2025-01-05T19:40:59.108516+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.4 | 49730 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:40:59.108516+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49730 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:40:59.744568+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49730 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:40:59.744568+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49730 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:00.236523+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.4 | 49732 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:00.236523+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49732 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:00.750160+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.4 | 49732 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:00.750160+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49732 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:01.655742+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.4 | 49734 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:01.655742+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49734 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:02.758603+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.4 | 49738 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:02.758603+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49738 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:03.792134+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.4 | 49739 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:03.792134+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49739 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:05.167559+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.4 | 49741 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:05.167559+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49741 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:05.671560+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49741 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:06.604372+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.4 | 49742 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:06.604372+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49742 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:08.742208+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.4 | 49743 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:08.742208+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49743 | 104.21.32.1 | 443 | TCP |
2025-01-05T19:41:09.245583+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49743 | 104.21.32.1 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 5, 2025 19:40:58.619548082 CET | 49730 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:40:58.619597912 CET | 443 | 49730 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:40:58.619693041 CET | 49730 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:40:58.625873089 CET | 49730 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:40:58.625893116 CET | 443 | 49730 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:40:59.108448982 CET | 443 | 49730 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:40:59.108515978 CET | 49730 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:40:59.114108086 CET | 49730 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:40:59.114120960 CET | 443 | 49730 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:40:59.114346981 CET | 443 | 49730 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:40:59.160940886 CET | 49730 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:40:59.322251081 CET | 49730 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:40:59.322278976 CET | 49730 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:40:59.322423935 CET | 443 | 49730 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:40:59.744604111 CET | 443 | 49730 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:40:59.744702101 CET | 443 | 49730 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:40:59.744756937 CET | 49730 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:40:59.746318102 CET | 49730 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:40:59.746336937 CET | 443 | 49730 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:40:59.746354103 CET | 49730 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:40:59.746361017 CET | 443 | 49730 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:40:59.753642082 CET | 49732 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:40:59.753680944 CET | 443 | 49732 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:40:59.753753901 CET | 49732 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:40:59.753985882 CET | 49732 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:40:59.753999949 CET | 443 | 49732 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:00.236445904 CET | 443 | 49732 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:00.236522913 CET | 49732 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:00.237802029 CET | 49732 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:00.237812042 CET | 443 | 49732 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:00.238017082 CET | 443 | 49732 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:00.246598959 CET | 49732 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:00.246705055 CET | 49732 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:00.246742010 CET | 443 | 49732 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:00.750166893 CET | 443 | 49732 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:00.750226021 CET | 443 | 49732 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:00.750252962 CET | 443 | 49732 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:00.750279903 CET | 443 | 49732 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:00.750300884 CET | 443 | 49732 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:00.750304937 CET | 49732 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:00.750324011 CET | 443 | 49732 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:00.750348091 CET | 49732 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:00.750370026 CET | 49732 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:00.750391960 CET | 443 | 49732 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:00.750695944 CET | 443 | 49732 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:00.750752926 CET | 49732 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:00.750760078 CET | 443 | 49732 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:00.757256031 CET | 443 | 49732 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:00.757304907 CET | 49732 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:00.757312059 CET | 443 | 49732 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:00.803469896 CET | 49732 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:00.841412067 CET | 443 | 49732 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:00.841509104 CET | 443 | 49732 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:00.841541052 CET | 443 | 49732 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:00.841624022 CET | 49732 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:00.841634035 CET | 443 | 49732 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:00.841646910 CET | 443 | 49732 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:00.841679096 CET | 49732 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:00.841711998 CET | 49732 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:00.862356901 CET | 49732 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:00.862369061 CET | 443 | 49732 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:00.862377882 CET | 49732 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:00.862384081 CET | 443 | 49732 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:01.068306923 CET | 49734 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:01.068332911 CET | 443 | 49734 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:01.068423986 CET | 49734 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:01.068828106 CET | 49734 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:01.068846941 CET | 443 | 49734 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:01.655653954 CET | 443 | 49734 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:01.655741930 CET | 49734 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:01.657099009 CET | 49734 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:01.657109976 CET | 443 | 49734 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:01.657382965 CET | 443 | 49734 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:01.664968014 CET | 49734 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:01.665174007 CET | 49734 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:01.665215015 CET | 443 | 49734 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:01.665278912 CET | 49734 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:01.665286064 CET | 443 | 49734 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:02.275646925 CET | 443 | 49734 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:02.275755882 CET | 443 | 49734 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:02.275847912 CET | 49734 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:02.283237934 CET | 49734 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:02.283255100 CET | 443 | 49734 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:02.301115990 CET | 49738 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:02.301148891 CET | 443 | 49738 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:02.301254034 CET | 49738 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:02.301533937 CET | 49738 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:02.301544905 CET | 443 | 49738 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:02.758512974 CET | 443 | 49738 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:02.758603096 CET | 49738 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:02.759874105 CET | 49738 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:02.759881973 CET | 443 | 49738 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:02.760112047 CET | 443 | 49738 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:02.761324883 CET | 49738 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:02.761467934 CET | 49738 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:02.761495113 CET | 443 | 49738 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:03.234091043 CET | 443 | 49738 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:03.234191895 CET | 443 | 49738 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:03.234270096 CET | 49738 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:03.234435081 CET | 49738 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:03.234451056 CET | 443 | 49738 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:03.329884052 CET | 49739 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:03.329931974 CET | 443 | 49739 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:03.330163002 CET | 49739 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:03.333792925 CET | 49739 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:03.333810091 CET | 443 | 49739 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:03.792046070 CET | 443 | 49739 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:03.792134047 CET | 49739 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:03.858275890 CET | 49739 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:03.858319998 CET | 443 | 49739 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:03.858629942 CET | 443 | 49739 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:03.884903908 CET | 49739 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:03.886104107 CET | 49739 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:03.886142015 CET | 443 | 49739 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:03.886230946 CET | 49739 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:03.886248112 CET | 443 | 49739 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:04.560380936 CET | 443 | 49739 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:04.560463905 CET | 443 | 49739 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:04.560529947 CET | 49739 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:04.560774088 CET | 49739 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:04.560798883 CET | 443 | 49739 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:04.679930925 CET | 49741 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:04.679987907 CET | 443 | 49741 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:04.680061102 CET | 49741 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:04.680412054 CET | 49741 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:04.680423975 CET | 443 | 49741 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:05.167448044 CET | 443 | 49741 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:05.167558908 CET | 49741 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:05.168931961 CET | 49741 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:05.168941975 CET | 443 | 49741 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:05.169145107 CET | 443 | 49741 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:05.181406021 CET | 49741 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:05.181550026 CET | 49741 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:05.181562901 CET | 443 | 49741 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:05.671566010 CET | 443 | 49741 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:05.671658993 CET | 443 | 49741 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:05.671948910 CET | 49741 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:05.672190905 CET | 49741 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:05.672214031 CET | 443 | 49741 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:06.111618042 CET | 49742 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:06.111670971 CET | 443 | 49742 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:06.111728907 CET | 49742 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:06.112200022 CET | 49742 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:06.112215996 CET | 443 | 49742 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:06.604283094 CET | 443 | 49742 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:06.604372025 CET | 49742 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:06.621189117 CET | 49742 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:06.621212959 CET | 443 | 49742 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:06.621453047 CET | 443 | 49742 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:06.642416000 CET | 49742 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:06.656039953 CET | 49742 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:06.656081915 CET | 443 | 49742 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:06.656207085 CET | 49742 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:06.656239033 CET | 443 | 49742 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:06.656337023 CET | 49742 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:06.656362057 CET | 443 | 49742 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:06.656474113 CET | 49742 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:06.656506062 CET | 443 | 49742 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:06.656639099 CET | 49742 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:06.656670094 CET | 443 | 49742 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:06.656807899 CET | 49742 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:06.656835079 CET | 443 | 49742 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:06.656842947 CET | 49742 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:06.656852007 CET | 443 | 49742 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:06.656980038 CET | 49742 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:06.657006025 CET | 443 | 49742 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:06.657030106 CET | 49742 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:06.657156944 CET | 49742 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:06.657186985 CET | 49742 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:06.661475897 CET | 443 | 49742 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:06.661690950 CET | 49742 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:06.661719084 CET | 443 | 49742 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:06.661742926 CET | 49742 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:06.661783934 CET | 49742 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:06.671360016 CET | 443 | 49742 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:08.275064945 CET | 443 | 49742 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:08.275156021 CET | 443 | 49742 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:08.275226116 CET | 49742 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:08.275403976 CET | 49742 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:08.275419950 CET | 443 | 49742 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:08.279576063 CET | 49743 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:08.279616117 CET | 443 | 49743 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:08.279720068 CET | 49743 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:08.279974937 CET | 49743 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:08.279983997 CET | 443 | 49743 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:08.742079020 CET | 443 | 49743 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:08.742208004 CET | 49743 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:08.743419886 CET | 49743 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:08.743428946 CET | 443 | 49743 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:08.743628979 CET | 443 | 49743 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:08.744741917 CET | 49743 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:08.744791985 CET | 49743 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:08.744801044 CET | 443 | 49743 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:09.245593071 CET | 443 | 49743 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:09.245646000 CET | 443 | 49743 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:09.245678902 CET | 443 | 49743 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:09.245711088 CET | 443 | 49743 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:09.245716095 CET | 49743 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:09.245733023 CET | 443 | 49743 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:09.245748043 CET | 49743 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:09.245768070 CET | 443 | 49743 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:09.245800972 CET | 443 | 49743 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:09.245805979 CET | 49743 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:09.245810986 CET | 443 | 49743 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:09.245845079 CET | 49743 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:09.245850086 CET | 443 | 49743 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:09.246083975 CET | 443 | 49743 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:09.246126890 CET | 49743 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:09.246133089 CET | 443 | 49743 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:09.246340990 CET | 443 | 49743 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:09.246388912 CET | 49743 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:09.257949114 CET | 49743 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:09.257966995 CET | 443 | 49743 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:09.257999897 CET | 49743 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 5, 2025 19:41:09.258006096 CET | 443 | 49743 | 104.21.32.1 | 192.168.2.4 |
Jan 5, 2025 19:41:41.887747049 CET | 53944 | 53 | 192.168.2.4 | 162.159.36.2 |
Jan 5, 2025 19:41:41.892594099 CET | 53 | 53944 | 162.159.36.2 | 192.168.2.4 |
Jan 5, 2025 19:41:41.892676115 CET | 53944 | 53 | 192.168.2.4 | 162.159.36.2 |
Jan 5, 2025 19:41:41.897521973 CET | 53 | 53944 | 162.159.36.2 | 192.168.2.4 |
Jan 5, 2025 19:41:42.366027117 CET | 53944 | 53 | 192.168.2.4 | 162.159.36.2 |
Jan 5, 2025 19:41:42.371054888 CET | 53 | 53944 | 162.159.36.2 | 192.168.2.4 |
Jan 5, 2025 19:41:42.371110916 CET | 53944 | 53 | 192.168.2.4 | 162.159.36.2 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 5, 2025 19:40:58.597126007 CET | 54217 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 5, 2025 19:40:58.611097097 CET | 53 | 54217 | 1.1.1.1 | 192.168.2.4 |
Jan 5, 2025 19:41:41.887057066 CET | 53 | 50571 | 162.159.36.2 | 192.168.2.4 |
Jan 5, 2025 19:41:42.381479025 CET | 53 | 54471 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 5, 2025 19:40:58.597126007 CET | 192.168.2.4 | 1.1.1.1 | 0x6f9a | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 5, 2025 19:40:58.611097097 CET | 1.1.1.1 | 192.168.2.4 | 0x6f9a | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false | ||
Jan 5, 2025 19:40:58.611097097 CET | 1.1.1.1 | 192.168.2.4 | 0x6f9a | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false | ||
Jan 5, 2025 19:40:58.611097097 CET | 1.1.1.1 | 192.168.2.4 | 0x6f9a | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false | ||
Jan 5, 2025 19:40:58.611097097 CET | 1.1.1.1 | 192.168.2.4 | 0x6f9a | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false | ||
Jan 5, 2025 19:40:58.611097097 CET | 1.1.1.1 | 192.168.2.4 | 0x6f9a | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false | ||
Jan 5, 2025 19:40:58.611097097 CET | 1.1.1.1 | 192.168.2.4 | 0x6f9a | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false | ||
Jan 5, 2025 19:40:58.611097097 CET | 1.1.1.1 | 192.168.2.4 | 0x6f9a | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49730 | 104.21.32.1 | 443 | 7480 | C:\Users\user\Desktop\Installer.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 18:40:59 UTC | 264 | OUT | |
2025-01-05 18:40:59 UTC | 8 | OUT | |
2025-01-05 18:40:59 UTC | 1132 | IN | |
2025-01-05 18:40:59 UTC | 7 | IN | |
2025-01-05 18:40:59 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49732 | 104.21.32.1 | 443 | 7480 | C:\Users\user\Desktop\Installer.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 18:41:00 UTC | 265 | OUT | |
2025-01-05 18:41:00 UTC | 52 | OUT | |
2025-01-05 18:41:00 UTC | 1129 | IN | |
2025-01-05 18:41:00 UTC | 240 | IN | |
2025-01-05 18:41:00 UTC | 895 | IN | |
2025-01-05 18:41:00 UTC | 1369 | IN | |
2025-01-05 18:41:00 UTC | 1369 | IN | |
2025-01-05 18:41:00 UTC | 1369 | IN | |
2025-01-05 18:41:00 UTC | 1369 | IN | |
2025-01-05 18:41:00 UTC | 1369 | IN | |
2025-01-05 18:41:00 UTC | 1369 | IN | |
2025-01-05 18:41:00 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49734 | 104.21.32.1 | 443 | 7480 | C:\Users\user\Desktop\Installer.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 18:41:01 UTC | 278 | OUT | |
2025-01-05 18:41:01 UTC | 15331 | OUT | |
2025-01-05 18:41:01 UTC | 2807 | OUT | |
2025-01-05 18:41:02 UTC | 1143 | IN | |
2025-01-05 18:41:02 UTC | 20 | IN | |
2025-01-05 18:41:02 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49738 | 104.21.32.1 | 443 | 7480 | C:\Users\user\Desktop\Installer.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 18:41:02 UTC | 281 | OUT | |
2025-01-05 18:41:02 UTC | 8783 | OUT | |
2025-01-05 18:41:03 UTC | 1129 | IN | |
2025-01-05 18:41:03 UTC | 20 | IN | |
2025-01-05 18:41:03 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49739 | 104.21.32.1 | 443 | 7480 | C:\Users\user\Desktop\Installer.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 18:41:03 UTC | 280 | OUT | |
2025-01-05 18:41:03 UTC | 15331 | OUT | |
2025-01-05 18:41:03 UTC | 5093 | OUT | |
2025-01-05 18:41:04 UTC | 1137 | IN | |
2025-01-05 18:41:04 UTC | 20 | IN | |
2025-01-05 18:41:04 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49741 | 104.21.32.1 | 443 | 7480 | C:\Users\user\Desktop\Installer.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 18:41:05 UTC | 282 | OUT | |
2025-01-05 18:41:05 UTC | 1005 | OUT | |
2025-01-05 18:41:05 UTC | 1138 | IN | |
2025-01-05 18:41:05 UTC | 20 | IN | |
2025-01-05 18:41:05 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49742 | 104.21.32.1 | 443 | 7480 | C:\Users\user\Desktop\Installer.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 18:41:06 UTC | 277 | OUT | |
2025-01-05 18:41:06 UTC | 15331 | OUT | |
2025-01-05 18:41:06 UTC | 15331 | OUT | |
2025-01-05 18:41:06 UTC | 15331 | OUT | |
2025-01-05 18:41:06 UTC | 15331 | OUT | |
2025-01-05 18:41:06 UTC | 15331 | OUT | |
2025-01-05 18:41:06 UTC | 15331 | OUT | |
2025-01-05 18:41:06 UTC | 15331 | OUT | |
2025-01-05 18:41:06 UTC | 15331 | OUT | |
2025-01-05 18:41:06 UTC | 15331 | OUT | |
2025-01-05 18:41:06 UTC | 15331 | OUT | |
2025-01-05 18:41:08 UTC | 1141 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49743 | 104.21.32.1 | 443 | 7480 | C:\Users\user\Desktop\Installer.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 18:41:08 UTC | 265 | OUT | |
2025-01-05 18:41:08 UTC | 87 | OUT | |
2025-01-05 18:41:09 UTC | 1133 | IN | |
2025-01-05 18:41:09 UTC | 236 | IN | |
2025-01-05 18:41:09 UTC | 1369 | IN | |
2025-01-05 18:41:09 UTC | 1369 | IN | |
2025-01-05 18:41:09 UTC | 1369 | IN | |
2025-01-05 18:41:09 UTC | 1369 | IN | |
2025-01-05 18:41:09 UTC | 1369 | IN | |
2025-01-05 18:41:09 UTC | 1369 | IN | |
2025-01-05 18:41:09 UTC | 1369 | IN | |
2025-01-05 18:41:09 UTC | 1369 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 13:40:57 |
Start date: | 05/01/2025 |
Path: | C:\Users\user\Desktop\Installer.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x7a0000 |
File size: | 370'176 bytes |
MD5 hash: | D6C51AF8146503EEBC3A023123936D29 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 13:40:57 |
Start date: | 05/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 13:40:57 |
Start date: | 05/01/2025 |
Path: | C:\Users\user\Desktop\Installer.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x710000 |
File size: | 370'176 bytes |
MD5 hash: | D6C51AF8146503EEBC3A023123936D29 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 5 |
Start time: | 13:40:57 |
Start date: | 05/01/2025 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x960000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 7.1% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 57.1% |
Total number of Nodes: | 14 |
Total number of Limit Nodes: | 2 |
Graph
Function 02D68639 Relevance: 40.5, APIs: 10, Strings: 13, Instructions: 294threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02D687B6 Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 82threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010B06E8 Relevance: 1.6, APIs: 1, Instructions: 54memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010B2E43 Relevance: 1.6, APIs: 1, Instructions: 51memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010B0861 Relevance: 2.7, Strings: 2, Instructions: 157COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 010B0870 Relevance: 2.6, Strings: 2, Instructions: 149COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 9% |
Dynamic/Decrypted Code Coverage: | 4.4% |
Signature Coverage: | 42.6% |
Total number of Nodes: | 366 |
Total number of Limit Nodes: | 26 |
Graph
Function 0043DCC0 Relevance: 32.4, APIs: 11, Strings: 7, Instructions: 917memorycomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03301000 Relevance: 19.6, APIs: 13, Instructions: 81clipboardsleepmemoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00442EE0 Relevance: 1.5, APIs: 1, Instructions: 14libraryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004453C0 Relevance: 1.3, Strings: 1, Instructions: 73COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408A70 Relevance: 7.6, APIs: 5, Instructions: 135threadCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040F460 Relevance: 3.1, APIs: 2, Instructions: 115COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00443D91 Relevance: 3.0, APIs: 2, Instructions: 16COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043196A Relevance: 1.6, APIs: 1, Instructions: 80COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043C9EA Relevance: 1.6, APIs: 1, Instructions: 55COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00442E80 Relevance: 1.5, APIs: 1, Instructions: 30memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00437044 Relevance: 1.5, APIs: 1, Instructions: 25COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441180 Relevance: 1.5, APIs: 1, Instructions: 22memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00434F83 Relevance: 1.5, APIs: 1, Instructions: 21COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040F40B Relevance: 1.5, APIs: 1, Instructions: 17COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441160 Relevance: 1.5, APIs: 1, Instructions: 9memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042A430 Relevance: 16.5, Strings: 13, Instructions: 260COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040B3A0 Relevance: 15.3, Strings: 12, Instructions: 258COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004094A0 Relevance: 11.7, Strings: 9, Instructions: 450COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00429670 Relevance: 10.4, Strings: 8, Instructions: 410COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415BA0 Relevance: 9.2, Strings: 7, Instructions: 433COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00428898 Relevance: 5.6, Strings: 4, Instructions: 609COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040E579 Relevance: 5.3, Strings: 4, Instructions: 346COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004429A0 Relevance: 5.1, Strings: 4, Instructions: 129COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042C68E Relevance: 4.2, Strings: 3, Instructions: 425COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004310BA Relevance: 4.0, Strings: 3, Instructions: 267COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00431150 Relevance: 4.0, Strings: 3, Instructions: 265COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004311C0 Relevance: 4.0, Strings: 3, Instructions: 263COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004311B1 Relevance: 4.0, Strings: 3, Instructions: 239COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041C079 Relevance: 3.9, Strings: 3, Instructions: 188COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043F2A0 Relevance: 3.3, Strings: 2, Instructions: 799COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041D510 Relevance: 3.0, Strings: 2, Instructions: 488COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00444C10 Relevance: 2.9, Strings: 2, Instructions: 449COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004150C0 Relevance: 2.2, Strings: 1, Instructions: 977COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042A630 Relevance: 1.8, Strings: 1, Instructions: 563COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004223E6 Relevance: 1.7, Strings: 1, Instructions: 466COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F6A0 Relevance: 1.6, Strings: 1, Instructions: 388COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043EAD0 Relevance: 1.6, Strings: 1, Instructions: 370COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409200 Relevance: 1.5, Strings: 1, Instructions: 255COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042FB40 Relevance: 1.5, Strings: 1, Instructions: 236COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407640 Relevance: .6, Instructions: 625COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042C006 Relevance: .3, Instructions: 291COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041FD70 Relevance: .2, Instructions: 204COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004296AB Relevance: .2, Instructions: 179COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408E10 Relevance: .2, Instructions: 172COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041A368 Relevance: .2, Instructions: 168COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042C44F Relevance: .2, Instructions: 163COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040F15C Relevance: .1, Instructions: 146COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043EEC0 Relevance: .1, Instructions: 146COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041E930 Relevance: .1, Instructions: 112COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042A450 Relevance: .1, Instructions: 68COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043AC30 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042DCA0 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041BD50 Relevance: .1, Instructions: 52COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042CA41 Relevance: .0, Instructions: 48COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441740 Relevance: .0, Instructions: 46COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040D520 Relevance: .0, Instructions: 39COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042CC9C Relevance: .0, Instructions: 24COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041FFE0 Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|