Windows
Analysis Report
CrosshairX.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- CrosshairX.exe (PID: 7320 cmdline:
"C:\Users\ user\Deskt op\Crossha irX.exe" MD5: 69BD9BE788D02879474D95C9A50BEB16) - conhost.exe (PID: 7328 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - CrosshairX.exe (PID: 7388 cmdline:
"C:\Users\ user\Deskt op\Crossha irX.exe" MD5: 69BD9BE788D02879474D95C9A50BEB16) - CrosshairX.exe (PID: 7396 cmdline:
"C:\Users\ user\Deskt op\Crossha irX.exe" MD5: 69BD9BE788D02879474D95C9A50BEB16) - WerFault.exe (PID: 7488 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 320 -s 928 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["framekgirus.shop", "tirepublicerj.shop", "abruptyopsn.shop", "noisycuttej.shop", "wholersorie.shop", "undesirabkel.click", "cloudewahsj.shop", "rabidcowse.shop", "nearycrepso.shop"], "Build id": "LPnhqo--imqylxxhmnff"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T19:59:54.564025+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49730 | 188.114.96.3 | 443 | TCP |
2025-01-05T19:59:58.714037+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49736 | 188.114.96.3 | 443 | TCP |
2025-01-05T19:59:59.804416+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49738 | 188.114.96.3 | 443 | TCP |
2025-01-05T20:00:00.900774+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49739 | 188.114.96.3 | 443 | TCP |
2025-01-05T20:00:02.258764+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49740 | 188.114.96.3 | 443 | TCP |
2025-01-05T20:00:03.450246+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49741 | 188.114.96.3 | 443 | TCP |
2025-01-05T20:00:05.062265+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49742 | 188.114.96.3 | 443 | TCP |
2025-01-05T20:00:07.871288+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49745 | 188.114.96.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T19:59:58.180114+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 188.114.96.3 | 443 | TCP |
2025-01-05T19:59:59.190509+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49736 | 188.114.96.3 | 443 | TCP |
2025-01-05T20:00:08.402270+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49745 | 188.114.96.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T19:59:58.180114+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 188.114.96.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T19:59:59.190509+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.4 | 49736 | 188.114.96.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T19:59:54.564025+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49730 | 188.114.96.3 | 443 | TCP |
2025-01-05T19:59:58.714037+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49736 | 188.114.96.3 | 443 | TCP |
2025-01-05T19:59:59.804416+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49738 | 188.114.96.3 | 443 | TCP |
2025-01-05T20:00:00.900774+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49739 | 188.114.96.3 | 443 | TCP |
2025-01-05T20:00:02.258764+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49740 | 188.114.96.3 | 443 | TCP |
2025-01-05T20:00:03.450246+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49741 | 188.114.96.3 | 443 | TCP |
2025-01-05T20:00:05.062265+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49742 | 188.114.96.3 | 443 | TCP |
2025-01-05T20:00:07.871288+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49745 | 188.114.96.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T19:59:54.063845+0100 | 2058550 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 64399 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T20:00:01.390799+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49739 | 188.114.96.3 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Code function: | 3_2_0041616F |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 3_2_00426970 | |
Source: | Code function: | 3_2_004453C0 | |
Source: | Code function: | 3_2_0043DCC0 | |
Source: | Code function: | 3_2_0040D7E3 | |
Source: | Code function: | 3_2_0041C079 | |
Source: | Code function: | 3_2_0042C006 | |
Source: | Code function: | 3_2_004150C0 | |
Source: | Code function: | 3_2_004150C0 | |
Source: | Code function: | 3_2_0041A8F0 | |
Source: | Code function: | 3_2_0041A8F0 | |
Source: | Code function: | 3_2_004310BA | |
Source: | Code function: | 3_2_00431150 | |
Source: | Code function: | 3_2_0040F15C | |
Source: | Code function: | 3_2_00432966 | |
Source: | Code function: | 3_2_0043106C | |
Source: | Code function: | 3_2_0041E930 | |
Source: | Code function: | 3_2_004311C0 | |
Source: | Code function: | 3_2_004429A0 | |
Source: | Code function: | 3_2_004311B1 | |
Source: | Code function: | 3_2_0042CA41 | |
Source: | Code function: | 3_2_00409200 | |
Source: | Code function: | 3_2_0043EAD0 | |
Source: | Code function: | 3_2_0043F2A0 | |
Source: | Code function: | 3_2_0043F2A0 | |
Source: | Code function: | 3_2_0043F2A0 | |
Source: | Code function: | 3_2_0042FB40 | |
Source: | Code function: | 3_2_0041A368 | |
Source: | Code function: | 3_2_004223E6 | |
Source: | Code function: | 3_2_0040B3A0 | |
Source: | Code function: | 3_2_00415BA0 | |
Source: | Code function: | 3_2_0042C44F | |
Source: | Code function: | 3_2_0042A450 | |
Source: | Code function: | 3_2_00418459 | |
Source: | Code function: | 3_2_00444C10 | |
Source: | Code function: | 3_2_0042A430 | |
Source: | Code function: | 3_2_0043AC30 | |
Source: | Code function: | 3_2_0042CC9C | |
Source: | Code function: | 3_2_004094A0 | |
Source: | Code function: | 3_2_0042DCA0 | |
Source: | Code function: | 3_2_0041BD50 | |
Source: | Code function: | 3_2_0041FD70 | |
Source: | Code function: | 3_2_0040E579 | |
Source: | Code function: | 3_2_0040E579 | |
Source: | Code function: | 3_2_0041D510 | |
Source: | Code function: | 3_2_0040D520 | |
Source: | Code function: | 3_2_00407640 | |
Source: | Code function: | 3_2_00407640 | |
Source: | Code function: | 3_2_00429670 | |
Source: | Code function: | 3_2_00429670 | |
Source: | Code function: | 3_2_00408E10 | |
Source: | Code function: | 3_2_0042A630 | |
Source: | Code function: | 3_2_0042A630 | |
Source: | Code function: | 3_2_0043EEC0 | |
Source: | Code function: | 3_2_0042C68E | |
Source: | Code function: | 3_2_0043169D | |
Source: | Code function: | 3_2_0042F6A0 | |
Source: | Code function: | 3_2_004296AB | |
Source: | Code function: | 3_2_00441740 | |
Source: | Code function: | 3_2_0042AF1D | |
Source: | Code function: | 3_2_0041FFE0 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 3_2_00438A00 |
Source: | Code function: | 3_2_03931000 |
Source: | Code function: | 3_2_00438A00 |
Source: | Code function: | 3_2_00438BA0 |
Source: | Code function: | 3_2_0041616F | |
Source: | Code function: | 3_2_00426970 | |
Source: | Code function: | 3_2_0040E9C9 | |
Source: | Code function: | 3_2_0043DA40 | |
Source: | Code function: | 3_2_00422A9B | |
Source: | Code function: | 3_2_00412BE0 | |
Source: | Code function: | 3_2_00423410 | |
Source: | Code function: | 3_2_0043DCC0 | |
Source: | Code function: | 3_2_004454A0 | |
Source: | Code function: | 3_2_0040AE20 | |
Source: | Code function: | 3_2_00445E20 | |
Source: | Code function: | 3_2_00429F30 | |
Source: | Code function: | 3_2_0040D7E3 | |
Source: | Code function: | 3_2_0041B840 | |
Source: | Code function: | 3_2_0043F040 | |
Source: | Code function: | 3_2_00406860 | |
Source: | Code function: | 3_2_00444870 | |
Source: | Code function: | 3_2_0042C006 | |
Source: | Code function: | 3_2_00420818 | |
Source: | Code function: | 3_2_00412030 | |
Source: | Code function: | 3_2_004150C0 | |
Source: | Code function: | 3_2_0041A8F0 | |
Source: | Code function: | 3_2_004378FB | |
Source: | Code function: | 3_2_00445880 | |
Source: | Code function: | 3_2_00436090 | |
Source: | Code function: | 3_2_004288AE | |
Source: | Code function: | 3_2_0041C8BF | |
Source: | Code function: | 3_2_00428950 | |
Source: | Code function: | 3_2_00444960 | |
Source: | Code function: | 3_2_00444979 | |
Source: | Code function: | 3_2_0044497B | |
Source: | Code function: | 3_2_00427100 | |
Source: | Code function: | 3_2_00432131 | |
Source: | Code function: | 3_2_004039C0 | |
Source: | Code function: | 3_2_0043D1D0 | |
Source: | Code function: | 3_2_00426191 | |
Source: | Code function: | 3_2_004099A0 | |
Source: | Code function: | 3_2_0041E200 | |
Source: | Code function: | 3_2_00437209 | |
Source: | Code function: | 3_2_00445220 | |
Source: | Code function: | 3_2_00444AC0 | |
Source: | Code function: | 3_2_0043EAD0 | |
Source: | Code function: | 3_2_00419F95 | |
Source: | Code function: | 3_2_0043C2DE | |
Source: | Code function: | 3_2_0043F2A0 | |
Source: | Code function: | 3_2_00417B48 | |
Source: | Code function: | 3_2_00445B60 | |
Source: | Code function: | 3_2_00405B70 | |
Source: | Code function: | 3_2_00404370 | |
Source: | Code function: | 3_2_00417306 | |
Source: | Code function: | 3_2_0043BB2E | |
Source: | Code function: | 3_2_0040BB3C | |
Source: | Code function: | 3_2_0043533C | |
Source: | Code function: | 3_2_004063D0 | |
Source: | Code function: | 3_2_004223E6 | |
Source: | Code function: | 3_2_00402BA0 | |
Source: | Code function: | 3_2_0040B3A0 | |
Source: | Code function: | 3_2_00415BA0 | |
Source: | Code function: | 3_2_0043B44E | |
Source: | Code function: | 3_2_00418459 | |
Source: | Code function: | 3_2_0041CC70 | |
Source: | Code function: | 3_2_00436400 | |
Source: | Code function: | 3_2_00432413 | |
Source: | Code function: | 3_2_00444C10 | |
Source: | Code function: | 3_2_0043D430 | |
Source: | Code function: | 3_2_0041B4F0 | |
Source: | Code function: | 3_2_004424F7 | |
Source: | Code function: | 3_2_004094A0 | |
Source: | Code function: | 3_2_00433CB6 | |
Source: | Code function: | 3_2_0041D510 | |
Source: | Code function: | 3_2_004385C0 | |
Source: | Code function: | 3_2_004105CB | |
Source: | Code function: | 3_2_00407640 | |
Source: | Code function: | 3_2_00429670 | |
Source: | Code function: | 3_2_0041E610 | |
Source: | Code function: | 3_2_0042A630 | |
Source: | Code function: | 3_2_00427EF4 | |
Source: | Code function: | 3_2_00404E90 | |
Source: | Code function: | 3_2_0041DEA0 | |
Source: | Code function: | 3_2_00441F40 | |
Source: | Code function: | 3_2_00432F50 | |
Source: | Code function: | 3_2_0042FF00 | |
Source: | Code function: | 3_2_0042B706 | |
Source: | Code function: | 3_2_0042AF1D | |
Source: | Code function: | 3_2_00420F8A | |
Source: | Code function: | 3_2_00419F95 | |
Source: | Code function: | 3_2_00402FA0 | |
Source: | Code function: | 3_2_004417B0 |
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 3_2_0043DCC0 |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 3_2_0044DB28 | |
Source: | Code function: | 3_2_0044DB28 | |
Source: | Code function: | 3_2_0044DD06 |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_3-14990 |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 3_2_00442EE0 |
Source: | Code function: | 0_2_02647F39 | |
Source: | Code function: | 0_2_026480B6 |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Code function: | 0_2_02647F39 |
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 211 Process Injection | 23 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 1 Query Registry | Remote Services | 1 Screen Capture | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Disable or Modify Tools | LSASS Memory | 231 Security Software Discovery | Remote Desktop Protocol | 1 Archive Collected Data | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 211 Process Injection | Security Account Manager | 23 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | 41 Data from Local System | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 11 Deobfuscate/Decode Files or Information | NTDS | 1 Process Discovery | Distributed Component Object Model | 3 Clipboard Data | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 3 Obfuscated Files or Information | LSA Secrets | 1 Application Window Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Software Packing | Cached Domain Credentials | 1 File and Directory Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 Timestomp | DCSync | 22 System Information Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 DLL Side-Loading | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | TR/ATRAPS.Gen | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
undesirabkel.click | 188.114.96.3 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
true |
| unknown | |
false | high | ||
false | high | ||
false | high | ||
true |
| unknown | |
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
188.114.96.3 | undesirabkel.click | European Union | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1584542 |
Start date and time: | 2025-01-05 19:59:04 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 36s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 11 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | CrosshairX.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@7/5@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 52.182.143.212, 20.190.159.23, 4.245.163.56, 13.107.246.45
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: CrosshairX.exe
Time | Type | Description |
---|---|---|
13:59:57 | API Interceptor | |
14:00:11 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
188.114.96.3 | Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| |
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
undesirabkel.click | Get hash | malicious | LummaC, PureLog Stealer | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_CrosshairX.exe_3a7c379d35735d73b4b1f5995acd792ecc6f1adf_f5684b01_8a4ed039-3ed9-4d1f-b1fe-2f65d4cf61f8\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.8912900107826616 |
Encrypted: | false |
SSDEEP: | 96:LHFJsTxA3ogAsBgejTOAqyS3QXIDcQlc6VcEdcw3t+BHUHZ0ownOgHkEwH3dEFYd:TLsTG3dAjA0LR3caGGzuiFccZ24IO8Q |
MD5: | D55B1E454E7DFACD76CF33E24BE842AF |
SHA1: | 8B6C00457B260A119571B622FAB92B0CE575743A |
SHA-256: | 6C1BE46393979B61A96157CED5A53C93E9852EB085A871A7E39FB201B41733E3 |
SHA-512: | 09C86D92ED4122D1E4A7BC1C46ECDEAC14F8BB7445A8276F61498CD60AB09EFC1FAE7317A39DE3894E44FBC9A0185E1575DE819EEE748D1FA62B8C85D99CC851 |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 154321 |
Entropy (8bit): | 3.6967004559140784 |
Encrypted: | false |
SSDEEP: | 1536:RwReXFW2tT4xuBojRypN4uE2aOKcqCD3LTgWJ6YUfQcvKnKAZDGgL:iRyFWQcnU4uEqKch3LTgLRfrKnZG |
MD5: | E443C64F8A9D5DC24BE8F095494DD2FE |
SHA1: | E6708F1990364D131607FD8632330ABEACCC1AB6 |
SHA-256: | 83359E207825FB9BCC2568AE1404A40B65F244623BA1DD7551C6EE3317B488DA |
SHA-512: | 7F34C390DA21CB8BAF4F65685FA7AEDB5DEA8897531609002077A4B1B7EE9C9BC6CB26D9F1EAA090106E80058AFADAB882D813A6666ED5E1858A64E207D17D51 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8382 |
Entropy (8bit): | 3.692301699988033 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJDjZ6G6Y9wSU9SKzIgmfiVJ9prt89bIusfgvYm:R6lXJvZ6G6YaSU9S5gmfiVJKItfg1 |
MD5: | 63D9A1C1CE78C57F31C3868562E92D68 |
SHA1: | E100A3230B4BDD158463DE7991A853AE350F91DB |
SHA-256: | D0B0D9530ED69F001EFC9AB812ECCD9C853D9ACF89A466DF4F8799C6AA075802 |
SHA-512: | 34F135A65E7553ACC4A3DE94AA4DDEF4E6E3F9838202E032EAF8207F7D5160FE5F1FFBB2B5D6BA16F0044D6C34FBBCB989F261EC2E06EF238FF84B69EA519E5C |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4756 |
Entropy (8bit): | 4.447664057872275 |
Encrypted: | false |
SSDEEP: | 96:uIjfpnI7pd7VmVoJgfERlfBEyK5ERlfGQUIjdd:uI1Ypd7ltpEMOAjT |
MD5: | 03227D34C8D71273F13C20465F05EB2B |
SHA1: | 30F434CAD5ADAB492ED9D86767368B72B19C2C85 |
SHA-256: | CAE1704B6A70A3C0E0BEC45B92A74FD9D2076D74EC10E9436891B450D5D29BCF |
SHA-512: | A8845AC3CED172B1CFE1DF7E22E4D07DBE2088426231F1520499171769D5BEB1254531DC60F0D89DF086F6B178CAE7BE95C478A71EB5DFF220BF294DC7984CD6 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.465533986363812 |
Encrypted: | false |
SSDEEP: | 6144:uIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNIdwBCswSbSv:jXD94+WlLZMM6YFHC+Sv |
MD5: | FC7934E7C86F2D006C1CAD9101CB9734 |
SHA1: | 0834A87996B436F9FCA7ECC5D9AB50ADAD0925BD |
SHA-256: | 24716C0AD4EEF8FDA6916EA42C2FE5781979E1E5406B41F3CDBC10F747924545 |
SHA-512: | FB0AD6BEE58BF643782D299BC0856648BCA38214C796FE5B1A78858E74DCBB94A41BD6ED591BA4A83C4030D65C4DF0C716B6A40177046FC99AE0D271B2B79405 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.96663112148494 |
TrID: |
|
File name: | CrosshairX.exe |
File size: | 369'664 bytes |
MD5: | 69bd9be788d02879474d95c9a50beb16 |
SHA1: | f29aeddeb31b109bdabb519c9dc8204ade7e2fb8 |
SHA256: | 5685c21f0fea45d3b474e4f33689a444e7961b3fb2fed82502518931e7239ccc |
SHA512: | 30a9eab7fa7a93c61bd90caa9a173b9fe32e9d93c1d0c73845e1c180bfd348673f7070d5fc694d48f24c49f669c0b4b364f13962f778c9fbba84ba604ebfc4e6 |
SSDEEP: | 6144:pTPOsgo5qJgKjOfDDBrwHJAtlsGMpZh7exUG0Gv0JYlCaLkmJ3/n2b:pPOi8go6BrwSMpZg+GBv0JYlCahJ34 |
TLSH: | 17742325F64F5A29DF8E4A3BB49651C28230D7801197D279E29C0027EF6BE4E53ABF14 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...AL................0..B...H.......a... ........@.. ....................... ........e...`................................ |
Icon Hash: | 0f45869392ce6d17 |
Entrypoint: | 0x40619e |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0xB98C4C41 [Thu Aug 23 20:32:01 2068 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x6150 | 0x4b | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x8000 | 0x441e | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xe000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x610a | 0x1c | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x41a4 | 0x4200 | 3fd86cd640fad1b0e3c70a019e57ee90 | False | 0.5025449810606061 | data | 5.884139579646745 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x8000 | 0x441e | 0x4600 | 2664d5807743a67b874ed987663755b7 | False | 0.9142299107142857 | data | 7.705443216316868 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xe000 | 0xc | 0x200 | 0553d30171535035af0137d669b879da | False | 0.044921875 | data | 0.08153941234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.BSS | 0x10000 | 0x51600 | 0x51600 | 388a0ab9d7c7c982c0576a00e3188d44 | False | 1.000333021313364 | data | 7.999479237635455 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x81b4 | 0x3d60 | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | 0.9851705702647657 | ||
RT_GROUP_ICON | 0xbf14 | 0x14 | data | 1.05 | ||
RT_VERSION | 0xbf28 | 0x30c | data | 0.41923076923076924 | ||
RT_MANIFEST | 0xc234 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T19:59:54.063845+0100 | 2058550 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (undesirabkel .click) | 1 | 192.168.2.4 | 64399 | 1.1.1.1 | 53 | UDP |
2025-01-05T19:59:54.564025+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49730 | 188.114.96.3 | 443 | TCP |
2025-01-05T19:59:54.564025+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49730 | 188.114.96.3 | 443 | TCP |
2025-01-05T19:59:58.180114+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49730 | 188.114.96.3 | 443 | TCP |
2025-01-05T19:59:58.180114+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49730 | 188.114.96.3 | 443 | TCP |
2025-01-05T19:59:58.714037+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49736 | 188.114.96.3 | 443 | TCP |
2025-01-05T19:59:58.714037+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49736 | 188.114.96.3 | 443 | TCP |
2025-01-05T19:59:59.190509+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.4 | 49736 | 188.114.96.3 | 443 | TCP |
2025-01-05T19:59:59.190509+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49736 | 188.114.96.3 | 443 | TCP |
2025-01-05T19:59:59.804416+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49738 | 188.114.96.3 | 443 | TCP |
2025-01-05T19:59:59.804416+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49738 | 188.114.96.3 | 443 | TCP |
2025-01-05T20:00:00.900774+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49739 | 188.114.96.3 | 443 | TCP |
2025-01-05T20:00:00.900774+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49739 | 188.114.96.3 | 443 | TCP |
2025-01-05T20:00:01.390799+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49739 | 188.114.96.3 | 443 | TCP |
2025-01-05T20:00:02.258764+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49740 | 188.114.96.3 | 443 | TCP |
2025-01-05T20:00:02.258764+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49740 | 188.114.96.3 | 443 | TCP |
2025-01-05T20:00:03.450246+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49741 | 188.114.96.3 | 443 | TCP |
2025-01-05T20:00:03.450246+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49741 | 188.114.96.3 | 443 | TCP |
2025-01-05T20:00:05.062265+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49742 | 188.114.96.3 | 443 | TCP |
2025-01-05T20:00:05.062265+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49742 | 188.114.96.3 | 443 | TCP |
2025-01-05T20:00:07.871288+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49745 | 188.114.96.3 | 443 | TCP |
2025-01-05T20:00:07.871288+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49745 | 188.114.96.3 | 443 | TCP |
2025-01-05T20:00:08.402270+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49745 | 188.114.96.3 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 5, 2025 19:59:54.090238094 CET | 49730 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:54.090265989 CET | 443 | 49730 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:54.090332985 CET | 49730 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:54.093405008 CET | 49730 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:54.093419075 CET | 443 | 49730 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:54.563946009 CET | 443 | 49730 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:54.564024925 CET | 49730 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:54.567518950 CET | 49730 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:54.567528009 CET | 443 | 49730 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:54.567866087 CET | 443 | 49730 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:54.611327887 CET | 49730 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:54.660849094 CET | 49730 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:54.660924911 CET | 49730 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:54.660970926 CET | 443 | 49730 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:58.180124998 CET | 443 | 49730 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:58.180207014 CET | 443 | 49730 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:58.180389881 CET | 49730 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:58.183423042 CET | 49730 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:58.183434963 CET | 443 | 49730 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:58.192821026 CET | 49736 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:58.192845106 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:58.192939043 CET | 49736 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:58.193231106 CET | 49736 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:58.193238974 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:58.713977098 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:58.714036942 CET | 49736 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:58.715784073 CET | 49736 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:58.715789080 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:58.715980053 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:58.724911928 CET | 49736 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:58.724935055 CET | 49736 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:58.724965096 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:59.190504074 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:59.190542936 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:59.190572023 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:59.190608025 CET | 49736 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:59.190615892 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:59.190658092 CET | 49736 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:59.190661907 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:59.190850973 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:59.190877914 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:59.190893888 CET | 49736 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:59.190898895 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:59.190969944 CET | 49736 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:59.191026926 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:59.196691036 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:59.196718931 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:59.196758032 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:59.196768045 CET | 49736 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:59.196774960 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:59.196825027 CET | 49736 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:59.279882908 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:59.279928923 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:59.279975891 CET | 49736 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:59.279980898 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:59.280009985 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:59.280055046 CET | 49736 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:59.280247927 CET | 49736 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:59.280256987 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:59.280275106 CET | 49736 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:59.280286074 CET | 443 | 49736 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:59.343902111 CET | 49738 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:59.343920946 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:59.344008923 CET | 49738 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:59.344341040 CET | 49738 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:59.344348907 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:59.804339886 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:59.804415941 CET | 49738 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:59.805737972 CET | 49738 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:59.805744886 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:59.805936098 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:59.814652920 CET | 49738 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:59.814815044 CET | 49738 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:59.814835072 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 19:59:59.814898968 CET | 49738 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 19:59:59.814904928 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:00.419581890 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:00.419676065 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:00.419751883 CET | 49738 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:00.419925928 CET | 49738 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:00.419935942 CET | 443 | 49738 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:00.438806057 CET | 49739 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:00.438844919 CET | 443 | 49739 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:00.438930988 CET | 49739 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:00.439217091 CET | 49739 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:00.439229012 CET | 443 | 49739 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:00.900682926 CET | 443 | 49739 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:00.900774002 CET | 49739 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:00.902136087 CET | 49739 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:00.902143955 CET | 443 | 49739 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:00.902364016 CET | 443 | 49739 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:00.906553984 CET | 49739 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:00.906661034 CET | 49739 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:00.906689882 CET | 443 | 49739 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:01.390790939 CET | 443 | 49739 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:01.390888929 CET | 443 | 49739 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:01.390935898 CET | 49739 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:01.391305923 CET | 49739 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:01.391330957 CET | 443 | 49739 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:01.780157089 CET | 49740 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:01.780232906 CET | 443 | 49740 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:01.780303001 CET | 49740 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:01.780801058 CET | 49740 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:01.780816078 CET | 443 | 49740 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:02.258651018 CET | 443 | 49740 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:02.258764029 CET | 49740 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:02.260252953 CET | 49740 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:02.260266066 CET | 443 | 49740 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:02.260467052 CET | 443 | 49740 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:02.261676073 CET | 49740 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:02.261811972 CET | 49740 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:02.261843920 CET | 443 | 49740 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:02.261909962 CET | 49740 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:02.261923075 CET | 443 | 49740 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:02.893434048 CET | 443 | 49740 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:02.893503904 CET | 443 | 49740 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:02.893599033 CET | 49740 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:02.893871069 CET | 49740 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:02.893892050 CET | 443 | 49740 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:02.977159023 CET | 49741 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:02.977195024 CET | 443 | 49741 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:02.977277040 CET | 49741 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:02.977575064 CET | 49741 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:02.977588892 CET | 443 | 49741 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:03.450151920 CET | 443 | 49741 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:03.450246096 CET | 49741 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:03.451764107 CET | 49741 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:03.451771975 CET | 443 | 49741 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:03.452018023 CET | 443 | 49741 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:03.453365088 CET | 49741 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:03.453495979 CET | 49741 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:03.453501940 CET | 443 | 49741 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:03.928706884 CET | 443 | 49741 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:03.928786039 CET | 443 | 49741 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:03.928832054 CET | 49741 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:03.928992033 CET | 49741 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:03.929003000 CET | 443 | 49741 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:04.583852053 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:04.583904028 CET | 443 | 49742 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:04.583967924 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:04.584750891 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:04.584765911 CET | 443 | 49742 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:05.062169075 CET | 443 | 49742 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:05.062264919 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:05.063421011 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:05.063431025 CET | 443 | 49742 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:05.063652039 CET | 443 | 49742 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:05.064815044 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:05.065517902 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:05.065551043 CET | 443 | 49742 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:05.065634966 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:05.065680027 CET | 443 | 49742 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:05.065788031 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:05.065810919 CET | 443 | 49742 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:05.065915108 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:05.065953970 CET | 443 | 49742 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:05.066087961 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:05.066108942 CET | 443 | 49742 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:05.066255093 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:05.066282988 CET | 443 | 49742 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:05.066297054 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:05.066309929 CET | 443 | 49742 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:05.066409111 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:05.066432953 CET | 443 | 49742 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:05.066454887 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:05.066576004 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:05.066603899 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:05.075645924 CET | 443 | 49742 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:05.075838089 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:05.075865984 CET | 443 | 49742 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:05.075889111 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:05.075927973 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:05.080472946 CET | 443 | 49742 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:07.373634100 CET | 443 | 49742 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:07.373713970 CET | 443 | 49742 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:07.373759985 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:07.373922110 CET | 49742 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:07.373935938 CET | 443 | 49742 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:07.378200054 CET | 49745 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:07.378226995 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:07.378312111 CET | 49745 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:07.378565073 CET | 49745 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:07.378572941 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:07.871195078 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:07.871288061 CET | 49745 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:07.872591019 CET | 49745 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:07.872596979 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:07.872790098 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:07.873987913 CET | 49745 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:07.874010086 CET | 49745 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:07.874037027 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:08.402276039 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:08.402324915 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:08.402363062 CET | 49745 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:08.402371883 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:08.402380943 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:08.402414083 CET | 49745 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:08.402426958 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:08.402481079 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:08.402515888 CET | 49745 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:08.402518988 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:08.402525902 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:08.402561903 CET | 49745 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:08.402565956 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:08.402981997 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:08.403013945 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:08.403021097 CET | 49745 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:08.403023958 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:08.403062105 CET | 49745 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:08.403419971 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:08.403491020 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:08.403533936 CET | 49745 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:08.415272951 CET | 49745 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:08.415282965 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Jan 5, 2025 20:00:08.415318966 CET | 49745 | 443 | 192.168.2.4 | 188.114.96.3 |
Jan 5, 2025 20:00:08.415323973 CET | 443 | 49745 | 188.114.96.3 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 5, 2025 19:59:54.063844919 CET | 64399 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 5, 2025 19:59:54.084418058 CET | 53 | 64399 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 5, 2025 19:59:54.063844919 CET | 192.168.2.4 | 1.1.1.1 | 0x648d | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 5, 2025 19:59:54.084418058 CET | 1.1.1.1 | 192.168.2.4 | 0x648d | No error (0) | 188.114.96.3 | A (IP address) | IN (0x0001) | false | ||
Jan 5, 2025 19:59:54.084418058 CET | 1.1.1.1 | 192.168.2.4 | 0x648d | No error (0) | 188.114.97.3 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49730 | 188.114.96.3 | 443 | 7396 | C:\Users\user\Desktop\CrosshairX.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 18:59:54 UTC | 265 | OUT | |
2025-01-05 18:59:54 UTC | 8 | OUT | |
2025-01-05 18:59:58 UTC | 1130 | IN | |
2025-01-05 18:59:58 UTC | 7 | IN | |
2025-01-05 18:59:58 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49736 | 188.114.96.3 | 443 | 7396 | C:\Users\user\Desktop\CrosshairX.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 18:59:58 UTC | 266 | OUT | |
2025-01-05 18:59:58 UTC | 54 | OUT | |
2025-01-05 18:59:59 UTC | 1136 | IN | |
2025-01-05 18:59:59 UTC | 233 | IN | |
2025-01-05 18:59:59 UTC | 1369 | IN | |
2025-01-05 18:59:59 UTC | 1369 | IN | |
2025-01-05 18:59:59 UTC | 1369 | IN | |
2025-01-05 18:59:59 UTC | 1369 | IN | |
2025-01-05 18:59:59 UTC | 1369 | IN | |
2025-01-05 18:59:59 UTC | 1369 | IN | |
2025-01-05 18:59:59 UTC | 1369 | IN | |
2025-01-05 18:59:59 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49738 | 188.114.96.3 | 443 | 7396 | C:\Users\user\Desktop\CrosshairX.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 18:59:59 UTC | 276 | OUT | |
2025-01-05 18:59:59 UTC | 15331 | OUT | |
2025-01-05 18:59:59 UTC | 2791 | OUT | |
2025-01-05 19:00:00 UTC | 1130 | IN | |
2025-01-05 19:00:00 UTC | 20 | IN | |
2025-01-05 19:00:00 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49739 | 188.114.96.3 | 443 | 7396 | C:\Users\user\Desktop\CrosshairX.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 19:00:00 UTC | 276 | OUT | |
2025-01-05 19:00:00 UTC | 8749 | OUT | |
2025-01-05 19:00:01 UTC | 1132 | IN | |
2025-01-05 19:00:01 UTC | 20 | IN | |
2025-01-05 19:00:01 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49740 | 188.114.96.3 | 443 | 7396 | C:\Users\user\Desktop\CrosshairX.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 19:00:02 UTC | 280 | OUT | |
2025-01-05 19:00:02 UTC | 15331 | OUT | |
2025-01-05 19:00:02 UTC | 5089 | OUT | |
2025-01-05 19:00:02 UTC | 1131 | IN | |
2025-01-05 19:00:02 UTC | 20 | IN | |
2025-01-05 19:00:02 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49741 | 188.114.96.3 | 443 | 7396 | C:\Users\user\Desktop\CrosshairX.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 19:00:03 UTC | 280 | OUT | |
2025-01-05 19:00:03 UTC | 996 | OUT | |
2025-01-05 19:00:03 UTC | 1136 | IN | |
2025-01-05 19:00:03 UTC | 20 | IN | |
2025-01-05 19:00:03 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49742 | 188.114.96.3 | 443 | 7396 | C:\Users\user\Desktop\CrosshairX.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 19:00:05 UTC | 280 | OUT | |
2025-01-05 19:00:05 UTC | 15331 | OUT | |
2025-01-05 19:00:05 UTC | 15331 | OUT | |
2025-01-05 19:00:05 UTC | 15331 | OUT | |
2025-01-05 19:00:05 UTC | 15331 | OUT | |
2025-01-05 19:00:05 UTC | 15331 | OUT | |
2025-01-05 19:00:05 UTC | 15331 | OUT | |
2025-01-05 19:00:05 UTC | 15331 | OUT | |
2025-01-05 19:00:05 UTC | 15331 | OUT | |
2025-01-05 19:00:05 UTC | 15331 | OUT | |
2025-01-05 19:00:05 UTC | 15331 | OUT | |
2025-01-05 19:00:07 UTC | 1140 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49745 | 188.114.96.3 | 443 | 7396 | C:\Users\user\Desktop\CrosshairX.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 19:00:07 UTC | 266 | OUT | |
2025-01-05 19:00:07 UTC | 89 | OUT | |
2025-01-05 19:00:08 UTC | 1135 | IN | |
2025-01-05 19:00:08 UTC | 234 | IN | |
2025-01-05 19:00:08 UTC | 1369 | IN | |
2025-01-05 19:00:08 UTC | 1369 | IN | |
2025-01-05 19:00:08 UTC | 1369 | IN | |
2025-01-05 19:00:08 UTC | 1369 | IN | |
2025-01-05 19:00:08 UTC | 1369 | IN | |
2025-01-05 19:00:08 UTC | 1369 | IN | |
2025-01-05 19:00:08 UTC | 1369 | IN | |
2025-01-05 19:00:08 UTC | 1369 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 13:59:52 |
Start date: | 05/01/2025 |
Path: | C:\Users\user\Desktop\CrosshairX.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd0000 |
File size: | 369'664 bytes |
MD5 hash: | 69BD9BE788D02879474D95C9A50BEB16 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 13:59:52 |
Start date: | 05/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 13:59:53 |
Start date: | 05/01/2025 |
Path: | C:\Users\user\Desktop\CrosshairX.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x140000 |
File size: | 369'664 bytes |
MD5 hash: | 69BD9BE788D02879474D95C9A50BEB16 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 3 |
Start time: | 13:59:53 |
Start date: | 05/01/2025 |
Path: | C:\Users\user\Desktop\CrosshairX.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd40000 |
File size: | 369'664 bytes |
MD5 hash: | 69BD9BE788D02879474D95C9A50BEB16 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 6 |
Start time: | 13:59:53 |
Start date: | 05/01/2025 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x420000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 7.8% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 60% |
Total number of Nodes: | 15 |
Total number of Limit Nodes: | 1 |
Graph
Function 02647F39 Relevance: 42.3, APIs: 11, Strings: 13, Instructions: 294threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 026480B6 Relevance: 12.3, APIs: 6, Strings: 1, Instructions: 82threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 009A29D7 Relevance: 1.6, APIs: 1, Instructions: 58memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 009A0668 Relevance: 1.6, APIs: 1, Instructions: 54memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 9.1% |
Dynamic/Decrypted Code Coverage: | 4.4% |
Signature Coverage: | 64.8% |
Total number of Nodes: | 366 |
Total number of Limit Nodes: | 26 |
Graph
Function 0043DCC0 Relevance: 32.4, APIs: 11, Strings: 7, Instructions: 917memorycomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03931000 Relevance: 19.6, APIs: 13, Instructions: 81clipboardsleepmemoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00423410 Relevance: 10.5, Strings: 8, Instructions: 488COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040AE20 Relevance: 7.9, Strings: 6, Instructions: 429COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040E9C9 Relevance: 4.0, Strings: 3, Instructions: 214COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00429F30 Relevance: 1.7, Strings: 1, Instructions: 436COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004454A0 Relevance: 1.6, Strings: 1, Instructions: 334COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00445E20 Relevance: 1.6, Strings: 1, Instructions: 303COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00442EE0 Relevance: 1.5, APIs: 1, Instructions: 14libraryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004453C0 Relevance: 1.3, Strings: 1, Instructions: 73COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00432131 Relevance: .2, Instructions: 219COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00422A9B Relevance: .2, Instructions: 197COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043DA40 Relevance: .2, Instructions: 186COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408A70 Relevance: 7.6, APIs: 5, Instructions: 135threadCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040F460 Relevance: 3.1, APIs: 2, Instructions: 115COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00443D91 Relevance: 3.0, APIs: 2, Instructions: 16COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043196A Relevance: 1.6, APIs: 1, Instructions: 80COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043C9EA Relevance: 1.6, APIs: 1, Instructions: 55COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00442E80 Relevance: 1.5, APIs: 1, Instructions: 30memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00437044 Relevance: 1.5, APIs: 1, Instructions: 25COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441180 Relevance: 1.5, APIs: 1, Instructions: 22memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00434F83 Relevance: 1.5, APIs: 1, Instructions: 21COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040F40B Relevance: 1.5, APIs: 1, Instructions: 17COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441160 Relevance: 1.5, APIs: 1, Instructions: 9memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043BB2E Relevance: 71.6, Strings: 57, Instructions: 383COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043B44E Relevance: 40.3, Strings: 32, Instructions: 276COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043C2DE Relevance: 40.3, Strings: 32, Instructions: 268COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00432F50 Relevance: 28.4, Strings: 22, Instructions: 856COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427EF4 Relevance: 23.0, Strings: 18, Instructions: 494COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042A430 Relevance: 16.5, Strings: 13, Instructions: 260COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040B3A0 Relevance: 15.3, Strings: 12, Instructions: 258COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004094A0 Relevance: 11.7, Strings: 9, Instructions: 450COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00445220 Relevance: 11.4, Strings: 9, Instructions: 122COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00429670 Relevance: 10.4, Strings: 8, Instructions: 410COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043D430 Relevance: 10.2, Strings: 8, Instructions: 223COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004105CB Relevance: 9.7, Strings: 7, Instructions: 988COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415BA0 Relevance: 9.2, Strings: 7, Instructions: 433COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042FF00 Relevance: 9.0, Strings: 7, Instructions: 264COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00417306 Relevance: 8.0, Strings: 6, Instructions: 550COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404370 Relevance: 6.7, Strings: 5, Instructions: 473COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00428950 Relevance: 5.5, Strings: 4, Instructions: 480COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004288AE Relevance: 5.4, Strings: 4, Instructions: 357COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040E579 Relevance: 5.3, Strings: 4, Instructions: 346COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004424F7 Relevance: 5.3, Strings: 4, Instructions: 341COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004429A0 Relevance: 5.1, Strings: 4, Instructions: 129COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004417B0 Relevance: 4.3, Strings: 3, Instructions: 584COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00417B48 Relevance: 4.2, Strings: 3, Instructions: 491COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042C68E Relevance: 4.2, Strings: 3, Instructions: 425COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004099A0 Relevance: 4.2, Strings: 3, Instructions: 424COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426191 Relevance: 4.2, Strings: 3, Instructions: 418COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042B706 Relevance: 4.1, Strings: 3, Instructions: 392COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041CC70 Relevance: 4.0, Strings: 3, Instructions: 278COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004310BA Relevance: 4.0, Strings: 3, Instructions: 267COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00431150 Relevance: 4.0, Strings: 3, Instructions: 265COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004311C0 Relevance: 4.0, Strings: 3, Instructions: 263COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004311B1 Relevance: 4.0, Strings: 3, Instructions: 239COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041C079 Relevance: 3.9, Strings: 3, Instructions: 188COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004378FB Relevance: 3.7, APIs: 1, Strings: 1, Instructions: 236memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00437209 Relevance: 3.7, APIs: 1, Strings: 1, Instructions: 226memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043F2A0 Relevance: 3.3, Strings: 2, Instructions: 799COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404E90 Relevance: 3.3, Strings: 2, Instructions: 792COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041D510 Relevance: 3.0, Strings: 2, Instructions: 488COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00444C10 Relevance: 2.9, Strings: 2, Instructions: 449COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040BB3C Relevance: 2.8, Strings: 2, Instructions: 283COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041B4F0 Relevance: 2.7, Strings: 2, Instructions: 241COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004150C0 Relevance: 2.2, Strings: 1, Instructions: 977COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042A630 Relevance: 1.8, Strings: 1, Instructions: 563COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00436400 Relevance: 1.8, Strings: 1, Instructions: 537COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004223E6 Relevance: 1.7, Strings: 1, Instructions: 466COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F6A0 Relevance: 1.6, Strings: 1, Instructions: 388COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043EAD0 Relevance: 1.6, Strings: 1, Instructions: 370COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00436090 Relevance: 1.6, Strings: 1, Instructions: 306COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041E610 Relevance: 1.5, Strings: 1, Instructions: 274COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00419F95 Relevance: 1.5, Strings: 1, Instructions: 273COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409200 Relevance: 1.5, Strings: 1, Instructions: 255COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00444870 Relevance: 1.5, Strings: 1, Instructions: 253COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00445B60 Relevance: 1.5, Strings: 1, Instructions: 249COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042FB40 Relevance: 1.5, Strings: 1, Instructions: 236COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00444960 Relevance: 1.4, Strings: 1, Instructions: 182COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0044497B Relevance: 1.4, Strings: 1, Instructions: 171COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00444979 Relevance: 1.4, Strings: 1, Instructions: 170COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00444AC0 Relevance: 1.3, Strings: 1, Instructions: 81COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402FA0 Relevance: .7, Instructions: 674COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406860 Relevance: .7, Instructions: 665COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407640 Relevance: .6, Instructions: 625COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004039C0 Relevance: .6, Instructions: 600COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00420F8A Relevance: .5, Instructions: 494COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00420818 Relevance: .4, Instructions: 406COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405B70 Relevance: .4, Instructions: 400COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043533C Relevance: .4, Instructions: 369COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441F40 Relevance: .3, Instructions: 348COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041E200 Relevance: .3, Instructions: 337COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00433CB6 Relevance: .3, Instructions: 327COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041DEA0 Relevance: .3, Instructions: 319COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004063D0 Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042C006 Relevance: .3, Instructions: 291COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00445880 Relevance: .3, Instructions: 267COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004385C0 Relevance: .3, Instructions: 254COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041C8BF Relevance: .2, Instructions: 235COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00432413 Relevance: .2, Instructions: 227COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041FD70 Relevance: .2, Instructions: 204COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041B840 Relevance: .2, Instructions: 190COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043D1D0 Relevance: .2, Instructions: 189COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004296AB Relevance: .2, Instructions: 179COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408E10 Relevance: .2, Instructions: 172COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041A368 Relevance: .2, Instructions: 168COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042C44F Relevance: .2, Instructions: 163COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040F15C Relevance: .1, Instructions: 146COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043EEC0 Relevance: .1, Instructions: 146COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043F040 Relevance: .1, Instructions: 132COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041E930 Relevance: .1, Instructions: 112COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402BA0 Relevance: .1, Instructions: 112COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042A450 Relevance: .1, Instructions: 68COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043AC30 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042DCA0 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041BD50 Relevance: .1, Instructions: 52COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042CA41 Relevance: .0, Instructions: 48COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441740 Relevance: .0, Instructions: 46COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040D520 Relevance: .0, Instructions: 39COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042CC9C Relevance: .0, Instructions: 24COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041FFE0 Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|