Windows
Analysis Report
Rgr8LJz.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Rgr8LJz.exe (PID: 7276 cmdline:
"C:\Users\ user\Deskt op\Rgr8LJz .exe" MD5: 20155323669FD610A0C7201BE666FBD6) - conhost.exe (PID: 7284 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - Rgr8LJz.exe (PID: 7344 cmdline:
"C:\Users\ user\Deskt op\Rgr8LJz .exe" MD5: 20155323669FD610A0C7201BE666FBD6) - Rgr8LJz.exe (PID: 7352 cmdline:
"C:\Users\ user\Deskt op\Rgr8LJz .exe" MD5: 20155323669FD610A0C7201BE666FBD6) - WerFault.exe (PID: 7444 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 276 -s 924 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["versersleep.shop", "crowdwarek.shop", "apporholis.shop", "cureprouderio.click", "handscreamny.shop", "femalsabler.shop", "soundtappysk.shop", "robinsharez.shop", "chipdonkeruz.shop"], "Build id": "LPnhqo--nbgnxdlxdnyo"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-08T13:57:56.472148+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49730 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:57:57.426089+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49732 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:57:58.747803+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49734 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:57:59.912318+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49738 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:58:00.976526+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49739 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:58:02.524982+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49741 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:58:03.833728+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49742 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:58:13.622738+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49748 | 104.21.4.114 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-08T13:57:56.941881+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:57:57.967721+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49732 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:58:14.109483+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49748 | 104.21.4.114 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-08T13:57:56.941881+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 104.21.4.114 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-08T13:57:57.967721+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.4 | 49732 | 104.21.4.114 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-08T13:57:56.472148+0100 | 2058639 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49730 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:57:57.426089+0100 | 2058639 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49732 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:57:58.747803+0100 | 2058639 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49734 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:57:59.912318+0100 | 2058639 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49738 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:58:00.976526+0100 | 2058639 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49739 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:58:02.524982+0100 | 2058639 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49741 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:58:03.833728+0100 | 2058639 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49742 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:58:13.622738+0100 | 2058639 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49748 | 104.21.4.114 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-08T13:57:55.981472+0100 | 2058638 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 64606 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-08T13:58:02.997634+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49741 | 104.21.4.114 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Code function: | 3_2_00418BDB |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 3_2_00428970 | |
Source: | Code function: | 3_2_00442191 | |
Source: | Code function: | 3_2_00418BDB | |
Source: | Code function: | 3_2_00442842 | |
Source: | Code function: | 3_2_0042B031 | |
Source: | Code function: | 3_2_004150D0 | |
Source: | Code function: | 3_2_0040C8DE | |
Source: | Code function: | 3_2_0042A8E0 | |
Source: | Code function: | 3_2_0043D8F0 | |
Source: | Code function: | 3_2_0041F8A0 | |
Source: | Code function: | 3_2_004190A6 | |
Source: | Code function: | 3_2_0041C0AD | |
Source: | Code function: | 3_2_0041C0AD | |
Source: | Code function: | 3_2_00421150 | |
Source: | Code function: | 3_2_00421150 | |
Source: | Code function: | 3_2_0041F9F0 | |
Source: | Code function: | 3_2_0042A9F4 | |
Source: | Code function: | 3_2_00409270 | |
Source: | Code function: | 3_2_00409270 | |
Source: | Code function: | 3_2_00405AD0 | |
Source: | Code function: | 3_2_00405AD0 | |
Source: | Code function: | 3_2_004222F0 | |
Source: | Code function: | 3_2_004302A2 | |
Source: | Code function: | 3_2_0043E2B9 | |
Source: | Code function: | 3_2_0043E2B9 | |
Source: | Code function: | 3_2_00419B6F | |
Source: | Code function: | 3_2_00417303 | |
Source: | Code function: | 3_2_0040AB10 | |
Source: | Code function: | 3_2_00442335 | |
Source: | Code function: | 3_2_00415BD0 | |
Source: | Code function: | 3_2_0042F3E7 | |
Source: | Code function: | 3_2_0042F3EA | |
Source: | Code function: | 3_2_00427BA0 | |
Source: | Code function: | 3_2_0043DBB0 | |
Source: | Code function: | 3_2_0043DBB0 | |
Source: | Code function: | 3_2_004403B0 | |
Source: | Code function: | 3_2_0044144E | |
Source: | Code function: | 3_2_00408470 | |
Source: | Code function: | 3_2_0042E400 | |
Source: | Code function: | 3_2_00428CD0 | |
Source: | Code function: | 3_2_0042FD51 | |
Source: | Code function: | 3_2_0041CD60 | |
Source: | Code function: | 3_2_0042FD4F | |
Source: | Code function: | 3_2_0040BD34 | |
Source: | Code function: | 3_2_0040BD34 | |
Source: | Code function: | 3_2_00408DC0 | |
Source: | Code function: | 3_2_00442DC5 | |
Source: | Code function: | 3_2_0041D5D0 | |
Source: | Code function: | 3_2_00407650 | |
Source: | Code function: | 3_2_0041667E | |
Source: | Code function: | 3_2_00430E0C | |
Source: | Code function: | 3_2_00430613 | |
Source: | Code function: | 3_2_00430E1E | |
Source: | Code function: | 3_2_0041C620 | |
Source: | Code function: | 3_2_0041C620 | |
Source: | Code function: | 3_2_0041C620 | |
Source: | Code function: | 3_2_0041C620 | |
Source: | Code function: | 3_2_0042FEC3 | |
Source: | Code function: | 3_2_0042C6C0 | |
Source: | Code function: | 3_2_00427ED0 | |
Source: | Code function: | 3_2_004176DC | |
Source: | Code function: | 3_2_0042AE86 | |
Source: | Code function: | 3_2_0042AE86 | |
Source: | Code function: | 3_2_0042DEA0 | |
Source: | Code function: | 3_2_0042DEA0 | |
Source: | Code function: | 3_2_00440740 | |
Source: | Code function: | 3_2_0041775C | |
Source: | Code function: | 3_2_00439F60 | |
Source: | Code function: | 3_2_00409720 | |
Source: | Code function: | 3_2_0041972E | |
Source: | Code function: | 3_2_0041972E | |
Source: | Code function: | 3_2_00428F9D | |
Source: | Code function: | 3_2_004407B0 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 3_2_00437820 |
Source: | Code function: | 3_2_032C1000 |
Source: | Code function: | 3_2_00437820 |
Source: | Code function: | 3_2_0043852B |
Source: | Code function: | 3_2_00425828 | |
Source: | Code function: | 3_2_0040D0FF | |
Source: | Code function: | 3_2_00428970 | |
Source: | Code function: | 3_2_00411296 | |
Source: | Code function: | 3_2_0041732D | |
Source: | Code function: | 3_2_00418BDB | |
Source: | Code function: | 3_2_00412CA0 | |
Source: | Code function: | 3_2_0043056F | |
Source: | Code function: | 3_2_00443EA0 | |
Source: | Code function: | 3_2_0043CF10 | |
Source: | Code function: | 3_2_00444780 | |
Source: | Code function: | 3_2_00411FB1 | |
Source: | Code function: | 3_2_00442842 | |
Source: | Code function: | 3_2_0042F056 | |
Source: | Code function: | 3_2_00406870 | |
Source: | Code function: | 3_2_00435800 | |
Source: | Code function: | 3_2_00437820 | |
Source: | Code function: | 3_2_0042B031 | |
Source: | Code function: | 3_2_0041E0C0 | |
Source: | Code function: | 3_2_004150D0 | |
Source: | Code function: | 3_2_004308DA | |
Source: | Code function: | 3_2_004338DC | |
Source: | Code function: | 3_2_0042E8F0 | |
Source: | Code function: | 3_2_0040B090 | |
Source: | Code function: | 3_2_0043056F | |
Source: | Code function: | 3_2_00403920 | |
Source: | Code function: | 3_2_0042A9F4 | |
Source: | Code function: | 3_2_0043B98C | |
Source: | Code function: | 3_2_0041D990 | |
Source: | Code function: | 3_2_00409270 | |
Source: | Code function: | 3_2_00444210 | |
Source: | Code function: | 3_2_0041E2C0 | |
Source: | Code function: | 3_2_00405AD0 | |
Source: | Code function: | 3_2_004042D0 | |
Source: | Code function: | 3_2_0040E2EA | |
Source: | Code function: | 3_2_004222F0 | |
Source: | Code function: | 3_2_004242FC | |
Source: | Code function: | 3_2_004162A3 | |
Source: | Code function: | 3_2_0043E2B9 | |
Source: | Code function: | 3_2_00425828 | |
Source: | Code function: | 3_2_0040AB10 | |
Source: | Code function: | 3_2_00402B30 | |
Source: | Code function: | 3_2_00416BC5 | |
Source: | Code function: | 3_2_00415BD0 | |
Source: | Code function: | 3_2_004433D0 | |
Source: | Code function: | 3_2_00434BD9 | |
Source: | Code function: | 3_2_004063E0 | |
Source: | Code function: | 3_2_0041ABE0 | |
Source: | Code function: | 3_2_0043DBB0 | |
Source: | Code function: | 3_2_00402400 | |
Source: | Code function: | 3_2_004434C0 | |
Source: | Code function: | 3_2_0041E4D0 | |
Source: | Code function: | 3_2_004354D0 | |
Source: | Code function: | 3_2_004444D0 | |
Source: | Code function: | 3_2_0043C4B0 | |
Source: | Code function: | 3_2_0041FD60 | |
Source: | Code function: | 3_2_0041557C | |
Source: | Code function: | 3_2_0041D5D0 | |
Source: | Code function: | 3_2_00404DE0 | |
Source: | Code function: | 3_2_004375A0 | |
Source: | Code function: | 3_2_00407650 | |
Source: | Code function: | 3_2_00434656 | |
Source: | Code function: | 3_2_0040DE7D | |
Source: | Code function: | 3_2_0041667E | |
Source: | Code function: | 3_2_00430E0C | |
Source: | Code function: | 3_2_00430E1E | |
Source: | Code function: | 3_2_0041C620 | |
Source: | Code function: | 3_2_00443620 | |
Source: | Code function: | 3_2_0041DE30 | |
Source: | Code function: | 3_2_0042FEC3 | |
Source: | Code function: | 3_2_0041AED0 | |
Source: | Code function: | 3_2_00417EDE | |
Source: | Code function: | 3_2_0042AE86 | |
Source: | Code function: | 3_2_00433E84 | |
Source: | Code function: | 3_2_0042DEA0 | |
Source: | Code function: | 3_2_004436A0 | |
Source: | Code function: | 3_2_00443750 | |
Source: | Code function: | 3_2_00434F7E | |
Source: | Code function: | 3_2_00402F10 | |
Source: | Code function: | 3_2_0043C710 | |
Source: | Code function: | 3_2_00409720 | |
Source: | Code function: | 3_2_0043A732 | |
Source: | Code function: | 3_2_00427F37 | |
Source: | Code function: | 3_2_004127C0 | |
Source: | Code function: | 3_2_00416FCC | |
Source: | Code function: | 3_2_00425FD0 | |
Source: | Code function: | 3_2_00428FE6 | |
Source: | Code function: | 3_2_00428F9D | |
Source: | Code function: | 3_2_00419FB0 | |
Source: | Code function: | 3_2_004407B0 |
Source: | Code function: | ||
Source: | Code function: |
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 3_2_0043CF10 |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: |
Source: | Code function: | 3_2_00449AB1 | |
Source: | Code function: | 3_2_00449AB1 |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_3-14336 |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 3_2_00441A80 |
Source: | Code function: | 0_2_03087F21 | |
Source: | Code function: | 0_2_0308809E |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Code function: | 0_2_03087F21 |
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 211 Process Injection | 23 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 1 Query Registry | Remote Services | 1 Screen Capture | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Disable or Modify Tools | LSASS Memory | 231 Security Software Discovery | Remote Desktop Protocol | 1 Archive Collected Data | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 211 Process Injection | Security Account Manager | 23 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | 41 Data from Local System | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 11 Deobfuscate/Decode Files or Information | NTDS | 1 Process Discovery | Distributed Component Object Model | 3 Clipboard Data | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 3 Obfuscated Files or Information | LSA Secrets | 1 Application Window Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Software Packing | Cached Domain Credentials | 1 File and Directory Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 Timestomp | DCSync | 22 System Information Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 DLL Side-Loading | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
49% | Virustotal | Browse | ||
47% | ReversingLabs | Win32.Trojan.Generic | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
cureprouderio.click | 104.21.4.114 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
true |
| unknown | ||
true |
| unknown | ||
true |
| unknown | ||
true |
| unknown | ||
false | high | |||
true |
| unknown | ||
true |
| unknown | ||
true |
| unknown | ||
true |
| unknown | ||
true |
| unknown | ||
true |
| unknown | ||
true |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.4.114 | cureprouderio.click | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1585913 |
Start date and time: | 2025-01-08 13:57:07 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 41s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 11 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Rgr8LJz.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@7/5@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 20.189.173.20, 20.190.160.14, 52.149.20.212, 13.107.246.45
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
07:57:55 | API Interceptor | |
07:58:11 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.4.114 | Get hash | malicious | FormBook | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
cureprouderio.click | Get hash | malicious | Amadey, Babadeda, LummaC Stealer, Poverty Stealer, PureLog Stealer | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Branchlock Obfuscator | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook, PureLog Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Rgr8LJz.exe_41612d26a46917a1f598b16129f1566561cb9f0_36f8f177_c1019844-5e7a-4c7a-884e-1dfe5128f5e8\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.8927045903259268 |
Encrypted: | false |
SSDEEP: | 96:cJiGSFtbZdcks+t9jTOAqyS3QXIDcQlc6VcEdcw3iH++BHUHZ0ownOgHkEwH3dE2:JzZOkgA0LR3kaGGzuiFcsZ24IO8AZ |
MD5: | 4046B6712BF330AFF38B80AB017CECD5 |
SHA1: | 1D59AFCA5BF9AF6F08AC7E9ED3CBA9371C055246 |
SHA-256: | B100CBFAE62FD1167133A49646616054E9BF5ACB3F9EEEE1E06216B2974871C6 |
SHA-512: | 7DBDC9985118945D08E41ABD31C926FA7FDE6BC7268B2CAF6C658278D038D52ED8670B28CB246E4A3610E2AEB1B50783451F23236A55F3EDF910BF8616D19A8B |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 154192 |
Entropy (8bit): | 3.7625477649794963 |
Encrypted: | false |
SSDEEP: | 1536:xFMJAYOABR9tThzuBojRWpN4uE2aO5MLCDSLTgUi:xmJAYPNdg4uEq5fSLTgU |
MD5: | 6DCB0611FBB09F7E65D8A908B9F1B7DA |
SHA1: | 604064D4AB1C2571A7E50C50B35321CD47168F17 |
SHA-256: | D75098D242ADFF27F25EA8F70D92FBB47055150E4F9E9257A0EB20FBD3252BE3 |
SHA-512: | 4F39419F36457D349E6B7066FF65B4BB6CC0132A4D1A5ACBAF6AAE2CDDC9AECEBB5667C047A65D1F52BBA39411E8F2A5ADE7EF4C5BAB73A52FCA1FDD07483644 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8384 |
Entropy (8bit): | 3.6975899802704486 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJmM656Y9PSU9Uk2ogmfZrVJTprt89bUUusfBmCm:R6lXJ1656YVSU9UtogmfZrVJkUUtfAT |
MD5: | D28DE7D12925A107C7A81A43A2A938FB |
SHA1: | 7C52C3D1152A92E7A8429AF1CBC6F6BD2EFC6D90 |
SHA-256: | E00E295B8BBFB492A75C3B0BE861987877786B3798D8A4556541A18F463107F6 |
SHA-512: | 1ECE544C2F7DE64CC857D1A8B6F500AE80AEDA86D2098BCEFB11B6915F0708AB3B12ACF67716DE548A3D252DC2205D6E8CFDA733C41C62800F0E2E80C31FCC61 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4755 |
Entropy (8bit): | 4.46634196927398 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsR7Jg77aI952MyWpW8VYlYm8M4JhSdxPcf6FP+q8vdSdxPcfvQMum59d:uIjfRVI772k7VZJhnfIKdnfvQM559d |
MD5: | F35809E9260CB560E18155BAC3ADEEA3 |
SHA1: | 1C2953103B25827A76129BA877A1B75D2B13F6EA |
SHA-256: | 6F27CBF83EFAE6B2E82A1944F5E5F5FE9E008C9CF0645AA1F9611A6C457F1C5B |
SHA-512: | DFEF2B1C8A6CACC33383AF6E2E229845C64A0C4E634252B36F79C9B8852B8A1D5D5967574ED7B8F371CB1C81A547FC438333B8F884FC00CC79FE47D63AD83C7C |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.466129060486366 |
Encrypted: | false |
SSDEEP: | 6144:3IXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNadwBCswSbD:4XD94+WlLZMM6YFH8+D |
MD5: | C177D46DE0C8705B8CA7D3A475D55569 |
SHA1: | 4362A5AF40F9EF4047A07CBF298C76C6DA3B95BE |
SHA-256: | C2B9A103D52D3A0E19C7C704050E7E84EE920B27AD3148BBB04B1CC90E903A98 |
SHA-512: | D18A1E1BB01923DDE32150A25B35A2A02ED139E9CE3C07022664A4AA6663E878AAD89918661DCD3582BCA71CC867A4ABBDBBAC9817D49422809944D4B8E82E37 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.962963905942242 |
TrID: |
|
File name: | Rgr8LJz.exe |
File size: | 347'648 bytes |
MD5: | 20155323669fd610a0c7201be666fbd6 |
SHA1: | 99bb4dcee2ba86b0f6220ecbefffd1700e44ba71 |
SHA256: | 586b3a854631ed30c8aefbde7edcf3a725d7c40a4a56c8ebc17aeb64979ea442 |
SHA512: | 338382b16e2cd2b3edce364aa2f92281769ee39dcfb990b6da94dcac477df9c29ef25636026e5a8491e5a3fe2c24b04d501b94e72935501a32af1db8d5d196c9 |
SSDEEP: | 6144:yZZzgHPaRciI8PDjb17g5esNPwOR716Z6NWk8C93PG+gHT8oAu7us9SOv3KZts:y/Dq18PDdJNOR7cZdk8CZBiT8obus9Lj |
TLSH: | 0174134EF28F8673DCDE8B359180868072726765DC7B5E7F399D212BCE4A4390236366 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....5................0..D...........b... ........@.. ....................................`................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x4062ee |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0xFDE635DB [Fri Dec 26 08:18:35 2104 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x62a0 | 0x4b | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x8000 | 0x622 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xa000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x6256 | 0x1c | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x42f4 | 0x4400 | 29cbbbb722b7fc8767bdc6c90c7a619c | False | 0.5066061580882353 | data | 5.893234630300136 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x8000 | 0x622 | 0x800 | 475a49e737227fab34df740bd3b803cb | False | 0.35693359375 | data | 3.5546778997020008 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xa000 | 0xc | 0x200 | 8a8b2abc4c357fd26f3ff0a207ef381f | False | 0.044921875 | data | 0.08153941234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.bss | 0xc000 | 0x4fc00 | 0x4fc00 | da81887a1abd34b3aaf8752dd728a15e | False | 1.0003245003918495 | data | 7.9994100941957225 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x80a0 | 0x398 | OpenPGP Secret Key | English | United States | 0.45760869565217394 |
RT_MANIFEST | 0x8438 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-08T13:57:55.981472+0100 | 2058638 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (cureprouderio .click) | 1 | 192.168.2.4 | 64606 | 1.1.1.1 | 53 | UDP |
2025-01-08T13:57:56.472148+0100 | 2058639 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (cureprouderio .click in TLS SNI) | 1 | 192.168.2.4 | 49730 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:57:56.472148+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49730 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:57:56.941881+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49730 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:57:56.941881+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49730 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:57:57.426089+0100 | 2058639 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (cureprouderio .click in TLS SNI) | 1 | 192.168.2.4 | 49732 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:57:57.426089+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49732 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:57:57.967721+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.4 | 49732 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:57:57.967721+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49732 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:57:58.747803+0100 | 2058639 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (cureprouderio .click in TLS SNI) | 1 | 192.168.2.4 | 49734 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:57:58.747803+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49734 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:57:59.912318+0100 | 2058639 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (cureprouderio .click in TLS SNI) | 1 | 192.168.2.4 | 49738 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:57:59.912318+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49738 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:58:00.976526+0100 | 2058639 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (cureprouderio .click in TLS SNI) | 1 | 192.168.2.4 | 49739 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:58:00.976526+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49739 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:58:02.524982+0100 | 2058639 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (cureprouderio .click in TLS SNI) | 1 | 192.168.2.4 | 49741 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:58:02.524982+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49741 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:58:02.997634+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49741 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:58:03.833728+0100 | 2058639 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (cureprouderio .click in TLS SNI) | 1 | 192.168.2.4 | 49742 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:58:03.833728+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49742 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:58:13.622738+0100 | 2058639 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (cureprouderio .click in TLS SNI) | 1 | 192.168.2.4 | 49748 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:58:13.622738+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49748 | 104.21.4.114 | 443 | TCP |
2025-01-08T13:58:14.109483+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49748 | 104.21.4.114 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 8, 2025 13:57:55.999577045 CET | 49730 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:55.999624968 CET | 443 | 49730 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:55.999720097 CET | 49730 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:56.002621889 CET | 49730 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:56.002631903 CET | 443 | 49730 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:56.471832991 CET | 443 | 49730 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:56.472147942 CET | 49730 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:56.488838911 CET | 49730 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:56.488856077 CET | 443 | 49730 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:56.489128113 CET | 443 | 49730 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:56.542048931 CET | 49730 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:56.544408083 CET | 49730 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:56.544430017 CET | 49730 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:56.544529915 CET | 443 | 49730 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:56.941885948 CET | 443 | 49730 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:56.941983938 CET | 443 | 49730 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:56.942045927 CET | 49730 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:56.943629026 CET | 49730 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:56.943659067 CET | 443 | 49730 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:56.943674088 CET | 49730 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:56.943680048 CET | 443 | 49730 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:56.950858116 CET | 49732 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:56.950895071 CET | 443 | 49732 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:56.950975895 CET | 49732 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:56.951756954 CET | 49732 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:56.951771021 CET | 443 | 49732 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:57.426014900 CET | 443 | 49732 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:57.426089048 CET | 49732 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:57.457525969 CET | 49732 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:57.457556963 CET | 443 | 49732 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:57.457863092 CET | 443 | 49732 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:57.510802984 CET | 49732 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:57.513294935 CET | 49732 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:57.513400078 CET | 49732 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:57.513442993 CET | 443 | 49732 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:57.967725039 CET | 443 | 49732 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:57.967782021 CET | 443 | 49732 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:57.967812061 CET | 443 | 49732 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:57.967839003 CET | 443 | 49732 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:57.967858076 CET | 49732 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:57.967864037 CET | 443 | 49732 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:57.967874050 CET | 443 | 49732 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:57.967935085 CET | 49732 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:57.968323946 CET | 443 | 49732 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:57.968378067 CET | 443 | 49732 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:57.968409061 CET | 443 | 49732 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:57.968432903 CET | 443 | 49732 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:57.968461990 CET | 49732 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:57.968472958 CET | 443 | 49732 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:57.968487024 CET | 49732 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:57.972351074 CET | 443 | 49732 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:57.974236965 CET | 49732 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:57.974242926 CET | 443 | 49732 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:58.026549101 CET | 49732 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:58.058057070 CET | 443 | 49732 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:58.058131933 CET | 443 | 49732 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:58.058161020 CET | 443 | 49732 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:58.058211088 CET | 49732 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:58.058238029 CET | 443 | 49732 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:58.058262110 CET | 443 | 49732 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:58.058346033 CET | 49732 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:58.090259075 CET | 49732 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:58.090281963 CET | 443 | 49732 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:58.090306997 CET | 49732 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:58.090313911 CET | 443 | 49732 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:58.287225008 CET | 49734 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:58.287272930 CET | 443 | 49734 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:58.287483931 CET | 49734 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:58.287904024 CET | 49734 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:58.287919998 CET | 443 | 49734 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:58.747694969 CET | 443 | 49734 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:58.747802973 CET | 49734 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:58.749279976 CET | 49734 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:58.749286890 CET | 443 | 49734 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:58.749516964 CET | 443 | 49734 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:58.756474018 CET | 49734 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:58.756665945 CET | 49734 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:58.756690979 CET | 443 | 49734 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:58.756778002 CET | 49734 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:58.756784916 CET | 443 | 49734 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:59.415127993 CET | 443 | 49734 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:59.415231943 CET | 443 | 49734 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:59.415285110 CET | 49734 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:59.415529013 CET | 49734 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:59.415546894 CET | 443 | 49734 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:59.437021017 CET | 49738 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:59.437071085 CET | 443 | 49738 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:59.437146902 CET | 49738 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:59.437542915 CET | 49738 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:59.437562943 CET | 443 | 49738 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:59.912246943 CET | 443 | 49738 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:59.912317991 CET | 49738 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:59.914041996 CET | 49738 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:59.914062977 CET | 443 | 49738 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:59.914318085 CET | 443 | 49738 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:57:59.915441990 CET | 49738 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:59.915544033 CET | 49738 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:57:59.915570021 CET | 443 | 49738 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:00.397614956 CET | 443 | 49738 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:00.397716045 CET | 443 | 49738 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:00.397794008 CET | 49738 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:00.398025036 CET | 49738 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:00.398050070 CET | 443 | 49738 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:00.503129959 CET | 49739 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:00.503199100 CET | 443 | 49739 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:00.503285885 CET | 49739 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:00.508773088 CET | 49739 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:00.508790016 CET | 443 | 49739 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:00.976361990 CET | 443 | 49739 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:00.976526022 CET | 49739 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:01.046722889 CET | 49739 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:01.046757936 CET | 443 | 49739 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:01.047765970 CET | 443 | 49739 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:01.072721004 CET | 49739 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:01.073777914 CET | 49739 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:01.073837996 CET | 443 | 49739 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:01.073929071 CET | 49739 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:01.073939085 CET | 443 | 49739 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:01.686681032 CET | 443 | 49739 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:01.686784029 CET | 443 | 49739 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:01.686883926 CET | 49739 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:01.687079906 CET | 49739 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:01.687100887 CET | 443 | 49739 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:01.784280062 CET | 49741 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:01.784321070 CET | 443 | 49741 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:01.784423113 CET | 49741 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:01.784780025 CET | 49741 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:01.784790039 CET | 443 | 49741 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:02.524800062 CET | 443 | 49741 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:02.524981976 CET | 49741 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:02.526338100 CET | 49741 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:02.526350021 CET | 443 | 49741 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:02.527189016 CET | 443 | 49741 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:02.538585901 CET | 49741 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:02.538677931 CET | 49741 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:02.538681984 CET | 443 | 49741 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:02.997634888 CET | 443 | 49741 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:02.997734070 CET | 443 | 49741 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:02.998003006 CET | 49741 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:02.998111963 CET | 49741 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:02.998131037 CET | 443 | 49741 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:03.365664959 CET | 49742 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:03.365715981 CET | 443 | 49742 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:03.365789890 CET | 49742 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:03.366292953 CET | 49742 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:03.366305113 CET | 443 | 49742 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:03.833658934 CET | 443 | 49742 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:03.833728075 CET | 49742 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:03.841806889 CET | 49742 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:03.841829062 CET | 443 | 49742 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:03.842053890 CET | 443 | 49742 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:03.846457005 CET | 49742 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:03.855885983 CET | 49742 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:03.855921030 CET | 443 | 49742 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:03.856062889 CET | 49742 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:03.856096983 CET | 443 | 49742 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:03.856218100 CET | 49742 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:03.856268883 CET | 443 | 49742 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:03.856408119 CET | 49742 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:03.856447935 CET | 443 | 49742 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:03.856621981 CET | 49742 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:03.856672049 CET | 443 | 49742 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:03.856862068 CET | 49742 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:03.856899023 CET | 443 | 49742 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:03.856909990 CET | 49742 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:03.856923103 CET | 443 | 49742 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:03.857067108 CET | 49742 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:03.857100010 CET | 443 | 49742 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:03.857122898 CET | 49742 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:03.857253075 CET | 49742 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:03.857289076 CET | 49742 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:03.866215944 CET | 443 | 49742 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:03.866400957 CET | 49742 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:03.866436958 CET | 443 | 49742 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:03.866461992 CET | 49742 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:03.866512060 CET | 49742 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:03.866539001 CET | 49742 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:03.871553898 CET | 443 | 49742 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:13.145889997 CET | 443 | 49742 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:13.145968914 CET | 443 | 49742 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:13.146037102 CET | 49742 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:13.146209955 CET | 49742 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:13.146225929 CET | 443 | 49742 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:13.150398970 CET | 49748 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:13.150450945 CET | 443 | 49748 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:13.150547028 CET | 49748 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:13.150799036 CET | 49748 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:13.150810957 CET | 443 | 49748 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:13.622602940 CET | 443 | 49748 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:13.622737885 CET | 49748 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:13.626792908 CET | 49748 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:13.626806021 CET | 443 | 49748 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:13.627074003 CET | 443 | 49748 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:13.628288031 CET | 49748 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:13.628288031 CET | 49748 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:13.628360033 CET | 443 | 49748 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:14.109493971 CET | 443 | 49748 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:14.109543085 CET | 443 | 49748 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:14.109570980 CET | 443 | 49748 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:14.109622002 CET | 443 | 49748 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:14.109652042 CET | 49748 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:14.109685898 CET | 443 | 49748 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:14.109781981 CET | 49748 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:14.110017061 CET | 443 | 49748 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:14.110157013 CET | 49748 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:14.110171080 CET | 443 | 49748 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:14.110301971 CET | 443 | 49748 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:14.110471964 CET | 49748 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:14.110485077 CET | 443 | 49748 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:14.115040064 CET | 443 | 49748 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:14.115070105 CET | 443 | 49748 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:14.115098953 CET | 49748 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:14.115113020 CET | 443 | 49748 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:14.115169048 CET | 443 | 49748 | 104.21.4.114 | 192.168.2.4 |
Jan 8, 2025 13:58:14.115195036 CET | 49748 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:14.115421057 CET | 49748 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:14.115422010 CET | 49748 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:14.115760088 CET | 49748 | 443 | 192.168.2.4 | 104.21.4.114 |
Jan 8, 2025 13:58:14.115780115 CET | 443 | 49748 | 104.21.4.114 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 8, 2025 13:57:55.981472015 CET | 64606 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 8, 2025 13:57:55.993710041 CET | 53 | 64606 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 8, 2025 13:57:55.981472015 CET | 192.168.2.4 | 1.1.1.1 | 0x6c18 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 8, 2025 13:57:55.993710041 CET | 1.1.1.1 | 192.168.2.4 | 0x6c18 | No error (0) | 104.21.4.114 | A (IP address) | IN (0x0001) | false | ||
Jan 8, 2025 13:57:55.993710041 CET | 1.1.1.1 | 192.168.2.4 | 0x6c18 | No error (0) | 172.67.132.7 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49730 | 104.21.4.114 | 443 | 7352 | C:\Users\user\Desktop\Rgr8LJz.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-08 12:57:56 UTC | 266 | OUT | |
2025-01-08 12:57:56 UTC | 8 | OUT | |
2025-01-08 12:57:56 UTC | 1129 | IN | |
2025-01-08 12:57:56 UTC | 7 | IN | |
2025-01-08 12:57:56 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49732 | 104.21.4.114 | 443 | 7352 | C:\Users\user\Desktop\Rgr8LJz.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-08 12:57:57 UTC | 267 | OUT | |
2025-01-08 12:57:57 UTC | 54 | OUT | |
2025-01-08 12:57:57 UTC | 1125 | IN | |
2025-01-08 12:57:57 UTC | 244 | IN | |
2025-01-08 12:57:57 UTC | 1369 | IN | |
2025-01-08 12:57:57 UTC | 1369 | IN | |
2025-01-08 12:57:57 UTC | 1369 | IN | |
2025-01-08 12:57:57 UTC | 1369 | IN | |
2025-01-08 12:57:57 UTC | 1369 | IN | |
2025-01-08 12:57:57 UTC | 266 | IN | |
2025-01-08 12:57:57 UTC | 1369 | IN | |
2025-01-08 12:57:57 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49734 | 104.21.4.114 | 443 | 7352 | C:\Users\user\Desktop\Rgr8LJz.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-08 12:57:58 UTC | 275 | OUT | |
2025-01-08 12:57:58 UTC | 15331 | OUT | |
2025-01-08 12:57:58 UTC | 2779 | OUT | |
2025-01-08 12:57:59 UTC | 1128 | IN | |
2025-01-08 12:57:59 UTC | 20 | IN | |
2025-01-08 12:57:59 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49738 | 104.21.4.114 | 443 | 7352 | C:\Users\user\Desktop\Rgr8LJz.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-08 12:57:59 UTC | 280 | OUT | |
2025-01-08 12:57:59 UTC | 8767 | OUT | |
2025-01-08 12:58:00 UTC | 1123 | IN | |
2025-01-08 12:58:00 UTC | 20 | IN | |
2025-01-08 12:58:00 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49739 | 104.21.4.114 | 443 | 7352 | C:\Users\user\Desktop\Rgr8LJz.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-08 12:58:01 UTC | 283 | OUT | |
2025-01-08 12:58:01 UTC | 15331 | OUT | |
2025-01-08 12:58:01 UTC | 5101 | OUT | |
2025-01-08 12:58:01 UTC | 1127 | IN | |
2025-01-08 12:58:01 UTC | 20 | IN | |
2025-01-08 12:58:01 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49741 | 104.21.4.114 | 443 | 7352 | C:\Users\user\Desktop\Rgr8LJz.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-08 12:58:02 UTC | 280 | OUT | |
2025-01-08 12:58:02 UTC | 969 | OUT | |
2025-01-08 12:58:02 UTC | 1130 | IN | |
2025-01-08 12:58:02 UTC | 20 | IN | |
2025-01-08 12:58:02 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49742 | 104.21.4.114 | 443 | 7352 | C:\Users\user\Desktop\Rgr8LJz.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-08 12:58:03 UTC | 287 | OUT | |
2025-01-08 12:58:03 UTC | 15331 | OUT | |
2025-01-08 12:58:03 UTC | 15331 | OUT | |
2025-01-08 12:58:03 UTC | 15331 | OUT | |
2025-01-08 12:58:03 UTC | 15331 | OUT | |
2025-01-08 12:58:03 UTC | 15331 | OUT | |
2025-01-08 12:58:03 UTC | 15331 | OUT | |
2025-01-08 12:58:03 UTC | 15331 | OUT | |
2025-01-08 12:58:03 UTC | 15331 | OUT | |
2025-01-08 12:58:03 UTC | 15331 | OUT | |
2025-01-08 12:58:03 UTC | 15331 | OUT | |
2025-01-08 12:58:13 UTC | 180 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49748 | 104.21.4.114 | 443 | 7352 | C:\Users\user\Desktop\Rgr8LJz.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-08 12:58:13 UTC | 267 | OUT | |
2025-01-08 12:58:13 UTC | 89 | OUT | |
2025-01-08 12:58:14 UTC | 1127 | IN | |
2025-01-08 12:58:14 UTC | 242 | IN | |
2025-01-08 12:58:14 UTC | 1369 | IN | |
2025-01-08 12:58:14 UTC | 1369 | IN | |
2025-01-08 12:58:14 UTC | 167 | IN | |
2025-01-08 12:58:14 UTC | 1369 | IN | |
2025-01-08 12:58:14 UTC | 1369 | IN | |
2025-01-08 12:58:14 UTC | 1369 | IN | |
2025-01-08 12:58:14 UTC | 1369 | IN | |
2025-01-08 12:58:14 UTC | 1369 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 07:57:54 |
Start date: | 08/01/2025 |
Path: | C:\Users\user\Desktop\Rgr8LJz.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xc90000 |
File size: | 347'648 bytes |
MD5 hash: | 20155323669FD610A0C7201BE666FBD6 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 07:57:54 |
Start date: | 08/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 07:57:54 |
Start date: | 08/01/2025 |
Path: | C:\Users\user\Desktop\Rgr8LJz.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x420000 |
File size: | 347'648 bytes |
MD5 hash: | 20155323669FD610A0C7201BE666FBD6 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 3 |
Start time: | 07:57:54 |
Start date: | 08/01/2025 |
Path: | C:\Users\user\Desktop\Rgr8LJz.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x6e0000 |
File size: | 347'648 bytes |
MD5 hash: | 20155323669FD610A0C7201BE666FBD6 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Target ID: | 6 |
Start time: | 07:57:54 |
Start date: | 08/01/2025 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x380000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 12.2% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 33.3% |
Total number of Nodes: | 27 |
Total number of Limit Nodes: | 2 |
Graph
Function 03087F21 Relevance: 42.3, APIs: 11, Strings: 13, Instructions: 294threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0308809E Relevance: 12.3, APIs: 6, Strings: 1, Instructions: 82threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 015327E8 Relevance: 1.8, APIs: 1, Instructions: 252memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01530668 Relevance: 1.6, APIs: 1, Instructions: 54memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 9.2% |
Dynamic/Decrypted Code Coverage: | 4.2% |
Signature Coverage: | 57.5% |
Total number of Nodes: | 381 |
Total number of Limit Nodes: | 26 |
Graph
Function 00412CA0 Relevance: 112.3, APIs: 4, Strings: 59, Instructions: 2003COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043CF10 Relevance: 28.8, APIs: 12, Strings: 4, Instructions: 802memorycomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 032C1000 Relevance: 19.6, APIs: 13, Instructions: 81clipboardsleepmemoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041732D Relevance: 4.1, Strings: 3, Instructions: 395COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00442191 Relevance: 3.9, Strings: 3, Instructions: 149COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00411296 Relevance: 2.5, APIs: 1, Instructions: 1019COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00411FB1 Relevance: 2.1, APIs: 1, Instructions: 625COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00443EA0 Relevance: 1.6, Strings: 1, Instructions: 327COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00444780 Relevance: 1.5, Strings: 1, Instructions: 297COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00441A80 Relevance: 1.5, APIs: 1, Instructions: 14libraryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00428970 Relevance: .3, Instructions: 285COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00408980 Relevance: 7.6, APIs: 5, Instructions: 113threadCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0040CA78 Relevance: 3.0, APIs: 2, Instructions: 26COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042FC43 Relevance: 1.6, APIs: 1, Instructions: 86COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042FC3F Relevance: 1.6, APIs: 1, Instructions: 67COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043A620 Relevance: 1.6, APIs: 1, Instructions: 52COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00441A20 Relevance: 1.5, APIs: 1, Instructions: 30memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00433675 Relevance: 1.5, APIs: 1, Instructions: 21COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00436EC9 Relevance: 1.5, APIs: 1, Instructions: 21COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0040CA30 Relevance: 1.5, APIs: 1, Instructions: 17COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00441BF0 Relevance: 1.5, APIs: 1, Instructions: 16COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00440130 Relevance: 1.5, APIs: 1, Instructions: 15memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00440110 Relevance: 1.5, APIs: 1, Instructions: 9memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004242FC Relevance: 100.4, Strings: 80, Instructions: 403COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043A732 Relevance: 75.4, Strings: 60, Instructions: 390COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043B98C Relevance: 75.4, Strings: 60, Instructions: 389COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00409270 Relevance: 15.4, Strings: 12, Instructions: 406COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043C710 Relevance: 15.2, Strings: 12, Instructions: 243COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041775C Relevance: 10.3, Strings: 8, Instructions: 296COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041C620 Relevance: 8.1, Strings: 6, Instructions: 596COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0040AB10 Relevance: 7.9, Strings: 6, Instructions: 449COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00409720 Relevance: 7.9, Strings: 6, Instructions: 418COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00442335 Relevance: 7.7, Strings: 6, Instructions: 171COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004042D0 Relevance: 6.7, Strings: 5, Instructions: 467COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0040B090 Relevance: 6.7, Strings: 5, Instructions: 435COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041FD60 Relevance: 5.7, Strings: 4, Instructions: 664COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004162A3 Relevance: 5.4, Strings: 4, Instructions: 399COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042FEC3 Relevance: 5.3, Strings: 4, Instructions: 330COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0040DE7D Relevance: 5.3, Strings: 4, Instructions: 306COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0040E2EA Relevance: 5.3, Strings: 4, Instructions: 283COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042E8F0 Relevance: 5.3, Strings: 4, Instructions: 278COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00416FCC Relevance: 5.3, Strings: 4, Instructions: 264COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043E2B9 Relevance: 4.5, Strings: 3, Instructions: 783COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004407B0 Relevance: 4.3, Strings: 3, Instructions: 593COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430E1E Relevance: 4.1, Strings: 3, Instructions: 307COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430E0C Relevance: 4.0, Strings: 3, Instructions: 280COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00427BA0 Relevance: 4.0, Strings: 3, Instructions: 246COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0044144E Relevance: 3.9, Strings: 3, Instructions: 147COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00428CD0 Relevance: 3.8, Strings: 3, Instructions: 93COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00434F7E Relevance: 3.7, APIs: 1, Strings: 1, Instructions: 231memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041667E Relevance: 3.4, APIs: 2, Instructions: 442COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00404DE0 Relevance: 3.3, Strings: 2, Instructions: 792COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004433D0 Relevance: 3.1, Strings: 2, Instructions: 618COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004434C0 Relevance: 3.0, Strings: 2, Instructions: 546COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004222F0 Relevance: 3.0, Strings: 2, Instructions: 483COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00443620 Relevance: 2.9, Strings: 2, Instructions: 445COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004436A0 Relevance: 2.9, Strings: 2, Instructions: 417COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043DBB0 Relevance: 2.8, Strings: 2, Instructions: 347COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042F056 Relevance: 2.8, Strings: 2, Instructions: 277COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043D8F0 Relevance: 2.7, Strings: 2, Instructions: 238COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041ABE0 Relevance: 2.7, Strings: 2, Instructions: 198COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041E4D0 Relevance: 2.6, Strings: 1, Instructions: 1385COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042A9F4 Relevance: 1.9, APIs: 1, Instructions: 362COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041C0AD Relevance: 1.8, Strings: 1, Instructions: 515COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004150D0 Relevance: 1.8, Strings: 1, Instructions: 501COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042B031 Relevance: 1.7, Strings: 1, Instructions: 486COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042DEA0 Relevance: 1.7, Strings: 1, Instructions: 477COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042AE86 Relevance: 1.7, Strings: 1, Instructions: 446COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00421150 Relevance: 1.7, Strings: 1, Instructions: 433COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00417EDE Relevance: 1.7, Strings: 1, Instructions: 413COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00433E84 Relevance: 1.6, Strings: 1, Instructions: 371COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041557C Relevance: 1.6, Strings: 1, Instructions: 340COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004354D0 Relevance: 1.5, Strings: 1, Instructions: 288COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00427F37 Relevance: 1.5, Strings: 1, Instructions: 272COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00402400 Relevance: 1.5, Strings: 1, Instructions: 261COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042E400 Relevance: 1.5, Strings: 1, Instructions: 236COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042F3EA Relevance: 1.4, Strings: 1, Instructions: 194COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042F3E7 Relevance: 1.4, Strings: 1, Instructions: 192COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041E0C0 Relevance: 1.4, Strings: 1, Instructions: 174COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042FD51 Relevance: 1.3, Strings: 1, Instructions: 86COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042FD4F Relevance: 1.3, Strings: 1, Instructions: 64COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430613 Relevance: 1.3, Strings: 1, Instructions: 59COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00419B6F Relevance: 1.3, Strings: 1, Instructions: 52COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0040C8DE Relevance: 1.3, Strings: 1, Instructions: 49COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00442DC5 Relevance: 1.3, Strings: 1, Instructions: 19COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00417303 Relevance: 1.3, Strings: 1, Instructions: 11COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00407650 Relevance: .7, Instructions: 671COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00402F10 Relevance: .7, Instructions: 670COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00406870 Relevance: .7, Instructions: 665COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00403920 Relevance: .6, Instructions: 600COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00435800 Relevance: .6, Instructions: 599COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00405AD0 Relevance: .4, Instructions: 449COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00415BD0 Relevance: .4, Instructions: 421COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00434656 Relevance: .4, Instructions: 405COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00443750 Relevance: .4, Instructions: 397COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041D990 Relevance: .4, Instructions: 383COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004127C0 Relevance: .4, Instructions: 383COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041CD60 Relevance: .4, Instructions: 379COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00428FE6 Relevance: .4, Instructions: 367COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004338DC Relevance: .4, Instructions: 353COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041D5D0 Relevance: .4, Instructions: 353COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004063E0 Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00408470 Relevance: .3, Instructions: 281COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00444210 Relevance: .3, Instructions: 256COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004444D0 Relevance: .2, Instructions: 248COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00442842 Relevance: .2, Instructions: 229COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00434BD9 Relevance: .2, Instructions: 228COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004375A0 Relevance: .2, Instructions: 221COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041DE30 Relevance: .2, Instructions: 218COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043C4B0 Relevance: .2, Instructions: 189COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041E2C0 Relevance: .2, Instructions: 183COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041AED0 Relevance: .2, Instructions: 181COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041972E Relevance: .2, Instructions: 151COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00408DC0 Relevance: .1, Instructions: 135COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00428F9D Relevance: .1, Instructions: 113COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0040BD34 Relevance: .1, Instructions: 111COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041F9F0 Relevance: .1, Instructions: 104COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00402B30 Relevance: .1, Instructions: 91COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004403B0 Relevance: .1, Instructions: 77COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004302A2 Relevance: .1, Instructions: 74COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00439F60 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042C6C0 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004190A6 Relevance: .1, Instructions: 54COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00440740 Relevance: .0, Instructions: 46COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004176DC Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041F8A0 Relevance: .0, Instructions: 21COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00427ED0 Relevance: .0, Instructions: 17COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|