Windows
Analysis Report
CondosGold_nopump.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- CondosGold_nopump.exe (PID: 7636 cmdline:
"C:\Users\ user\Deskt op\CondosG old_nopump .exe" MD5: 412DB12259A7D002A629959260898EA7) - cmd.exe (PID: 7752 cmdline:
"C:\Window s\System32 \cmd.exe" /c move Dr ives Drive s.cmd & Dr ives.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7760 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 7864 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 7872 cmdline:
findstr /I "opssvc w rsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - tasklist.exe (PID: 7952 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 7964 cmdline:
findstr "A vastUI AVG UI bdservi cehost nsW scSvc ekrn SophosHea lth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 8020 cmdline:
cmd /c md 352348 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - extrac32.exe (PID: 8036 cmdline:
extrac32 / Y /E Fat MD5: 9472AAB6390E4F1431BAA912FCFF9707) - findstr.exe (PID: 8056 cmdline:
findstr /V "CERTAIN" Panties MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 8072 cmdline:
cmd /c cop y /b ..\Si ngapore + ..\Vegetar ian + ..\D ating + .. \Wings + . .\Audit + ..\Relates + ..\Trip E MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - Cassette.com (PID: 8088 cmdline:
Cassette.c om E MD5: 62D09F076E6E0240548C2F837536A46A) - choice.exe (PID: 8108 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:41:49.020484+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49941 | 104.102.49.254 | 443 | TCP |
2025-01-10T11:41:50.963232+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49947 | 104.21.48.1 | 443 | TCP |
2025-01-10T11:41:51.856695+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49956 | 104.21.48.1 | 443 | TCP |
2025-01-10T11:41:53.468747+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49964 | 104.21.48.1 | 443 | TCP |
2025-01-10T11:41:56.109188+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49976 | 104.21.48.1 | 443 | TCP |
2025-01-10T11:41:57.254577+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49977 | 104.21.48.1 | 443 | TCP |
2025-01-10T11:41:58.689401+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49978 | 104.21.48.1 | 443 | TCP |
2025-01-10T11:41:59.792757+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49980 | 104.21.48.1 | 443 | TCP |
2025-01-10T11:42:00.834584+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49981 | 104.21.48.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:41:51.388752+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.7 | 49947 | 104.21.48.1 | 443 | TCP |
2025-01-10T11:41:52.350877+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.7 | 49956 | 104.21.48.1 | 443 | TCP |
2025-01-10T11:42:01.579448+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.7 | 49981 | 104.21.48.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:41:51.388752+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.7 | 49947 | 104.21.48.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:41:52.350877+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.7 | 49956 | 104.21.48.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:41:48.332730+0100 | 2058480 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 50003 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:41:48.239040+0100 | 2058039 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 55194 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:41:48.309803+0100 | 2058484 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 63022 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:41:48.277499+0100 | 2058492 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 57952 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:41:48.288094+0100 | 2058500 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 58613 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:41:48.266539+0100 | 2058502 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 64203 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:41:48.299362+0100 | 2058510 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 55668 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:41:48.321673+0100 | 2058512 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 50921 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:41:48.251744+0100 | 2058514 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 57753 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:41:59.133170+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49978 | 104.21.48.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:41:50.387376+0100 | 2858666 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 49941 | 104.102.49.254 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 5_2_00406301 | |
Source: | Code function: | 5_2_00406CC7 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 5_2_004050F9 |
Source: | Code function: | 5_2_004044D1 |
Source: | Code function: | 5_2_004038AF |
Source: | File created: | Jump to behavior |
Source: | Code function: | 5_2_0040737E | |
Source: | Code function: | 5_2_00406EFE | |
Source: | Code function: | 5_2_004079A2 | |
Source: | Code function: | 5_2_004049A8 |
Source: | Dropped File: |
Source: | Code function: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 5_2_004044D1 |
Source: | Code function: | 5_2_004024FB |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Process created: |
Source: | Window detected: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Code function: | 5_2_00406328 |
Source: | Static PE information: |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Code function: | 5_2_00406301 | |
Source: | Code function: | 5_2_00406CC7 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 5_2_00406328 |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 5_2_00406831 |
Source: | Key value queried: | Jump to behavior |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 21 Windows Management Instrumentation | 1 DLL Side-Loading | 12 Process Injection | 11 Masquerading | 2 OS Credential Dumping | 11 Security Software Discovery | Remote Services | 11 Input Capture | 11 Encrypted Channel | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 1 Native API | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 11 Virtualization/Sandbox Evasion | 11 Input Capture | 11 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 1 Archive Collected Data | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 12 Process Injection | Security Account Manager | 3 Process Discovery | SMB/Windows Admin Shares | 31 Data from Local System | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Deobfuscate/Decode Files or Information | NTDS | 13 File and Directory Discovery | Distributed Component Object Model | 1 Clipboard Data | 14 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | 25 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
21% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
steamcommunity.com | 104.102.49.254 | true | false | high | |
sputnik-1985.com | 104.21.48.1 | true | false | high | |
HkdhdnSyRbxIxwUiM.HkdhdnSyRbxIxwUiM | unknown | unknown | true | unknown | |
wordyfindy.lat | unknown | unknown | false | high | |
slipperyloo.lat | unknown | unknown | false | high | |
curverpluch.lat | unknown | unknown | false | high | |
tentabatte.lat | unknown | unknown | false | high | |
manyrestro.lat | unknown | unknown | false | high | |
bashfulacid.lat | unknown | unknown | false | high | |
brendon-sharjen.biz | unknown | unknown | false | high | |
shapestickyr.lat | unknown | unknown | false | high | |
talkynicer.lat | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.48.1 | sputnik-1985.com | United States | 13335 | CLOUDFLARENETUS | false | |
104.102.49.254 | steamcommunity.com | United States | 16625 | AKAMAI-ASUS | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1587443 |
Start date and time: | 2025-01-10 11:40:06 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 54s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 24 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | CondosGold_nopump.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@24/23@12/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 13.107.253.45, 20.109.210.53
- Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtSetInformationFile calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: CondosGold_nopump.exe
Time | Type | Description |
---|---|---|
05:41:04 | API Interceptor | |
07:31:41 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.48.1 | Get hash | malicious | CMSBrute | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
104.102.49.254 | Get hash | malicious | Socks5Systemz | Browse |
| |
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
sputnik-1985.com | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, PrivateLoader | Browse |
| ||
Get hash | malicious | Amadey, Babadeda, LummaC Stealer, Poverty Stealer, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
steamcommunity.com | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Blank Grabber | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | GRQ Scam | Browse |
| ||
Get hash | malicious | CredGrabber, Meduza Stealer | Browse |
| ||
AKAMAI-ASUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | DBatLoader, MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\352348\Cassette.com | Get hash | malicious | LummaC | Browse | ||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | LummaC | Browse |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 15758 |
Entropy (8bit): | 5.120140452449369 |
Encrypted: | false |
SSDEEP: | 384:48eOi6ptcfIICBzR67qjiYkvO6R48/ZF0rrE:48eOltcBCBQ7Mi1Oq3ZarrE |
MD5: | F09B25054B1B0532B076879548EC89C8 |
SHA1: | 59094E8C99412EC6A2435CBCBBE8059446355032 |
SHA-256: | 0D23DC5BD965715543363D5374D18011F15D9E06DBBAB6ECB62A3938DD12EE4D |
SHA-512: | 16DD8B6F48DF2C48A0E989CF481AE9DEFF0ECF49EF899CDBE9C4CEE53BFEE48D45C85D2EC1D57B1C3B5BE34AF9C5476402135B2DEB07739BA47AD8E984FB65BD |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 947288 |
Entropy (8bit): | 6.630612696399572 |
Encrypted: | false |
SSDEEP: | 24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK |
MD5: | 62D09F076E6E0240548C2F837536A46A |
SHA1: | 26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2 |
SHA-256: | 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49 |
SHA-512: | 32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 475927 |
Entropy (8bit): | 7.999621373183763 |
Encrypted: | true |
SSDEEP: | 12288:XGsCTt9SKb4dC1x1hJU5YLaG43Vk9B3Tn0ZwR:XhCTt9xMdmhJUCLa3VynuG |
MD5: | AC79C3191FBB88552A7DBD4D875DF09E |
SHA1: | 5F6C3BC0ECD09F79C4E9FEE81CFEFE6E85FF2516 |
SHA-256: | FB335ECAC71DC089DA72D7FA000547FDBF62E2FC0F37EDE8F052F85ED747AE09 |
SHA-512: | 1507600B66E99FE7ED16F2508085DE7C7FDC1D92B3C76B9FEE0C48BD8A4AC264B8DE9BF7DCE88AD56933A104E8D6351B00DAFD933530AD34831033EDD267BFF7 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 111616 |
Entropy (8bit): | 5.745595346242765 |
Encrypted: | false |
SSDEEP: | 1536:oj62SfuVGHj1vtK7h6R8anHsWccd0vtmgMbFuz08QuklMBNIimuzaAwusPR:ojfTq8QLeAg0Fuz08XvBNbjaAtsPR |
MD5: | 10305A41A60BE9B67325C94A31F8EDAF |
SHA1: | C8C38AC6B1D2042D3041119F054A94EC1F377124 |
SHA-256: | 81F31EC76DFCEA3139EFB84A07E0FAA5B1CBB68C799C33DC9C87575A1AABCB2D |
SHA-512: | 1547A465A11DF6FEF6512F7D0D33325BEB1B1DC35242F72A5E1C43BBC78C474569E7FEDCBD02926E3D030C161300D2644A9F34D47B27A00A0257D82EE0B6DC1F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\CondosGold_nopump.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 69632 |
Entropy (8bit): | 7.997095057003264 |
Encrypted: | true |
SSDEEP: | 1536:y4d0p2s49gaMw7K73pbpbzX6f/+UzlPd/bb:y4dRs49gdwq3PUph |
MD5: | 8D75FC9991189A412D3E1FA1DFD75163 |
SHA1: | EE3D42335C7B504800B095D8F31BD97E1E0EFDBF |
SHA-256: | 3C1E37AB0C3F14AF16961DFDE9CBC76742B1400026758DFFE4AFEC1E32E17CAF |
SHA-512: | 8C12B8FB35D090FFC3F1AB845777AEF0FC711CFC802DA47580841D019E6532CD3B53B88F7C5F0CEF87EA6FE208678ABE1C1B1E7526C06B006F1E2D5BDCE21CB3 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 42901 |
Entropy (8bit): | 7.101865091239342 |
Encrypted: | false |
SSDEEP: | 768:jGmd9OTGQ1Dv7sMvLHfR/ZByLiFuO/ChgZ45VatJVEV3GPkjF:jGmdATGODv7xvTphAiPChgZ2kOE6 |
MD5: | 8CB45AEEA40A56DA7EC6AC468C6A20F2 |
SHA1: | 94C462D5C9F1081C26529B23AF82C493BEF6052E |
SHA-256: | F07F84B2F7417A14E3E36A0E0B31A18EACD8AF1B38AEF4DFC7183010995B81B0 |
SHA-512: | 3B160360FFC3080EA0B37D84A30C8BDDC546B062771D31776788BDE03AB62D9686402D7938CFED5FD695C26C583453E960ED326D2782188210AC601EEDD55175 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 148480 |
Entropy (8bit): | 6.638907377766191 |
Encrypted: | false |
SSDEEP: | 3072:wA3laW2UDQWf05mjccBiqXvpgF4qv+32eOyKODOSpQSAE:VloUDtf0accB3gBmmLsiS+SAE |
MD5: | 479B7FAACC9BC81ACB0922A5EB05BE14 |
SHA1: | 39FD7FE93204AE9ED2A97E0413BEF832B17A853F |
SHA-256: | 9629DF2ED5E6ED7A485724C006F31F4A50CB315F495C769FFEC3245787430CA5 |
SHA-512: | 60C427BB99C0A5ECC8B33D7C9CD81932A4C849541414BB0BEF6DAA6A13366A8A8DFE83FA7D70011ECEBDDB9B310A85F1AB20A7C1464A67AC790E4D495ED3CA7C |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\CondosGold_nopump.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 83968 |
Entropy (8bit): | 7.997784387491903 |
Encrypted: | true |
SSDEEP: | 1536:KClv57hMdLiVSneFca3m5B7zJjgUgBql/1yVbCr3QMcwDTe5lH:ZhAnY2T9gUmMdyVbCrQMPqJ |
MD5: | 260503C7CFDC29544356D517366EB586 |
SHA1: | B491D547F5299812C226C6BA41C24288569950A0 |
SHA-256: | B1E3AE6B8BB1470E30953021C06A5AA5B7BFBE6AF83FA3D45174F03B839C1EB0 |
SHA-512: | 5F78810B768687FD7276D7A3AFAC38F2FF5C09F55359710AEB932CF59DFEEF0EF00C3B211A070E537E12596870E74BE65A346A681DAECC3895ACDE60329C22BC |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\CondosGold_nopump.exe |
File Type: | |
Category: | modified |
Size (bytes): | 15758 |
Entropy (8bit): | 5.120140452449369 |
Encrypted: | false |
SSDEEP: | 384:48eOi6ptcfIICBzR67qjiYkvO6R48/ZF0rrE:48eOltcBCBQ7Mi1Oq3ZarrE |
MD5: | F09B25054B1B0532B076879548EC89C8 |
SHA1: | 59094E8C99412EC6A2435CBCBBE8059446355032 |
SHA-256: | 0D23DC5BD965715543363D5374D18011F15D9E06DBBAB6ECB62A3938DD12EE4D |
SHA-512: | 16DD8B6F48DF2C48A0E989CF481AE9DEFF0ECF49EF899CDBE9C4CEE53BFEE48D45C85D2EC1D57B1C3B5BE34AF9C5476402135B2DEB07739BA47AD8E984FB65BD |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 147456 |
Entropy (8bit): | 6.633054649927551 |
Encrypted: | false |
SSDEEP: | 3072:NPnj0nEoXnmowS2u5hVOoQ7t8T6pUkBJR8CThpmESv+AqVnBI:NPj0nEo3tb2j6AUkB0CThp6vmVnK |
MD5: | 4886FA52250B2EA113CCD6BCC6994015 |
SHA1: | FC455B281AC2E1550B267F5245475445B4869ECE |
SHA-256: | 7DAB6C65ADFB8F1A05B50A480C1ED040A2F9CA77276C15D40B221BBB6E8FAD0B |
SHA-512: | 940A6D363F0BEADD72415C6B78296EF663D2BC2B69F6106155198A959BE39218A0EDFB3004B1CFBB28DD65D872F5E3969CC6C060CD1697EA84F2788032FB4C49 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 56320 |
Entropy (8bit): | 6.681980001152323 |
Encrypted: | false |
SSDEEP: | 1536:f6LdTmHwANUQlHS3cctlxWboHdMJ3RraSXn:gdTmRxlHS3NxrHSBRtn |
MD5: | AA7580CF47C4FA4D135E86158E14819D |
SHA1: | B97C10E1883F50B6D27E319C823588C68A70C04A |
SHA-256: | 220106FE5F865FE588A2D20BD3FD2A78E9FE421BFAEF9AF688B7BC2F6FB3C719 |
SHA-512: | 7E39D27AE73FDFDDE959C19B05D3D57AD36047DE2D8B4409E2F59F5F30701C6D4AFD60FDC6F53FFFB092B4091ED1AA5DC900973915F4DBAC39ED656205398459 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 105472 |
Entropy (8bit): | 6.6048996943010625 |
Encrypted: | false |
SSDEEP: | 3072:ppIbv18mLthfhnueoMmOqDoioO5bLezW9FfTut/Dde6u640ewy4Za9coRCB:qphfhnvO5bLezWWt/Dd314V14ZgP0B |
MD5: | 84FC0F80D9CDF138F56F00284E961F02 |
SHA1: | CA2DBE9175A654EADE7AC4A0608B73751D47C090 |
SHA-256: | 5B66E7B1A42B9FCC9488AAA2F3CD933B39BB3E737E7F8A1593A2DFBDDE24456B |
SHA-512: | CAEAFB8F84747616DD271E8FDF31600E0FB7E49363B69F82269B4B65A422D47ADE8D9A40523CBF63247B73F39996D15235FE5C7FD4EFA119D03159823C00FBAE |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\CondosGold_nopump.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 488838 |
Entropy (8bit): | 7.998562760673357 |
Encrypted: | true |
SSDEEP: | 12288:jTh0ZHzZ6HCnX8aJH1L34gO5a7EBx0Gr2Ridy:jTxHCX8gHJ34EoErB |
MD5: | 62B44863280E1CB88AB21293E8BEA0F5 |
SHA1: | 4FC9446CB8F4A4135162809BA8BF6EB773879080 |
SHA-256: | 5FE98335AFEF943933F4839521765B3325ABE9E1C3032577026481946BBE61C9 |
SHA-512: | C3882B8CC019FAF5804223D7E38D9129FE44B7933DC6F390AED0327B66BB4A794BDA424788C029E0C06798B0C851B7872F96493653844BF6791BBE135ECD8510 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 84992 |
Entropy (8bit): | 5.129213502158536 |
Encrypted: | false |
SSDEEP: | 768:hsFxyLtVSQsbZgar3R/OWel3EYr8qcDP8WBosd0bHazf0Tye4Ur2+9:wxjgarB/5el3EYrDWyu0uZo2+9 |
MD5: | FAE8CAAB7BF628714BCDA7A14650C8A9 |
SHA1: | E99C919713DE03E4B0420678826699D962B05480 |
SHA-256: | F9602B60E6B34A44AF7AB43DA832E47956485D6E952B0FEFBA79BEC382F4158A |
SHA-512: | 141D0275651598F50FC3685D2C663FC37218DBCDC77A78F4529E61046196A09E128911379D75B2448E264E70F760DBC2DB3EDF0DB0D330921A6A605B274F45B8 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 86016 |
Entropy (8bit): | 6.614133995903123 |
Encrypted: | false |
SSDEEP: | 1536:fP4Cxi8q0vQEcmFdni8yDGVFE5gOHu1CwCMIBZwneAJu7QnswIPumV3BxZxu6/sL:X4CE0Imbi80PtCZEMnVIPPBxT/sZ5 |
MD5: | D8384B26A2535C0417E7AA1087DC171D |
SHA1: | A2BE1DCE8C974D3BA17E20845BC39969219728DD |
SHA-256: | 8916199C5C994EBA1CC99A8440D0836D87BC06AF203C68484E979FD3375B6ED8 |
SHA-512: | 1FA573FAA54EC9DBBADC0462EADE5BCC869E6CC63CDA14DF22396AA3A5CD7E3B9E7922898AD9859CBFC8A90DA3F257CA07DDB3E8295D169B00711DAB86E2E36A |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 202 |
Entropy (8bit): | 4.7712205967826735 |
Encrypted: | false |
SSDEEP: | 3:P+uUqt/vllpfrYZcFTS9gXeF+X32ZpfW6MZCt7HINqCXjPYLEd:PCqjvVg3F+X32+hZCt7HSbY+ |
MD5: | 8D7BEBE90D83C02282F2B37902D47609 |
SHA1: | 8528721237432C9CB70956F3861A2FBF6AB174C5 |
SHA-256: | 8AE79C5433BA0B1FEAF8CA4E4547BA0366BD4120A15CAABA853CC578931BA0C1 |
SHA-512: | 47D963B1CDDD904E011CEC1D1A6521CB1C6FB5B5F762504AE5CCB3FE890CA1B0C6FB6A9F8CC9E6B6AA0FFA96D65CC0F1957411420C4BF4532AA30C89B054D6B6 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 91136 |
Entropy (8bit): | 6.372657761619245 |
Encrypted: | false |
SSDEEP: | 1536:N1/AD1EsdzVXnP94SGGLpRB6M28eFvMVpYhWoXElJUzdlDfFgQa8BpDzdZPp7p:NZg5PXPeiR6MKkjGWoUlJUPdgQa8Bp// |
MD5: | 82B9DE69C5590DC95D9AF421CE8AD0FE |
SHA1: | 5C8C50D6512C7E914B29E9A7FEDD32830ED43A28 |
SHA-256: | EE5B15E38E3BA19BA9249B794AB669A875137818CBC6E2AC9F1388D5FE574E39 |
SHA-512: | 2FEC14247D7C6A6C060B8904A99C86D2B39A43E54C2384D3ED2D2D8C1921F8E0F40DB85374043CE4327AF19C14BB6BFF91E6DED3105CCAE8168849F02EBE9FDD |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\CondosGold_nopump.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 63488 |
Entropy (8bit): | 7.99729604423269 |
Encrypted: | true |
SSDEEP: | 1536:tEwfk7sA0/MJ4e8rzJwWKhKQumxniVK1G4XEpZfz:eqk7sA0UKmWKhFuwn3XXkZfz |
MD5: | 228B3CBA5D32E858E0CF61AEE28C2602 |
SHA1: | 27FD03A6F2F60E9437C820EE56973B149BDE74FF |
SHA-256: | 66F2071971DA2660A980A358C665A81E0456054B7EF240CF02B5EFBF9495854C |
SHA-512: | 8153E2F43D5A1AE294D816378143AF7ACC291ABAB7ADABC3E326BB284B609E19A0FC2EBAC97A747612595E7CE2F94862893DB73299B1D489F3CD7F7B80A504DF |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 72704 |
Entropy (8bit): | 5.014947643275812 |
Encrypted: | false |
SSDEEP: | 384:Lu88888888888888888888888888888zv888888NfU84444QnooooooooooooooX:L/SGKAGWRqA60dTcR4qYnGfAHE9AS |
MD5: | 406DC257ECC2C7B7B85236291DD52401 |
SHA1: | 44DD1450A357A6EE606D379E48447D69908C2FC5 |
SHA-256: | D7D3378ED777D309BEA183208DE1C1B283A15262B4D39D29FB5C5DF4D738A268 |
SHA-512: | 9E91E16B65A080EF57B35C9B9FED182AC56A81226EFA19FC382755247547F800908586263B21B1B6176699416BAF841F6849B3C2E32BB4F4801E81B1B98443D4 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\CondosGold_nopump.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 72704 |
Entropy (8bit): | 7.997249644835945 |
Encrypted: | true |
SSDEEP: | 1536:4AhTI6aca5io/Qi7keHqP41EPxrIm5GjoKS8Hv376A5iY+TdGCaSFfStLpdzugY:4ApI6La5B4iYeKg1aImE1P3uAcY+0AFv |
MD5: | E7A35D1689F9E4DF278775799501706A |
SHA1: | 8C6DF65201F038A584D10847D42EAEE40CCC1642 |
SHA-256: | 000545EA8097A390CB269326658782385D851C7C6E33354EBBE00F3879A7231F |
SHA-512: | FD2BBB471AABA4BCFF75758CEAF26EA094804539775CCA4FCB60F869FE6DE32B6BDB76A35AFDADFD0C1213421334F14CB3D1E69376F51A77F7DB8F7FC814C2F1 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\CondosGold_nopump.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 41751 |
Entropy (8bit): | 7.996473125333125 |
Encrypted: | true |
SSDEEP: | 768:575nVPIny09GJErMDDFtZBjugA+DO4rnC+I934JvHW5GMq8Hr:1NVPIT9G8MD/nugHDz7I9oJidHr |
MD5: | F15AD1D41F690F4541BAE39F2B9FFFD3 |
SHA1: | 49AF965BA99791BE68F143449532A0019EB24C95 |
SHA-256: | 23011FF4E4AA99F55ED45256758D565C4AAFABAE1B5C5F77DBC1D98A0B4B90E5 |
SHA-512: | DCEA021626792075175E329C44252B499917EC164CE9838BA4024BD676A7A39E92C521630650D21D7BCF8BBEA355B1391FC8707D80ABA66D47757AB7CFE642EE |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\CondosGold_nopump.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 87040 |
Entropy (8bit): | 7.99795896720847 |
Encrypted: | true |
SSDEEP: | 1536:ZDmSe/ID7sViTA+MDeps9s51zw6BllFmAldrvxntFMHBD4M2jt8B:ZaSeSAcA+M4Es5p9b2AldrvxngHB0zyB |
MD5: | DD05ED191465579E96916C50A7CC7419 |
SHA1: | D2482A24757311976588F8D28DB830E6F5BD9DF5 |
SHA-256: | 670ABCC677B35E21D6AE9EFA6F4094B2F13A0BFB82BCF82D0EC9994A6CE4D7EE |
SHA-512: | 57EAFFB89BB4E456198143F1CDC6C418CD579D8B4E50A8A1E1DF83E35DE5D76AC74F2666AC5B86D99DA36392C737BF6359D8B6EBD244D20F7C5EEA7FB7810371 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\CondosGold_nopump.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 57344 |
Entropy (8bit): | 7.996643836498878 |
Encrypted: | true |
SSDEEP: | 1536:8mOk69atKyiusHKun7++aobbFKv3AoJkfra9Yo00dC:8tk6KKbusq27cFvQQkm9YT |
MD5: | 7C8B6B59D68D7C48CD20B146BC8975FF |
SHA1: | B54D2938C915D9331CB1CC1FA70221BFA6505756 |
SHA-256: | DD83E07857F67230562721745A62D2F0577ABDF56D896A5D89917D5AC112651D |
SHA-512: | 70FB87A1C94CB4339DA7A94C93B638F39B2FCAE18B40C4AB4006473F05D8E9B017CA322D83059A0E4725250907F7FFED20688ED77184E79045B8345CD192330A |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.9591664571432705 |
TrID: |
|
File name: | CondosGold_nopump.exe |
File size: | 1'378'152 bytes |
MD5: | 412db12259a7d002a629959260898ea7 |
SHA1: | 4a8a563c534c4399d2f2dec2575c6268c2cbe898 |
SHA256: | 469fbee829e69894f23aa921e86480cfe18b116b873fedf03a9227ec1d57bb80 |
SHA512: | 0edcc32a29f2d4cdb5afda89dfcce0681d093ea32a3c85bc1e34f7279e82facdbb922461a6a0c6e5976d0be3d7a2559b8e328f0e2464e94ba9090aae3af96e8f |
SSDEEP: | 24576:yeO8eaBw8wu2vlgPhX49nuMUvLap9HMdCVPPhoJF9SCHCsKKgHQ34d8fr4:YCBwRu2NgPh8uR+jlPhs3SCFgw34C4 |
TLSH: | 3055334B4B90C85BF7D20E71696A103FCA3C9F7619E8F05B9315CDC9B121190AE6AB73 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................t...x...B...8..... |
Icon Hash: | fee29bdadb9ac8c0 |
Entrypoint: | 0x4038af |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x4F47E2E4 [Fri Feb 24 19:20:04 2012 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | be41bf7b8cc010b614bd36bbca606973 |
Signature Valid: | false |
Signature Issuer: | CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | D4E75D16F15BD3BC32ACDF4EAF83A59A |
Thumbprint SHA-1: | 8A5A56EFFDC462AE8A6CF732BB21E2541995BF36 |
Thumbprint SHA-256: | 44DBAC9846A7E8F8EAE8BF0F9518B44FB86C257DD797742B767AF6ED1995AAF4 |
Serial: | 4EF1C2D67B37517957F42E8D |
Instruction |
---|
sub esp, 000002D4h |
push ebx |
push ebp |
push esi |
push edi |
push 00000020h |
xor ebp, ebp |
pop esi |
mov dword ptr [esp+18h], ebp |
mov dword ptr [esp+10h], 0040A268h |
mov dword ptr [esp+14h], ebp |
call dword ptr [00409030h] |
push 00008001h |
call dword ptr [004090B4h] |
push ebp |
call dword ptr [004092C0h] |
push 00000008h |
mov dword ptr [0047EB98h], eax |
call 00007FC0E86B04ABh |
push ebp |
push 000002B4h |
mov dword ptr [0047EAB0h], eax |
lea eax, dword ptr [esp+38h] |
push eax |
push ebp |
push 0040A264h |
call dword ptr [00409184h] |
push 0040A24Ch |
push 00476AA0h |
call 00007FC0E86B018Dh |
call dword ptr [004090B0h] |
push eax |
mov edi, 004CF0A0h |
push edi |
call 00007FC0E86B017Bh |
push ebp |
call dword ptr [00409134h] |
cmp word ptr [004CF0A0h], 0022h |
mov dword ptr [0047EAB8h], eax |
mov eax, edi |
jne 00007FC0E86ADA7Ah |
push 00000022h |
pop esi |
mov eax, 004CF0A2h |
push esi |
push eax |
call 00007FC0E86AFE51h |
push eax |
call dword ptr [00409260h] |
mov esi, eax |
mov dword ptr [esp+1Ch], esi |
jmp 00007FC0E86ADB03h |
push 00000020h |
pop ebx |
cmp ax, bx |
jne 00007FC0E86ADA7Ah |
add esi, 02h |
cmp word ptr [esi], bx |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xac40 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x100000 | 0x50b62 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x14d5f8 | 0x3170 | .rsrc |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x86000 | 0x994 | .ndata |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x9000 | 0x2d0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x728c | 0x7400 | 419d4e1be1ac35a5db9c47f553b27cea | False | 0.6566540948275862 | data | 6.499708590628113 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x9000 | 0x2b6e | 0x2c00 | cca1ca3fbf99570f6de9b43ce767f368 | False | 0.3678977272727273 | data | 4.497932535153822 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xc000 | 0x72b9c | 0x200 | 77f0839f8ebea31040e462523e1c770e | False | 0.279296875 | data | 1.8049406284608531 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x7f000 | 0x81000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x100000 | 0x50b62 | 0x50c00 | 6f4c937d6aeb71c5ea3038160a438d00 | False | 0.9591053115325078 | data | 7.812086713491337 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x151000 | 0xfd6 | 0x1000 | c5a18758c1d350e60be4b1b8c16003a4 | False | 0.5693359375 | data | 5.327989080156199 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x1002c8 | 0x44b86 | PNG image data, 512 x 512, 8-bit/color RGBA, non-interlaced | English | United States | 0.9844783606534081 |
RT_ICON | 0x144e50 | 0x5a3f | PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced | English | United States | 0.9950655758992338 |
RT_ICON | 0x14a890 | 0x1e71 | PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced | English | United States | 1.001411523161812 |
RT_ICON | 0x14c704 | 0x2668 | Device independent bitmap graphic, 48 x 96 x 32, image size 9792 | English | United States | 0.4736574450772986 |
RT_ICON | 0x14ed6c | 0x1128 | Device independent bitmap graphic, 32 x 64 x 32, image size 4352 | English | United States | 0.5453096539162113 |
RT_ICON | 0x14fe94 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.6808510638297872 |
RT_DIALOG | 0x1502fc | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0x1503fc | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x150518 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x150578 | 0x5a | data | English | United States | 0.7888888888888889 |
RT_VERSION | 0x1505d4 | 0x2b8 | COM executable for DOS | English | United States | 0.49712643678160917 |
RT_MANIFEST | 0x15088c | 0x2d6 | XML 1.0 document, ASCII text, with very long lines (726), with no line terminators | English | United States | 0.5647382920110193 |
DLL | Import |
---|---|
KERNEL32.dll | SetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW |
USER32.dll | GetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW |
GDI32.dll | SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject |
SHELL32.dll | SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation |
ADVAPI32.dll | RegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW |
COMCTL32.dll | ImageList_AddMasked, ImageList_Destroy, ImageList_Create |
ole32.dll | CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance |
VERSION.dll | GetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:41:48.239040+0100 | 2058039 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (brendon-sharjen .biz) | 1 | 192.168.2.7 | 55194 | 1.1.1.1 | 53 | UDP |
2025-01-10T11:41:48.251744+0100 | 2058514 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (wordyfindy .lat) | 1 | 192.168.2.7 | 57753 | 1.1.1.1 | 53 | UDP |
2025-01-10T11:41:48.266539+0100 | 2058502 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (slipperyloo .lat) | 1 | 192.168.2.7 | 64203 | 1.1.1.1 | 53 | UDP |
2025-01-10T11:41:48.277499+0100 | 2058492 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (manyrestro .lat) | 1 | 192.168.2.7 | 57952 | 1.1.1.1 | 53 | UDP |
2025-01-10T11:41:48.288094+0100 | 2058500 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (shapestickyr .lat) | 1 | 192.168.2.7 | 58613 | 1.1.1.1 | 53 | UDP |
2025-01-10T11:41:48.299362+0100 | 2058510 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (talkynicer .lat) | 1 | 192.168.2.7 | 55668 | 1.1.1.1 | 53 | UDP |
2025-01-10T11:41:48.309803+0100 | 2058484 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (curverpluch .lat) | 1 | 192.168.2.7 | 63022 | 1.1.1.1 | 53 | UDP |
2025-01-10T11:41:48.321673+0100 | 2058512 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (tentabatte .lat) | 1 | 192.168.2.7 | 50921 | 1.1.1.1 | 53 | UDP |
2025-01-10T11:41:48.332730+0100 | 2058480 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (bashfulacid .lat) | 1 | 192.168.2.7 | 50003 | 1.1.1.1 | 53 | UDP |
2025-01-10T11:41:49.020484+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49941 | 104.102.49.254 | 443 | TCP |
2025-01-10T11:41:50.387376+0100 | 2858666 | ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup | 1 | 192.168.2.7 | 49941 | 104.102.49.254 | 443 | TCP |
2025-01-10T11:41:50.963232+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49947 | 104.21.48.1 | 443 | TCP |
2025-01-10T11:41:51.388752+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.7 | 49947 | 104.21.48.1 | 443 | TCP |
2025-01-10T11:41:51.388752+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.7 | 49947 | 104.21.48.1 | 443 | TCP |
2025-01-10T11:41:51.856695+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49956 | 104.21.48.1 | 443 | TCP |
2025-01-10T11:41:52.350877+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.7 | 49956 | 104.21.48.1 | 443 | TCP |
2025-01-10T11:41:52.350877+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.7 | 49956 | 104.21.48.1 | 443 | TCP |
2025-01-10T11:41:53.468747+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49964 | 104.21.48.1 | 443 | TCP |
2025-01-10T11:41:56.109188+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49976 | 104.21.48.1 | 443 | TCP |
2025-01-10T11:41:57.254577+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49977 | 104.21.48.1 | 443 | TCP |
2025-01-10T11:41:58.689401+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49978 | 104.21.48.1 | 443 | TCP |
2025-01-10T11:41:59.133170+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.7 | 49978 | 104.21.48.1 | 443 | TCP |
2025-01-10T11:41:59.792757+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49980 | 104.21.48.1 | 443 | TCP |
2025-01-10T11:42:00.834584+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49981 | 104.21.48.1 | 443 | TCP |
2025-01-10T11:42:01.579448+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.7 | 49981 | 104.21.48.1 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 10, 2025 11:41:48.358530998 CET | 49941 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 10, 2025 11:41:48.358584881 CET | 443 | 49941 | 104.102.49.254 | 192.168.2.7 |
Jan 10, 2025 11:41:48.359325886 CET | 49941 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 10, 2025 11:41:48.361778975 CET | 49941 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 10, 2025 11:41:48.361793041 CET | 443 | 49941 | 104.102.49.254 | 192.168.2.7 |
Jan 10, 2025 11:41:49.020178080 CET | 443 | 49941 | 104.102.49.254 | 192.168.2.7 |
Jan 10, 2025 11:41:49.020483971 CET | 49941 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 10, 2025 11:41:49.022797108 CET | 49941 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 10, 2025 11:41:49.022805929 CET | 443 | 49941 | 104.102.49.254 | 192.168.2.7 |
Jan 10, 2025 11:41:49.023099899 CET | 443 | 49941 | 104.102.49.254 | 192.168.2.7 |
Jan 10, 2025 11:41:49.072927952 CET | 49941 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 10, 2025 11:41:49.088112116 CET | 49941 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 10, 2025 11:41:49.131325960 CET | 443 | 49941 | 104.102.49.254 | 192.168.2.7 |
Jan 10, 2025 11:41:50.387557983 CET | 443 | 49941 | 104.102.49.254 | 192.168.2.7 |
Jan 10, 2025 11:41:50.387619019 CET | 443 | 49941 | 104.102.49.254 | 192.168.2.7 |
Jan 10, 2025 11:41:50.387638092 CET | 443 | 49941 | 104.102.49.254 | 192.168.2.7 |
Jan 10, 2025 11:41:50.387664080 CET | 49941 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 10, 2025 11:41:50.387726068 CET | 443 | 49941 | 104.102.49.254 | 192.168.2.7 |
Jan 10, 2025 11:41:50.387742996 CET | 443 | 49941 | 104.102.49.254 | 192.168.2.7 |
Jan 10, 2025 11:41:50.387763977 CET | 49941 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 10, 2025 11:41:50.387813091 CET | 49941 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 10, 2025 11:41:50.392191887 CET | 443 | 49941 | 104.102.49.254 | 192.168.2.7 |
Jan 10, 2025 11:41:50.392246008 CET | 443 | 49941 | 104.102.49.254 | 192.168.2.7 |
Jan 10, 2025 11:41:50.392292023 CET | 49941 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 10, 2025 11:41:50.392302036 CET | 443 | 49941 | 104.102.49.254 | 192.168.2.7 |
Jan 10, 2025 11:41:50.392318964 CET | 49941 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 10, 2025 11:41:50.392436028 CET | 49941 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 10, 2025 11:41:50.392894030 CET | 443 | 49941 | 104.102.49.254 | 192.168.2.7 |
Jan 10, 2025 11:41:50.392965078 CET | 49941 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 10, 2025 11:41:50.392993927 CET | 443 | 49941 | 104.102.49.254 | 192.168.2.7 |
Jan 10, 2025 11:41:50.393143892 CET | 443 | 49941 | 104.102.49.254 | 192.168.2.7 |
Jan 10, 2025 11:41:50.393248081 CET | 49941 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 10, 2025 11:41:50.394057035 CET | 49941 | 443 | 192.168.2.7 | 104.102.49.254 |
Jan 10, 2025 11:41:50.394076109 CET | 443 | 49941 | 104.102.49.254 | 192.168.2.7 |
Jan 10, 2025 11:41:50.411967993 CET | 49947 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:50.412012100 CET | 443 | 49947 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:50.412096024 CET | 49947 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:50.412370920 CET | 49947 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:50.412385941 CET | 443 | 49947 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:50.962996006 CET | 443 | 49947 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:50.963232040 CET | 49947 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:50.965025902 CET | 49947 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:50.965040922 CET | 443 | 49947 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:50.965282917 CET | 443 | 49947 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:50.966464996 CET | 49947 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:50.966485977 CET | 49947 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:50.966540098 CET | 443 | 49947 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:51.388873100 CET | 443 | 49947 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:51.389116049 CET | 443 | 49947 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:51.389355898 CET | 49947 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:51.389499903 CET | 49947 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:51.389518023 CET | 443 | 49947 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:51.389533997 CET | 49947 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:51.389539957 CET | 443 | 49947 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:51.394167900 CET | 49956 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:51.394207001 CET | 443 | 49956 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:51.394295931 CET | 49956 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:51.394686937 CET | 49956 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:51.394701004 CET | 443 | 49956 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:51.856606960 CET | 443 | 49956 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:51.856694937 CET | 49956 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:51.857827902 CET | 49956 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:51.857839108 CET | 443 | 49956 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:51.858050108 CET | 443 | 49956 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:51.859206915 CET | 49956 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:51.859229088 CET | 49956 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:51.859308958 CET | 443 | 49956 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:52.350965977 CET | 443 | 49956 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:52.351109982 CET | 443 | 49956 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:52.351188898 CET | 49956 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:52.351208925 CET | 443 | 49956 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:52.351239920 CET | 443 | 49956 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:52.351336956 CET | 49956 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:52.351360083 CET | 443 | 49956 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:52.351511002 CET | 443 | 49956 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:52.351596117 CET | 443 | 49956 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:52.351615906 CET | 49956 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:52.351629972 CET | 443 | 49956 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:52.351682901 CET | 49956 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:52.351690054 CET | 443 | 49956 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:52.355771065 CET | 443 | 49956 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:52.355840921 CET | 49956 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:52.355849981 CET | 443 | 49956 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:52.401045084 CET | 49956 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:52.401079893 CET | 443 | 49956 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:52.437396049 CET | 443 | 49956 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:52.437489986 CET | 49956 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:52.437505007 CET | 443 | 49956 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:52.437539101 CET | 443 | 49956 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:52.437594891 CET | 49956 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:52.437642097 CET | 443 | 49956 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:52.437808037 CET | 443 | 49956 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:52.437942982 CET | 49956 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:52.438240051 CET | 49956 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:52.438261032 CET | 443 | 49956 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:52.438272953 CET | 49956 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:52.438277960 CET | 443 | 49956 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:52.958640099 CET | 49964 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:52.958693027 CET | 443 | 49964 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:52.958758116 CET | 49964 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:52.959780931 CET | 49964 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:52.959793091 CET | 443 | 49964 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:53.468614101 CET | 443 | 49964 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:53.468746901 CET | 49964 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:53.470000029 CET | 49964 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:53.470011950 CET | 443 | 49964 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:53.470256090 CET | 443 | 49964 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:53.471504927 CET | 49964 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:53.471673012 CET | 49964 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:53.471705914 CET | 443 | 49964 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:55.557307005 CET | 443 | 49964 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:55.557429075 CET | 443 | 49964 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:55.557497025 CET | 49964 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:55.597342014 CET | 49964 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:55.597356081 CET | 443 | 49964 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:55.617353916 CET | 49976 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:55.617388010 CET | 443 | 49976 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:55.617450953 CET | 49976 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:55.617810965 CET | 49976 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:55.617827892 CET | 443 | 49976 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:56.109088898 CET | 443 | 49976 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:56.109188080 CET | 49976 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:56.123061895 CET | 49976 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:56.123085022 CET | 443 | 49976 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:56.123467922 CET | 443 | 49976 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:56.143207073 CET | 49976 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:56.143306971 CET | 49976 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:56.143354893 CET | 443 | 49976 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:56.143429995 CET | 49976 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:56.187335968 CET | 443 | 49976 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:56.674657106 CET | 443 | 49976 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:56.674751997 CET | 443 | 49976 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:56.674834013 CET | 49976 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:56.697370052 CET | 49976 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:56.697396994 CET | 443 | 49976 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:56.784219027 CET | 49977 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:56.784279108 CET | 443 | 49977 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:56.784375906 CET | 49977 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:56.785339117 CET | 49977 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:56.785356998 CET | 443 | 49977 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:57.254432917 CET | 443 | 49977 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:57.254576921 CET | 49977 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:57.256455898 CET | 49977 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:57.256472111 CET | 443 | 49977 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:57.256702900 CET | 443 | 49977 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:57.258477926 CET | 49977 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:57.258477926 CET | 49977 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:57.258512020 CET | 443 | 49977 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:57.258594036 CET | 49977 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:57.258600950 CET | 443 | 49977 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:57.877415895 CET | 443 | 49977 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:57.877532959 CET | 443 | 49977 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:57.877635956 CET | 49977 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:57.877759933 CET | 49977 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:57.877782106 CET | 443 | 49977 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:58.211622000 CET | 49978 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:58.211672068 CET | 443 | 49978 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:58.211764097 CET | 49978 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:58.212282896 CET | 49978 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:58.212299109 CET | 443 | 49978 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:58.689265966 CET | 443 | 49978 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:58.689400911 CET | 49978 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:58.690665007 CET | 49978 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:58.690679073 CET | 443 | 49978 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:58.690922976 CET | 443 | 49978 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:58.692272902 CET | 49978 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:58.692272902 CET | 49978 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:58.692316055 CET | 443 | 49978 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:59.133244991 CET | 443 | 49978 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:59.133533955 CET | 443 | 49978 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:59.133656979 CET | 49978 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:59.133817911 CET | 49978 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:59.133840084 CET | 443 | 49978 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:59.191893101 CET | 49980 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:59.191937923 CET | 443 | 49980 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:59.192035913 CET | 49980 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:59.192308903 CET | 49980 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:59.192322016 CET | 443 | 49980 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:59.792668104 CET | 443 | 49980 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:59.792757034 CET | 49980 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:59.794116974 CET | 49980 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:59.794125080 CET | 443 | 49980 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:59.794442892 CET | 443 | 49980 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:41:59.795582056 CET | 49980 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:59.795667887 CET | 49980 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:41:59.795672894 CET | 443 | 49980 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:42:00.375979900 CET | 443 | 49980 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:42:00.376097918 CET | 443 | 49980 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:42:00.376189947 CET | 49980 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:42:00.376403093 CET | 49980 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:42:00.376420021 CET | 443 | 49980 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:42:00.379080057 CET | 49981 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:42:00.379120111 CET | 443 | 49981 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:42:00.379282951 CET | 49981 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:42:00.379539967 CET | 49981 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:42:00.379554987 CET | 443 | 49981 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:42:00.834347963 CET | 443 | 49981 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:42:00.834583998 CET | 49981 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:42:00.835730076 CET | 49981 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:42:00.835741043 CET | 443 | 49981 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:42:00.836086035 CET | 443 | 49981 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:42:00.837167978 CET | 49981 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:42:00.837189913 CET | 49981 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:42:00.837261915 CET | 443 | 49981 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:42:01.579510927 CET | 443 | 49981 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:42:01.579756021 CET | 443 | 49981 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:42:01.579855919 CET | 49981 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:42:01.579981089 CET | 49981 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:42:01.580002069 CET | 443 | 49981 | 104.21.48.1 | 192.168.2.7 |
Jan 10, 2025 11:42:01.580010891 CET | 49981 | 443 | 192.168.2.7 | 104.21.48.1 |
Jan 10, 2025 11:42:01.580017090 CET | 443 | 49981 | 104.21.48.1 | 192.168.2.7 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 10, 2025 11:41:11.013550997 CET | 57751 | 53 | 192.168.2.7 | 1.1.1.1 |
Jan 10, 2025 11:41:11.022175074 CET | 53 | 57751 | 1.1.1.1 | 192.168.2.7 |
Jan 10, 2025 11:41:48.239039898 CET | 55194 | 53 | 192.168.2.7 | 1.1.1.1 |
Jan 10, 2025 11:41:48.248671055 CET | 53 | 55194 | 1.1.1.1 | 192.168.2.7 |
Jan 10, 2025 11:41:48.251744032 CET | 57753 | 53 | 192.168.2.7 | 1.1.1.1 |
Jan 10, 2025 11:41:48.264158964 CET | 53 | 57753 | 1.1.1.1 | 192.168.2.7 |
Jan 10, 2025 11:41:48.266539097 CET | 64203 | 53 | 192.168.2.7 | 1.1.1.1 |
Jan 10, 2025 11:41:48.275337934 CET | 53 | 64203 | 1.1.1.1 | 192.168.2.7 |
Jan 10, 2025 11:41:48.277498960 CET | 57952 | 53 | 192.168.2.7 | 1.1.1.1 |
Jan 10, 2025 11:41:48.285769939 CET | 53 | 57952 | 1.1.1.1 | 192.168.2.7 |
Jan 10, 2025 11:41:48.288094044 CET | 58613 | 53 | 192.168.2.7 | 1.1.1.1 |
Jan 10, 2025 11:41:48.297122002 CET | 53 | 58613 | 1.1.1.1 | 192.168.2.7 |
Jan 10, 2025 11:41:48.299361944 CET | 55668 | 53 | 192.168.2.7 | 1.1.1.1 |
Jan 10, 2025 11:41:48.307821035 CET | 53 | 55668 | 1.1.1.1 | 192.168.2.7 |
Jan 10, 2025 11:41:48.309803009 CET | 63022 | 53 | 192.168.2.7 | 1.1.1.1 |
Jan 10, 2025 11:41:48.318593979 CET | 53 | 63022 | 1.1.1.1 | 192.168.2.7 |
Jan 10, 2025 11:41:48.321672916 CET | 50921 | 53 | 192.168.2.7 | 1.1.1.1 |
Jan 10, 2025 11:41:48.330441952 CET | 53 | 50921 | 1.1.1.1 | 192.168.2.7 |
Jan 10, 2025 11:41:48.332730055 CET | 50003 | 53 | 192.168.2.7 | 1.1.1.1 |
Jan 10, 2025 11:41:48.343365908 CET | 53 | 50003 | 1.1.1.1 | 192.168.2.7 |
Jan 10, 2025 11:41:48.345536947 CET | 58548 | 53 | 192.168.2.7 | 1.1.1.1 |
Jan 10, 2025 11:41:48.352880955 CET | 53 | 58548 | 1.1.1.1 | 192.168.2.7 |
Jan 10, 2025 11:41:50.397864103 CET | 64852 | 53 | 192.168.2.7 | 1.1.1.1 |
Jan 10, 2025 11:41:50.407550097 CET | 53 | 64852 | 1.1.1.1 | 192.168.2.7 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 10, 2025 11:41:11.013550997 CET | 192.168.2.7 | 1.1.1.1 | 0x5bb8 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:41:48.239039898 CET | 192.168.2.7 | 1.1.1.1 | 0xc7e2 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:41:48.251744032 CET | 192.168.2.7 | 1.1.1.1 | 0x2f28 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:41:48.266539097 CET | 192.168.2.7 | 1.1.1.1 | 0x6064 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:41:48.277498960 CET | 192.168.2.7 | 1.1.1.1 | 0xf475 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:41:48.288094044 CET | 192.168.2.7 | 1.1.1.1 | 0x48a8 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:41:48.299361944 CET | 192.168.2.7 | 1.1.1.1 | 0xaf64 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:41:48.309803009 CET | 192.168.2.7 | 1.1.1.1 | 0x3b4c | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:41:48.321672916 CET | 192.168.2.7 | 1.1.1.1 | 0xc148 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:41:48.332730055 CET | 192.168.2.7 | 1.1.1.1 | 0xe4b3 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:41:48.345536947 CET | 192.168.2.7 | 1.1.1.1 | 0xa41d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:41:50.397864103 CET | 192.168.2.7 | 1.1.1.1 | 0x705a | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 10, 2025 11:41:11.022175074 CET | 1.1.1.1 | 192.168.2.7 | 0x5bb8 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:41:48.248671055 CET | 1.1.1.1 | 192.168.2.7 | 0xc7e2 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:41:48.264158964 CET | 1.1.1.1 | 192.168.2.7 | 0x2f28 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:41:48.275337934 CET | 1.1.1.1 | 192.168.2.7 | 0x6064 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:41:48.285769939 CET | 1.1.1.1 | 192.168.2.7 | 0xf475 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:41:48.297122002 CET | 1.1.1.1 | 192.168.2.7 | 0x48a8 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:41:48.307821035 CET | 1.1.1.1 | 192.168.2.7 | 0xaf64 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:41:48.318593979 CET | 1.1.1.1 | 192.168.2.7 | 0x3b4c | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:41:48.330441952 CET | 1.1.1.1 | 192.168.2.7 | 0xc148 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:41:48.343365908 CET | 1.1.1.1 | 192.168.2.7 | 0xe4b3 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:41:48.352880955 CET | 1.1.1.1 | 192.168.2.7 | 0xa41d | No error (0) | 104.102.49.254 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 11:41:50.407550097 CET | 1.1.1.1 | 192.168.2.7 | 0x705a | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 11:41:50.407550097 CET | 1.1.1.1 | 192.168.2.7 | 0x705a | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 11:41:50.407550097 CET | 1.1.1.1 | 192.168.2.7 | 0x705a | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 11:41:50.407550097 CET | 1.1.1.1 | 192.168.2.7 | 0x705a | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 11:41:50.407550097 CET | 1.1.1.1 | 192.168.2.7 | 0x705a | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 11:41:50.407550097 CET | 1.1.1.1 | 192.168.2.7 | 0x705a | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 11:41:50.407550097 CET | 1.1.1.1 | 192.168.2.7 | 0x705a | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.7 | 49941 | 104.102.49.254 | 443 | 8088 | C:\Users\user\AppData\Local\Temp\352348\Cassette.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 10:41:49 UTC | 219 | OUT | |
2025-01-10 10:41:50 UTC | 1905 | IN | |
2025-01-10 10:41:50 UTC | 14479 | IN | |
2025-01-10 10:41:50 UTC | 16384 | IN | |
2025-01-10 10:41:50 UTC | 3768 | IN | |
2025-01-10 10:41:50 UTC | 495 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.7 | 49947 | 104.21.48.1 | 443 | 8088 | C:\Users\user\AppData\Local\Temp\352348\Cassette.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 10:41:50 UTC | 263 | OUT | |
2025-01-10 10:41:50 UTC | 8 | OUT | |
2025-01-10 10:41:51 UTC | 1133 | IN | |
2025-01-10 10:41:51 UTC | 7 | IN | |
2025-01-10 10:41:51 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.7 | 49956 | 104.21.48.1 | 443 | 8088 | C:\Users\user\AppData\Local\Temp\352348\Cassette.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 10:41:51 UTC | 264 | OUT | |
2025-01-10 10:41:51 UTC | 86 | OUT | |
2025-01-10 10:41:52 UTC | 1123 | IN | |
2025-01-10 10:41:52 UTC | 246 | IN | |
2025-01-10 10:41:52 UTC | 1369 | IN | |
2025-01-10 10:41:52 UTC | 1369 | IN | |
2025-01-10 10:41:52 UTC | 1369 | IN | |
2025-01-10 10:41:52 UTC | 1369 | IN | |
2025-01-10 10:41:52 UTC | 1369 | IN | |
2025-01-10 10:41:52 UTC | 1369 | IN | |
2025-01-10 10:41:52 UTC | 1369 | IN | |
2025-01-10 10:41:52 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.7 | 49964 | 104.21.48.1 | 443 | 8088 | C:\Users\user\AppData\Local\Temp\352348\Cassette.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 10:41:53 UTC | 283 | OUT | |
2025-01-10 10:41:53 UTC | 12857 | OUT | |
2025-01-10 10:41:55 UTC | 1133 | IN | |
2025-01-10 10:41:55 UTC | 20 | IN | |
2025-01-10 10:41:55 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.7 | 49976 | 104.21.48.1 | 443 | 8088 | C:\Users\user\AppData\Local\Temp\352348\Cassette.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 10:41:56 UTC | 273 | OUT | |
2025-01-10 10:41:56 UTC | 15029 | OUT | |
2025-01-10 10:41:56 UTC | 1127 | IN | |
2025-01-10 10:41:56 UTC | 20 | IN | |
2025-01-10 10:41:56 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.7 | 49977 | 104.21.48.1 | 443 | 8088 | C:\Users\user\AppData\Local\Temp\352348\Cassette.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 10:41:57 UTC | 280 | OUT | |
2025-01-10 10:41:57 UTC | 15331 | OUT | |
2025-01-10 10:41:57 UTC | 5065 | OUT | |
2025-01-10 10:41:57 UTC | 1125 | IN | |
2025-01-10 10:41:57 UTC | 20 | IN | |
2025-01-10 10:41:57 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.7 | 49978 | 104.21.48.1 | 443 | 8088 | C:\Users\user\AppData\Local\Temp\352348\Cassette.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 10:41:58 UTC | 278 | OUT | |
2025-01-10 10:41:58 UTC | 1202 | OUT | |
2025-01-10 10:41:59 UTC | 1120 | IN | |
2025-01-10 10:41:59 UTC | 20 | IN | |
2025-01-10 10:41:59 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.7 | 49980 | 104.21.48.1 | 443 | 8088 | C:\Users\user\AppData\Local\Temp\352348\Cassette.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 10:41:59 UTC | 282 | OUT | |
2025-01-10 10:41:59 UTC | 1159 | OUT | |
2025-01-10 10:42:00 UTC | 1120 | IN | |
2025-01-10 10:42:00 UTC | 20 | IN | |
2025-01-10 10:42:00 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.7 | 49981 | 104.21.48.1 | 443 | 8088 | C:\Users\user\AppData\Local\Temp\352348\Cassette.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 10:42:00 UTC | 265 | OUT | |
2025-01-10 10:42:00 UTC | 121 | OUT | |
2025-01-10 10:42:01 UTC | 1122 | IN | |
2025-01-10 10:42:01 UTC | 54 | IN | |
2025-01-10 10:42:01 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 5 |
Start time: | 05:41:03 |
Start date: | 10/01/2025 |
Path: | C:\Users\user\Desktop\CondosGold_nopump.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'378'152 bytes |
MD5 hash: | 412DB12259A7D002A629959260898EA7 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 7 |
Start time: | 05:41:04 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x410000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 05:41:04 |
Start date: | 10/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff75da10000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 9 |
Start time: | 05:41:06 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x650000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 10 |
Start time: | 05:41:06 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x7c0000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 12 |
Start time: | 05:41:06 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x650000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 13 |
Start time: | 05:41:07 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x7c0000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 14 |
Start time: | 05:41:07 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x410000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 15 |
Start time: | 05:41:07 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\extrac32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe60000 |
File size: | 29'184 bytes |
MD5 hash: | 9472AAB6390E4F1431BAA912FCFF9707 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 16 |
Start time: | 05:41:08 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x7c0000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 17 |
Start time: | 05:41:08 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x410000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 18 |
Start time: | 05:41:08 |
Start date: | 10/01/2025 |
Path: | C:\Users\user\AppData\Local\Temp\352348\Cassette.com |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x4f0000 |
File size: | 947'288 bytes |
MD5 hash: | 62D09F076E6E0240548C2F837536A46A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Has exited: | true |
Target ID: | 19 |
Start time: | 05:41:09 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\choice.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd70000 |
File size: | 28'160 bytes |
MD5 hash: | FCE0E41C87DC4ABBE976998AD26C27E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Execution Graph
Execution Coverage: | 17.7% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 21% |
Total number of Nodes: | 1482 |
Total number of Limit Nodes: | 27 |
Graph
Function 004050F9 Relevance: 66.8, APIs: 36, Strings: 2, Instructions: 295windowclipboardmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004038AF Relevance: 52.8, APIs: 22, Strings: 8, Instructions: 304filestringcomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004015A0 Relevance: 56.4, APIs: 15, Strings: 17, Instructions: 351sleepfilewindowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405958 Relevance: 45.7, APIs: 15, Strings: 11, Instructions: 233stringregistrylibraryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401A1F Relevance: 22.9, APIs: 5, Strings: 8, Instructions: 185stringtimeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040337F Relevance: 19.4, APIs: 6, Strings: 5, Instructions: 175fileCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004022FD Relevance: 7.6, APIs: 5, Instructions: 56memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040139D Relevance: 3.0, APIs: 2, Instructions: 42windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E7C Relevance: 3.0, APIs: 2, Instructions: 15fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E5C Relevance: 3.0, APIs: 2, Instructions: 9COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403336 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004037F8 Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DDB Relevance: 1.5, APIs: 1, Instructions: 9windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403368 Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DC4 Relevance: 1.5, APIs: 1, Instructions: 6windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DB1 Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004049A8 Relevance: 65.2, APIs: 33, Strings: 4, Instructions: 470windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406CC7 Relevance: 31.7, APIs: 9, Strings: 9, Instructions: 190filestringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004044D1 Relevance: 30.0, APIs: 15, Strings: 2, Instructions: 300stringkeyboardCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406EFE Relevance: 30.0, APIs: 14, Strings: 3, Instructions: 270filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406831 Relevance: 21.2, APIs: 8, Strings: 4, Instructions: 212stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004079A2 Relevance: .3, Instructions: 347COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040737E Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004063D8 Relevance: 70.3, APIs: 29, Strings: 11, Instructions: 256libraryloadermemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004040E4 Relevance: 40.5, APIs: 20, Strings: 3, Instructions: 210windowstringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406AC5 Relevance: 35.2, APIs: 15, Strings: 5, Instructions: 163filestringmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402880 Relevance: 17.6, APIs: 4, Strings: 6, Instructions: 131registrystringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406113 Relevance: 15.8, APIs: 7, Strings: 2, Instructions: 72filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E55 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 103memoryfileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004023F0 Relevance: 12.3, APIs: 3, Strings: 4, Instructions: 83libraryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DF6 Relevance: 12.1, APIs: 8, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402238 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 59synchronizationCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040487A Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040324C Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 40timeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040209F Relevance: 7.5, APIs: 5, Instructions: 39windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401F80 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowtimeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004043D9 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 73stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004027E3 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 60registryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402665 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 56stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406250 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 53stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004020F9 Relevance: 6.0, APIs: 4, Instructions: 45COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407224 Relevance: 6.0, APIs: 3, Strings: 1, Instructions: 43stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004032D2 Relevance: 6.0, APIs: 4, Instructions: 33COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406391 Relevance: 6.0, APIs: 4, Instructions: 31memorylibraryloaderCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004048F8 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 58windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402797 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 25stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C6B Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 24processCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062CF Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 13stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405DE2 Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|