Windows
Analysis Report
HouseholdsClicking.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- HouseholdsClicking.exe (PID: 3604 cmdline:
"C:\Users\ user\Deskt op\Househo ldsClickin g.exe" MD5: C3C0FBE6393929C60E63885BAB2603F6) - cmd.exe (PID: 2008 cmdline:
"C:\Window s\System32 \cmd.exe" /c copy Hi ghways Hig hways.cmd && Highway s.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 3744 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 1740 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 4464 cmdline:
findstr /I "opssvc w rsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - tasklist.exe (PID: 5516 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 5252 cmdline:
findstr "A vastUI AVG UI bdservi cehost nsW scSvc ekrn SophosHea lth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 6408 cmdline:
cmd /c md 19152 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - findstr.exe (PID: 2144 cmdline:
findstr /V "Bookmark s" Sv MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 5608 cmdline:
cmd /c cop y /b ..\Di stance + . .\Butt + . .\Roland + ..\July + ..\Islam + ..\Argen tina M MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - Appliance.com (PID: 4504 cmdline:
Appliance. com M MD5: 62D09F076E6E0240548C2F837536A46A) - choice.exe (PID: 480 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["debonairnukk.xyz", "sordid-snaked.cyou", "wrathful-jammy.cyou", "ingreem-eilish.biz", "immureprech.biz", "diffuculttan.xyz", "awake-weaves.cyou", "deafeninggeh.biz", "effecterectz.xyz"], "Build id": "HpOoIh--3fe7f419a360"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security | ||
Click to see the 4 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security |
Source: | Author: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T12:06:22.661289+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49737 | 104.102.49.254 | 443 | TCP |
2025-01-10T12:06:23.771159+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49738 | 104.21.64.1 | 443 | TCP |
2025-01-10T12:06:24.707840+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49739 | 104.21.64.1 | 443 | TCP |
2025-01-10T12:06:25.928436+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49740 | 104.21.64.1 | 443 | TCP |
2025-01-10T12:06:27.143705+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49741 | 104.21.64.1 | 443 | TCP |
2025-01-10T12:06:28.329583+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49742 | 104.21.64.1 | 443 | TCP |
2025-01-10T12:06:29.625250+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49743 | 104.21.64.1 | 443 | TCP |
2025-01-10T12:06:30.613387+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49744 | 104.21.64.1 | 443 | TCP |
2025-01-10T12:06:32.305834+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49745 | 104.21.64.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T12:06:24.232789+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49738 | 104.21.64.1 | 443 | TCP |
2025-01-10T12:06:25.177022+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49739 | 104.21.64.1 | 443 | TCP |
2025-01-10T12:06:32.770493+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49745 | 104.21.64.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T12:06:24.232789+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49738 | 104.21.64.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T12:06:25.177022+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.4 | 49739 | 104.21.64.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T12:06:21.962806+0100 | 2058210 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 53762 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T12:06:21.894226+0100 | 2058214 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 60520 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T12:06:21.934811+0100 | 2058216 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 64453 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T12:06:21.917168+0100 | 2058218 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 54680 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T12:06:21.905518+0100 | 2058220 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 61330 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T12:06:21.882584+0100 | 2058222 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 64889 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T12:06:21.870440+0100 | 2058612 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 51002 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T12:06:21.975796+0100 | 2058226 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 53765 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T12:06:21.950791+0100 | 2058236 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 50919 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T12:06:31.813411+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49744 | 104.21.64.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T12:06:23.171566+0100 | 2858666 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49737 | 104.102.49.254 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00406301 | |
Source: | Code function: | 0_2_00406CC7 | |
Source: | Code function: | 10_2_00E2DC54 | |
Source: | Code function: | 10_2_00E3A087 | |
Source: | Code function: | 10_2_00E3A1E2 | |
Source: | Code function: | 10_2_00E2E472 | |
Source: | Code function: | 10_2_00E3A570 | |
Source: | Code function: | 10_2_00E366DC | |
Source: | Code function: | 10_2_00DFC622 | |
Source: | Code function: | 10_2_00E373D4 | |
Source: | Code function: | 10_2_00E37333 | |
Source: | Code function: | 10_2_00E2D921 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | Code function: | 10_2_00E3D889 |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_004050F9 |
Source: | Code function: | 10_2_00E3F7C7 |
Source: | Code function: | 10_2_00E3F55C |
Source: | Code function: | 0_2_004044D1 |
Source: | Code function: | 10_2_00E59FD2 |
Source: | Code function: | 10_2_00DDFFE0 |
Source: | Code function: | 10_2_00E34763 |
Source: | Code function: | 10_2_00E21B4D |
Source: | Code function: | 0_2_004038AF | |
Source: | Code function: | 10_2_00E2F20D |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_0040737E | |
Source: | Code function: | 0_2_00406EFE | |
Source: | Code function: | 0_2_004079A2 | |
Source: | Code function: | 0_2_004049A8 | |
Source: | Code function: | 10_2_00DE8017 | |
Source: | Code function: | 10_2_00DCE1F0 | |
Source: | Code function: | 10_2_00DDE144 | |
Source: | Code function: | 10_2_00DC22AD | |
Source: | Code function: | 10_2_00DE22A2 | |
Source: | Code function: | 10_2_00DFA26E | |
Source: | Code function: | 10_2_00DDC624 | |
Source: | Code function: | 10_2_00E4C8A4 | |
Source: | Code function: | 10_2_00DFE87F | |
Source: | Code function: | 10_2_00DF6ADE | |
Source: | Code function: | 10_2_00E32A05 | |
Source: | Code function: | 10_2_00E28BFF | |
Source: | Code function: | 10_2_00DDCD7A | |
Source: | Code function: | 10_2_00DECE10 | |
Source: | Code function: | 10_2_00DF7159 | |
Source: | Code function: | 10_2_00DC9240 | |
Source: | Code function: | 10_2_00E55311 | |
Source: | Code function: | 10_2_00DC96E0 | |
Source: | Code function: | 10_2_00DE1704 | |
Source: | Code function: | 10_2_00DE1A76 | |
Source: | Code function: | 10_2_00DE7B8B | |
Source: | Code function: | 10_2_00DC9B60 | |
Source: | Code function: | 10_2_00DE7DBA | |
Source: | Code function: | 10_2_00DE1D20 | |
Source: | Code function: | 10_2_00DE1FE7 |
Source: | Dropped File: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 10_2_00E341FA |
Source: | Code function: | 10_2_00E22010 | |
Source: | Code function: | 10_2_00E21A0B |
Source: | Code function: | 0_2_004044D1 |
Source: | Code function: | 10_2_00E2DD87 |
Source: | Code function: | 0_2_004024FB |
Source: | Code function: | 10_2_00E33A0E |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Process created: |
Source: | Window detected: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00406328 |
Source: | Static PE information: |
Source: | Code function: | 10_2_00DE0DF9 |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | Code function: | 10_2_00E526DD | |
Source: | Code function: | 10_2_00DDFC7C |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | System information queried: | Jump to behavior |
Source: | API coverage: |
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: |
Source: | Code function: | 0_2_00406301 | |
Source: | Code function: | 0_2_00406CC7 | |
Source: | Code function: | 10_2_00E2DC54 | |
Source: | Code function: | 10_2_00E3A087 | |
Source: | Code function: | 10_2_00E3A1E2 | |
Source: | Code function: | 10_2_00E2E472 | |
Source: | Code function: | 10_2_00E3A570 | |
Source: | Code function: | 10_2_00E366DC | |
Source: | Code function: | 10_2_00DFC622 | |
Source: | Code function: | 10_2_00E373D4 | |
Source: | Code function: | 10_2_00E37333 | |
Source: | Code function: | 10_2_00E2D921 |
Source: | Code function: | 10_2_00DC5FC8 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 10_2_00E3F4FF |
Source: | Code function: | 10_2_00DC338B |
Source: | Code function: | 0_2_00406328 |
Source: | Code function: | 10_2_00DE5058 |
Source: | Code function: | 10_2_00E220AA |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Code function: | 10_2_00DF2992 | |
Source: | Code function: | 10_2_00DE0BAF | |
Source: | Code function: | 10_2_00DE0D45 | |
Source: | Code function: | 10_2_00DE0F91 |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Code function: | 10_2_00E21B4D |
Source: | Code function: | 10_2_00DC338B |
Source: | Code function: | 10_2_00E2BBED |
Source: | Code function: | 10_2_00E2ECD0 |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Code function: | 10_2_00E214AE |
Source: | Code function: | 10_2_00E21FB0 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: | 10_2_00DE0A08 |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 10_2_00E1E5F4 |
Source: | Code function: | 10_2_00E1E652 |
Source: | Code function: | 10_2_00DFBCD2 |
Source: | Code function: | 0_2_00406831 |
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Code function: | 10_2_00E42263 | |
Source: | Code function: | 10_2_00E41C61 |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | 2 Valid Accounts | 21 Windows Management Instrumentation | 1 DLL Side-Loading | 1 Exploitation for Privilege Escalation | 1 Disable or Modify Tools | 2 OS Credential Dumping | 2 System Time Discovery | Remote Services | 1 Archive Collected Data | 2 Ingress Tool Transfer | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 1 Native API | 2 Valid Accounts | 1 DLL Side-Loading | 11 Deobfuscate/Decode Files or Information | 21 Input Capture | 1 Account Discovery | Remote Desktop Protocol | 41 Data from Local System | 11 Encrypted Channel | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 1 PowerShell | Logon Script (Windows) | 2 Valid Accounts | 2 Obfuscated Files or Information | Security Account Manager | 13 File and Directory Discovery | SMB/Windows Admin Shares | 21 Input Capture | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | 21 Access Token Manipulation | 1 DLL Side-Loading | NTDS | 36 System Information Discovery | Distributed Component Object Model | 3 Clipboard Data | 114 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | 12 Process Injection | 11 Masquerading | LSA Secrets | 141 Security Software Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 2 Valid Accounts | Cached Domain Credentials | 11 Virtualization/Sandbox Evasion | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 11 Virtualization/Sandbox Evasion | DCSync | 4 Process Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 21 Access Token Manipulation | Proc Filesystem | 1 Application Window Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
Network Topology | Malvertising | Exploit Public-Facing Application | Command and Scripting Interpreter | At | At | 12 Process Injection | /etc/passwd and /etc/shadow | 1 System Owner/User Discovery | Direct Cloud VM Connections | Data Staged | Web Protocols | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Internal Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
69% | Virustotal | Browse | ||
61% | ReversingLabs | Win32.Exploit.LummaC |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
steamcommunity.com | 104.102.49.254 | true | false | high | |
sputnik-1985.com | 104.21.64.1 | true | false | high | |
sordid-snaked.cyou | unknown | unknown | false | high | |
diffuculttan.xyz | unknown | unknown | false | high | |
effecterectz.xyz | unknown | unknown | false | high | |
aGpUaEJqSGxZhd.aGpUaEJqSGxZhd | unknown | unknown | true | unknown | |
awake-weaves.cyou | unknown | unknown | false | high | |
immureprech.biz | unknown | unknown | false | high | |
wrathful-jammy.cyou | unknown | unknown | false | high | |
ingreem-eilish.biz | unknown | unknown | false | high | |
deafeninggeh.biz | unknown | unknown | false | high | |
debonairnukk.xyz | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.102.49.254 | steamcommunity.com | United States | 16625 | AKAMAI-ASUS | false | |
104.21.64.1 | sputnik-1985.com | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1587455 |
Start date and time: | 2025-01-10 12:04:57 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 19s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 16 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | HouseholdsClicking.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@22/21@12/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 4.175.87.197, 13.107.246.45
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing disassembly code.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtSetInformationFile calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
06:05:54 | API Interceptor | |
06:06:21 | API Interceptor | |
11:05:44 | Task Scheduler |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.102.49.254 | Get hash | malicious | Socks5Systemz | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
104.21.64.1 | Get hash | malicious | FormBook | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | CMSBrute | Browse |
| ||
Get hash | malicious | FormBook | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
sputnik-1985.com | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
steamcommunity.com | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
AKAMAI-ASUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | HTMLPhisher | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\19152\Appliance.com | Get hash | malicious | LummaC Stealer | Browse | ||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | Remcos | Browse |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 947288 |
Entropy (8bit): | 6.630612696399572 |
Encrypted: | false |
SSDEEP: | 24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK |
MD5: | 62D09F076E6E0240548C2F837536A46A |
SHA1: | 26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2 |
SHA-256: | 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49 |
SHA-512: | 32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 461250 |
Entropy (8bit): | 7.999621902028459 |
Encrypted: | true |
SSDEEP: | 12288:8/0RpVmgKFUKPpmGpAzs9Qd+alBXfORFrCbKYvA:88FmgKpMMKXfQrCdY |
MD5: | 3D6D45218DAC95051441B7E09E8621B3 |
SHA1: | C6A507255B1C846187BCC734699C7B1555924FE6 |
SHA-256: | 6A82008253E0CEB27673AD23527848E51F58ABB6E11666CC5CCA8A454E9DD244 |
SHA-512: | FBC7FA801FF84ADA49E72B342821706FC145BB2208741E264F29B1CD7172AD2B6215FE8A655FB02004483484CC0E5B57C8D4698943450EEBCCFD62756582A2FF |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\HouseholdsClicking.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 36290 |
Entropy (8bit): | 7.995068265567553 |
Encrypted: | true |
SSDEEP: | 768:bjEXfdJyqM23wKsAKSHsJCGkpqGI8cSTPfjQjnBvHeTBcSLX:MXfRp3qMWCDpqGI8cSTjcn5H6 |
MD5: | E1FEDE06FFA7694324BCF0012BAE9FE5 |
SHA1: | CBB60A4DF15D7CF7E15096B7532C060A97D894E8 |
SHA-256: | A1F87ACFE34EC54BC86497054BB85CBB35DAFBF9499BD39B46396DD5C7D8F47D |
SHA-512: | 101B8D400854EBED2622ED4C01D8AB9E3278720860B8907367FC3716D9B853DAD9F209435015E15B0F770776A167B2DF704B3163F8D0E31D73B61871F9889B3A |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\HouseholdsClicking.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 67584 |
Entropy (8bit): | 6.528420431394248 |
Encrypted: | false |
SSDEEP: | 1536:H1/AD1EsdzVXnP94SGGLpRB6M28eFvMVpYhWoXElJUzg:HZg5PXPeiR6MKkjGWoUlJU8 |
MD5: | F7BE54E80D09910E992F0918DB991BB7 |
SHA1: | 28EFD6516884DFCEC50BFCBFF371596F80BBD756 |
SHA-256: | 849A886E92E8E3C8D73E2FAA569F7023C01A40E41C808D80BC8938A4F0CECE76 |
SHA-512: | B743C0AA129D7D9F606F823DD632E0AE0A8EFFA746704839E1ED410EDC343569E158FA076E6F2AC997C6B185A12044B480A02CD9F032EA95A9571FB02F16CD97 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\HouseholdsClicking.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 92160 |
Entropy (8bit): | 7.998077512036191 |
Encrypted: | true |
SSDEEP: | 1536:AhYI5MIRnfKSoZpTKTCbudVhi4aLhLldH6POBK8fyizA7LGrN9C1xm:A1MIxf5oZpTfbaGNLhLf6POtyizA7LGt |
MD5: | 973162049DDEB33CD2BA3E2E476F64B0 |
SHA1: | 1DEAC83AB1224975F1E8572B8CBC5B21384B6044 |
SHA-256: | B2AC8FBE5D7CB9FAB2E3202FE9A0649DEC91C7112DF587565FAC27FBCB18A25E |
SHA-512: | 4FE741421804BA73E3C49DFD8449C49AAD6C0E398E320D6749B869CBF91D297C59139C0EC3977860B8A4A3BB8419166406C63704A81BB7347683BC9057522696 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\HouseholdsClicking.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 88064 |
Entropy (8bit): | 7.998142475205919 |
Encrypted: | true |
SSDEEP: | 1536:89x7v70Zw3HYIaPI1zOnt3OZJODhNby6p9oeJCljf1SKpDrCD3IRGlGUU56iSQFF:8/7zoI/8YJO1p9oeJmgKpDrk3VlG/kbC |
MD5: | 7674CBBCB2ACA7B63551861BF75F97D0 |
SHA1: | 81ED4DA3280BF1ABC4D8E3EB9BEF10938C64D9C2 |
SHA-256: | E2CF3658C672C28D3A8D27F6EFEB40A497202B1C4F7AA5851D6471DBA5E2083F |
SHA-512: | 479CC5E44828C868BB38BC31588894AE08DF8D934DDC4AE4CFDB8E93AE864DAED74FEFA4845F644762BDC0C1E4533F3D90B5E8602D25467CDE1B40B431F53123 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\HouseholdsClicking.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 145408 |
Entropy (8bit): | 6.628315928999892 |
Encrypted: | false |
SSDEEP: | 3072:h0nEoXnmowS2u5hVOoQ7t8T6pUkBJR8CThpmESv+AqVnBypIbv18mLtv:h0nEo3tb2j6AUkB0CThp6vmVnjpv |
MD5: | F7ED04C8FEBD990111B46FA11BDD8D1D |
SHA1: | 15D2525CEC051B85CD31F337DBE50DC4AEB8E7AB |
SHA-256: | 06DCA7DC1D2C82224A78FED7F59FBE4FE94776FE98FDB9D44CC66E9F4F1C2EBD |
SHA-512: | 15445C9E187B5B75A8A8B6256EB79571667AE4F3810A122381203E474F33A53DFC16327687F452AFDEE88E2213476F4DCF262C4A32168685F8EF761BFBFE550D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\HouseholdsClicking.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 102400 |
Entropy (8bit): | 6.4059896910898395 |
Encrypted: | false |
SSDEEP: | 3072:JfhnueoMmOqDoioO5bLezW9FfTut/Dde6u640ewy4Za9coRC2jfTk:JfhnvO5bLezWWt/Dd314V14ZgP0h |
MD5: | 304420C62ED1D9CD3F85D86582FCAC5C |
SHA1: | BC0693627B10C59A1A35ABBAAC45F7286D5FB821 |
SHA-256: | E0ECA4D4BB96BBF101554D6C9A124607604727C3D80784CA51F17CF0DC7B79AE |
SHA-512: | 0C811009FA23F4E9EB9F9C8FFA81CBA3CA03ABB65D069242534C8CC29B427A3D2B72FF241FD8A41DC22ADA94BB547CD10952D49F317DF2AD55D85A4285BD9CCC |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\HouseholdsClicking.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 29027 |
Entropy (8bit): | 5.070122764281543 |
Encrypted: | false |
SSDEEP: | 384:TJN2fuMMPCstNHSrg3lVKCTzR9zCKx4BTOnuCtN5u0tmIy4E0yqK4arJKkN6OjLt:TD2zMbyEVQO9z3S6uImqvTnEKpOjLt |
MD5: | 1772A08E66C81359D95F1B6BE25C7BC6 |
SHA1: | 3EC3D8D9C7AF1CB6E89D92B81761E2518844FC79 |
SHA-256: | 1D3C3C2A3643173A621BFFE1AD7DEB6752ACF927159807CFD1C823773C133A25 |
SHA-512: | 09B91369A720D9B5DF2F89619D29113CD12900E9057B53FA34369E43162BE4B4EF6308BD2E5B9BAB25E0666960EFA90B1C7300FF91A56CB09D07BD28D12DF06E |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 29027 |
Entropy (8bit): | 5.070122764281543 |
Encrypted: | false |
SSDEEP: | 384:TJN2fuMMPCstNHSrg3lVKCTzR9zCKx4BTOnuCtN5u0tmIy4E0yqK4arJKkN6OjLt:TD2zMbyEVQO9z3S6uImqvTnEKpOjLt |
MD5: | 1772A08E66C81359D95F1B6BE25C7BC6 |
SHA1: | 3EC3D8D9C7AF1CB6E89D92B81761E2518844FC79 |
SHA-256: | 1D3C3C2A3643173A621BFFE1AD7DEB6752ACF927159807CFD1C823773C133A25 |
SHA-512: | 09B91369A720D9B5DF2F89619D29113CD12900E9057B53FA34369E43162BE4B4EF6308BD2E5B9BAB25E0666960EFA90B1C7300FF91A56CB09D07BD28D12DF06E |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\HouseholdsClicking.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 74752 |
Entropy (8bit): | 7.997927415486124 |
Encrypted: | true |
SSDEEP: | 1536:ZTRPM9AmDGFg/v98FARN//qoino/CTwIqH3ecBfq/JtN:LJFFgtPRN/ziUCTwI03DBfMJj |
MD5: | C0717EAA23E1B4D8EF42EA9E99B89B69 |
SHA1: | 7E6B3B073737732C572642ED689C241D6D8BC077 |
SHA-256: | BDBE1D6E61B0115D697B5AA9E80D25B453E7474E4E09E559A1832D2DCFDC8FD1 |
SHA-512: | 1E75297CFB2E648859B35C4562B0D95C55DAF9BA8E4A66AF13565A1BEBB646A67C680A1E1AC84B1F69F852B64B0F9D736802273B83DF7DDEA55DE19C709A7A31 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\HouseholdsClicking.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 69632 |
Entropy (8bit): | 7.996970735141732 |
Encrypted: | true |
SSDEEP: | 1536:hKHe6Tk8avhcplFAdcv85JGTpua0urdeJ1QwBUwweBg:hKHzk8FplF7c6p10+yWRn |
MD5: | 99FA6F1A532385C89E16FEF6F954914E |
SHA1: | 6769F770470DF82AD78B32EC1535C345F28FE59C |
SHA-256: | 0C52ACA520B6875005651503A4D6F2B37430A227E9D84FDA93252D2AA094705C |
SHA-512: | 11B81B984A43C03AD5EEE5167DA72D5581D159EA7A3FAFE2BD442BB697915F3D598AC52BE0A843755D2AFF22DFBDA580CCAE455BBEA879E64475B61E24675DB2 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\HouseholdsClicking.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 66560 |
Entropy (8bit): | 6.684735459735519 |
Encrypted: | false |
SSDEEP: | 1536:+eOypvcLSDOSpZ+Sh+I+FrbCyI7P4Cxi8q0c:+eOyKODOSpQSAU4CE0c |
MD5: | 91CB734D0460BA18254E8FF059D6374F |
SHA1: | A7A4053A9C934F5023908F1B83A2A20A137D6C16 |
SHA-256: | AEB2BE9B4E40055826B3F960C271F86E647A92C1DB662ED8ADF9654ED37C9E82 |
SHA-512: | 3F5C265F4F651780889A82F5EA08D69E1BA0B22C7D2AEC865BFECD456E791744B2D3F21168B6E359B0620ED6DF0845813546F702F71CAE7118AB12C305350113 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\HouseholdsClicking.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 126976 |
Entropy (8bit): | 6.451923499297437 |
Encrypted: | false |
SSDEEP: | 3072:4dgQa8Bp/LxyA3laW2UDQWf05mjccBiqXvpgF4qv+3P:4gQaE/loUDtf0accB3gBmf |
MD5: | F76D99915DAD5D1428306D84FD5CEF4A |
SHA1: | 07C609BC4E5206607858EB56A43C138AD172F3FB |
SHA-256: | 528C4E90EF35FCCFA8ACACCCC6A3A65BF753F211FB7ACC277527921606DD63C5 |
SHA-512: | 9DA0F739147C67AB46BA8A896AF99A9CBE10B14B8725BDEBAFC6905DCF5252CC3588250D74A755C380F724E76F968909421858E16CE12075BE13709D1069C626 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\HouseholdsClicking.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 30110 |
Entropy (8bit): | 7.201013260715943 |
Encrypted: | false |
SSDEEP: | 768:cDv7sMvLHfR/ZByLiFuO/ChgZ45VatJVEV3GPkjF:cDv7xvTphAiPChgZ2kOE6 |
MD5: | 139ECBC61C65EEED2C66A743ABAC82D0 |
SHA1: | 00B2C1A41006975E5D68EDEA5FCB3203A9F1333A |
SHA-256: | 6D0498EC0E7B86B819DD86A54CF13515E4EB50569AFF18C9FFC944EEFDA68251 |
SHA-512: | 35C59717C001AC5A894ECB635072D8EEA157B8558E385B637C97493E35E3C4D962199D1799756A0D6C0A6310A327280F755564B9383ACADAB83DB7B02624F3C3 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\HouseholdsClicking.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 64512 |
Entropy (8bit): | 6.348311128852535 |
Encrypted: | false |
SSDEEP: | 768:Cel3EYr8qcDP8WBosd0bHazf0Tye4Ur2+9BGmd9OTGQG:Cel3EYrDWyu0uZo2+9BGmdATGV |
MD5: | 98D45275D84D549CF80B87BD0144D901 |
SHA1: | E321E6915F70857315778FDB7061D98E4B81A4E7 |
SHA-256: | 48ED90918079AFCC3CB658F5898D643C864F2EFC7394FC7353D1CA83F19E7761 |
SHA-512: | 5BA8EF5B24CBF770B3FC07F8251F5CB7BEAEABBD03879CCAA0E26A2E529446C8D72FC06A4A40DE39516C9DF4D893A3A60C682819521A3884FB62724C04A1E149 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\HouseholdsClicking.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 100352 |
Entropy (8bit): | 7.998096501321864 |
Encrypted: | true |
SSDEEP: | 3072:jMSCHPzzMZFHsbM78XjkRVobAJ5Qdzyul+sC:MzmFM0skjVjQd5O |
MD5: | DF8FDF5F14B162328C5A1C1A7D883B5A |
SHA1: | 69B6CFE2FBC4196E7F84A9E615E0AA845D5462E8 |
SHA-256: | 0241AE98F5BC3D7BAF64427D3AF04029D8FB52362E95C0DA931B4A0FDDE5D13B |
SHA-512: | 177D290979EB7B5D1AA1F0660C98E0C4EF9A2949C32E327D0DE439E7B5889CD615830F47C350ED12511A9D58B1CE60299EDEEF64EAF36EA54DDF22E22E76E79B |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\HouseholdsClicking.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 144384 |
Entropy (8bit): | 6.664092486590779 |
Encrypted: | false |
SSDEEP: | 3072:Zmbi80PtCZEMnVIPPBxT/sZydTmRxlHS3NxrHSBRtNPnF:gbfSCOMVIPPL/sZ7HS3zcNPF |
MD5: | E1A20C475EC5F88B2F289C1E03D35848 |
SHA1: | 12A23B096421755073A19D8F5FBFA031224852C8 |
SHA-256: | B64877AEADB747E805C85E4818FC3E667FC7107DFCDC5F3E20B819E1D559EFEF |
SHA-512: | 3FDBEF82EBD83DEADFA21D26516D0E4B2ECA75D1904AFCBB0E64D835D0E1A7CE2EEF03DAE1202321DEE7E30CB4DC556C040EC1038F8AE158F122B26826B98CB9 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\HouseholdsClicking.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 4.042876042833136 |
Encrypted: | false |
SSDEEP: | 768:CKAGWRqA60dTcR4qYnGfAHE9AUsFxyLtVSQsbZgar3R/o:CKaj6iTcPAsAhxjgarB/o |
MD5: | E3C619D6E998064E8E0B65361184EE91 |
SHA1: | E5DC3B5D5746E0BF1338E763F559E3478B970283 |
SHA-256: | 4AE3270EA08C657550B1FA048E85E786C7E608BD243A2A6E4A6E70428202CA66 |
SHA-512: | 32C1300C725C3B0C9494BBBBA2B0FC87FDD25487E7018F7EAC77115301656EC0AEFDEAFABDF875BCC655967CBEB71D6632FD6F88A4AD03FE9B68DC4F5C6B8831 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\HouseholdsClicking.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 707 |
Entropy (8bit): | 4.199195082896046 |
Encrypted: | false |
SSDEEP: | 12:VEmtHyGSG+fCtJfjEvadTfA43k66h1ICdC3v6clC1t:V9tHyGS9PvCA433C+sCNC1t |
MD5: | FB5E6B5023C95D6B259E8A32C47E4188 |
SHA1: | DD075EF6C1E7161253E79224DAEC20831AFF4CC9 |
SHA-256: | 61CA18D2F088E4AA315E0E989E6D0630C394765E655F567ED99EA53AD9E5F851 |
SHA-512: | 7CF610141B7C93CCC7A2F5FA9953A14696A42A0135750C42FB02B4F6BF6BA76A6F5E32B8805FB465173C0D0F87501052E5082497B8E6F7FEA299CB6244512E8F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\HouseholdsClicking.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 133120 |
Entropy (8bit): | 5.76830886452573 |
Encrypted: | false |
SSDEEP: | 1536:PR8anHsWccd0vtmgMbFuz08QuklMBNIimuzaAwusPu:58QLeAg0Fuz08XvBNbjaAtsPu |
MD5: | A2AD31B3B39D97E19767812F46D19EAD |
SHA1: | E1F31BEAAC4E5C4FF16EBF916E7BF6A2CE2AD99A |
SHA-256: | EE4DEDD77C361EC10B10B7A34F727528C0A8C90750088A2658424B8C1569DD5C |
SHA-512: | 7DB651D15B4612BE65BF8EC54AFF9A6F5C46964150E3AA96C9C656BFAF064B0C8FDD02E6C47C1EE54945B09061FEF395E4C31D027372A76941A91A547B84D5E5 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.9613420017471315 |
TrID: |
|
File name: | HouseholdsClicking.exe |
File size: | 1'051'945 bytes |
MD5: | c3c0fbe6393929c60e63885bab2603f6 |
SHA1: | 09c0cb9efeaa8808710df3f47b3c56fcd323b8bd |
SHA256: | 2fbecbe7ba6ce56cfe6b6da8e7aaf6127755161a7ef340b7b20c2b061404f022 |
SHA512: | 6d288c7fe70a1a5fc95347a86dff1ce7fed819e994e56be482383273f58d41ccafe2dfeb9b98d9d4250d58b02545cdc856a642549e1f5ef74b48110af701a37e |
SSDEEP: | 24576:tOwnvrCKVzzbzfafzs68PmgUFDWrE1X7BH/:jnTrJnEsNUFyM7Bf |
TLSH: | D02523C2C9714537F28A0F3A75B4C34799BEECA88C75C0CA6720DB5D83219509F64B9B |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................t.......B...8..... |
Icon Hash: | 04040c5834646c0c |
Entrypoint: | 0x4038af |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x4F47E2E4 [Fri Feb 24 19:20:04 2012 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | be41bf7b8cc010b614bd36bbca606973 |
Signature Valid: | false |
Signature Issuer: | CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 15E2254C8FC88D4A538BA4FB09C0019E |
Thumbprint SHA-1: | A731D48CD8E2A99BB91F7C096F40CEDF3A468BA6 |
Thumbprint SHA-256: | 866B46DC0876C0B9C85AFE6569E49352A021C255C8E7680DF6AC1FDBAD677033 |
Serial: | 03AA6492DE9D96A90A4BCA97BEADB44A |
Instruction |
---|
sub esp, 000002D4h |
push ebx |
push ebp |
push esi |
push edi |
push 00000020h |
xor ebp, ebp |
pop esi |
mov dword ptr [esp+18h], ebp |
mov dword ptr [esp+10h], 0040A268h |
mov dword ptr [esp+14h], ebp |
call dword ptr [00409030h] |
push 00008001h |
call dword ptr [004090B4h] |
push ebp |
call dword ptr [004092C0h] |
push 00000008h |
mov dword ptr [0047EB98h], eax |
call 00007F59D512ED0Bh |
push ebp |
push 000002B4h |
mov dword ptr [0047EAB0h], eax |
lea eax, dword ptr [esp+38h] |
push eax |
push ebp |
push 0040A264h |
call dword ptr [00409184h] |
push 0040A24Ch |
push 00476AA0h |
call 00007F59D512E9EDh |
call dword ptr [004090B0h] |
push eax |
mov edi, 004CF0A0h |
push edi |
call 00007F59D512E9DBh |
push ebp |
call dword ptr [00409134h] |
cmp word ptr [004CF0A0h], 0022h |
mov dword ptr [0047EAB8h], eax |
mov eax, edi |
jne 00007F59D512C2DAh |
push 00000022h |
pop esi |
mov eax, 004CF0A2h |
push esi |
push eax |
call 00007F59D512E6B1h |
push eax |
call dword ptr [00409260h] |
mov esi, eax |
mov dword ptr [esp+1Ch], esi |
jmp 00007F59D512C363h |
push 00000020h |
pop ebx |
cmp ax, bx |
jne 00007F59D512C2DAh |
add esi, 02h |
cmp word ptr [esi], bx |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xac40 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x100000 | 0x3dd6 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0xfe3d1 | 0x2958 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x86000 | 0x994 | .ndata |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x9000 | 0x2d0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x728c | 0x7400 | 419d4e1be1ac35a5db9c47f553b27cea | False | 0.6566540948275862 | data | 6.499708590628113 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x9000 | 0x2b6e | 0x2c00 | cca1ca3fbf99570f6de9b43ce767f368 | False | 0.3678977272727273 | data | 4.497932535153822 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xc000 | 0x72b9c | 0x200 | 77f0839f8ebea31040e462523e1c770e | False | 0.279296875 | data | 1.8049406284608531 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x7f000 | 0x81000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x100000 | 0x3dd6 | 0x3e00 | dd0bef767dd402b5e43760f872ba0825 | False | 0.3206275201612903 | data | 3.2491159454321363 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x104000 | 0xfd6 | 0x1000 | 3be994507c33de1e64a3838e10ac6bda | False | 0.597412109375 | data | 5.588401656476848 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x1001f0 | 0xb94 | PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced | English | United States | 1.003711201079622 |
RT_ICON | 0x100d84 | 0x2668 | Device independent bitmap graphic, 48 x 96 x 32, image size 9792 | English | United States | 0.08665581773799837 |
RT_ICON | 0x1033ec | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.22429078014184398 |
RT_DIALOG | 0x103854 | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0x103954 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x103a70 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x103ad0 | 0x30 | data | English | United States | 0.875 |
RT_MANIFEST | 0x103b00 | 0x2d6 | XML 1.0 document, ASCII text, with very long lines (726), with no line terminators | English | United States | 0.5647382920110193 |
DLL | Import |
---|---|
KERNEL32.dll | SetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW |
USER32.dll | GetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW |
GDI32.dll | SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject |
SHELL32.dll | SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation |
ADVAPI32.dll | RegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW |
COMCTL32.dll | ImageList_AddMasked, ImageList_Destroy, ImageList_Create |
ole32.dll | CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance |
VERSION.dll | GetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T12:06:21.870440+0100 | 2058612 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (ingreem-eilish .biz) | 1 | 192.168.2.4 | 51002 | 1.1.1.1 | 53 | UDP |
2025-01-10T12:06:21.882584+0100 | 2058222 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (immureprech .biz) | 1 | 192.168.2.4 | 64889 | 1.1.1.1 | 53 | UDP |
2025-01-10T12:06:21.894226+0100 | 2058214 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (deafeninggeh .biz) | 1 | 192.168.2.4 | 60520 | 1.1.1.1 | 53 | UDP |
2025-01-10T12:06:21.905518+0100 | 2058220 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (effecterectz .xyz) | 1 | 192.168.2.4 | 61330 | 1.1.1.1 | 53 | UDP |
2025-01-10T12:06:21.917168+0100 | 2058218 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (diffuculttan .xyz) | 1 | 192.168.2.4 | 54680 | 1.1.1.1 | 53 | UDP |
2025-01-10T12:06:21.934811+0100 | 2058216 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (debonairnukk .xyz) | 1 | 192.168.2.4 | 64453 | 1.1.1.1 | 53 | UDP |
2025-01-10T12:06:21.950791+0100 | 2058236 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (wrathful-jammy .cyou) | 1 | 192.168.2.4 | 50919 | 1.1.1.1 | 53 | UDP |
2025-01-10T12:06:21.962806+0100 | 2058210 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (awake-weaves .cyou) | 1 | 192.168.2.4 | 53762 | 1.1.1.1 | 53 | UDP |
2025-01-10T12:06:21.975796+0100 | 2058226 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (sordid-snaked .cyou) | 1 | 192.168.2.4 | 53765 | 1.1.1.1 | 53 | UDP |
2025-01-10T12:06:22.661289+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49737 | 104.102.49.254 | 443 | TCP |
2025-01-10T12:06:23.171566+0100 | 2858666 | ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup | 1 | 192.168.2.4 | 49737 | 104.102.49.254 | 443 | TCP |
2025-01-10T12:06:23.771159+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49738 | 104.21.64.1 | 443 | TCP |
2025-01-10T12:06:24.232789+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49738 | 104.21.64.1 | 443 | TCP |
2025-01-10T12:06:24.232789+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49738 | 104.21.64.1 | 443 | TCP |
2025-01-10T12:06:24.707840+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49739 | 104.21.64.1 | 443 | TCP |
2025-01-10T12:06:25.177022+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.4 | 49739 | 104.21.64.1 | 443 | TCP |
2025-01-10T12:06:25.177022+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49739 | 104.21.64.1 | 443 | TCP |
2025-01-10T12:06:25.928436+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49740 | 104.21.64.1 | 443 | TCP |
2025-01-10T12:06:27.143705+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49741 | 104.21.64.1 | 443 | TCP |
2025-01-10T12:06:28.329583+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49742 | 104.21.64.1 | 443 | TCP |
2025-01-10T12:06:29.625250+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49743 | 104.21.64.1 | 443 | TCP |
2025-01-10T12:06:30.613387+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49744 | 104.21.64.1 | 443 | TCP |
2025-01-10T12:06:31.813411+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49744 | 104.21.64.1 | 443 | TCP |
2025-01-10T12:06:32.305834+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49745 | 104.21.64.1 | 443 | TCP |
2025-01-10T12:06:32.770493+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49745 | 104.21.64.1 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 10, 2025 12:06:22.002865076 CET | 49737 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 10, 2025 12:06:22.002902031 CET | 443 | 49737 | 104.102.49.254 | 192.168.2.4 |
Jan 10, 2025 12:06:22.003015995 CET | 49737 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 10, 2025 12:06:22.006567955 CET | 49737 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 10, 2025 12:06:22.006582022 CET | 443 | 49737 | 104.102.49.254 | 192.168.2.4 |
Jan 10, 2025 12:06:22.661048889 CET | 443 | 49737 | 104.102.49.254 | 192.168.2.4 |
Jan 10, 2025 12:06:22.661288977 CET | 49737 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 10, 2025 12:06:22.666254044 CET | 49737 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 10, 2025 12:06:22.666265965 CET | 443 | 49737 | 104.102.49.254 | 192.168.2.4 |
Jan 10, 2025 12:06:22.666749954 CET | 443 | 49737 | 104.102.49.254 | 192.168.2.4 |
Jan 10, 2025 12:06:22.712958097 CET | 49737 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 10, 2025 12:06:22.715888023 CET | 49737 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 10, 2025 12:06:22.759341002 CET | 443 | 49737 | 104.102.49.254 | 192.168.2.4 |
Jan 10, 2025 12:06:23.171643972 CET | 443 | 49737 | 104.102.49.254 | 192.168.2.4 |
Jan 10, 2025 12:06:23.171672106 CET | 443 | 49737 | 104.102.49.254 | 192.168.2.4 |
Jan 10, 2025 12:06:23.171724081 CET | 49737 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 10, 2025 12:06:23.171741009 CET | 443 | 49737 | 104.102.49.254 | 192.168.2.4 |
Jan 10, 2025 12:06:23.171792984 CET | 443 | 49737 | 104.102.49.254 | 192.168.2.4 |
Jan 10, 2025 12:06:23.171832085 CET | 49737 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 10, 2025 12:06:23.171832085 CET | 49737 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 10, 2025 12:06:23.171842098 CET | 443 | 49737 | 104.102.49.254 | 192.168.2.4 |
Jan 10, 2025 12:06:23.171852112 CET | 443 | 49737 | 104.102.49.254 | 192.168.2.4 |
Jan 10, 2025 12:06:23.171866894 CET | 49737 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 10, 2025 12:06:23.171925068 CET | 49737 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 10, 2025 12:06:23.261085033 CET | 443 | 49737 | 104.102.49.254 | 192.168.2.4 |
Jan 10, 2025 12:06:23.261116028 CET | 443 | 49737 | 104.102.49.254 | 192.168.2.4 |
Jan 10, 2025 12:06:23.261193991 CET | 49737 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 10, 2025 12:06:23.261204004 CET | 443 | 49737 | 104.102.49.254 | 192.168.2.4 |
Jan 10, 2025 12:06:23.261250973 CET | 49737 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 10, 2025 12:06:23.261251926 CET | 49737 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 10, 2025 12:06:23.266244888 CET | 443 | 49737 | 104.102.49.254 | 192.168.2.4 |
Jan 10, 2025 12:06:23.266321898 CET | 49737 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 10, 2025 12:06:23.270832062 CET | 443 | 49737 | 104.102.49.254 | 192.168.2.4 |
Jan 10, 2025 12:06:23.270885944 CET | 49737 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 10, 2025 12:06:23.270899057 CET | 443 | 49737 | 104.102.49.254 | 192.168.2.4 |
Jan 10, 2025 12:06:23.270937920 CET | 443 | 49737 | 104.102.49.254 | 192.168.2.4 |
Jan 10, 2025 12:06:23.270992041 CET | 49737 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 10, 2025 12:06:23.271827936 CET | 49737 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 10, 2025 12:06:23.271850109 CET | 443 | 49737 | 104.102.49.254 | 192.168.2.4 |
Jan 10, 2025 12:06:23.284075975 CET | 49738 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:23.284106016 CET | 443 | 49738 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:23.284183025 CET | 49738 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:23.284516096 CET | 49738 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:23.284527063 CET | 443 | 49738 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:23.770941973 CET | 443 | 49738 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:23.771158934 CET | 49738 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:23.773144960 CET | 49738 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:23.773158073 CET | 443 | 49738 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:23.773485899 CET | 443 | 49738 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:23.774792910 CET | 49738 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:23.774792910 CET | 49738 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:23.774872065 CET | 443 | 49738 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:24.232795954 CET | 443 | 49738 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:24.232903957 CET | 443 | 49738 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:24.233009100 CET | 49738 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:24.233273983 CET | 49738 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:24.233273983 CET | 49738 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:24.233297110 CET | 443 | 49738 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:24.233308077 CET | 443 | 49738 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:24.240933895 CET | 49739 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:24.240988016 CET | 443 | 49739 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:24.241239071 CET | 49739 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:24.241877079 CET | 49739 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:24.241895914 CET | 443 | 49739 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:24.707765102 CET | 443 | 49739 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:24.707839966 CET | 49739 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:24.709415913 CET | 49739 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:24.709443092 CET | 443 | 49739 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:24.710064888 CET | 443 | 49739 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:24.711407900 CET | 49739 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:24.711430073 CET | 49739 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:24.711566925 CET | 443 | 49739 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:25.177026987 CET | 443 | 49739 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:25.177087069 CET | 443 | 49739 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:25.177115917 CET | 443 | 49739 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:25.177155018 CET | 443 | 49739 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:25.177186012 CET | 443 | 49739 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:25.177205086 CET | 443 | 49739 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:25.177244902 CET | 49739 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:25.177244902 CET | 49739 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:25.177273035 CET | 443 | 49739 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:25.177292109 CET | 49739 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:25.181757927 CET | 443 | 49739 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:25.181793928 CET | 443 | 49739 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:25.181813002 CET | 49739 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:25.181819916 CET | 443 | 49739 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:25.181830883 CET | 443 | 49739 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:25.181875944 CET | 49739 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:25.181885958 CET | 443 | 49739 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:25.181946993 CET | 49739 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:25.265364885 CET | 443 | 49739 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:25.265511036 CET | 443 | 49739 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:25.265575886 CET | 49739 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:25.265714884 CET | 49739 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:25.265747070 CET | 443 | 49739 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:25.265786886 CET | 49739 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:25.265798092 CET | 443 | 49739 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:25.450849056 CET | 49740 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:25.450891018 CET | 443 | 49740 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:25.450978041 CET | 49740 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:25.451575994 CET | 49740 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:25.451595068 CET | 443 | 49740 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:25.928354025 CET | 443 | 49740 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:25.928436041 CET | 49740 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:25.930336952 CET | 49740 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:25.930362940 CET | 443 | 49740 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:25.930663109 CET | 443 | 49740 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:25.932349920 CET | 49740 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:25.932712078 CET | 49740 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:25.932744026 CET | 443 | 49740 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:25.932801008 CET | 49740 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:25.932816029 CET | 443 | 49740 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:26.585578918 CET | 443 | 49740 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:26.585685015 CET | 443 | 49740 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:26.585777998 CET | 49740 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:26.591375113 CET | 49740 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:26.591396093 CET | 443 | 49740 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:26.687400103 CET | 49741 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:26.687432051 CET | 443 | 49741 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:26.687542915 CET | 49741 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:26.688009977 CET | 49741 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:26.688021898 CET | 443 | 49741 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:27.143632889 CET | 443 | 49741 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:27.143704891 CET | 49741 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:27.145124912 CET | 49741 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:27.145132065 CET | 443 | 49741 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:27.145462990 CET | 443 | 49741 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:27.146766901 CET | 49741 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:27.146882057 CET | 49741 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:27.146904945 CET | 443 | 49741 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:27.607758045 CET | 443 | 49741 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:27.607886076 CET | 443 | 49741 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:27.607994080 CET | 49741 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:27.608179092 CET | 49741 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:27.608192921 CET | 443 | 49741 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:27.842983961 CET | 49742 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:27.843029976 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:27.843108892 CET | 49742 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:27.843508959 CET | 49742 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:27.843521118 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:28.329323053 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:28.329582930 CET | 49742 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:28.330821991 CET | 49742 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:28.330840111 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:28.331127882 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:28.332590103 CET | 49742 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:28.332847118 CET | 49742 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:28.332882881 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:28.333015919 CET | 49742 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:28.333024979 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:28.979715109 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:28.979805946 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:28.979868889 CET | 49742 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:28.980334044 CET | 49742 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:28.980355978 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:29.161921024 CET | 49743 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:29.161950111 CET | 443 | 49743 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:29.162059069 CET | 49743 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:29.163033009 CET | 49743 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:29.163044930 CET | 443 | 49743 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:29.625171900 CET | 443 | 49743 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:29.625250101 CET | 49743 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:29.627389908 CET | 49743 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:29.627397060 CET | 443 | 49743 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:29.627603054 CET | 443 | 49743 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:29.628902912 CET | 49743 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:29.629019022 CET | 49743 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:29.629021883 CET | 443 | 49743 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:30.069155931 CET | 443 | 49743 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:30.069256067 CET | 443 | 49743 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:30.069462061 CET | 49743 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:30.071332932 CET | 49743 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:30.071343899 CET | 443 | 49743 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:30.150538921 CET | 49744 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:30.150593996 CET | 443 | 49744 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:30.150796890 CET | 49744 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:30.151360989 CET | 49744 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:30.151376963 CET | 443 | 49744 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:30.612080097 CET | 443 | 49744 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:30.613387108 CET | 49744 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:30.617372990 CET | 49744 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:30.617386103 CET | 443 | 49744 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:30.617650986 CET | 443 | 49744 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:30.618944883 CET | 49744 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:30.618944883 CET | 49744 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:30.618964911 CET | 443 | 49744 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:31.813221931 CET | 443 | 49744 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:31.813293934 CET | 443 | 49744 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:31.813349962 CET | 49744 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:31.813570023 CET | 49744 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:31.813585043 CET | 443 | 49744 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:31.849026918 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:31.849046946 CET | 443 | 49745 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:31.849170923 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:31.849608898 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:31.849622011 CET | 443 | 49745 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:32.305438042 CET | 443 | 49745 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:32.305834055 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:32.307130098 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:32.307146072 CET | 443 | 49745 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:32.307359934 CET | 443 | 49745 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:32.310524940 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:32.310524940 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:32.310585976 CET | 443 | 49745 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:32.770330906 CET | 443 | 49745 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:32.770433903 CET | 443 | 49745 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:32.770634890 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:32.782382011 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:32.782382011 CET | 49745 | 443 | 192.168.2.4 | 104.21.64.1 |
Jan 10, 2025 12:06:32.782407045 CET | 443 | 49745 | 104.21.64.1 | 192.168.2.4 |
Jan 10, 2025 12:06:32.782419920 CET | 443 | 49745 | 104.21.64.1 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 10, 2025 12:06:00.260647058 CET | 49200 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 10, 2025 12:06:00.269191027 CET | 53 | 49200 | 1.1.1.1 | 192.168.2.4 |
Jan 10, 2025 12:06:21.870440006 CET | 51002 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 10, 2025 12:06:21.879566908 CET | 53 | 51002 | 1.1.1.1 | 192.168.2.4 |
Jan 10, 2025 12:06:21.882584095 CET | 64889 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 10, 2025 12:06:21.891345024 CET | 53 | 64889 | 1.1.1.1 | 192.168.2.4 |
Jan 10, 2025 12:06:21.894226074 CET | 60520 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 10, 2025 12:06:21.903135061 CET | 53 | 60520 | 1.1.1.1 | 192.168.2.4 |
Jan 10, 2025 12:06:21.905518055 CET | 61330 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 10, 2025 12:06:21.914936066 CET | 53 | 61330 | 1.1.1.1 | 192.168.2.4 |
Jan 10, 2025 12:06:21.917167902 CET | 54680 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 10, 2025 12:06:21.932107925 CET | 53 | 54680 | 1.1.1.1 | 192.168.2.4 |
Jan 10, 2025 12:06:21.934811115 CET | 64453 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 10, 2025 12:06:21.947910070 CET | 53 | 64453 | 1.1.1.1 | 192.168.2.4 |
Jan 10, 2025 12:06:21.950790882 CET | 50919 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 10, 2025 12:06:21.959995031 CET | 53 | 50919 | 1.1.1.1 | 192.168.2.4 |
Jan 10, 2025 12:06:21.962805986 CET | 53762 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 10, 2025 12:06:21.973184109 CET | 53 | 53762 | 1.1.1.1 | 192.168.2.4 |
Jan 10, 2025 12:06:21.975795984 CET | 53765 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 10, 2025 12:06:21.989090919 CET | 53 | 53765 | 1.1.1.1 | 192.168.2.4 |
Jan 10, 2025 12:06:21.991847992 CET | 64316 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 10, 2025 12:06:21.998331070 CET | 53 | 64316 | 1.1.1.1 | 192.168.2.4 |
Jan 10, 2025 12:06:23.274111032 CET | 62580 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 10, 2025 12:06:23.283212900 CET | 53 | 62580 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 10, 2025 12:06:00.260647058 CET | 192.168.2.4 | 1.1.1.1 | 0xfbc0 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 12:06:21.870440006 CET | 192.168.2.4 | 1.1.1.1 | 0x8cba | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 12:06:21.882584095 CET | 192.168.2.4 | 1.1.1.1 | 0x279b | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 12:06:21.894226074 CET | 192.168.2.4 | 1.1.1.1 | 0x58ed | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 12:06:21.905518055 CET | 192.168.2.4 | 1.1.1.1 | 0xe293 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 12:06:21.917167902 CET | 192.168.2.4 | 1.1.1.1 | 0x2318 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 12:06:21.934811115 CET | 192.168.2.4 | 1.1.1.1 | 0x53fc | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 12:06:21.950790882 CET | 192.168.2.4 | 1.1.1.1 | 0x9edd | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 12:06:21.962805986 CET | 192.168.2.4 | 1.1.1.1 | 0xe191 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 12:06:21.975795984 CET | 192.168.2.4 | 1.1.1.1 | 0xc69c | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 12:06:21.991847992 CET | 192.168.2.4 | 1.1.1.1 | 0xb83e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 12:06:23.274111032 CET | 192.168.2.4 | 1.1.1.1 | 0x9994 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 10, 2025 12:06:00.269191027 CET | 1.1.1.1 | 192.168.2.4 | 0xfbc0 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 12:06:21.879566908 CET | 1.1.1.1 | 192.168.2.4 | 0x8cba | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 12:06:21.891345024 CET | 1.1.1.1 | 192.168.2.4 | 0x279b | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 12:06:21.903135061 CET | 1.1.1.1 | 192.168.2.4 | 0x58ed | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 12:06:21.914936066 CET | 1.1.1.1 | 192.168.2.4 | 0xe293 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 12:06:21.932107925 CET | 1.1.1.1 | 192.168.2.4 | 0x2318 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 12:06:21.947910070 CET | 1.1.1.1 | 192.168.2.4 | 0x53fc | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 12:06:21.959995031 CET | 1.1.1.1 | 192.168.2.4 | 0x9edd | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 12:06:21.973184109 CET | 1.1.1.1 | 192.168.2.4 | 0xe191 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 12:06:21.989090919 CET | 1.1.1.1 | 192.168.2.4 | 0xc69c | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 12:06:21.998331070 CET | 1.1.1.1 | 192.168.2.4 | 0xb83e | No error (0) | 104.102.49.254 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 12:06:23.283212900 CET | 1.1.1.1 | 192.168.2.4 | 0x9994 | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 12:06:23.283212900 CET | 1.1.1.1 | 192.168.2.4 | 0x9994 | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 12:06:23.283212900 CET | 1.1.1.1 | 192.168.2.4 | 0x9994 | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 12:06:23.283212900 CET | 1.1.1.1 | 192.168.2.4 | 0x9994 | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 12:06:23.283212900 CET | 1.1.1.1 | 192.168.2.4 | 0x9994 | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 12:06:23.283212900 CET | 1.1.1.1 | 192.168.2.4 | 0x9994 | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 12:06:23.283212900 CET | 1.1.1.1 | 192.168.2.4 | 0x9994 | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49737 | 104.102.49.254 | 443 | 4504 | C:\Users\user\AppData\Local\Temp\19152\Appliance.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 11:06:22 UTC | 219 | OUT | |
2025-01-10 11:06:23 UTC | 1905 | IN | |
2025-01-10 11:06:23 UTC | 14479 | IN | |
2025-01-10 11:06:23 UTC | 16384 | IN | |
2025-01-10 11:06:23 UTC | 3768 | IN | |
2025-01-10 11:06:23 UTC | 495 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49738 | 104.21.64.1 | 443 | 4504 | C:\Users\user\AppData\Local\Temp\19152\Appliance.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 11:06:23 UTC | 263 | OUT | |
2025-01-10 11:06:23 UTC | 8 | OUT | |
2025-01-10 11:06:24 UTC | 1123 | IN | |
2025-01-10 11:06:24 UTC | 7 | IN | |
2025-01-10 11:06:24 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49739 | 104.21.64.1 | 443 | 4504 | C:\Users\user\AppData\Local\Temp\19152\Appliance.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 11:06:24 UTC | 264 | OUT | |
2025-01-10 11:06:24 UTC | 86 | OUT | |
2025-01-10 11:06:25 UTC | 1121 | IN | |
2025-01-10 11:06:25 UTC | 248 | IN | |
2025-01-10 11:06:25 UTC | 890 | IN | |
2025-01-10 11:06:25 UTC | 1369 | IN | |
2025-01-10 11:06:25 UTC | 1369 | IN | |
2025-01-10 11:06:25 UTC | 1369 | IN | |
2025-01-10 11:06:25 UTC | 1369 | IN | |
2025-01-10 11:06:25 UTC | 1369 | IN | |
2025-01-10 11:06:25 UTC | 1369 | IN | |
2025-01-10 11:06:25 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49740 | 104.21.64.1 | 443 | 4504 | C:\Users\user\AppData\Local\Temp\19152\Appliance.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 11:06:25 UTC | 281 | OUT | |
2025-01-10 11:06:25 UTC | 15331 | OUT | |
2025-01-10 11:06:25 UTC | 2833 | OUT | |
2025-01-10 11:06:26 UTC | 1131 | IN | |
2025-01-10 11:06:26 UTC | 20 | IN | |
2025-01-10 11:06:26 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49741 | 104.21.64.1 | 443 | 4504 | C:\Users\user\AppData\Local\Temp\19152\Appliance.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 11:06:27 UTC | 275 | OUT | |
2025-01-10 11:06:27 UTC | 8755 | OUT | |
2025-01-10 11:06:27 UTC | 1121 | IN | |
2025-01-10 11:06:27 UTC | 20 | IN | |
2025-01-10 11:06:27 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49742 | 104.21.64.1 | 443 | 4504 | C:\Users\user\AppData\Local\Temp\19152\Appliance.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 11:06:28 UTC | 280 | OUT | |
2025-01-10 11:06:28 UTC | 15331 | OUT | |
2025-01-10 11:06:28 UTC | 5101 | OUT | |
2025-01-10 11:06:28 UTC | 1127 | IN | |
2025-01-10 11:06:28 UTC | 20 | IN | |
2025-01-10 11:06:28 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49743 | 104.21.64.1 | 443 | 4504 | C:\Users\user\AppData\Local\Temp\19152\Appliance.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 11:06:29 UTC | 282 | OUT | |
2025-01-10 11:06:29 UTC | 1290 | OUT | |
2025-01-10 11:06:30 UTC | 1128 | IN | |
2025-01-10 11:06:30 UTC | 20 | IN | |
2025-01-10 11:06:30 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49744 | 104.21.64.1 | 443 | 4504 | C:\Users\user\AppData\Local\Temp\19152\Appliance.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 11:06:30 UTC | 280 | OUT | |
2025-01-10 11:06:30 UTC | 1135 | OUT | |
2025-01-10 11:06:31 UTC | 1125 | IN | |
2025-01-10 11:06:31 UTC | 20 | IN | |
2025-01-10 11:06:31 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.4 | 49745 | 104.21.64.1 | 443 | 4504 | C:\Users\user\AppData\Local\Temp\19152\Appliance.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 11:06:32 UTC | 265 | OUT | |
2025-01-10 11:06:32 UTC | 121 | OUT | |
2025-01-10 11:06:32 UTC | 1132 | IN | |
2025-01-10 11:06:32 UTC | 54 | IN | |
2025-01-10 11:06:32 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 06:05:53 |
Start date: | 10/01/2025 |
Path: | C:\Users\user\Desktop\HouseholdsClicking.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'051'945 bytes |
MD5 hash: | C3C0FBE6393929C60E63885BAB2603F6 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 06:05:54 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 06:05:54 |
Start date: | 10/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 06:05:57 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xde0000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 06:05:57 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 06:05:57 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xde0000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 06:05:57 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x470000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 06:05:58 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 06:05:59 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x470000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 9 |
Start time: | 06:05:59 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 10 |
Start time: | 06:05:59 |
Start date: | 10/01/2025 |
Path: | C:\Users\user\AppData\Local\Temp\19152\Appliance.com |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xdc0000 |
File size: | 947'288 bytes |
MD5 hash: | 62D09F076E6E0240548C2F837536A46A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Antivirus matches: |
|
Has exited: | true |
Target ID: | 11 |
Start time: | 06:05:59 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\choice.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x780000 |
File size: | 28'160 bytes |
MD5 hash: | FCE0E41C87DC4ABBE976998AD26C27E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Execution Graph
Execution Coverage: | 17.5% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 21% |
Total number of Nodes: | 1482 |
Total number of Limit Nodes: | 25 |
Graph
Function 004050F9 Relevance: 66.8, APIs: 36, Strings: 2, Instructions: 295windowclipboardmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004038AF Relevance: 52.8, APIs: 22, Strings: 8, Instructions: 304filestringcomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004015A0 Relevance: 56.4, APIs: 15, Strings: 17, Instructions: 351sleepfilewindowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405958 Relevance: 45.7, APIs: 15, Strings: 11, Instructions: 233stringregistrylibraryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401A1F Relevance: 22.9, APIs: 5, Strings: 8, Instructions: 185stringtimeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040337F Relevance: 19.4, APIs: 6, Strings: 5, Instructions: 175fileCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040139D Relevance: 3.0, APIs: 2, Instructions: 42windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E7C Relevance: 3.0, APIs: 2, Instructions: 15fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E5C Relevance: 3.0, APIs: 2, Instructions: 9COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403336 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004037F8 Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DDB Relevance: 1.5, APIs: 1, Instructions: 9windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403368 Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DC4 Relevance: 1.5, APIs: 1, Instructions: 6windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DB1 Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004049A8 Relevance: 65.2, APIs: 33, Strings: 4, Instructions: 470windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406CC7 Relevance: 31.7, APIs: 9, Strings: 9, Instructions: 190filestringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004044D1 Relevance: 30.0, APIs: 15, Strings: 2, Instructions: 300stringkeyboardCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406EFE Relevance: 30.0, APIs: 14, Strings: 3, Instructions: 270filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406831 Relevance: 21.2, APIs: 8, Strings: 4, Instructions: 212stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004079A2 Relevance: .3, Instructions: 347COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040737E Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004063D8 Relevance: 70.3, APIs: 29, Strings: 11, Instructions: 256libraryloadermemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004040E4 Relevance: 40.5, APIs: 20, Strings: 3, Instructions: 210windowstringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406AC5 Relevance: 35.2, APIs: 15, Strings: 5, Instructions: 163filestringmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402880 Relevance: 17.6, APIs: 4, Strings: 6, Instructions: 131registrystringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406113 Relevance: 15.8, APIs: 7, Strings: 2, Instructions: 72filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E55 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 103memoryfileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004023F0 Relevance: 12.3, APIs: 3, Strings: 4, Instructions: 83libraryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DF6 Relevance: 12.1, APIs: 8, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402238 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 59synchronizationCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040487A Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040324C Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 40timeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004022FD Relevance: 7.6, APIs: 5, Instructions: 56memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040209F Relevance: 7.5, APIs: 5, Instructions: 39windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401F80 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowtimeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004043D9 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 73stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004027E3 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 60registryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402665 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 56stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406250 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 53stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004020F9 Relevance: 6.0, APIs: 4, Instructions: 45COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407224 Relevance: 6.0, APIs: 3, Strings: 1, Instructions: 43stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004032D2 Relevance: 6.0, APIs: 4, Instructions: 33COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406391 Relevance: 6.0, APIs: 4, Instructions: 31memorylibraryloaderCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004048F8 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 58windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402797 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 25stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C6B Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 24processCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062CF Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 13stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405DE2 Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 3.3% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 3.6% |
Total number of Nodes: | 2000 |
Total number of Limit Nodes: | 55 |
Graph
Function 00DC5FC8 Relevance: 21.2, APIs: 9, Strings: 3, Instructions: 236libraryloaderCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DC338B Relevance: 21.1, APIs: 8, Strings: 4, Instructions: 148windowCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2DC54 Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 91fileCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2DD87 Relevance: 6.1, APIs: 4, Instructions: 86processCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DDFFE0 Relevance: 3.1, APIs: 2, Instructions: 94nativeCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DC370F Relevance: 19.4, APIs: 8, Strings: 3, Instructions: 145windowtimeregistryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DC3624 Relevance: 19.3, APIs: 7, Strings: 4, Instructions: 53windowregistryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E009DB Relevance: 17.8, APIs: 9, Strings: 1, Instructions: 272COMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DC52A7 Relevance: 17.7, APIs: 6, Strings: 4, Instructions: 201registryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DC34D3 Relevance: 17.6, APIs: 7, Strings: 3, Instructions: 63windowregistryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E40FB8 Relevance: 16.0, APIs: 8, Strings: 1, Instructions: 207networkfileCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DC2793 Relevance: 14.2, APIs: 3, Strings: 5, Instructions: 153comCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DC61A9 Relevance: 8.9, APIs: 2, Strings: 3, Instructions: 122windowCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DF8A2E Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 61COMMONLIBRARYCODE
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DC58CB Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 58registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E489B6 Relevance: 4.9, APIs: 3, Instructions: 430COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E49AF3 Relevance: 4.7, APIs: 3, Instructions: 233COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DC396B Relevance: 3.1, APIs: 2, Instructions: 77windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DC331B Relevance: 3.0, APIs: 2, Instructions: 30COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DCCAB0 Relevance: 2.1, APIs: 1, Instructions: 587COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E47AF9 Relevance: 1.8, APIs: 1, Instructions: 326COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DEF106 Relevance: 1.7, APIs: 1, Instructions: 151COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2FCB5 Relevance: 1.6, APIs: 1, Instructions: 136COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DC6679 Relevance: 1.6, APIs: 1, Instructions: 65libraryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DF8782 Relevance: 1.6, APIs: 1, Instructions: 54COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DEE972 Relevance: 1.5, APIs: 1, Instructions: 46COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DCB329 Relevance: 1.5, APIs: 1, Instructions: 43COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E3F94A Relevance: 1.5, APIs: 1, Instructions: 43COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DF4FF0 Relevance: 1.5, APIs: 1, Instructions: 39memoryCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DF3B93 Relevance: 1.5, APIs: 1, Instructions: 32memoryCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DC66E7 Relevance: 1.5, APIs: 1, Instructions: 28COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DC684A Relevance: 1.5, APIs: 1, Instructions: 26COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DC3907 Relevance: 1.5, APIs: 1, Instructions: 24windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DC3A57 Relevance: 1.5, APIs: 1, Instructions: 23COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2EAB0 Relevance: 1.5, APIs: 1, Instructions: 10COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E3664C Relevance: 1.3, APIs: 1, Instructions: 31COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E373D4 Relevance: 21.4, APIs: 7, Strings: 5, Instructions: 363timefileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E3A087 Relevance: 21.1, APIs: 11, Strings: 1, Instructions: 118fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E34763 Relevance: 19.4, APIs: 8, Strings: 3, Instructions: 101fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E3A1E2 Relevance: 17.6, APIs: 9, Strings: 1, Instructions: 111fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2D921 Relevance: 14.2, APIs: 7, Strings: 1, Instructions: 172fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E3F7C7 Relevance: 13.6, APIs: 9, Instructions: 102clipboardmemoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2F20D Relevance: 12.3, APIs: 3, Strings: 4, Instructions: 57shutdownCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E220AA Relevance: 9.1, APIs: 6, Instructions: 68memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E3A570 Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 119filesleepCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E526DD Relevance: 7.6, APIs: 5, Instructions: 83windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E22010 Relevance: 4.6, APIs: 3, Instructions: 68COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E341FA Relevance: 3.0, APIs: 2, Instructions: 33windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E21A0B Relevance: 3.0, APIs: 2, Instructions: 24COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DE0D45 Relevance: 1.5, APIs: 1, Instructions: 3COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E4353B Relevance: 77.5, APIs: 40, Strings: 4, Instructions: 486filecommemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DC1625 Relevance: 53.0, APIs: 26, Strings: 4, Instructions: 480windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E4316E Relevance: 45.8, APIs: 22, Strings: 4, Instructions: 330windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DC2521 Relevance: 42.3, APIs: 18, Strings: 6, Instructions: 282windowtimeCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E51A8F Relevance: 37.0, APIs: 18, Strings: 3, Instructions: 284windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E50CDD Relevance: 35.4, APIs: 7, Strings: 13, Instructions: 391windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E4CE17 Relevance: 30.2, APIs: 11, Strings: 6, Instructions: 495registryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E513BA Relevance: 30.1, APIs: 6, Strings: 11, Instructions: 372windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E58D97 Relevance: 29.9, APIs: 14, Strings: 3, Instructions: 196windowlibraryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E4086B Relevance: 27.1, APIs: 18, Instructions: 128COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E59B7A Relevance: 26.4, APIs: 10, Strings: 5, Instructions: 181windowfileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E44A46 Relevance: 23.2, APIs: 11, Strings: 2, Instructions: 478libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DC381F Relevance: 23.0, APIs: 12, Strings: 1, Instructions: 214windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E57711 Relevance: 22.9, APIs: 11, Strings: 2, Instructions: 194windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DC146D Relevance: 22.9, APIs: 12, Strings: 1, Instructions: 168timeCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E3CEBB Relevance: 22.9, APIs: 12, Strings: 1, Instructions: 143networkCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E4C06E Relevance: 21.3, APIs: 10, Strings: 2, Instructions: 285registrylibraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E5A94F Relevance: 21.3, APIs: 10, Strings: 2, Instructions: 271windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E5976A Relevance: 21.2, APIs: 10, Strings: 2, Instructions: 221windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E42FB9 Relevance: 21.2, APIs: 11, Strings: 1, Instructions: 169windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2C8F7 Relevance: 19.4, APIs: 10, Strings: 1, Instructions: 190windowsleepCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E4D694 Relevance: 19.4, APIs: 9, Strings: 2, Instructions: 104registryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2EFC7 Relevance: 19.3, APIs: 10, Strings: 1, Instructions: 72sleepwindowtimeCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2662D Relevance: 18.2, APIs: 12, Instructions: 173COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DC2128 Relevance: 18.1, APIs: 12, Instructions: 137COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DC13A6 Relevance: 17.7, APIs: 9, Strings: 1, Instructions: 155windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E5955E Relevance: 17.6, APIs: 6, Strings: 4, Instructions: 149windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2A05C Relevance: 17.6, APIs: 5, Strings: 5, Instructions: 137windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E20FCF Relevance: 17.6, APIs: 7, Strings: 3, Instructions: 127registryshareCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E54A34 Relevance: 17.6, APIs: 9, Strings: 1, Instructions: 101windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2D11F Relevance: 17.6, APIs: 2, Strings: 8, Instructions: 81windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E4468D Relevance: 16.8, APIs: 11, Instructions: 344fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E384DB Relevance: 16.8, APIs: 11, Instructions: 298comCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E44189 Relevance: 15.9, APIs: 6, Strings: 3, Instructions: 187comCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E38BDA Relevance: 15.9, APIs: 8, Strings: 1, Instructions: 186timeCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E546E2 Relevance: 15.9, APIs: 7, Strings: 2, Instructions: 101windowCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2282C Relevance: 15.8, APIs: 7, Strings: 2, Instructions: 78windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2290D Relevance: 15.8, APIs: 7, Strings: 2, Instructions: 77windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DC2AB0 Relevance: 14.3, APIs: 7, Strings: 1, Instructions: 332comCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E588F9 Relevance: 14.2, APIs: 7, Strings: 1, Instructions: 193windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DC7447 Relevance: 14.2, APIs: 7, Strings: 1, Instructions: 184windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E3CC98 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 94networkCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2A215 Relevance: 14.1, APIs: 3, Strings: 5, Instructions: 74windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E229EC Relevance: 14.1, APIs: 3, Strings: 5, Instructions: 71windowCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DC7567 Relevance: 13.8, APIs: 9, Instructions: 291COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DFD210 Relevance: 13.7, APIs: 9, Instructions: 209COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E22EEF Relevance: 13.6, APIs: 9, Instructions: 60sleepkeyboardwindowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2CE7B Relevance: 12.4, APIs: 4, Strings: 3, Instructions: 191windowCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E54322 Relevance: 12.4, APIs: 6, Strings: 1, Instructions: 141windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2C625 Relevance: 12.4, APIs: 5, Strings: 2, Instructions: 137windowCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2E73E Relevance: 12.3, APIs: 6, Strings: 1, Instructions: 70networkCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2F630 Relevance: 12.1, APIs: 8, Instructions: 137timeCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E5379F Relevance: 12.1, APIs: 8, Instructions: 95windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E018A2 Relevance: 10.8, APIs: 7, Instructions: 268COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E31B46 Relevance: 10.8, APIs: 7, Instructions: 254COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DF57A1 Relevance: 10.7, APIs: 7, Instructions: 152fileCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2D7AB Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 108filestringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E342B9 Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 101windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E53899 Relevance: 10.6, APIs: 7, Instructions: 99windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2808D Relevance: 10.6, APIs: 7, Instructions: 94memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E28164 Relevance: 10.6, APIs: 7, Instructions: 89memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E30E79 Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 80pipeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E30F4E Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 80pipeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E54B4B Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 75windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2E30E Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 46windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E31312 Relevance: 10.5, APIs: 7, Instructions: 35synchronizationthreadCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DF0527 Relevance: 9.3, APIs: 6, Instructions: 269COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DF6571 Relevance: 9.2, APIs: 6, Instructions: 216COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2009D Relevance: 9.2, APIs: 6, Instructions: 183memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E31196 Relevance: 9.1, APIs: 6, Instructions: 107fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E58C36 Relevance: 9.1, APIs: 6, Instructions: 104windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E42D37 Relevance: 9.1, APIs: 6, Instructions: 103COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E255E1 Relevance: 9.1, APIs: 6, Instructions: 87windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E59480 Relevance: 9.0, APIs: 6, Instructions: 49COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E25B61 Relevance: 9.0, APIs: 6, Instructions: 49COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E034D6 Relevance: 9.0, APIs: 6, Instructions: 39windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E221C1 Relevance: 9.0, APIs: 6, Instructions: 23memorysynchronizationCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E27B05 Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 120comlibraryloaderCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E54818 Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 101windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2272F Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 93windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E539B3 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 78windowlibraryCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E59A25 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 78windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DE50DD Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 38libraryloaderCOMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E1E778 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 27libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DC663E Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 24libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DC6607 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 22libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E33306 Relevance: 7.8, APIs: 5, Instructions: 313fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E4ADE7 Relevance: 7.8, APIs: 5, Instructions: 256COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E29517 Relevance: 7.7, APIs: 5, Instructions: 159COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E39540 Relevance: 7.6, APIs: 5, Instructions: 143COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E575AE Relevance: 7.6, APIs: 5, Instructions: 131windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E561A5 Relevance: 7.6, APIs: 5, Instructions: 82windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E4138D Relevance: 7.6, APIs: 5, Instructions: 69COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DFD13D Relevance: 7.6, APIs: 5, Instructions: 68COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E208FE Relevance: 7.5, APIs: 5, Instructions: 47stringCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2F292 Relevance: 7.5, APIs: 5, Instructions: 47sleepCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E21A45 Relevance: 7.5, APIs: 5, Instructions: 46memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E21960 Relevance: 7.5, APIs: 5, Instructions: 43memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E21900 Relevance: 7.5, APIs: 5, Instructions: 43memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E30CB6 Relevance: 7.5, APIs: 6, Instructions: 41COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DF2610 Relevance: 7.5, APIs: 5, Instructions: 30COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DF12B7 Relevance: 7.4, APIs: 2, Strings: 2, Instructions: 389COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E23063 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 121windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2CB28 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 114windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E43AAB Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 90networkCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E54954 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 89windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E550F1 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 87windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E54253 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E54C89 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 67windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2389E Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 67windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E56321 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 47windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E5823D Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 41windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E58BCD Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 40processCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2096F Relevance: 6.3, APIs: 4, Instructions: 322COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DF41F3 Relevance: 6.3, APIs: 4, Instructions: 305COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E20D26 Relevance: 6.2, APIs: 4, Instructions: 230COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E56CB0 Relevance: 6.1, APIs: 4, Instructions: 138COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DFB79F Relevance: 6.1, APIs: 4, Instructions: 133COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E3611E Relevance: 6.1, APIs: 4, Instructions: 110fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E580AE Relevance: 6.1, APIs: 4, Instructions: 102windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E52176 Relevance: 6.1, APIs: 4, Instructions: 101COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2E8AC Relevance: 6.1, APIs: 4, Instructions: 87COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2DB6C Relevance: 6.1, APIs: 4, Instructions: 78COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E5321E Relevance: 6.1, APIs: 4, Instructions: 75COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2825C Relevance: 6.1, APIs: 3, Strings: 1, Instructions: 71stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E560FF Relevance: 6.1, APIs: 4, Instructions: 67windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DF2079 Relevance: 6.1, APIs: 4, Instructions: 63COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E22374 Relevance: 6.1, APIs: 4, Instructions: 56windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2EAED Relevance: 6.1, APIs: 4, Instructions: 55synchronizationthreadwindowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DED53C Relevance: 6.1, APIs: 4, Instructions: 55threadCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DC7873 Relevance: 6.1, APIs: 4, Instructions: 53windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DF33E6 Relevance: 6.1, APIs: 4, Instructions: 52libraryCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2BA6F Relevance: 6.0, APIs: 4, Instructions: 50sleepCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E5886F Relevance: 6.0, APIs: 4, Instructions: 46COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E592BF Relevance: 6.0, APIs: 4, Instructions: 31COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DC21A0 Relevance: 6.0, APIs: 4, Instructions: 23COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E1EC36 Relevance: 6.0, APIs: 4, Instructions: 19COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E1EC4A Relevance: 6.0, APIs: 4, Instructions: 18COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E357CC Relevance: 5.5, APIs: 1, Strings: 2, Instructions: 230shareCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DDF6CA Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 144sleepCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E3DB39 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 98networkCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E54FD5 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 95windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E3D763 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 66networkCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2262B Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 52windowCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E22525 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 50windowCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E225A9 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 49windowCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E226B5 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 46windowCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E59AFD Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 44windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E21461 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 28windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E52DF2 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 15windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E52DBE Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 15windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|