Windows
Analysis Report
176.113.115.170.ps1
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- powershell.exe (PID: 7696 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -noLogo -E xecutionPo licy unres tricted -f ile "C:\Us ers\user\D esktop\176 .113.115.1 70.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7704 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - RegSvcs.exe (PID: 7876 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\Reg Svcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["nuttyshopr.biz", "spookycappy.biz", "marketlumpe.biz", "punishzement.biz", "grandiouseziu.biz", "fraggielek.biz", "truculengisau.biz", "littlenotii.biz"], "Build id": "atxOT1--noviy2"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source: | Author: frack113: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-12T09:13:02.022134+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49730 | 104.102.49.254 | 443 | TCP |
2025-01-12T09:13:03.168945+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49731 | 172.67.160.193 | 443 | TCP |
2025-01-12T09:13:04.150232+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49732 | 172.67.160.193 | 443 | TCP |
2025-01-12T09:13:05.241985+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49733 | 172.67.160.193 | 443 | TCP |
2025-01-12T09:13:06.684051+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49734 | 172.67.160.193 | 443 | TCP |
2025-01-12T09:13:07.827144+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49735 | 172.67.160.193 | 443 | TCP |
2025-01-12T09:13:09.588549+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49736 | 172.67.160.193 | 443 | TCP |
2025-01-12T09:13:10.764737+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49737 | 172.67.160.193 | 443 | TCP |
2025-01-12T09:13:13.854856+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49738 | 172.67.160.193 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-12T09:13:03.645814+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49731 | 172.67.160.193 | 443 | TCP |
2025-01-12T09:13:04.600731+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49732 | 172.67.160.193 | 443 | TCP |
2025-01-12T09:13:14.615899+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49738 | 172.67.160.193 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-12T09:13:03.645814+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49731 | 172.67.160.193 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-12T09:13:04.600731+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.4 | 49732 | 172.67.160.193 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-12T09:13:07.273263+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49734 | 172.67.160.193 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-12T09:13:10.768561+0100 | 2843864 | 1 | A Network Trojan was detected | 192.168.2.4 | 49737 | 172.67.160.193 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-12T09:13:02.570846+0100 | 2858666 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49730 | 104.102.49.254 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | Integrated Neural Analysis Model: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Code function: | 2_2_004182C0 | |
Source: | Code function: | 2_2_00415D15 | |
Source: | Code function: | 2_2_00418404 |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Binary string: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Code function: | 2_2_00427A50 | |
Source: | Code function: | 2_2_0040BA29 | |
Source: | Code function: | 2_2_0040CB44 | |
Source: | Code function: | 2_2_0042D420 | |
Source: | Code function: | 2_2_00423E44 | |
Source: | Code function: | 2_2_00408740 | |
Source: | Code function: | 2_2_00429871 | |
Source: | Code function: | 2_2_0042E002 | |
Source: | Code function: | 2_2_0042E002 | |
Source: | Code function: | 2_2_0042A810 | |
Source: | Code function: | 2_2_004288BA | |
Source: | Code function: | 2_2_00402940 | |
Source: | Code function: | 2_2_0040A910 | |
Source: | Code function: | 2_2_004161DF | |
Source: | Code function: | 2_2_004251E8 | |
Source: | Code function: | 2_2_00426A00 | |
Source: | Code function: | 2_2_00438AF0 | |
Source: | Code function: | 2_2_0041AA90 | |
Source: | Code function: | 2_2_0041AA90 | |
Source: | Code function: | 2_2_004082A0 | |
Source: | Code function: | 2_2_0043EB00 | |
Source: | Code function: | 2_2_00420B10 | |
Source: | Code function: | 2_2_00440310 | |
Source: | Code function: | 2_2_004273A0 | |
Source: | Code function: | 2_2_004273A0 | |
Source: | Code function: | 2_2_004273A0 | |
Source: | Code function: | 2_2_0041DC40 | |
Source: | Code function: | 2_2_00417451 | |
Source: | Code function: | 2_2_00407400 | |
Source: | Code function: | 2_2_00407400 | |
Source: | Code function: | 2_2_0043C410 | |
Source: | Code function: | 2_2_0043C410 | |
Source: | Code function: | 2_2_00415C25 | |
Source: | Code function: | 2_2_0042B430 | |
Source: | Code function: | 2_2_00408CD0 | |
Source: | Code function: | 2_2_00426D70 | |
Source: | Code function: | 2_2_0042DD30 | |
Source: | Code function: | 2_2_0042E5C2 | |
Source: | Code function: | 2_2_004165EE | |
Source: | Code function: | 2_2_00415590 | |
Source: | Code function: | 2_2_004095A0 | |
Source: | Code function: | 2_2_00415E42 | |
Source: | Code function: | 2_2_00413E50 | |
Source: | Code function: | 2_2_0040DE72 | |
Source: | Code function: | 2_2_00425E00 | |
Source: | Code function: | 2_2_00425E00 | |
Source: | Code function: | 2_2_0043EE10 | |
Source: | Code function: | 2_2_00408EB0 | |
Source: | Code function: | 2_2_0041DEB0 | |
Source: | Code function: | 2_2_0041F710 | |
Source: | Code function: | 2_2_0041F710 | |
Source: | Code function: | 2_2_004427E0 | |
Source: | Code function: | 2_2_0042E7EB | |
Source: | Code function: | 2_2_0040DFEA | |
Source: | Code function: | 2_2_0042F799 | |
Source: | Code function: | 2_2_0042DFAF |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 2_2_004363E0 |
Source: | Code function: | 2_2_004363E0 |
Source: | Code function: | 2_2_00436590 |
Source: | Window created: | Jump to behavior |
Source: | Code function: | 0_2_00007FFD9BAC5190 | |
Source: | Code function: | 0_2_00007FFD9BACA5D9 | |
Source: | Code function: | 2_2_00415975 | |
Source: | Code function: | 2_2_00427A50 | |
Source: | Code function: | 2_2_00440A0D | |
Source: | Code function: | 2_2_00420440 | |
Source: | Code function: | 2_2_00410446 | |
Source: | Code function: | 2_2_00442460 | |
Source: | Code function: | 2_2_00442DE0 | |
Source: | Code function: | 2_2_00423E44 | |
Source: | Code function: | 2_2_0040AE60 | |
Source: | Code function: | 2_2_0042DEE5 | |
Source: | Code function: | 2_2_0040D690 | |
Source: | Code function: | 2_2_00408740 | |
Source: | Code function: | 2_2_0043B7B0 | |
Source: | Code function: | 2_2_00430050 | |
Source: | Code function: | 2_2_00411078 | |
Source: | Code function: | 2_2_0042A810 | |
Source: | Code function: | 2_2_00433810 | |
Source: | Code function: | 2_2_004270D0 | |
Source: | Code function: | 2_2_004058E0 | |
Source: | Code function: | 2_2_0042D893 | |
Source: | Code function: | 2_2_004148B0 | |
Source: | Code function: | 2_2_004288BA | |
Source: | Code function: | 2_2_00436140 | |
Source: | Code function: | 2_2_0040A910 | |
Source: | Code function: | 2_2_00441910 | |
Source: | Code function: | 2_2_00403920 | |
Source: | Code function: | 2_2_0043912C | |
Source: | Code function: | 2_2_004091C0 | |
Source: | Code function: | 2_2_004161DF | |
Source: | Code function: | 2_2_004311E6 | |
Source: | Code function: | 2_2_00432188 | |
Source: | Code function: | 2_2_00406190 | |
Source: | Code function: | 2_2_0042F195 | |
Source: | Code function: | 2_2_004421B0 | |
Source: | Code function: | 2_2_0041E250 | |
Source: | Code function: | 2_2_00441A56 | |
Source: | Code function: | 2_2_0041B200 | |
Source: | Code function: | 2_2_004042D0 | |
Source: | Code function: | 2_2_0041BAD0 | |
Source: | Code function: | 2_2_00433AD0 | |
Source: | Code function: | 2_2_00431A88 | |
Source: | Code function: | 2_2_00441A94 | |
Source: | Code function: | 2_2_0041AA90 | |
Source: | Code function: | 2_2_00442A90 | |
Source: | Code function: | 2_2_004082A0 | |
Source: | Code function: | 2_2_0041CAA0 | |
Source: | Code function: | 2_2_0043CAA7 | |
Source: | Code function: | 2_2_004412B1 | |
Source: | Code function: | 2_2_00441B40 | |
Source: | Code function: | 2_2_0041C370 | |
Source: | Code function: | 2_2_00420B10 | |
Source: | Code function: | 2_2_00402B20 | |
Source: | Code function: | 2_2_00411B20 | |
Source: | Code function: | 2_2_0042ABC0 | |
Source: | Code function: | 2_2_00441BD0 | |
Source: | Code function: | 2_2_004273A0 | |
Source: | Code function: | 2_2_0043AC40 | |
Source: | Code function: | 2_2_00417451 | |
Source: | Code function: | 2_2_00441C60 | |
Source: | Code function: | 2_2_00419470 | |
Source: | Code function: | 2_2_00407400 | |
Source: | Code function: | 2_2_00404C00 | |
Source: | Code function: | 2_2_0043C410 | |
Source: | Code function: | 2_2_0042ECD0 | |
Source: | Code function: | 2_2_00439CD8 | |
Source: | Code function: | 2_2_00440CD8 | |
Source: | Code function: | 2_2_00414C9C | |
Source: | Code function: | 2_2_0042CCA0 | |
Source: | Code function: | 2_2_0040E4B0 | |
Source: | Code function: | 2_2_00426D70 | |
Source: | Code function: | 2_2_00428D76 | |
Source: | Code function: | 2_2_00422D17 | |
Source: | Code function: | 2_2_004245C0 | |
Source: | Code function: | 2_2_004165EE | |
Source: | Code function: | 2_2_00415590 | |
Source: | Code function: | 2_2_004095A0 | |
Source: | Code function: | 2_2_00415E42 | |
Source: | Code function: | 2_2_00413E50 | |
Source: | Code function: | 2_2_0041BE00 | |
Source: | Code function: | 2_2_00406620 | |
Source: | Code function: | 2_2_00402EF0 | |
Source: | Code function: | 2_2_0043EE80 | |
Source: | Code function: | 2_2_0043AEA0 | |
Source: | Code function: | 2_2_0043974A | |
Source: | Code function: | 2_2_00419710 | |
Source: | Code function: | 2_2_0041F710 | |
Source: | Code function: | 2_2_0041C7D0 | |
Source: | Code function: | 2_2_004427E0 | |
Source: | Code function: | 2_2_00427F8D |
Source: | Classification label: |
Source: | Code function: | 2_2_0043B7B0 |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Binary string: |
Source: | Code function: | 0_2_00007FFD9BAC5411 | |
Source: | Code function: | 0_2_00007FFD9BAC4C0D | |
Source: | Code function: | 0_2_00007FFD9BAC2852 | |
Source: | Code function: | 2_2_00441864 | |
Source: | Code function: | 2_2_0043A6FE |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 2_2_004402D0 |
Source: | Process token adjusted: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 211 Process Injection | 121 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 111 Security Software Discovery | Remote Services | 1 Screen Capture | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 211 Process Injection | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | 1 Archive Collected Data | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 11 Deobfuscate/Decode Files or Information | Security Account Manager | 121 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | 41 Data from Local System | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 3 Obfuscated Files or Information | NTDS | 1 Application Window Discovery | Distributed Component Object Model | 3 Clipboard Data | 114 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 12 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | Steganography | Cached Domain Credentials | 22 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
7% | Virustotal | Browse | ||
8% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
steamcommunity.com | 104.102.49.254 | true | false | high | |
misha-lomonosov.com | 172.67.160.193 | true | true | unknown | |
littlenotii.biz | unknown | unknown | true | unknown | |
fraggielek.biz | unknown | unknown | true | unknown | |
nuttyshopr.biz | unknown | unknown | true | unknown | |
grandiouseziu.biz | unknown | unknown | true | unknown | |
marketlumpe.biz | unknown | unknown | true | unknown | |
spookycappy.biz | unknown | unknown | true | unknown | |
truculengisau.biz | unknown | unknown | true | unknown | |
punishzement.biz | unknown | unknown | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
false | high | ||
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
172.67.160.193 | misha-lomonosov.com | United States | 13335 | CLOUDFLARENETUS | true | |
104.102.49.254 | steamcommunity.com | United States | 16625 | AKAMAI-ASUS | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1589406 |
Start date and time: | 2025-01-12 09:12:07 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 0s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 176.113.115.170.ps1 |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winPS1@4/5@10/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 52.149.20.212, 13.107.246.45
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target powershell.exe, PID 7696 because it is empty
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
03:12:59 | API Interceptor | |
03:13:00 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.102.49.254 | Get hash | malicious | Socks5Systemz | Browse |
| |
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
steamcommunity.com | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Python Stealer, Exela Stealer, Xmrig | Browse |
| ||
Get hash | malicious | Blank Grabber, Umbral Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
AKAMAI-ASUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Download File
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 64 |
Entropy (8bit): | 1.1940658735648508 |
Encrypted: | false |
SSDEEP: | 3:Nlllulbnolz:NllUc |
MD5: | F23953D4A58E404FCB67ADD0C45EB27A |
SHA1: | 2D75B5CACF2916C66E440F19F6B3B21DFD289340 |
SHA-256: | 16F994BFB26D529E4C28ED21C6EE36D4AFEAE01CEEB1601E85E0E7FDFF4EFA8B |
SHA-512: | B90BFEC26910A590A367E8356A20F32A65DB41C6C62D79CA0DDCC8D95C14EB48138DEC6B992A6E5C7B35CFF643063012462DA3E747B2AA15721FE2ECCE02C044 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
Download File
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6221 |
Entropy (8bit): | 3.730735018874753 |
Encrypted: | false |
SSDEEP: | 96:x3M+33CxHjeMkvhkvCCtek3EO6QjHMp3EO6QjHMS:x3M+yDeI33E1z3E10 |
MD5: | D4DC90E74B6FC4102D31D804D4C03217 |
SHA1: | 0A13C86AED78B3798EA1F583FC49307C15659041 |
SHA-256: | 8FC7C1012DE1A63D5DA1A5F301CE79037D684C3D95F381276D636E5C75BCCB71 |
SHA-512: | 7006B3DFF75870DF9A00D1ABE3EE76E2E94231985D441580B89132BFFAC27EAAC7C01A7A53BB4479B128041C4670B9306B483B94C75C8EF0AC117D6DAED00E9D |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\V5QNO79839W50I0YSWE4.temp
Download File
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6221 |
Entropy (8bit): | 3.730735018874753 |
Encrypted: | false |
SSDEEP: | 96:x3M+33CxHjeMkvhkvCCtek3EO6QjHMp3EO6QjHMS:x3M+yDeI33E1z3E10 |
MD5: | D4DC90E74B6FC4102D31D804D4C03217 |
SHA1: | 0A13C86AED78B3798EA1F583FC49307C15659041 |
SHA-256: | 8FC7C1012DE1A63D5DA1A5F301CE79037D684C3D95F381276D636E5C75BCCB71 |
SHA-512: | 7006B3DFF75870DF9A00D1ABE3EE76E2E94231985D441580B89132BFFAC27EAAC7C01A7A53BB4479B128041C4670B9306B483B94C75C8EF0AC117D6DAED00E9D |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 5.486554505856197 |
TrID: | |
File name: | 176.113.115.170.ps1 |
File size: | 538'493 bytes |
MD5: | 88520295d17f287fd127830bb766712a |
SHA1: | df16145f1bff600147977f6acd4f931f204bf554 |
SHA256: | 3e376b0722ed209898a1b3a93a6988c4ad2f6e35083c07dc9e486e3da55c88ed |
SHA512: | 26993dbe1d417c01f68b687d8f6dbe02977b698215f2e63d1dc5a2f6c80cb18cf5912f593ad988f24953ee8732ddb15d5e65f7dc0412e93a9242028762a7e640 |
SSDEEP: | 6144:hkYzSm2MYa1Qdgzkqs5u0uXrRMnfB3sBVy8ZK5HKceYWQLJgvF/9EoQ6GsbwMI5g:srSZ2h7dVI42CoeUJ2z6m20QFqwg2 |
TLSH: | 27B47D3140137C5E3BAA2ECE64006EC00C5939A7BB54D150AE899276F2BE53B5F6D9FC |
File Content Preview: | .. $t0='IQIQQIIQIQQEX'.replace('IQIQQ','');sal GG $t0;....$OE="qQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDANfKUWcAAAAAAA |
Icon Hash: | 3270d6baae77db44 |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-12T09:13:02.022134+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49730 | 104.102.49.254 | 443 | TCP |
2025-01-12T09:13:02.570846+0100 | 2858666 | ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup | 1 | 192.168.2.4 | 49730 | 104.102.49.254 | 443 | TCP |
2025-01-12T09:13:03.168945+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49731 | 172.67.160.193 | 443 | TCP |
2025-01-12T09:13:03.645814+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49731 | 172.67.160.193 | 443 | TCP |
2025-01-12T09:13:03.645814+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49731 | 172.67.160.193 | 443 | TCP |
2025-01-12T09:13:04.150232+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49732 | 172.67.160.193 | 443 | TCP |
2025-01-12T09:13:04.600731+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.4 | 49732 | 172.67.160.193 | 443 | TCP |
2025-01-12T09:13:04.600731+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49732 | 172.67.160.193 | 443 | TCP |
2025-01-12T09:13:05.241985+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49733 | 172.67.160.193 | 443 | TCP |
2025-01-12T09:13:06.684051+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49734 | 172.67.160.193 | 443 | TCP |
2025-01-12T09:13:07.273263+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49734 | 172.67.160.193 | 443 | TCP |
2025-01-12T09:13:07.827144+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49735 | 172.67.160.193 | 443 | TCP |
2025-01-12T09:13:09.588549+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49736 | 172.67.160.193 | 443 | TCP |
2025-01-12T09:13:10.764737+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49737 | 172.67.160.193 | 443 | TCP |
2025-01-12T09:13:10.768561+0100 | 2843864 | ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 | 1 | 192.168.2.4 | 49737 | 172.67.160.193 | 443 | TCP |
2025-01-12T09:13:13.854856+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49738 | 172.67.160.193 | 443 | TCP |
2025-01-12T09:13:14.615899+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49738 | 172.67.160.193 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 12, 2025 09:13:01.348078012 CET | 49730 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 12, 2025 09:13:01.348166943 CET | 443 | 49730 | 104.102.49.254 | 192.168.2.4 |
Jan 12, 2025 09:13:01.348253012 CET | 49730 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 12, 2025 09:13:01.351556063 CET | 49730 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 12, 2025 09:13:01.351593971 CET | 443 | 49730 | 104.102.49.254 | 192.168.2.4 |
Jan 12, 2025 09:13:02.022057056 CET | 443 | 49730 | 104.102.49.254 | 192.168.2.4 |
Jan 12, 2025 09:13:02.022134066 CET | 49730 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 12, 2025 09:13:02.025186062 CET | 49730 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 12, 2025 09:13:02.025201082 CET | 443 | 49730 | 104.102.49.254 | 192.168.2.4 |
Jan 12, 2025 09:13:02.025624037 CET | 443 | 49730 | 104.102.49.254 | 192.168.2.4 |
Jan 12, 2025 09:13:02.078149080 CET | 49730 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 12, 2025 09:13:02.126996040 CET | 49730 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 12, 2025 09:13:02.171325922 CET | 443 | 49730 | 104.102.49.254 | 192.168.2.4 |
Jan 12, 2025 09:13:02.570931911 CET | 443 | 49730 | 104.102.49.254 | 192.168.2.4 |
Jan 12, 2025 09:13:02.570991039 CET | 443 | 49730 | 104.102.49.254 | 192.168.2.4 |
Jan 12, 2025 09:13:02.571011066 CET | 443 | 49730 | 104.102.49.254 | 192.168.2.4 |
Jan 12, 2025 09:13:02.571052074 CET | 443 | 49730 | 104.102.49.254 | 192.168.2.4 |
Jan 12, 2025 09:13:02.571070910 CET | 443 | 49730 | 104.102.49.254 | 192.168.2.4 |
Jan 12, 2025 09:13:02.571063995 CET | 49730 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 12, 2025 09:13:02.571141005 CET | 443 | 49730 | 104.102.49.254 | 192.168.2.4 |
Jan 12, 2025 09:13:02.571181059 CET | 49730 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 12, 2025 09:13:02.571181059 CET | 49730 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 12, 2025 09:13:02.571181059 CET | 49730 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 12, 2025 09:13:02.571217060 CET | 49730 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 12, 2025 09:13:02.668112993 CET | 443 | 49730 | 104.102.49.254 | 192.168.2.4 |
Jan 12, 2025 09:13:02.668164015 CET | 443 | 49730 | 104.102.49.254 | 192.168.2.4 |
Jan 12, 2025 09:13:02.668190956 CET | 49730 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 12, 2025 09:13:02.668211937 CET | 443 | 49730 | 104.102.49.254 | 192.168.2.4 |
Jan 12, 2025 09:13:02.668241024 CET | 49730 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 12, 2025 09:13:02.668262959 CET | 49730 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 12, 2025 09:13:02.672724962 CET | 443 | 49730 | 104.102.49.254 | 192.168.2.4 |
Jan 12, 2025 09:13:02.672787905 CET | 49730 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 12, 2025 09:13:02.672817945 CET | 443 | 49730 | 104.102.49.254 | 192.168.2.4 |
Jan 12, 2025 09:13:02.672867060 CET | 49730 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 12, 2025 09:13:02.672882080 CET | 443 | 49730 | 104.102.49.254 | 192.168.2.4 |
Jan 12, 2025 09:13:02.672949076 CET | 443 | 49730 | 104.102.49.254 | 192.168.2.4 |
Jan 12, 2025 09:13:02.673001051 CET | 49730 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 12, 2025 09:13:02.673767090 CET | 49730 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 12, 2025 09:13:02.673799038 CET | 443 | 49730 | 104.102.49.254 | 192.168.2.4 |
Jan 12, 2025 09:13:02.674096107 CET | 49730 | 443 | 192.168.2.4 | 104.102.49.254 |
Jan 12, 2025 09:13:02.674110889 CET | 443 | 49730 | 104.102.49.254 | 192.168.2.4 |
Jan 12, 2025 09:13:02.689053059 CET | 49731 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:02.689079046 CET | 443 | 49731 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:02.689152956 CET | 49731 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:02.689402103 CET | 49731 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:02.689409971 CET | 443 | 49731 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:03.168878078 CET | 443 | 49731 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:03.168945074 CET | 49731 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:03.211414099 CET | 49731 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:03.211433887 CET | 443 | 49731 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:03.212366104 CET | 443 | 49731 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:03.222485065 CET | 49731 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:03.222512007 CET | 49731 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:03.222681999 CET | 443 | 49731 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:03.645843029 CET | 443 | 49731 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:03.646051884 CET | 443 | 49731 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:03.646100998 CET | 49731 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:03.646501064 CET | 49731 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:03.646516085 CET | 443 | 49731 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:03.646529913 CET | 49731 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:03.646533012 CET | 443 | 49731 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:03.652939081 CET | 49732 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:03.653012037 CET | 443 | 49732 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:03.653105021 CET | 49732 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:03.653340101 CET | 49732 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:03.653373003 CET | 443 | 49732 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:04.150154114 CET | 443 | 49732 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:04.150232077 CET | 49732 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:04.151474953 CET | 49732 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:04.151508093 CET | 443 | 49732 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:04.152570963 CET | 443 | 49732 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:04.153826952 CET | 49732 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:04.153883934 CET | 49732 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:04.153975010 CET | 443 | 49732 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:04.600768089 CET | 443 | 49732 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:04.600883007 CET | 443 | 49732 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:04.600943089 CET | 49732 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:04.600970984 CET | 443 | 49732 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:04.600999117 CET | 443 | 49732 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:04.601047993 CET | 49732 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:04.601089954 CET | 443 | 49732 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:04.601308107 CET | 443 | 49732 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:04.601397038 CET | 443 | 49732 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:04.601443052 CET | 49732 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:04.601473093 CET | 443 | 49732 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:04.601613998 CET | 443 | 49732 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:04.601659060 CET | 49732 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:04.601675034 CET | 443 | 49732 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:04.601716042 CET | 49732 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:04.601727962 CET | 443 | 49732 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:04.605582952 CET | 443 | 49732 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:04.606087923 CET | 49732 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:04.606106997 CET | 443 | 49732 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:04.656289101 CET | 49732 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:04.692656994 CET | 443 | 49732 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:04.692814112 CET | 443 | 49732 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:04.692862034 CET | 49732 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:04.692882061 CET | 443 | 49732 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:04.693063974 CET | 443 | 49732 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:04.693124056 CET | 49732 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:04.694058895 CET | 49732 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:04.694108963 CET | 443 | 49732 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:04.772650003 CET | 49733 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:04.772737980 CET | 443 | 49733 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:04.773010015 CET | 49733 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:04.773235083 CET | 49733 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:04.773272038 CET | 443 | 49733 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:05.241906881 CET | 443 | 49733 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:05.241985083 CET | 49733 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:05.243057966 CET | 49733 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:05.243083000 CET | 443 | 49733 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:05.243747950 CET | 443 | 49733 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:05.244698048 CET | 49733 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:05.244820118 CET | 49733 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:05.244863987 CET | 443 | 49733 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:05.244959116 CET | 49733 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:05.244971991 CET | 443 | 49733 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:06.000776052 CET | 443 | 49733 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:06.000978947 CET | 443 | 49733 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:06.001065969 CET | 49733 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:06.016761065 CET | 49733 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:06.016801119 CET | 443 | 49733 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:06.185782909 CET | 49734 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:06.185856104 CET | 443 | 49734 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:06.185913086 CET | 49734 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:06.186516047 CET | 49734 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:06.186531067 CET | 443 | 49734 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:06.683816910 CET | 443 | 49734 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:06.684051037 CET | 49734 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:06.705091000 CET | 49734 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:06.705152035 CET | 443 | 49734 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:06.706017971 CET | 443 | 49734 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:06.707240105 CET | 49734 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:06.707357883 CET | 49734 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:06.707437038 CET | 443 | 49734 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:07.273308039 CET | 443 | 49734 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:07.273523092 CET | 443 | 49734 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:07.273727894 CET | 49734 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:07.273729086 CET | 49734 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:07.334964037 CET | 49735 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:07.335052967 CET | 443 | 49735 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:07.335196018 CET | 49735 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:07.335484982 CET | 49735 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:07.335517883 CET | 443 | 49735 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:07.578280926 CET | 49734 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:07.578335047 CET | 443 | 49734 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:07.826809883 CET | 443 | 49735 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:07.827143908 CET | 49735 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:07.828294039 CET | 49735 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:07.828318119 CET | 443 | 49735 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:07.829303980 CET | 443 | 49735 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:07.830318928 CET | 49735 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:07.830451965 CET | 49735 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:07.830547094 CET | 443 | 49735 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:07.830626965 CET | 49735 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:07.830626965 CET | 49735 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:07.830645084 CET | 443 | 49735 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:07.871350050 CET | 443 | 49735 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:08.453134060 CET | 443 | 49735 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:08.453360081 CET | 443 | 49735 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:08.453476906 CET | 49735 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:08.564392090 CET | 49735 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:08.564431906 CET | 443 | 49735 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:09.111887932 CET | 49736 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:09.111926079 CET | 443 | 49736 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:09.111984968 CET | 49736 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:09.112462997 CET | 49736 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:09.112478018 CET | 443 | 49736 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:09.588372946 CET | 443 | 49736 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:09.588548899 CET | 49736 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:09.589498997 CET | 49736 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:09.589510918 CET | 443 | 49736 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:09.590543032 CET | 443 | 49736 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:09.591573000 CET | 49736 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:09.591639996 CET | 49736 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:09.591645956 CET | 443 | 49736 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:10.015868902 CET | 443 | 49736 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:10.016185999 CET | 443 | 49736 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:10.016256094 CET | 49736 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:10.016364098 CET | 49736 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:10.016386986 CET | 443 | 49736 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:10.302479029 CET | 49737 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:10.302587986 CET | 443 | 49737 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:10.302803040 CET | 49737 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:10.303004980 CET | 49737 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:10.303025007 CET | 443 | 49737 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:10.764559031 CET | 443 | 49737 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:10.764736891 CET | 49737 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:10.765813112 CET | 49737 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:10.765836000 CET | 443 | 49737 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:10.766186953 CET | 443 | 49737 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:10.767282009 CET | 49737 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:10.767926931 CET | 49737 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:10.767975092 CET | 443 | 49737 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:10.768095970 CET | 49737 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:10.768143892 CET | 443 | 49737 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:10.768270016 CET | 49737 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:10.768306971 CET | 443 | 49737 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:10.768450022 CET | 49737 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:10.768497944 CET | 443 | 49737 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:10.768649101 CET | 49737 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:10.768697023 CET | 443 | 49737 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:10.768882990 CET | 49737 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:10.768925905 CET | 443 | 49737 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:10.768942118 CET | 49737 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:10.768970013 CET | 443 | 49737 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:10.769129992 CET | 49737 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:10.769166946 CET | 443 | 49737 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:10.769207001 CET | 49737 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:10.769316912 CET | 49737 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:10.769361973 CET | 49737 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:10.778297901 CET | 443 | 49737 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:10.778511047 CET | 49737 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:10.778563976 CET | 443 | 49737 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:10.778577089 CET | 49737 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:10.778613091 CET | 443 | 49737 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:10.778693914 CET | 49737 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:10.783950090 CET | 443 | 49737 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:13.285746098 CET | 443 | 49737 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:13.285984993 CET | 443 | 49737 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:13.286052942 CET | 49737 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:13.286127090 CET | 49737 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:13.286170006 CET | 443 | 49737 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:13.293746948 CET | 49738 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:13.293776989 CET | 443 | 49738 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:13.293829918 CET | 49738 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:13.294395924 CET | 49738 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:13.294406891 CET | 443 | 49738 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:13.854787111 CET | 443 | 49738 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:13.854856014 CET | 49738 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:13.863399029 CET | 49738 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:13.863410950 CET | 443 | 49738 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:13.864247084 CET | 443 | 49738 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:13.865879059 CET | 49738 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:13.865891933 CET | 49738 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:13.866105080 CET | 443 | 49738 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:14.615919113 CET | 443 | 49738 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:14.616126060 CET | 443 | 49738 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:14.617156029 CET | 49738 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:14.620551109 CET | 49738 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:14.620563984 CET | 443 | 49738 | 172.67.160.193 | 192.168.2.4 |
Jan 12, 2025 09:13:14.620572090 CET | 49738 | 443 | 192.168.2.4 | 172.67.160.193 |
Jan 12, 2025 09:13:14.620577097 CET | 443 | 49738 | 172.67.160.193 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 12, 2025 09:13:01.242893934 CET | 51983 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 12, 2025 09:13:01.252032995 CET | 53 | 51983 | 1.1.1.1 | 192.168.2.4 |
Jan 12, 2025 09:13:01.255490065 CET | 54116 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 12, 2025 09:13:01.264302969 CET | 53 | 54116 | 1.1.1.1 | 192.168.2.4 |
Jan 12, 2025 09:13:01.271042109 CET | 59943 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 12, 2025 09:13:01.280770063 CET | 53 | 59943 | 1.1.1.1 | 192.168.2.4 |
Jan 12, 2025 09:13:01.282561064 CET | 59628 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 12, 2025 09:13:01.291778088 CET | 53 | 59628 | 1.1.1.1 | 192.168.2.4 |
Jan 12, 2025 09:13:01.293471098 CET | 51281 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 12, 2025 09:13:01.302793026 CET | 53 | 51281 | 1.1.1.1 | 192.168.2.4 |
Jan 12, 2025 09:13:01.304408073 CET | 63575 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 12, 2025 09:13:01.313317060 CET | 53 | 63575 | 1.1.1.1 | 192.168.2.4 |
Jan 12, 2025 09:13:01.315104961 CET | 61295 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 12, 2025 09:13:01.325337887 CET | 53 | 61295 | 1.1.1.1 | 192.168.2.4 |
Jan 12, 2025 09:13:01.326572895 CET | 57078 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 12, 2025 09:13:01.335338116 CET | 53 | 57078 | 1.1.1.1 | 192.168.2.4 |
Jan 12, 2025 09:13:01.336393118 CET | 60815 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 12, 2025 09:13:01.343213081 CET | 53 | 60815 | 1.1.1.1 | 192.168.2.4 |
Jan 12, 2025 09:13:02.675997019 CET | 55404 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 12, 2025 09:13:02.686858892 CET | 53 | 55404 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 12, 2025 09:13:01.242893934 CET | 192.168.2.4 | 1.1.1.1 | 0xa37e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 12, 2025 09:13:01.255490065 CET | 192.168.2.4 | 1.1.1.1 | 0xa00a | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 12, 2025 09:13:01.271042109 CET | 192.168.2.4 | 1.1.1.1 | 0x53f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 12, 2025 09:13:01.282561064 CET | 192.168.2.4 | 1.1.1.1 | 0x841d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 12, 2025 09:13:01.293471098 CET | 192.168.2.4 | 1.1.1.1 | 0x30aa | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 12, 2025 09:13:01.304408073 CET | 192.168.2.4 | 1.1.1.1 | 0x79dd | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 12, 2025 09:13:01.315104961 CET | 192.168.2.4 | 1.1.1.1 | 0x7554 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 12, 2025 09:13:01.326572895 CET | 192.168.2.4 | 1.1.1.1 | 0x7fee | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 12, 2025 09:13:01.336393118 CET | 192.168.2.4 | 1.1.1.1 | 0xaee | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 12, 2025 09:13:02.675997019 CET | 192.168.2.4 | 1.1.1.1 | 0xe184 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 12, 2025 09:13:01.252032995 CET | 1.1.1.1 | 192.168.2.4 | 0xa37e | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 12, 2025 09:13:01.264302969 CET | 1.1.1.1 | 192.168.2.4 | 0xa00a | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 12, 2025 09:13:01.280770063 CET | 1.1.1.1 | 192.168.2.4 | 0x53f | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 12, 2025 09:13:01.291778088 CET | 1.1.1.1 | 192.168.2.4 | 0x841d | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 12, 2025 09:13:01.302793026 CET | 1.1.1.1 | 192.168.2.4 | 0x30aa | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 12, 2025 09:13:01.313317060 CET | 1.1.1.1 | 192.168.2.4 | 0x79dd | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 12, 2025 09:13:01.325337887 CET | 1.1.1.1 | 192.168.2.4 | 0x7554 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 12, 2025 09:13:01.335338116 CET | 1.1.1.1 | 192.168.2.4 | 0x7fee | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 12, 2025 09:13:01.343213081 CET | 1.1.1.1 | 192.168.2.4 | 0xaee | No error (0) | 104.102.49.254 | A (IP address) | IN (0x0001) | false | ||
Jan 12, 2025 09:13:02.686858892 CET | 1.1.1.1 | 192.168.2.4 | 0xe184 | No error (0) | 172.67.160.193 | A (IP address) | IN (0x0001) | false | ||
Jan 12, 2025 09:13:02.686858892 CET | 1.1.1.1 | 192.168.2.4 | 0xe184 | No error (0) | 104.21.14.233 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49730 | 104.102.49.254 | 443 | 7876 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-12 08:13:02 UTC | 219 | OUT | |
2025-01-12 08:13:02 UTC | 1905 | IN | |
2025-01-12 08:13:02 UTC | 14479 | IN | |
2025-01-12 08:13:02 UTC | 16384 | IN | |
2025-01-12 08:13:02 UTC | 3768 | IN | |
2025-01-12 08:13:02 UTC | 510 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49731 | 172.67.160.193 | 443 | 7876 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-12 08:13:03 UTC | 266 | OUT | |
2025-01-12 08:13:03 UTC | 8 | OUT | |
2025-01-12 08:13:03 UTC | 1129 | IN | |
2025-01-12 08:13:03 UTC | 7 | IN | |
2025-01-12 08:13:03 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49732 | 172.67.160.193 | 443 | 7876 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-12 08:13:04 UTC | 267 | OUT | |
2025-01-12 08:13:04 UTC | 48 | OUT | |
2025-01-12 08:13:04 UTC | 1120 | IN | |
2025-01-12 08:13:04 UTC | 249 | IN | |
2025-01-12 08:13:04 UTC | 1369 | IN | |
2025-01-12 08:13:04 UTC | 1369 | IN | |
2025-01-12 08:13:04 UTC | 1369 | IN | |
2025-01-12 08:13:04 UTC | 1369 | IN | |
2025-01-12 08:13:04 UTC | 1369 | IN | |
2025-01-12 08:13:04 UTC | 282 | IN | |
2025-01-12 08:13:04 UTC | 1369 | IN | |
2025-01-12 08:13:04 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49733 | 172.67.160.193 | 443 | 7876 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-12 08:13:05 UTC | 281 | OUT | |
2025-01-12 08:13:05 UTC | 15331 | OUT | |
2025-01-12 08:13:05 UTC | 2809 | OUT | |
2025-01-12 08:13:05 UTC | 1125 | IN | |
2025-01-12 08:13:05 UTC | 20 | IN | |
2025-01-12 08:13:05 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49734 | 172.67.160.193 | 443 | 7876 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-12 08:13:06 UTC | 283 | OUT | |
2025-01-12 08:13:06 UTC | 8779 | OUT | |
2025-01-12 08:13:07 UTC | 1133 | IN | |
2025-01-12 08:13:07 UTC | 20 | IN | |
2025-01-12 08:13:07 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49735 | 172.67.160.193 | 443 | 7876 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-12 08:13:07 UTC | 276 | OUT | |
2025-01-12 08:13:07 UTC | 15331 | OUT | |
2025-01-12 08:13:07 UTC | 5053 | OUT | |
2025-01-12 08:13:08 UTC | 1131 | IN | |
2025-01-12 08:13:08 UTC | 20 | IN | |
2025-01-12 08:13:08 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49736 | 172.67.160.193 | 443 | 7876 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-12 08:13:09 UTC | 284 | OUT | |
2025-01-12 08:13:09 UTC | 1409 | OUT | |
2025-01-12 08:13:10 UTC | 1132 | IN | |
2025-01-12 08:13:10 UTC | 20 | IN | |
2025-01-12 08:13:10 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49737 | 172.67.160.193 | 443 | 7876 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-12 08:13:10 UTC | 286 | OUT | |
2025-01-12 08:13:10 UTC | 15331 | OUT | |
2025-01-12 08:13:10 UTC | 15331 | OUT | |
2025-01-12 08:13:10 UTC | 15331 | OUT | |
2025-01-12 08:13:10 UTC | 15331 | OUT | |
2025-01-12 08:13:10 UTC | 15331 | OUT | |
2025-01-12 08:13:10 UTC | 15331 | OUT | |
2025-01-12 08:13:10 UTC | 15331 | OUT | |
2025-01-12 08:13:10 UTC | 15331 | OUT | |
2025-01-12 08:13:10 UTC | 15331 | OUT | |
2025-01-12 08:13:10 UTC | 15331 | OUT | |
2025-01-12 08:13:13 UTC | 1133 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.4 | 49738 | 172.67.160.193 | 443 | 7876 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-12 08:13:13 UTC | 267 | OUT | |
2025-01-12 08:13:13 UTC | 83 | OUT | |
2025-01-12 08:13:14 UTC | 1131 | IN | |
2025-01-12 08:13:14 UTC | 54 | IN | |
2025-01-12 08:13:14 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 03:12:58 |
Start date: | 12/01/2025 |
Path: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff788560000 |
File size: | 452'608 bytes |
MD5 hash: | 04029E121A0CFA5991749937DD22A1D9 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 1 |
Start time: | 03:12:58 |
Start date: | 12/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 03:13:00 |
Start date: | 12/01/2025 |
Path: | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe30000 |
File size: | 45'984 bytes |
MD5 hash: | 9D352BC46709F0CB5EC974633A0C3C94 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9BB9149A Relevance: .1, Instructions: 112COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9BACD768 Relevance: .1, Instructions: 55COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9BAC37B5 Relevance: .0, Instructions: 49COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9BACD97C Relevance: .0, Instructions: 49COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9BB914C1 Relevance: .0, Instructions: 41COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9BAC85CE Relevance: .0, Instructions: 40COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9BAC55AB Relevance: .0, Instructions: 32COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9BAC48D7 Relevance: .0, Instructions: 28COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9BACA5D9 Relevance: .1, Instructions: 110COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9BAC5190 Relevance: .1, Instructions: 102COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 8.9% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 47.4% |
Total number of Nodes: | 325 |
Total number of Limit Nodes: | 26 |
Graph
Function 0043B7B0 Relevance: 23.6, APIs: 11, Strings: 2, Instructions: 851memorycomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408740 Relevance: 10.7, APIs: 5, Strings: 1, Instructions: 228threadCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040CB44 Relevance: 3.0, APIs: 2, Instructions: 30COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00410446 Relevance: 2.4, APIs: 1, Instructions: 941COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427A50 Relevance: 1.7, Strings: 1, Instructions: 403COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004402D0 Relevance: 1.5, APIs: 1, Instructions: 14libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040BA29 Relevance: 1.3, Strings: 1, Instructions: 84COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042D420 Relevance: .1, Instructions: 122COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004406A2 Relevance: 3.0, APIs: 2, Instructions: 14COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00432D44 Relevance: 1.6, APIs: 1, Instructions: 94COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F596 Relevance: 1.6, APIs: 1, Instructions: 75COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F586 Relevance: 1.6, APIs: 1, Instructions: 61COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043AA74 Relevance: 1.6, APIs: 1, Instructions: 55COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440260 Relevance: 1.5, APIs: 1, Instructions: 45memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004358EF Relevance: 1.5, APIs: 1, Instructions: 26COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00432648 Relevance: 1.5, APIs: 1, Instructions: 24COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E860 Relevance: 1.5, APIs: 1, Instructions: 22memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E840 Relevance: 1.5, APIs: 1, Instructions: 9memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00425E00 Relevance: 34.2, Strings: 27, Instructions: 430COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004251E8 Relevance: 34.2, Strings: 27, Instructions: 426COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00417451 Relevance: 6.7, Strings: 5, Instructions: 462COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040A910 Relevance: 6.7, Strings: 5, Instructions: 422COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00420B10 Relevance: 5.5, Strings: 4, Instructions: 470COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F799 Relevance: 5.4, Strings: 4, Instructions: 395COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408EB0 Relevance: 5.3, Strings: 4, Instructions: 299COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041AA90 Relevance: 4.4, Strings: 3, Instructions: 606COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004095A0 Relevance: 4.1, Strings: 3, Instructions: 375COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042E5C2 Relevance: 3.9, Strings: 3, Instructions: 189COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00413E50 Relevance: 3.4, Strings: 2, Instructions: 884COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041F710 Relevance: 3.0, Strings: 2, Instructions: 527COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043C410 Relevance: 2.8, Strings: 2, Instructions: 349COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042DFAF Relevance: 2.6, Strings: 2, Instructions: 124COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042E7EB Relevance: 2.6, Strings: 2, Instructions: 108COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004273A0 Relevance: 1.6, Strings: 1, Instructions: 311COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004082A0 Relevance: 1.5, Strings: 1, Instructions: 288COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042E002 Relevance: 1.4, Strings: 1, Instructions: 152COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426A00 Relevance: 1.3, Strings: 1, Instructions: 11COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407400 Relevance: .6, Instructions: 625COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004288BA Relevance: .4, Instructions: 371COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415590 Relevance: .3, Instructions: 326COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426D70 Relevance: .3, Instructions: 280COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004427E0 Relevance: .2, Instructions: 242COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041DC40 Relevance: .2, Instructions: 204COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402940 Relevance: .2, Instructions: 164COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00429871 Relevance: .1, Instructions: 136COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408CD0 Relevance: .1, Instructions: 126COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040DFEA Relevance: .1, Instructions: 126COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040DE72 Relevance: .1, Instructions: 120COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043EB00 Relevance: .1, Instructions: 86COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415C25 Relevance: .1, Instructions: 80COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00438AF0 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042B430 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043EE10 Relevance: .0, Instructions: 46COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041DEB0 Relevance: .0, Instructions: 21COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440310 Relevance: .0, Instructions: 20COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|