Windows
Analysis Report
random.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- random.exe (PID: 2472 cmdline:
"C:\Users\ user\Deskt op\random. exe" MD5: FFA93EB02619DB4261CA8E263FB667CE) - random.exe (PID: 5332 cmdline:
"C:\Users\ user\Deskt op\random. exe" MD5: FFA93EB02619DB4261CA8E263FB667CE) - WerFault.exe (PID: 6480 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 2 472 -s 912 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["jarry-fixxer.bond", "stripedre-lot.bond", "pain-temper.bond", "growthselec.bond", "immolatechallen.bond", "crookedfoshe.bond", "strivehelpeu.bond", "jarry-deatile.bond", "sobrattyeu.bond"], "Build id": "7tx2jo--925"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T11:18:02.360031+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49713 | 104.21.96.1 | 443 | TCP |
2025-01-14T11:18:03.321724+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49715 | 104.21.96.1 | 443 | TCP |
2025-01-14T11:18:04.555866+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49717 | 104.21.96.1 | 443 | TCP |
2025-01-14T11:18:05.577527+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49718 | 104.21.96.1 | 443 | TCP |
2025-01-14T11:18:06.668015+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49719 | 104.21.96.1 | 443 | TCP |
2025-01-14T11:18:07.837594+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49720 | 104.21.96.1 | 443 | TCP |
2025-01-14T11:18:08.947720+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49721 | 104.21.96.1 | 443 | TCP |
2025-01-14T11:18:11.050851+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49722 | 104.21.96.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T11:18:02.843298+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49713 | 104.21.96.1 | 443 | TCP |
2025-01-14T11:18:03.799706+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49715 | 104.21.96.1 | 443 | TCP |
2025-01-14T11:18:11.552584+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49722 | 104.21.96.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T11:18:02.843298+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.5 | 49713 | 104.21.96.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T11:18:03.799706+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.5 | 49715 | 104.21.96.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T11:18:08.162919+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49720 | 104.21.96.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T11:18:08.951996+0100 | 2843864 | 1 | A Network Trojan was detected | 192.168.2.5 | 49721 | 104.21.96.1 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Code function: | 1_2_004182C0 | |
Source: | Code function: | 1_2_00415D15 | |
Source: | Code function: | 1_2_00418404 |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 1_2_0042D420 | |
Source: | Code function: | 1_2_00408740 | |
Source: | Code function: | 1_2_00427A50 | |
Source: | Code function: | 1_2_0040BA29 | |
Source: | Code function: | 1_2_0040CB44 | |
Source: | Code function: | 1_2_00423E44 | |
Source: | Code function: | 1_2_0042E002 | |
Source: | Code function: | 1_2_0042E002 | |
Source: | Code function: | 1_2_004161DF | |
Source: | Code function: | 1_2_004251E8 | |
Source: | Code function: | 1_2_004082A0 | |
Source: | Code function: | 1_2_00440310 | |
Source: | Code function: | 1_2_004273A0 | |
Source: | Code function: | 1_2_004273A0 | |
Source: | Code function: | 1_2_004273A0 | |
Source: | Code function: | 1_2_00417451 | |
Source: | Code function: | 1_2_00407400 | |
Source: | Code function: | 1_2_00407400 | |
Source: | Code function: | 1_2_0043C410 | |
Source: | Code function: | 1_2_0043C410 | |
Source: | Code function: | 1_2_0042B430 | |
Source: | Code function: | 1_2_0042E5C2 | |
Source: | Code function: | 1_2_004165EE | |
Source: | Code function: | 1_2_00415590 | |
Source: | Code function: | 1_2_004095A0 | |
Source: | Code function: | 1_2_0041F710 | |
Source: | Code function: | 1_2_0041F710 | |
Source: | Code function: | 1_2_004427E0 | |
Source: | Code function: | 1_2_0042E7EB | |
Source: | Code function: | 1_2_0042F799 | |
Source: | Code function: | 1_2_00429871 | |
Source: | Code function: | 1_2_0042A810 | |
Source: | Code function: | 1_2_004288BA | |
Source: | Code function: | 1_2_00402940 | |
Source: | Code function: | 1_2_0040A910 | |
Source: | Code function: | 1_2_00426A00 | |
Source: | Code function: | 1_2_00438AF0 | |
Source: | Code function: | 1_2_0041AA90 | |
Source: | Code function: | 1_2_0041AA90 | |
Source: | Code function: | 1_2_0043EB00 | |
Source: | Code function: | 1_2_00420B10 | |
Source: | Code function: | 1_2_0041DC40 | |
Source: | Code function: | 1_2_00415C25 | |
Source: | Code function: | 1_2_00408CD0 | |
Source: | Code function: | 1_2_00426D70 | |
Source: | Code function: | 1_2_0042DD30 | |
Source: | Code function: | 1_2_00415E42 | |
Source: | Code function: | 1_2_00413E50 | |
Source: | Code function: | 1_2_0040DE72 | |
Source: | Code function: | 1_2_00425E00 | |
Source: | Code function: | 1_2_00425E00 | |
Source: | Code function: | 1_2_0043EE10 | |
Source: | Code function: | 1_2_00408EB0 | |
Source: | Code function: | 1_2_0041DEB0 | |
Source: | Code function: | 1_2_0040DFEA | |
Source: | Code function: | 1_2_0042DFAF |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 1_2_004363E0 |
Source: | Code function: | 1_2_004363E0 |
Source: | Code function: | 1_2_00436590 |
Source: | Code function: | 1_2_00420440 | |
Source: | Code function: | 1_2_00410446 | |
Source: | Code function: | 1_2_00442460 | |
Source: | Code function: | 1_2_0040D690 | |
Source: | Code function: | 1_2_00408740 | |
Source: | Code function: | 1_2_0043B7B0 | |
Source: | Code function: | 1_2_00415975 | |
Source: | Code function: | 1_2_00427A50 | |
Source: | Code function: | 1_2_00440A0D | |
Source: | Code function: | 1_2_00442DE0 | |
Source: | Code function: | 1_2_00423E44 | |
Source: | Code function: | 1_2_0042DEE5 | |
Source: | Code function: | 1_2_00430050 | |
Source: | Code function: | 1_2_00411078 | |
Source: | Code function: | 1_2_004270D0 | |
Source: | Code function: | 1_2_00436140 | |
Source: | Code function: | 1_2_0043912C | |
Source: | Code function: | 1_2_004091C0 | |
Source: | Code function: | 1_2_004161DF | |
Source: | Code function: | 1_2_004311E6 | |
Source: | Code function: | 1_2_00432188 | |
Source: | Code function: | 1_2_00406190 | |
Source: | Code function: | 1_2_0042F195 | |
Source: | Code function: | 1_2_004421B0 | |
Source: | Code function: | 1_2_0041E250 | |
Source: | Code function: | 1_2_00445260 | |
Source: | Code function: | 1_2_0041B200 | |
Source: | Code function: | 1_2_004042D0 | |
Source: | Code function: | 1_2_004082A0 | |
Source: | Code function: | 1_2_004412B1 | |
Source: | Code function: | 1_2_0041C370 | |
Source: | Code function: | 1_2_004273A0 | |
Source: | Code function: | 1_2_00417451 | |
Source: | Code function: | 1_2_00419470 | |
Source: | Code function: | 1_2_00407400 | |
Source: | Code function: | 1_2_0043C410 | |
Source: | Code function: | 1_2_0040E4B0 | |
Source: | Code function: | 1_2_0041A574 | |
Source: | Code function: | 1_2_004245C0 | |
Source: | Code function: | 1_2_004165EE | |
Source: | Code function: | 1_2_00415590 | |
Source: | Code function: | 1_2_004095A0 | |
Source: | Code function: | 1_2_00406620 | |
Source: | Code function: | 1_2_00418690 | |
Source: | Code function: | 1_2_0043974A | |
Source: | Code function: | 1_2_00419710 | |
Source: | Code function: | 1_2_0041F710 | |
Source: | Code function: | 1_2_0041C7D0 | |
Source: | Code function: | 1_2_004427E0 | |
Source: | Code function: | 1_2_0042A810 | |
Source: | Code function: | 1_2_00433810 | |
Source: | Code function: | 1_2_004058E0 | |
Source: | Code function: | 1_2_0042D893 | |
Source: | Code function: | 1_2_004148B0 | |
Source: | Code function: | 1_2_004288BA | |
Source: | Code function: | 1_2_0040A910 | |
Source: | Code function: | 1_2_00441910 | |
Source: | Code function: | 1_2_00403920 | |
Source: | Code function: | 1_2_00441A56 | |
Source: | Code function: | 1_2_0041BAD0 | |
Source: | Code function: | 1_2_00433AD0 | |
Source: | Code function: | 1_2_00431A88 | |
Source: | Code function: | 1_2_00441A94 | |
Source: | Code function: | 1_2_0041AA90 | |
Source: | Code function: | 1_2_00442A90 | |
Source: | Code function: | 1_2_0041CAA0 | |
Source: | Code function: | 1_2_0043CAA7 | |
Source: | Code function: | 1_2_00441B40 | |
Source: | Code function: | 1_2_00420B10 | |
Source: | Code function: | 1_2_00402B20 | |
Source: | Code function: | 1_2_00411B20 | |
Source: | Code function: | 1_2_0042ABC0 | |
Source: | Code function: | 1_2_00441BD0 | |
Source: | Code function: | 1_2_0043AC40 | |
Source: | Code function: | 1_2_00441C60 | |
Source: | Code function: | 1_2_00404C00 | |
Source: | Code function: | 1_2_0042ECD0 | |
Source: | Code function: | 1_2_00439CD8 | |
Source: | Code function: | 1_2_00440CD8 | |
Source: | Code function: | 1_2_00414C9C | |
Source: | Code function: | 1_2_0042CCA0 | |
Source: | Code function: | 1_2_00426D70 | |
Source: | Code function: | 1_2_00428D76 | |
Source: | Code function: | 1_2_00422D17 | |
Source: | Code function: | 1_2_00405DC0 | |
Source: | Code function: | 1_2_00415E42 | |
Source: | Code function: | 1_2_00413E50 | |
Source: | Code function: | 1_2_0040AE60 | |
Source: | Code function: | 1_2_0041BE00 | |
Source: | Code function: | 1_2_00402EF0 | |
Source: | Code function: | 1_2_0043EE80 | |
Source: | Code function: | 1_2_0043AEA0 | |
Source: | Code function: | 1_2_00427F8D |
Source: | Code function: | ||
Source: | Code function: |
Source: | Process created: |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 1_2_0043B7B0 |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: |
Source: | Code function: | 1_2_0043A6FE | |
Source: | Code function: | 1_2_00441864 |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 1_2_004402D0 |
Source: | Code function: | 0_2_02A47F25 | |
Source: | Code function: | 0_2_02A480A2 |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Code function: | 0_2_02A47F25 |
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 211 Process Injection | 23 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 231 Security Software Discovery | Remote Services | 1 Screen Capture | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Disable or Modify Tools | LSASS Memory | 23 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 1 Archive Collected Data | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 211 Process Injection | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | 41 Data from Local System | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 11 Deobfuscate/Decode Files or Information | NTDS | 1 File and Directory Discovery | Distributed Component Object Model | 2 Clipboard Data | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 3 Obfuscated Files or Information | LSA Secrets | 22 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Software Packing | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 Timestomp | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 DLL Side-Loading | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
49% | Virustotal | Browse | ||
100% | Avira | HEUR/AGEN.1340047 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
sobrattyeu.bond | 104.21.96.1 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.96.1 | sobrattyeu.bond | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1590613 |
Start date and time: | 2025-01-14 11:17:09 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 2m 52s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | random.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@4/5@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 20.42.65.92, 4.245.163.56, 2.17.190.73, 20.3.187.198, 20.190.159.75, 20.190.160.20, 13.107.253.45
- Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, e3913.cd.akamaiedge.net, fe3cr.delivery.mp.microsoft.com, cac-ocsp.digicert.com.edgekey.net, fe3.delivery.mp.microsoft.com, onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, blobcollector.events.data.trafficmanager.net, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, umwatson.events.data.microsoft.com, glb.sls.prod.dcat.dsp.trafficmanager.net
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
05:18:02 | API Interceptor | |
05:18:03 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.96.1 | Get hash | malicious | FormBook | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | CMSBrute | Browse |
| ||
Get hash | malicious | FormBook | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | DBatLoader | Browse |
| ||
Get hash | malicious | DBatLoader | Browse |
| ||
Get hash | malicious | DBatLoader | Browse |
| ||
Get hash | malicious | DBatLoader | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_random.exe_57a172f3aff707b514fc1dd5c6b6bfcd5ec5798_2a7bfe58_e621bb6a-867a-4fda-b943-41f888579ae9\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.8860332352516674 |
Encrypted: | false |
SSDEEP: | 96:34F6515Css2g8jTOAqyS3QXIDcQlc6VcEdcw31+BHUHZ0ownOgHkEwH3dEFWo2bO:os515CskA0LR3ka2GzuiFIZ24IO8j |
MD5: | 2D3B4B3B40D7CB0A64E330BD494CB6E0 |
SHA1: | 92E44CB7F32F68261177816EA37BC1A5BC3FEC4C |
SHA-256: | 6F9E21C29754E0D43B7D540CDF1C88151072EDED6670A08DCB49D378BC881532 |
SHA-512: | 8330FBC2FD06A91DEC921C2789EFA47073E610CDFDFFA6C698EBCF994DBC6485F7E287BAF068A809F91A4F9552FE8CCFCC1B84856288E274BB489C60C24959A1 |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 151970 |
Entropy (8bit): | 3.784155024360512 |
Encrypted: | false |
SSDEEP: | 1536:zPxtTnyrgcM1iuBojRgpN4uE2aOqKCDCLTglus7Ak9v:z3xCW4uEqqBCLTglj/ |
MD5: | 88EE3CEC78264C72731E2A0174087B9B |
SHA1: | FA1A275A24477AD9035BE1098856E669D7582758 |
SHA-256: | AA7B512C16F9721F516D2A2CEDA29EC10378A41B0BE6AF1448404AB815D4D433 |
SHA-512: | C1F60F971FF2CFC2180B2996F2188D7042B8E2409497AFDACD20E2049507ABB651C38CBA90C7F88A9C70FBBB6954B444F83058D3C01CBCFEC26C99F8C8227855 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8364 |
Entropy (8bit): | 3.6874313329026975 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJpT6Sdde6YEIxSU9AIgmfBVJLrprM89baYsfoem:R6lXJt6D6YEOSU9AIgmfBVJTaLfY |
MD5: | 410BC58510FA8A45C694456DFA5FF335 |
SHA1: | C373104607CB10250AB6E9FF54EB00C5DE723093 |
SHA-256: | BA9DD36C40EB377F0EDD63D6A8B4402C74C29EBA68331F6501F2ABAF397C6379 |
SHA-512: | 827CE190C597EFB92935BA849374DDA92AD1F09F619AE18B919C27A364801DC0984CDA9E5286CF6176872B94A98F5DA314DE96D48746DE9ABA570FB1469A498F |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4730 |
Entropy (8bit): | 4.428875967120491 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsQJg77aI9Tk7WpW8VYcoYm8M4JKdxPcf6Fvay+q8v2dxPcfF4QjizpYd:uIjfWI79kK7VZJffeK7fF4QjizpYd |
MD5: | EC96BB901FCF5DCB657836CD19A5F267 |
SHA1: | 5F373EDC4B71CCDE55B208A5695321EC0B02E561 |
SHA-256: | BCF0DD4A05B93B2E6587AD0256A980FE599638DA29B0F3DA8D241A6A0074BDFD |
SHA-512: | B758150B4D2B697BBEC7D9E1F55ECF476645271256EBDD725E4AAC1A327A3F490FB15873E1C5CAA77F590F15A6F17657131EA5230190EBE8E4FF9CEB58F8D292 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.421670697749732 |
Encrypted: | false |
SSDEEP: | 6144:vSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnN50uhiTw:6vloTMW+EZMM6DFyX03w |
MD5: | F5DD0B1DFAF5E91D74715FD0F645E5A6 |
SHA1: | C21E6DC6D49FF9710B215937A693C063E2CD8579 |
SHA-256: | 212BDFB04C859678DBC2609AF5C0243D8EB91B1A533E537D590D6D601FFF8AD1 |
SHA-512: | 5545A45AE17F4CB7F1B6FA614E6C1F08BE703D802A878EBACA8F882E44A399BA024DBA68D4950A8BA81710729C4E03CD715E43F78E156B917FE8E6C8E4B71DBA |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.961485224900562 |
TrID: |
|
File name: | random.exe |
File size: | 350'832 bytes |
MD5: | ffa93eb02619db4261ca8e263fb667ce |
SHA1: | 9dd5e3e90bd54a223ba3a4963c67465f33ff64b2 |
SHA256: | 88aad531c777e07dbb4bf6309cbc7b94436b377207a0b4c122f3b418d8160216 |
SHA512: | 36308f5986e640bc3109075e432a278f8d8d9de47599021d27eb54f57fc72d18466076a7602a7c16c3afbc93526360f5a778151f0267fd572041d0455df851ee |
SSDEEP: | 6144:3K7WNwGfqO5rt1XphUpUx35aZM/3s3pgubF5KVFSs6RzE0Yl5tGq/sUC:3K7WV5ZKpUx3Qp3pacsFZ/sb |
TLSH: | C3741228924BA922ED67C6B53DB99606123AEB4A2C13DF83245C03164F717C376F3BD5 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...;.................0..D..........Nb... ........@.. ....................................`................................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x40624e |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0xC3D3DB3B [Fri Feb 9 22:35:39 2074 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Signature Valid: | false |
Signature Issuer: | CN=DigiCert EV Code Signing CA (SHA2), OU=www.digicert.com, O=DigiCert Inc, C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 332CDC164B1324C3FF3F64E228C5FFFC |
Thumbprint SHA-1: | CBFB3D25134A5FF6FCF2924D5B4BE16194EA7E13 |
Thumbprint SHA-256: | 531855F05B9D55E4F6DDEBC443706382DDB9ACBD2B8AB24004822BE204420943 |
Serial: | 0C9838F673F9B1CCE395CFAB2B6684E4 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x6200 | 0x4b | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x8000 | 0x598 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x53400 | 0x2670 | .idata |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xa000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x61b4 | 0x1c | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x4254 | 0x4400 | bf7682d2b25d764f15115a3479cfd1ee | False | 0.4921875 | data | 5.789864841770327 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x8000 | 0x598 | 0x600 | 97b5e78dd91bc3fa97e695160eb75d4a | False | 0.41015625 | data | 4.031118916432586 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xa000 | 0xc | 0x200 | cba309bc25d9ae6bdc5b702e03a9e7ce | False | 0.044921875 | data | 0.08153941234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.idata | 0xc000 | 0x4e400 | 0x4e400 | 18cf556744a5295b2564d40e83f2b81f | False | 1.0003307208466454 | data | 7.999432843434195 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x80a0 | 0x30c | data | 0.41923076923076924 | ||
RT_MANIFEST | 0x83ac | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T11:18:02.360031+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49713 | 104.21.96.1 | 443 | TCP |
2025-01-14T11:18:02.843298+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.5 | 49713 | 104.21.96.1 | 443 | TCP |
2025-01-14T11:18:02.843298+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49713 | 104.21.96.1 | 443 | TCP |
2025-01-14T11:18:03.321724+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49715 | 104.21.96.1 | 443 | TCP |
2025-01-14T11:18:03.799706+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.5 | 49715 | 104.21.96.1 | 443 | TCP |
2025-01-14T11:18:03.799706+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49715 | 104.21.96.1 | 443 | TCP |
2025-01-14T11:18:04.555866+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49717 | 104.21.96.1 | 443 | TCP |
2025-01-14T11:18:05.577527+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49718 | 104.21.96.1 | 443 | TCP |
2025-01-14T11:18:06.668015+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49719 | 104.21.96.1 | 443 | TCP |
2025-01-14T11:18:07.837594+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49720 | 104.21.96.1 | 443 | TCP |
2025-01-14T11:18:08.162919+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.5 | 49720 | 104.21.96.1 | 443 | TCP |
2025-01-14T11:18:08.947720+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49721 | 104.21.96.1 | 443 | TCP |
2025-01-14T11:18:08.951996+0100 | 2843864 | ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 | 1 | 192.168.2.5 | 49721 | 104.21.96.1 | 443 | TCP |
2025-01-14T11:18:11.050851+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49722 | 104.21.96.1 | 443 | TCP |
2025-01-14T11:18:11.552584+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49722 | 104.21.96.1 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 14, 2025 11:18:01.883438110 CET | 49713 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:01.883474112 CET | 443 | 49713 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:01.883563995 CET | 49713 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:01.884511948 CET | 49713 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:01.884527922 CET | 443 | 49713 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:02.359946012 CET | 443 | 49713 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:02.360030890 CET | 49713 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:02.362643957 CET | 49713 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:02.362652063 CET | 443 | 49713 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:02.364039898 CET | 443 | 49713 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:02.406228065 CET | 49713 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:02.426516056 CET | 49713 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:02.426544905 CET | 49713 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:02.426882982 CET | 443 | 49713 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:02.843254089 CET | 443 | 49713 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:02.843511105 CET | 443 | 49713 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:02.843589067 CET | 49713 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:02.845854998 CET | 49713 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:02.845885038 CET | 443 | 49713 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:02.845897913 CET | 49713 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:02.845904112 CET | 443 | 49713 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:02.855946064 CET | 49715 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:02.855983019 CET | 443 | 49715 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:02.856062889 CET | 49715 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:02.856466055 CET | 49715 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:02.856487036 CET | 443 | 49715 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:03.321602106 CET | 443 | 49715 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:03.321723938 CET | 49715 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:03.323173046 CET | 49715 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:03.323184967 CET | 443 | 49715 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:03.323534966 CET | 443 | 49715 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:03.324709892 CET | 49715 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:03.324750900 CET | 49715 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:03.324800968 CET | 443 | 49715 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:03.799755096 CET | 443 | 49715 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:03.799913883 CET | 443 | 49715 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:03.799972057 CET | 49715 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:03.800002098 CET | 443 | 49715 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:03.800085068 CET | 443 | 49715 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:03.800131083 CET | 49715 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:03.800138950 CET | 443 | 49715 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:03.800246000 CET | 443 | 49715 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:03.800290108 CET | 49715 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:03.800297976 CET | 443 | 49715 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:03.800399065 CET | 443 | 49715 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:03.800482988 CET | 443 | 49715 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:03.800585985 CET | 443 | 49715 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:03.800725937 CET | 49715 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:03.800725937 CET | 49715 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:03.800738096 CET | 443 | 49715 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:03.804286003 CET | 443 | 49715 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:03.804363012 CET | 49715 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:03.804371119 CET | 443 | 49715 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:03.859368086 CET | 49715 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:03.887061119 CET | 443 | 49715 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:03.887232065 CET | 443 | 49715 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:03.887284040 CET | 49715 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:03.887304068 CET | 443 | 49715 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:03.887490988 CET | 443 | 49715 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:03.887563944 CET | 49715 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:03.979895115 CET | 49715 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:03.979926109 CET | 443 | 49715 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:03.979939938 CET | 49715 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:03.979945898 CET | 443 | 49715 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:04.080147028 CET | 49717 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:04.080229044 CET | 443 | 49717 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:04.080312967 CET | 49717 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:04.080677986 CET | 49717 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:04.080691099 CET | 443 | 49717 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:04.555788994 CET | 443 | 49717 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:04.555866003 CET | 49717 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:04.557566881 CET | 49717 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:04.557585001 CET | 443 | 49717 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:04.557903051 CET | 443 | 49717 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:04.559376955 CET | 49717 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:04.559505939 CET | 49717 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:04.559552908 CET | 443 | 49717 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:05.089011908 CET | 443 | 49717 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:05.089107037 CET | 443 | 49717 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:05.089258909 CET | 49717 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:05.089351892 CET | 49717 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:05.089373112 CET | 443 | 49717 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:05.107059002 CET | 49718 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:05.107168913 CET | 443 | 49718 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:05.107338905 CET | 49718 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:05.107623100 CET | 49718 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:05.107659101 CET | 443 | 49718 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:05.577364922 CET | 443 | 49718 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:05.577527046 CET | 49718 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:05.579073906 CET | 49718 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:05.579101086 CET | 443 | 49718 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:05.579956055 CET | 443 | 49718 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:05.581334114 CET | 49718 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:05.581537962 CET | 49718 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:05.581588030 CET | 443 | 49718 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:05.581650972 CET | 49718 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:05.581664085 CET | 443 | 49718 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:06.130110025 CET | 443 | 49718 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:06.130379915 CET | 443 | 49718 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:06.130533934 CET | 49718 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:06.130800962 CET | 49718 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:06.130841017 CET | 443 | 49718 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:06.209322929 CET | 49719 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:06.209381104 CET | 443 | 49719 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:06.209469080 CET | 49719 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:06.209803104 CET | 49719 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:06.209814072 CET | 443 | 49719 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:06.667931080 CET | 443 | 49719 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:06.668015003 CET | 49719 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:06.670016050 CET | 49719 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:06.670031071 CET | 443 | 49719 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:06.670381069 CET | 443 | 49719 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:06.672184944 CET | 49719 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:06.672388077 CET | 49719 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:06.672415972 CET | 443 | 49719 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:06.672528982 CET | 49719 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:06.672538996 CET | 443 | 49719 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:07.278517008 CET | 443 | 49719 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:07.278629065 CET | 443 | 49719 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:07.278683901 CET | 49719 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:07.278772116 CET | 49719 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:07.278793097 CET | 443 | 49719 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:07.357691050 CET | 49720 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:07.357737064 CET | 443 | 49720 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:07.357810020 CET | 49720 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:07.358055115 CET | 49720 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:07.358067989 CET | 443 | 49720 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:07.837511063 CET | 443 | 49720 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:07.837594032 CET | 49720 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:07.838732004 CET | 49720 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:07.838742018 CET | 443 | 49720 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:07.839515924 CET | 443 | 49720 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:07.840646029 CET | 49720 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:07.840713024 CET | 49720 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:07.840718985 CET | 443 | 49720 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:08.162986040 CET | 443 | 49720 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:08.163239002 CET | 443 | 49720 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:08.163304090 CET | 49720 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:08.163430929 CET | 49720 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:08.163451910 CET | 443 | 49720 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:08.467274904 CET | 49721 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:08.467344999 CET | 443 | 49721 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:08.467433929 CET | 49721 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:08.467732906 CET | 49721 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:08.467756987 CET | 443 | 49721 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:08.947571039 CET | 443 | 49721 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:08.947720051 CET | 49721 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:08.948817015 CET | 49721 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:08.948853016 CET | 443 | 49721 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:08.949258089 CET | 443 | 49721 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:08.950407028 CET | 49721 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:08.951164007 CET | 49721 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:08.951214075 CET | 443 | 49721 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:08.951373100 CET | 49721 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:08.951420069 CET | 443 | 49721 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:08.951570034 CET | 49721 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:08.951625109 CET | 443 | 49721 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:08.951796055 CET | 49721 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:08.951843023 CET | 443 | 49721 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:08.952027082 CET | 49721 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:08.952073097 CET | 443 | 49721 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:08.952313900 CET | 49721 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:08.952359915 CET | 49721 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:08.960822105 CET | 443 | 49721 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:08.961052895 CET | 49721 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:08.961096048 CET | 443 | 49721 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:08.961143017 CET | 49721 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:08.961244106 CET | 49721 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:08.961291075 CET | 49721 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:08.966553926 CET | 443 | 49721 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:08.966768980 CET | 49721 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:08.966830969 CET | 49721 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:08.966897011 CET | 49721 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:08.967253923 CET | 443 | 49721 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:08.967358112 CET | 49721 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:08.967379093 CET | 443 | 49721 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:10.545170069 CET | 443 | 49721 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:10.545424938 CET | 443 | 49721 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:10.545686960 CET | 49721 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:10.546169043 CET | 49721 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:10.546196938 CET | 443 | 49721 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:10.550287008 CET | 49722 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:10.550338984 CET | 443 | 49722 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:10.550415993 CET | 49722 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:10.550898075 CET | 49722 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:10.550911903 CET | 443 | 49722 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:11.050753117 CET | 443 | 49722 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:11.050851107 CET | 49722 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:11.052337885 CET | 49722 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:11.052350998 CET | 443 | 49722 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:11.052706957 CET | 443 | 49722 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:11.053947926 CET | 49722 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:11.053976059 CET | 49722 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:11.054025888 CET | 443 | 49722 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:11.552609921 CET | 443 | 49722 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:11.552855015 CET | 443 | 49722 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:11.552936077 CET | 49722 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:11.553105116 CET | 49722 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:11.553129911 CET | 443 | 49722 | 104.21.96.1 | 192.168.2.5 |
Jan 14, 2025 11:18:11.553139925 CET | 49722 | 443 | 192.168.2.5 | 104.21.96.1 |
Jan 14, 2025 11:18:11.553145885 CET | 443 | 49722 | 104.21.96.1 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 14, 2025 11:18:01.857173920 CET | 52241 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 11:18:01.876703978 CET | 53 | 52241 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 14, 2025 11:18:01.857173920 CET | 192.168.2.5 | 1.1.1.1 | 0x952d | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 14, 2025 11:18:01.876703978 CET | 1.1.1.1 | 192.168.2.5 | 0x952d | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false | ||
Jan 14, 2025 11:18:01.876703978 CET | 1.1.1.1 | 192.168.2.5 | 0x952d | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false | ||
Jan 14, 2025 11:18:01.876703978 CET | 1.1.1.1 | 192.168.2.5 | 0x952d | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false | ||
Jan 14, 2025 11:18:01.876703978 CET | 1.1.1.1 | 192.168.2.5 | 0x952d | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false | ||
Jan 14, 2025 11:18:01.876703978 CET | 1.1.1.1 | 192.168.2.5 | 0x952d | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false | ||
Jan 14, 2025 11:18:01.876703978 CET | 1.1.1.1 | 192.168.2.5 | 0x952d | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false | ||
Jan 14, 2025 11:18:01.876703978 CET | 1.1.1.1 | 192.168.2.5 | 0x952d | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49713 | 104.21.96.1 | 443 | 5332 | C:\Users\user\Desktop\random.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 10:18:02 UTC | 262 | OUT | |
2025-01-14 10:18:02 UTC | 8 | OUT | |
2025-01-14 10:18:02 UTC | 1121 | IN | |
2025-01-14 10:18:02 UTC | 7 | IN | |
2025-01-14 10:18:02 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49715 | 104.21.96.1 | 443 | 5332 | C:\Users\user\Desktop\random.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 10:18:03 UTC | 263 | OUT | |
2025-01-14 10:18:03 UTC | 45 | OUT | |
2025-01-14 10:18:03 UTC | 1125 | IN | |
2025-01-14 10:18:03 UTC | 244 | IN | |
2025-01-14 10:18:03 UTC | 1369 | IN | |
2025-01-14 10:18:03 UTC | 1369 | IN | |
2025-01-14 10:18:03 UTC | 1369 | IN | |
2025-01-14 10:18:03 UTC | 900 | IN | |
2025-01-14 10:18:03 UTC | 1369 | IN | |
2025-01-14 10:18:03 UTC | 1369 | IN | |
2025-01-14 10:18:03 UTC | 1369 | IN | |
2025-01-14 10:18:03 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49717 | 104.21.96.1 | 443 | 5332 | C:\Users\user\Desktop\random.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 10:18:04 UTC | 281 | OUT | |
2025-01-14 10:18:04 UTC | 12833 | OUT | |
2025-01-14 10:18:05 UTC | 1128 | IN | |
2025-01-14 10:18:05 UTC | 20 | IN | |
2025-01-14 10:18:05 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49718 | 104.21.96.1 | 443 | 5332 | C:\Users\user\Desktop\random.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 10:18:05 UTC | 282 | OUT | |
2025-01-14 10:18:05 UTC | 15081 | OUT | |
2025-01-14 10:18:06 UTC | 1130 | IN | |
2025-01-14 10:18:06 UTC | 20 | IN | |
2025-01-14 10:18:06 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.5 | 49719 | 104.21.96.1 | 443 | 5332 | C:\Users\user\Desktop\random.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 10:18:06 UTC | 280 | OUT | |
2025-01-14 10:18:06 UTC | 15331 | OUT | |
2025-01-14 10:18:06 UTC | 5228 | OUT | |
2025-01-14 10:18:07 UTC | 1133 | IN | |
2025-01-14 10:18:07 UTC | 20 | IN | |
2025-01-14 10:18:07 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.5 | 49720 | 104.21.96.1 | 443 | 5332 | C:\Users\user\Desktop\random.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 10:18:07 UTC | 281 | OUT | |
2025-01-14 10:18:07 UTC | 1408 | OUT | |
2025-01-14 10:18:08 UTC | 1134 | IN | |
2025-01-14 10:18:08 UTC | 20 | IN | |
2025-01-14 10:18:08 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.5 | 49721 | 104.21.96.1 | 443 | 5332 | C:\Users\user\Desktop\random.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 10:18:08 UTC | 274 | OUT | |
2025-01-14 10:18:08 UTC | 15331 | OUT | |
2025-01-14 10:18:08 UTC | 15331 | OUT | |
2025-01-14 10:18:08 UTC | 15331 | OUT | |
2025-01-14 10:18:08 UTC | 15331 | OUT | |
2025-01-14 10:18:08 UTC | 15331 | OUT | |
2025-01-14 10:18:08 UTC | 15331 | OUT | |
2025-01-14 10:18:08 UTC | 15331 | OUT | |
2025-01-14 10:18:08 UTC | 15331 | OUT | |
2025-01-14 10:18:08 UTC | 15331 | OUT | |
2025-01-14 10:18:08 UTC | 15331 | OUT | |
2025-01-14 10:18:10 UTC | 1137 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.5 | 49722 | 104.21.96.1 | 443 | 5332 | C:\Users\user\Desktop\random.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 10:18:11 UTC | 263 | OUT | |
2025-01-14 10:18:11 UTC | 80 | OUT | |
2025-01-14 10:18:11 UTC | 1123 | IN | |
2025-01-14 10:18:11 UTC | 54 | IN | |
2025-01-14 10:18:11 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 05:18:00 |
Start date: | 14/01/2025 |
Path: | C:\Users\user\Desktop\random.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x620000 |
File size: | 350'832 bytes |
MD5 hash: | FFA93EB02619DB4261CA8E263FB667CE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 05:18:01 |
Start date: | 14/01/2025 |
Path: | C:\Users\user\Desktop\random.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xba0000 |
File size: | 350'832 bytes |
MD5 hash: | FFA93EB02619DB4261CA8E263FB667CE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 3 |
Start time: | 05:18:01 |
Start date: | 14/01/2025 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xab0000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 15.3% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 24.2% |
Total number of Nodes: | 33 |
Total number of Limit Nodes: | 4 |
Graph
Function 02A47F25 Relevance: 40.5, APIs: 10, Strings: 13, Instructions: 294threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02A480A2 Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 82threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 028327A0 Relevance: 1.7, APIs: 1, Instructions: 240COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02832028 Relevance: 1.6, APIs: 1, Instructions: 54memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 8.3% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 62.5% |
Total number of Nodes: | 368 |
Total number of Limit Nodes: | 30 |
Graph
Function 0043B7B0 Relevance: 23.6, APIs: 11, Strings: 2, Instructions: 851memorycomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408740 Relevance: 10.7, APIs: 5, Strings: 1, Instructions: 228threadCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00420440 Relevance: 6.7, Strings: 5, Instructions: 435COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040CB44 Relevance: 3.0, APIs: 2, Instructions: 30COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00410446 Relevance: 2.4, APIs: 1, Instructions: 941COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427A50 Relevance: 1.7, Strings: 1, Instructions: 403COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004402D0 Relevance: 1.5, APIs: 1, Instructions: 14libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F195 Relevance: 1.4, Strings: 1, Instructions: 190COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040BA29 Relevance: 1.3, Strings: 1, Instructions: 84COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415975 Relevance: .5, Instructions: 524COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00442460 Relevance: .3, Instructions: 317COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00442DE0 Relevance: .3, Instructions: 296COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440A0D Relevance: .2, Instructions: 210COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042D420 Relevance: .1, Instructions: 122COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004406A2 Relevance: 3.0, APIs: 2, Instructions: 14COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00432D44 Relevance: 1.6, APIs: 1, Instructions: 94COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F596 Relevance: 1.6, APIs: 1, Instructions: 75COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F586 Relevance: 1.6, APIs: 1, Instructions: 61COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043AA74 Relevance: 1.6, APIs: 1, Instructions: 55COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440260 Relevance: 1.5, APIs: 1, Instructions: 45memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004358EF Relevance: 1.5, APIs: 1, Instructions: 26COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00432648 Relevance: 1.5, APIs: 1, Instructions: 24COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E860 Relevance: 1.5, APIs: 1, Instructions: 22memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E840 Relevance: 1.5, APIs: 1, Instructions: 9memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00411B20 Relevance: 150.7, APIs: 4, Strings: 81, Instructions: 1908COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041CAA0 Relevance: 83.7, Strings: 66, Instructions: 1193COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00422D17 Relevance: 71.6, Strings: 57, Instructions: 394COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00425E00 Relevance: 34.2, Strings: 27, Instructions: 430COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004251E8 Relevance: 34.2, Strings: 27, Instructions: 426COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043AEA0 Relevance: 22.9, Strings: 18, Instructions: 366COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00430050 Relevance: 14.6, Strings: 11, Instructions: 875COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043EE80 Relevance: 8.1, Strings: 6, Instructions: 616COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00417451 Relevance: 6.7, Strings: 5, Instructions: 462COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040A910 Relevance: 6.7, Strings: 5, Instructions: 422COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004091C0 Relevance: 6.6, Strings: 5, Instructions: 382COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040AE60 Relevance: 5.5, Strings: 4, Instructions: 489COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00420B10 Relevance: 5.5, Strings: 4, Instructions: 470COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F799 Relevance: 5.4, Strings: 4, Instructions: 395COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408EB0 Relevance: 5.3, Strings: 4, Instructions: 299COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041AA90 Relevance: 4.4, Strings: 3, Instructions: 606COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427F8D Relevance: 4.2, Strings: 3, Instructions: 445COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004095A0 Relevance: 4.1, Strings: 3, Instructions: 375COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00419710 Relevance: 4.0, Strings: 3, Instructions: 239COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00419470 Relevance: 4.0, Strings: 3, Instructions: 230COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042E5C2 Relevance: 3.9, Strings: 3, Instructions: 189COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00413E50 Relevance: 3.4, Strings: 2, Instructions: 884COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404C00 Relevance: 3.3, Strings: 2, Instructions: 792COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041E250 Relevance: 3.2, Strings: 2, Instructions: 677COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041F710 Relevance: 3.0, Strings: 2, Instructions: 527COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042CCA0 Relevance: 3.0, Strings: 2, Instructions: 512COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042ABC0 Relevance: 3.0, Strings: 2, Instructions: 454COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041B200 Relevance: 2.9, Strings: 2, Instructions: 440COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043C410 Relevance: 2.8, Strings: 2, Instructions: 349COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004042D0 Relevance: 2.8, Strings: 2, Instructions: 329COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041C370 Relevance: 2.8, Strings: 2, Instructions: 273COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00433810 Relevance: 2.7, Strings: 2, Instructions: 239COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00436140 Relevance: 2.7, Strings: 2, Instructions: 234COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042DFAF Relevance: 2.6, Strings: 2, Instructions: 124COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042E7EB Relevance: 2.6, Strings: 2, Instructions: 108COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00411078 Relevance: 2.1, APIs: 1, Instructions: 560COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00414C9C Relevance: 2.0, Strings: 1, Instructions: 784COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441910 Relevance: 1.9, Strings: 1, Instructions: 646COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043CAA7 Relevance: 1.9, Strings: 1, Instructions: 620COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441A56 Relevance: 1.8, Strings: 1, Instructions: 520COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441A94 Relevance: 1.7, Strings: 1, Instructions: 498COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441B40 Relevance: 1.7, Strings: 1, Instructions: 445COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041BE00 Relevance: 1.7, Strings: 1, Instructions: 443COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441BD0 Relevance: 1.7, Strings: 1, Instructions: 410COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441C60 Relevance: 1.7, Strings: 1, Instructions: 409COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00445260 Relevance: 1.6, Strings: 1, Instructions: 383COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041A574 Relevance: 1.6, Strings: 1, Instructions: 324COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004273A0 Relevance: 1.6, Strings: 1, Instructions: 311COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004082A0 Relevance: 1.5, Strings: 1, Instructions: 288COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042D893 Relevance: 1.5, Strings: 1, Instructions: 281COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405DC0 Relevance: 1.5, Strings: 1, Instructions: 271COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004148B0 Relevance: 1.5, Strings: 1, Instructions: 263COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042E002 Relevance: 1.4, Strings: 1, Instructions: 152COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004270D0 Relevance: 1.4, Strings: 1, Instructions: 151COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426A00 Relevance: 1.3, Strings: 1, Instructions: 11COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00433AD0 Relevance: .8, Instructions: 767COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406620 Relevance: .7, Instructions: 665COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402EF0 Relevance: .7, Instructions: 664COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407400 Relevance: .6, Instructions: 625COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403920 Relevance: .6, Instructions: 600COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040E4B0 Relevance: .4, Instructions: 450COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004058E0 Relevance: .4, Instructions: 413COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043974A Relevance: .4, Instructions: 401COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004288BA Relevance: .4, Instructions: 371COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415590 Relevance: .3, Instructions: 326COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00428D76 Relevance: .3, Instructions: 319COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406190 Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00439CD8 Relevance: .3, Instructions: 297COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043912C Relevance: .3, Instructions: 293COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041BAD0 Relevance: .3, Instructions: 290COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00442A90 Relevance: .3, Instructions: 289COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00432188 Relevance: .3, Instructions: 280COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426D70 Relevance: .3, Instructions: 280COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004311E6 Relevance: .3, Instructions: 274COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00431A88 Relevance: .3, Instructions: 273COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041C7D0 Relevance: .2, Instructions: 245COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004427E0 Relevance: .2, Instructions: 242COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041DC40 Relevance: .2, Instructions: 204COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043AC40 Relevance: .2, Instructions: 189COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004421B0 Relevance: .2, Instructions: 171COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402940 Relevance: .2, Instructions: 164COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004412B1 Relevance: .2, Instructions: 160COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00429871 Relevance: .1, Instructions: 136COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408CD0 Relevance: .1, Instructions: 126COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040DFEA Relevance: .1, Instructions: 126COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040DE72 Relevance: .1, Instructions: 120COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043EB00 Relevance: .1, Instructions: 86COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415C25 Relevance: .1, Instructions: 80COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402B20 Relevance: .1, Instructions: 78COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440CD8 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00438AF0 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042B430 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043EE10 Relevance: .0, Instructions: 46COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041DEB0 Relevance: .0, Instructions: 21COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440310 Relevance: .0, Instructions: 20COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|