Windows
Analysis Report
mWAik6b.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- mWAik6b.exe (PID: 2944 cmdline:
"C:\Users\ user\Deskt op\mWAik6b .exe" MD5: 16A53E18CA53FE602974F0A4B7FFBF3C) - mWAik6b.exe (PID: 5988 cmdline:
"C:\Users\ user\Deskt op\mWAik6b .exe" MD5: 16A53E18CA53FE602974F0A4B7FFBF3C) - mWAik6b.exe (PID: 940 cmdline:
"C:\Users\ user\Deskt op\mWAik6b .exe" MD5: 16A53E18CA53FE602974F0A4B7FFBF3C) - WerFault.exe (PID: 344 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 2 944 -s 928 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["pain-temper.bond", "crookedfoshe.bond", "strivehelpeu.bond", "immolatechallen.bond", "stripedre-lot.bond", "jarry-fixxer.bond", "growthselec.bond", "cultureddirtys.click", "jarry-deatile.bond"], "Build id": "LPnhqo--zdqcssmdpvku"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T16:15:10.078904+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49705 | 172.67.150.129 | 443 | TCP |
2025-01-14T16:15:11.108776+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49706 | 172.67.150.129 | 443 | TCP |
2025-01-14T16:15:12.429285+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49708 | 172.67.150.129 | 443 | TCP |
2025-01-14T16:15:13.839625+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49713 | 172.67.150.129 | 443 | TCP |
2025-01-14T16:15:15.246349+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49715 | 172.67.150.129 | 443 | TCP |
2025-01-14T16:15:16.391120+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49716 | 172.67.150.129 | 443 | TCP |
2025-01-14T16:15:20.742313+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49719 | 172.67.150.129 | 443 | TCP |
2025-01-14T16:15:29.547266+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49760 | 172.67.150.129 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T16:15:10.627860+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49705 | 172.67.150.129 | 443 | TCP |
2025-01-14T16:15:11.585608+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49706 | 172.67.150.129 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T16:15:10.627860+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.5 | 49705 | 172.67.150.129 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T16:15:11.585608+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.5 | 49706 | 172.67.150.129 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T16:15:19.932487+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49716 | 172.67.150.129 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Code function: | 2_2_0041734A |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 2_2_00424050 | |
Source: | Code function: | 2_2_00427A00 | |
Source: | Code function: | 2_2_0040D22E | |
Source: | Code function: | 2_2_0042EAD2 | |
Source: | Code function: | 2_2_0042E2AC | |
Source: | Code function: | 2_2_0041734A | |
Source: | Code function: | 2_2_00409B10 | |
Source: | Code function: | 2_2_00441BA0 | |
Source: | Code function: | 2_2_0043A490 | |
Source: | Code function: | 2_2_0043A5E0 | |
Source: | Code function: | 2_2_00440DF0 | |
Source: | Code function: | 2_2_00440DF0 | |
Source: | Code function: | 2_2_0042A860 | |
Source: | Code function: | 2_2_0041E800 | |
Source: | Code function: | 2_2_0043D800 | |
Source: | Code function: | 2_2_004190C0 | |
Source: | Code function: | 2_2_004190C0 | |
Source: | Code function: | 2_2_00405880 | |
Source: | Code function: | 2_2_00405880 | |
Source: | Code function: | 2_2_0042F093 | |
Source: | Code function: | 2_2_0042F093 | |
Source: | Code function: | 2_2_0043B0B0 | |
Source: | Code function: | 2_2_0043B0B0 | |
Source: | Code function: | 2_2_0042D150 | |
Source: | Code function: | 2_2_0040E158 | |
Source: | Code function: | 2_2_0040E158 | |
Source: | Code function: | 2_2_00418927 | |
Source: | Code function: | 2_2_00418927 | |
Source: | Code function: | 2_2_0042F9CB | |
Source: | Code function: | 2_2_004091E0 | |
Source: | Code function: | 2_2_0043D990 | |
Source: | Code function: | 2_2_004201B0 | |
Source: | Code function: | 2_2_004269BC | |
Source: | Code function: | 2_2_00424A40 | |
Source: | Code function: | 2_2_0040AA70 | |
Source: | Code function: | 2_2_0040AA70 | |
Source: | Code function: | 2_2_00427230 | |
Source: | Code function: | 2_2_0041A280 | |
Source: | Code function: | 2_2_0041EA90 | |
Source: | Code function: | 2_2_00421290 | |
Source: | Code function: | 2_2_00440340 | |
Source: | Code function: | 2_2_00429374 | |
Source: | Code function: | 2_2_00402B30 | |
Source: | Code function: | 2_2_0042AB3B | |
Source: | Code function: | 2_2_0042AB3B | |
Source: | Code function: | 2_2_004073F0 | |
Source: | Code function: | 2_2_004073F0 | |
Source: | Code function: | 2_2_0042FB85 | |
Source: | Code function: | 2_2_0042FB85 | |
Source: | Code function: | 2_2_0042FB85 | |
Source: | Code function: | 2_2_004283A6 | |
Source: | Code function: | 2_2_004403B0 | |
Source: | Code function: | 2_2_004403B0 | |
Source: | Code function: | 2_2_0042CC70 | |
Source: | Code function: | 2_2_0042A4C7 | |
Source: | Code function: | 2_2_0042B4E0 | |
Source: | Code function: | 2_2_0042D4E0 | |
Source: | Code function: | 2_2_0042D4E0 | |
Source: | Code function: | 2_2_0043B4A0 | |
Source: | Code function: | 2_2_004404B0 | |
Source: | Code function: | 2_2_0041655E | |
Source: | Code function: | 2_2_0041B560 | |
Source: | Code function: | 2_2_0041B560 | |
Source: | Code function: | 2_2_0042F578 | |
Source: | Code function: | 2_2_0042F578 | |
Source: | Code function: | 2_2_00429DCC | |
Source: | Code function: | 2_2_00437DF0 | |
Source: | Code function: | 2_2_00427D90 | |
Source: | Code function: | 2_2_00427D90 | |
Source: | Code function: | 2_2_00427D90 | |
Source: | Code function: | 2_2_00415599 | |
Source: | Code function: | 2_2_00415599 | |
Source: | Code function: | 2_2_004405A0 | |
Source: | Code function: | 2_2_00417DAA | |
Source: | Code function: | 2_2_00426E50 | |
Source: | Code function: | 2_2_00419E70 | |
Source: | Code function: | 2_2_00440630 | |
Source: | Code function: | 2_2_004406D0 | |
Source: | Code function: | 2_2_0040D6DE | |
Source: | Code function: | 2_2_0042DE89 | |
Source: | Code function: | 2_2_00427EAD | |
Source: | Code function: | 2_2_0043FEB1 | |
Source: | Code function: | 2_2_0042AF5C | |
Source: | Code function: | 2_2_00408F70 | |
Source: | Code function: | 2_2_004247C0 | |
Source: | Code function: | 2_2_004217C0 | |
Source: | Code function: | 2_2_00427F95 | |
Source: | Code function: | 2_2_00427F95 | |
Source: | Code function: | 2_2_0040C7B6 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 2_2_00436020 |
Source: | Code function: | 2_2_00436020 |
Source: | Code function: | 2_2_004361B0 |
Source: | Code function: | 2_2_00424050 | |
Source: | Code function: | 2_2_0041095C | |
Source: | Code function: | 2_2_00427A00 | |
Source: | Code function: | 2_2_0042E2AC | |
Source: | Code function: | 2_2_0041734A | |
Source: | Code function: | 2_2_00420BA0 | |
Source: | Code function: | 2_2_0043D450 | |
Source: | Code function: | 2_2_0043A5E0 | |
Source: | Code function: | 2_2_00440ED0 | |
Source: | Code function: | 2_2_004086B0 | |
Source: | Code function: | 2_2_00441750 | |
Source: | Code function: | 2_2_004347BD | |
Source: | Code function: | 2_2_0041C04E | |
Source: | Code function: | 2_2_0041C850 | |
Source: | Code function: | 2_2_00414812 | |
Source: | Code function: | 2_2_004190C0 | |
Source: | Code function: | 2_2_00405880 | |
Source: | Code function: | 2_2_0043E8A0 | |
Source: | Code function: | 2_2_004038B0 | |
Source: | Code function: | 2_2_0043B0B0 | |
Source: | Code function: | 2_2_004388B6 | |
Source: | Code function: | 2_2_0043194F | |
Source: | Code function: | 2_2_0040E970 | |
Source: | Code function: | 2_2_00408920 | |
Source: | Code function: | 2_2_00418927 | |
Source: | Code function: | 2_2_004121C0 | |
Source: | Code function: | 2_2_004091E0 | |
Source: | Code function: | 2_2_00406190 | |
Source: | Code function: | 2_2_00433992 | |
Source: | Code function: | 2_2_00432195 | |
Source: | Code function: | 2_2_0041D1A0 | |
Source: | Code function: | 2_2_004201B0 | |
Source: | Code function: | 2_2_0043F1BA | |
Source: | Code function: | 2_2_00424A40 | |
Source: | Code function: | 2_2_00434247 | |
Source: | Code function: | 2_2_00404260 | |
Source: | Code function: | 2_2_00444260 | |
Source: | Code function: | 2_2_0040AA70 | |
Source: | Code function: | 2_2_0043DA00 | |
Source: | Code function: | 2_2_00427230 | |
Source: | Code function: | 2_2_00421290 | |
Source: | Code function: | 2_2_00435B60 | |
Source: | Code function: | 2_2_00429374 | |
Source: | Code function: | 2_2_0040CB08 | |
Source: | Code function: | 2_2_004073F0 | |
Source: | Code function: | 2_2_0042FB85 | |
Source: | Code function: | 2_2_00404B90 | |
Source: | Code function: | 2_2_004403B0 | |
Source: | Code function: | 2_2_00428C48 | |
Source: | Code function: | 2_2_0041EC00 | |
Source: | Code function: | 2_2_00428C2A | |
Source: | Code function: | 2_2_0043943D | |
Source: | Code function: | 2_2_0041C4E0 | |
Source: | Code function: | 2_2_0041CCF0 | |
Source: | Code function: | 2_2_00439CF0 | |
Source: | Code function: | 2_2_004184F8 | |
Source: | Code function: | 2_2_0041D490 | |
Source: | Code function: | 2_2_00441490 | |
Source: | Code function: | 2_2_004404B0 | |
Source: | Code function: | 2_2_0041655E | |
Source: | Code function: | 2_2_0041B560 | |
Source: | Code function: | 2_2_00411507 | |
Source: | Code function: | 2_2_00405DD0 | |
Source: | Code function: | 2_2_004095F0 | |
Source: | Code function: | 2_2_00427D90 | |
Source: | Code function: | 2_2_00415599 | |
Source: | Code function: | 2_2_004405A0 | |
Source: | Code function: | 2_2_00432642 | |
Source: | Code function: | 2_2_00426E50 | |
Source: | Code function: | 2_2_00406620 | |
Source: | Code function: | 2_2_0043AE30 | |
Source: | Code function: | 2_2_00440630 | |
Source: | Code function: | 2_2_004406D0 | |
Source: | Code function: | 2_2_00402E90 | |
Source: | Code function: | 2_2_00439F50 | |
Source: | Code function: | 2_2_0043B757 | |
Source: | Code function: | 2_2_00430765 | |
Source: | Code function: | 2_2_00415F0F | |
Source: | Code function: | 2_2_0040AF10 | |
Source: | Code function: | 2_2_00429F1C | |
Source: | Code function: | 2_2_00414F34 | |
Source: | Code function: | 2_2_004217C0 | |
Source: | Code function: | 2_2_004237D9 | |
Source: | Code function: | 2_2_00427F95 |
Source: | Code function: | ||
Source: | Code function: |
Source: | Process created: |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 2_2_0043A5E0 |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: |
Source: | Code function: | 2_2_0044807D | |
Source: | Code function: | 2_2_00446984 | |
Source: | Code function: | 2_2_00440343 | |
Source: | Code function: | 2_2_004464ED | |
Source: | Code function: | 2_2_004464F5 | |
Source: | Code function: | 2_2_004464F1 | |
Source: | Code function: | 2_2_0044559E |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 2_2_0043EF30 |
Source: | Code function: | 0_2_024A7F65 | |
Source: | Code function: | 0_2_024A80E2 |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Code function: | 0_2_024A7F65 |
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 211 Process Injection | 23 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 1 Query Registry | Remote Services | 1 Screen Capture | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Disable or Modify Tools | LSASS Memory | 231 Security Software Discovery | Remote Desktop Protocol | 1 Archive Collected Data | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 211 Process Injection | Security Account Manager | 23 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | 41 Data from Local System | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 11 Deobfuscate/Decode Files or Information | NTDS | 1 Process Discovery | Distributed Component Object Model | 2 Clipboard Data | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 3 Obfuscated Files or Information | LSA Secrets | 1 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Software Packing | Cached Domain Credentials | 22 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 Timestomp | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 DLL Side-Loading | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
29% | Virustotal | Browse | ||
32% | ReversingLabs | |||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
cultureddirtys.click | 172.67.150.129 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
172.67.150.129 | cultureddirtys.click | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1590828 |
Start date and time: | 2025-01-14 16:14:15 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 45s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 10 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | mWAik6b.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@6/5@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 20.42.65.92, 40.126.32.68, 13.107.246.45, 20.109.210.53
- Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
10:15:09 | API Interceptor | |
10:15:24 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | HTMLPhisher | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_mWAik6b.exe_a7fd83d59ed2df8d43c4fb3810d1dbe838887ce9_5e5638ff_9adb1ad0-0525-4e47-848b-7c5f41c29b2d\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.8880884374839403 |
Encrypted: | false |
SSDEEP: | 96:JZFju2Jc7tsog0HjTOAqyS3QXIDcQlc6VcEdcw3F+BHUHZ0ownOgHkEwH3dEFYRP:n02c7tXeA0LR3Ua2GzuiFUZ24IO8N |
MD5: | 332D50B3FCC4F1B9E3614680C47C112F |
SHA1: | 4243F226F898D86F4585A18BAF8F5DC8E21E7AA5 |
SHA-256: | 243771C27BC193A198B71D07715B38F8F6DFD8E6080F6C8082FE5F0990050870 |
SHA-512: | D7216A3F621105C81DED49AA1C406AC5F20336C34FB052B2CE84F84DBB2172963B9ED44A06E337ECF487FC6576D8369130C0604531A879BC3C7867F823191BA7 |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 155381 |
Entropy (8bit): | 3.7104953619325167 |
Encrypted: | false |
SSDEEP: | 1536:TVepN4uE2aODoLTg1A+XQCD6tT97hNuBojR3CC+H:Tm4uEqELTgl7k7rypH |
MD5: | 9EDF37002B03493CB43F99CF761987C5 |
SHA1: | 1A8CCD70E04527F2EB69DB82065E305E44D5D926 |
SHA-256: | 354A755903F2FCA731500C4A7699FD603AF05B4928BC334F69AA54FC730D43C9 |
SHA-512: | AB0760D23EFA9267013BA1C8E0D791B3DF0849D56B777AB1E99A6FEE30626332714BBA97047887911878B23C3D458DCBC4827424F3757A85470B5768D0DAF4A8 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8370 |
Entropy (8bit): | 3.690313764003803 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJPjr60P6YEIMSUvZ/gmfawVJNprB89biNsf52m:R6lXJ7r6U6YEDSUB/gmffVJ+iGfx |
MD5: | 201ECB0EA18F546D7DA356BE9CC33DE0 |
SHA1: | 1456997D86962079DF8FFEFDF1F71C828898E683 |
SHA-256: | CEA131FE68DD8F008447D0688BC36B10C48DD042542CD0C9B893B3F1E1DD4594 |
SHA-512: | 99D21190A231E72B9567A94A2867CA4C1177ED0833A8E3719F3F303DB59CE33BD0418FB87FA538F34D757F70E16810EF0BED1D7EDAC89CB23456203C92684434 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4735 |
Entropy (8bit): | 4.443859365705223 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsDJg77aI9nkWpW8VY/oYm8M4JodxPcf6Fuj+q8vodxPcfxQrYBd:uIjfdI7N97VUJZf5jKZfxQrYBd |
MD5: | 9A2FBEC6ADB9BCE93923310FC7889CC8 |
SHA1: | 488E5B4E47A9C97879C10C836C824DBB431BF9D9 |
SHA-256: | 832EEEFAC8B22CD8E9FDFADF28DE7DF204D9EEA9B11BAB7E8A31D7336B6B8798 |
SHA-512: | 4A44DA541ED8C4262EA72D9B46B1DCEE63481C6523BC8116DA7808AE66B4059A0AC5E8A9CF0803A236A657977AF9A0457B987D58E3A506C50FE7A7759B4723D0 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.421704737812632 |
Encrypted: | false |
SSDEEP: | 6144:kSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnN/0uhiTw:vvloTMW+EZMM6DFy503w |
MD5: | 15C8FBD569466BA0705074060287773A |
SHA1: | 1BA5DF26BA1685FB2C09049D78778864DCA85FF2 |
SHA-256: | 64496447304B4D65944E5C38D23FDA41C98A8BE31C328F5EBD3DC4437A8B8192 |
SHA-512: | B1C81514EDC493081AEB5A013E0906380C54A82A9DD258485E0A8098F50665ABC5D70FEEC9C02B3606DA7F5E757EEBC00313A7720F1B4040A0DCB9E90374FB5C |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.636437154879793 |
TrID: |
|
File name: | mWAik6b.exe |
File size: | 456'304 bytes |
MD5: | 16a53e18ca53fe602974f0a4b7ffbf3c |
SHA1: | 8c4b935040158b1ba65a599413b14e8d9e3b975e |
SHA256: | bb3b567a9f65a64f444738b2c73e8698db247a6b78aa0d1c6ae6cd05bdcc31a9 |
SHA512: | 678056adbf4bd491d9e980b79ed587bb7f04c1acfcbbfabbbe8d1d04de401beaa8ba4ebd84cf2e4cbbef49dc1d98f13f99bedf2afeca162da186d852577b29cd |
SSDEEP: | 12288:zA0WK2+gqm3fsyXAyqVEOkg1LIRgxVPTLTl:00tmLgVCgLWshTl |
TLSH: | F0A4D0686A68D537C2AE4775E4E3511263F1A4D3FD62F745BC8804F24D12380AA7A2FF |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2.................0.............>.... ... ....@.. .......................@............`................................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x421a3e |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0xECEDE332 [Sun Dec 18 02:19:30 2095 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Signature Valid: | false |
Signature Issuer: | CN=DigiCert EV Code Signing CA (SHA2), OU=www.digicert.com, O=DigiCert Inc, C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 332CDC164B1324C3FF3F64E228C5FFFC |
Thumbprint SHA-1: | CBFB3D25134A5FF6FCF2924D5B4BE16194EA7E13 |
Thumbprint SHA-256: | 531855F05B9D55E4F6DDEBC443706382DDB9ACBD2B8AB24004822BE204420943 |
Serial: | 0C9838F673F9B1CCE395CFAB2B6684E4 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x219f0 | 0x4b | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x22000 | 0x598 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x6d000 | 0x2670 | .idata |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x24000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x219a7 | 0x1c | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x1fa44 | 0x1fc00 | 7c297cc8f463f81875ed0f7ba3dd3ff0 | False | 0.4013056717519685 | data | 5.796591200875089 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x22000 | 0x598 | 0x600 | 511dd0b163083f747b4fa3f1e450067c | False | 0.41015625 | data | 4.038713703339799 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x24000 | 0xc | 0x200 | b1171333753a88cda4e7356665065f4c | False | 0.044921875 | data | 0.10191042566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.idata | 0x26000 | 0x4c800 | 0x4c800 | 7de813a6b35a7da0967b3dd52fa25e14 | False | 1.0003382863562091 | data | 7.999390808292112 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x220a0 | 0x30c | data | 0.41923076923076924 | ||
RT_MANIFEST | 0x223ac | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T16:15:10.078904+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49705 | 172.67.150.129 | 443 | TCP |
2025-01-14T16:15:10.627860+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.5 | 49705 | 172.67.150.129 | 443 | TCP |
2025-01-14T16:15:10.627860+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49705 | 172.67.150.129 | 443 | TCP |
2025-01-14T16:15:11.108776+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49706 | 172.67.150.129 | 443 | TCP |
2025-01-14T16:15:11.585608+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.5 | 49706 | 172.67.150.129 | 443 | TCP |
2025-01-14T16:15:11.585608+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49706 | 172.67.150.129 | 443 | TCP |
2025-01-14T16:15:12.429285+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49708 | 172.67.150.129 | 443 | TCP |
2025-01-14T16:15:13.839625+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49713 | 172.67.150.129 | 443 | TCP |
2025-01-14T16:15:15.246349+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49715 | 172.67.150.129 | 443 | TCP |
2025-01-14T16:15:16.391120+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49716 | 172.67.150.129 | 443 | TCP |
2025-01-14T16:15:19.932487+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.5 | 49716 | 172.67.150.129 | 443 | TCP |
2025-01-14T16:15:20.742313+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49719 | 172.67.150.129 | 443 | TCP |
2025-01-14T16:15:29.547266+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49760 | 172.67.150.129 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 14, 2025 16:15:09.612021923 CET | 49705 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:09.612107992 CET | 443 | 49705 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:09.612209082 CET | 49705 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:09.613903046 CET | 49705 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:09.613933086 CET | 443 | 49705 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:10.078810930 CET | 443 | 49705 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:10.078903913 CET | 49705 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:10.121494055 CET | 49705 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:10.121520996 CET | 443 | 49705 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:10.121865988 CET | 443 | 49705 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:10.172396898 CET | 49705 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:10.203718901 CET | 49705 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:10.203761101 CET | 49705 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:10.203871012 CET | 443 | 49705 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:10.627815962 CET | 443 | 49705 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:10.627897024 CET | 443 | 49705 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:10.627966881 CET | 49705 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:10.630580902 CET | 49705 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:10.630613089 CET | 443 | 49705 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:10.630635023 CET | 49705 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:10.630640984 CET | 443 | 49705 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:10.649111986 CET | 49706 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:10.649161100 CET | 443 | 49706 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:10.649267912 CET | 49706 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:10.650924921 CET | 49706 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:10.650937080 CET | 443 | 49706 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:11.108670950 CET | 443 | 49706 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:11.108776093 CET | 49706 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:11.137386084 CET | 49706 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:11.137403965 CET | 443 | 49706 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:11.137698889 CET | 443 | 49706 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:11.138998032 CET | 49706 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:11.139020920 CET | 49706 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:11.139072895 CET | 443 | 49706 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:11.585609913 CET | 443 | 49706 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:11.585691929 CET | 443 | 49706 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:11.585767031 CET | 443 | 49706 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:11.585799932 CET | 49706 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:11.585829020 CET | 443 | 49706 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:11.585879087 CET | 49706 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:11.585885048 CET | 443 | 49706 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:11.585968018 CET | 443 | 49706 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:11.586019993 CET | 49706 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:11.586025000 CET | 443 | 49706 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:11.586292982 CET | 443 | 49706 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:11.586349964 CET | 49706 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:11.586354971 CET | 443 | 49706 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:11.590491056 CET | 443 | 49706 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:11.590565920 CET | 49706 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:11.590570927 CET | 443 | 49706 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:11.641051054 CET | 49706 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:11.641083002 CET | 443 | 49706 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:11.672182083 CET | 443 | 49706 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:11.672208071 CET | 443 | 49706 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:11.672264099 CET | 49706 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:11.672291994 CET | 443 | 49706 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:11.672307968 CET | 443 | 49706 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:11.672343969 CET | 49706 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:11.672375917 CET | 49706 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:11.672605991 CET | 49706 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:11.672621012 CET | 443 | 49706 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:11.672636986 CET | 49706 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:11.672642946 CET | 443 | 49706 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:11.939053059 CET | 49708 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:11.939116955 CET | 443 | 49708 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:11.939184904 CET | 49708 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:11.939873934 CET | 49708 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:11.939889908 CET | 443 | 49708 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:12.429176092 CET | 443 | 49708 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:12.429285049 CET | 49708 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:12.430881977 CET | 49708 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:12.430911064 CET | 443 | 49708 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:12.431207895 CET | 443 | 49708 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:12.432439089 CET | 49708 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:12.432631969 CET | 49708 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:12.432682991 CET | 443 | 49708 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:13.339165926 CET | 443 | 49708 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:13.339297056 CET | 443 | 49708 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:13.339432955 CET | 49708 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:13.339621067 CET | 49708 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:13.339643955 CET | 443 | 49708 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:13.356189013 CET | 49713 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:13.356242895 CET | 443 | 49713 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:13.356348038 CET | 49713 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:13.356672049 CET | 49713 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:13.356692076 CET | 443 | 49713 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:13.839546919 CET | 443 | 49713 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:13.839624882 CET | 49713 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:13.840919971 CET | 49713 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:13.840929985 CET | 443 | 49713 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:13.841178894 CET | 443 | 49713 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:13.850585938 CET | 49713 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:13.850636959 CET | 49713 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:13.850661039 CET | 443 | 49713 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:13.850708008 CET | 49713 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:13.891345978 CET | 443 | 49713 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:14.447160959 CET | 443 | 49713 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:14.447261095 CET | 443 | 49713 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:14.447320938 CET | 49713 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:14.452724934 CET | 49713 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:14.452754974 CET | 443 | 49713 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:14.776185989 CET | 49715 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:14.776230097 CET | 443 | 49715 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:14.776309013 CET | 49715 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:14.776618958 CET | 49715 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:14.776631117 CET | 443 | 49715 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:15.246203899 CET | 443 | 49715 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:15.246349096 CET | 49715 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:15.247669935 CET | 49715 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:15.247688055 CET | 443 | 49715 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:15.248203993 CET | 443 | 49715 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:15.264863968 CET | 49715 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:15.265010118 CET | 49715 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:15.265072107 CET | 443 | 49715 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:15.265194893 CET | 49715 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:15.265208006 CET | 443 | 49715 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:15.777400970 CET | 443 | 49715 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:15.777513027 CET | 443 | 49715 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:15.777565956 CET | 49715 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:15.777729988 CET | 49715 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:15.777745008 CET | 443 | 49715 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:15.921300888 CET | 49716 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:15.921401024 CET | 443 | 49716 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:15.921499968 CET | 49716 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:15.921830893 CET | 49716 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:15.921866894 CET | 443 | 49716 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:16.391024113 CET | 443 | 49716 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:16.391119957 CET | 49716 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:16.392426014 CET | 49716 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:16.392457962 CET | 443 | 49716 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:16.392693043 CET | 443 | 49716 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:16.393714905 CET | 49716 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:16.393811941 CET | 49716 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:16.393831015 CET | 443 | 49716 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:19.932498932 CET | 443 | 49716 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:19.932599068 CET | 443 | 49716 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:19.932689905 CET | 49716 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:19.932949066 CET | 49716 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:19.932991028 CET | 443 | 49716 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:20.269002914 CET | 49719 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:20.269052029 CET | 443 | 49719 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:20.269141912 CET | 49719 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:20.269450903 CET | 49719 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:20.269463062 CET | 443 | 49719 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:20.742114067 CET | 443 | 49719 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:20.742312908 CET | 49719 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:20.743474960 CET | 49719 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:20.743482113 CET | 443 | 49719 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:20.743760109 CET | 443 | 49719 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:20.745048046 CET | 49719 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:20.745716095 CET | 49719 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:20.745740891 CET | 443 | 49719 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:20.745846987 CET | 49719 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:20.745862007 CET | 443 | 49719 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:20.745964050 CET | 49719 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:20.746037006 CET | 443 | 49719 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:20.746157885 CET | 49719 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:20.746181965 CET | 443 | 49719 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:20.746314049 CET | 49719 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:20.746340036 CET | 443 | 49719 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:20.746469021 CET | 49719 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:20.746484995 CET | 443 | 49719 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:20.746498108 CET | 49719 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:20.746516943 CET | 443 | 49719 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:20.746710062 CET | 49719 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:20.746743917 CET | 49719 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:20.756113052 CET | 443 | 49719 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:20.756303072 CET | 49719 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:20.756346941 CET | 49719 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:20.756369114 CET | 49719 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:20.756408930 CET | 443 | 49719 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:20.756540060 CET | 49719 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:20.756565094 CET | 443 | 49719 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:20.756592035 CET | 49719 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:20.756608963 CET | 49719 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:20.756645918 CET | 443 | 49719 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:29.360846043 CET | 443 | 49719 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:29.360955954 CET | 443 | 49719 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:29.361176014 CET | 49719 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:29.361299992 CET | 49719 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:29.361314058 CET | 443 | 49719 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:29.372662067 CET | 49760 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:29.372699022 CET | 443 | 49760 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:29.372817039 CET | 49760 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:29.373173952 CET | 49760 | 443 | 192.168.2.5 | 172.67.150.129 |
Jan 14, 2025 16:15:29.373189926 CET | 443 | 49760 | 172.67.150.129 | 192.168.2.5 |
Jan 14, 2025 16:15:29.547266006 CET | 49760 | 443 | 192.168.2.5 | 172.67.150.129 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 14, 2025 16:15:09.590918064 CET | 53970 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 16:15:09.604902983 CET | 53 | 53970 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 14, 2025 16:15:09.590918064 CET | 192.168.2.5 | 1.1.1.1 | 0xfb9b | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 14, 2025 16:15:09.604902983 CET | 1.1.1.1 | 192.168.2.5 | 0xfb9b | No error (0) | 172.67.150.129 | A (IP address) | IN (0x0001) | false | ||
Jan 14, 2025 16:15:09.604902983 CET | 1.1.1.1 | 192.168.2.5 | 0xfb9b | No error (0) | 104.21.90.4 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49705 | 172.67.150.129 | 443 | 940 | C:\Users\user\Desktop\mWAik6b.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 15:15:10 UTC | 267 | OUT | |
2025-01-14 15:15:10 UTC | 8 | OUT | |
2025-01-14 15:15:10 UTC | 1130 | IN | |
2025-01-14 15:15:10 UTC | 7 | IN | |
2025-01-14 15:15:10 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49706 | 172.67.150.129 | 443 | 940 | C:\Users\user\Desktop\mWAik6b.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 15:15:11 UTC | 268 | OUT | |
2025-01-14 15:15:11 UTC | 54 | OUT | |
2025-01-14 15:15:11 UTC | 1133 | IN | |
2025-01-14 15:15:11 UTC | 236 | IN | |
2025-01-14 15:15:11 UTC | 909 | IN | |
2025-01-14 15:15:11 UTC | 1369 | IN | |
2025-01-14 15:15:11 UTC | 1369 | IN | |
2025-01-14 15:15:11 UTC | 1369 | IN | |
2025-01-14 15:15:11 UTC | 1369 | IN | |
2025-01-14 15:15:11 UTC | 1369 | IN | |
2025-01-14 15:15:11 UTC | 1369 | IN | |
2025-01-14 15:15:11 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49708 | 172.67.150.129 | 443 | 940 | C:\Users\user\Desktop\mWAik6b.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 15:15:12 UTC | 281 | OUT | |
2025-01-14 15:15:12 UTC | 12812 | OUT | |
2025-01-14 15:15:13 UTC | 1134 | IN | |
2025-01-14 15:15:13 UTC | 20 | IN | |
2025-01-14 15:15:13 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49713 | 172.67.150.129 | 443 | 940 | C:\Users\user\Desktop\mWAik6b.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 15:15:13 UTC | 280 | OUT | |
2025-01-14 15:15:13 UTC | 15048 | OUT | |
2025-01-14 15:15:14 UTC | 1130 | IN | |
2025-01-14 15:15:14 UTC | 20 | IN | |
2025-01-14 15:15:14 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.5 | 49715 | 172.67.150.129 | 443 | 940 | C:\Users\user\Desktop\mWAik6b.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 15:15:15 UTC | 279 | OUT | |
2025-01-14 15:15:15 UTC | 15331 | OUT | |
2025-01-14 15:15:15 UTC | 5201 | OUT | |
2025-01-14 15:15:15 UTC | 1135 | IN | |
2025-01-14 15:15:15 UTC | 20 | IN | |
2025-01-14 15:15:15 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.5 | 49716 | 172.67.150.129 | 443 | 940 | C:\Users\user\Desktop\mWAik6b.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 15:15:16 UTC | 284 | OUT | |
2025-01-14 15:15:16 UTC | 1404 | OUT | |
2025-01-14 15:15:19 UTC | 1135 | IN | |
2025-01-14 15:15:19 UTC | 20 | IN | |
2025-01-14 15:15:19 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.5 | 49719 | 172.67.150.129 | 443 | 940 | C:\Users\user\Desktop\mWAik6b.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 15:15:20 UTC | 282 | OUT | |
2025-01-14 15:15:20 UTC | 15331 | OUT | |
2025-01-14 15:15:20 UTC | 15331 | OUT | |
2025-01-14 15:15:20 UTC | 15331 | OUT | |
2025-01-14 15:15:20 UTC | 15331 | OUT | |
2025-01-14 15:15:20 UTC | 15331 | OUT | |
2025-01-14 15:15:20 UTC | 15331 | OUT | |
2025-01-14 15:15:20 UTC | 15331 | OUT | |
2025-01-14 15:15:20 UTC | 15331 | OUT | |
2025-01-14 15:15:20 UTC | 15331 | OUT | |
2025-01-14 15:15:20 UTC | 15331 | OUT | |
2025-01-14 15:15:29 UTC | 1151 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 10:15:08 |
Start date: | 14/01/2025 |
Path: | C:\Users\user\Desktop\mWAik6b.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x30000 |
File size: | 456'304 bytes |
MD5 hash: | 16A53E18CA53FE602974F0A4B7FFBF3C |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 10:15:08 |
Start date: | 14/01/2025 |
Path: | C:\Users\user\Desktop\mWAik6b.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x250000 |
File size: | 456'304 bytes |
MD5 hash: | 16A53E18CA53FE602974F0A4B7FFBF3C |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 10:15:08 |
Start date: | 14/01/2025 |
Path: | C:\Users\user\Desktop\mWAik6b.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xc80000 |
File size: | 456'304 bytes |
MD5 hash: | 16A53E18CA53FE602974F0A4B7FFBF3C |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 6 |
Start time: | 10:15:09 |
Start date: | 14/01/2025 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x200000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 14.1% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 22.5% |
Total number of Nodes: | 40 |
Total number of Limit Nodes: | 3 |
Graph
Function 024A7F65 Relevance: 42.3, APIs: 11, Strings: 13, Instructions: 294threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 024A80E2 Relevance: 12.3, APIs: 6, Strings: 1, Instructions: 82threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 008C2880 Relevance: 1.7, APIs: 1, Instructions: 242COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 008C2104 Relevance: 1.6, APIs: 1, Instructions: 54memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 8.4% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 69% |
Total number of Nodes: | 348 |
Total number of Limit Nodes: | 22 |
Graph
Function 0043A5E0 Relevance: 33.9, APIs: 11, Strings: 8, Instructions: 645memorycomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00420BA0 Relevance: 16.7, Strings: 13, Instructions: 451COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004086B0 Relevance: 10.7, APIs: 5, Strings: 1, Instructions: 190threadCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427A00 Relevance: 5.3, Strings: 4, Instructions: 324COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041095C Relevance: 2.4, APIs: 1, Instructions: 924COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043EF30 Relevance: 1.5, APIs: 1, Instructions: 14libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441BA0 Relevance: 1.4, Strings: 1, Instructions: 124COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042EAD2 Relevance: 1.4, Strings: 1, Instructions: 101COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440DF0 Relevance: 1.3, Strings: 1, Instructions: 74COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440ED0 Relevance: .3, Instructions: 326COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441750 Relevance: .3, Instructions: 293COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043D450 Relevance: .2, Instructions: 230COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004347BD Relevance: .2, Instructions: 169COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043A490 Relevance: .1, Instructions: 132COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040D22E Relevance: .1, Instructions: 129COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409B10 Relevance: .1, Instructions: 70COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042DACF Relevance: 3.1, APIs: 2, Instructions: 71COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040CA9E Relevance: 3.0, APIs: 2, Instructions: 36COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043F8DD Relevance: 3.0, APIs: 2, Instructions: 30COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042E379 Relevance: 1.6, APIs: 1, Instructions: 147COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F3E7 Relevance: 1.6, APIs: 1, Instructions: 101COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F3E1 Relevance: 1.6, APIs: 1, Instructions: 81COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F293 Relevance: 1.6, APIs: 1, Instructions: 66COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043845E Relevance: 1.6, APIs: 1, Instructions: 55COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043EEB0 Relevance: 1.5, APIs: 1, Instructions: 47memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040CA30 Relevance: 1.5, APIs: 1, Instructions: 27COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004338E1 Relevance: 1.5, APIs: 1, Instructions: 23COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00432F78 Relevance: 1.5, APIs: 1, Instructions: 22COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043D420 Relevance: 1.5, APIs: 1, Instructions: 13memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043D400 Relevance: 1.5, APIs: 1, Instructions: 9memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004121C0 Relevance: 145.5, APIs: 2, Strings: 80, Instructions: 1977COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004237D9 Relevance: 115.4, Strings: 92, Instructions: 382COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041D490 Relevance: 64.9, Strings: 51, Instructions: 1135COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004388B6 Relevance: 61.7, Strings: 49, Instructions: 401COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043943D Relevance: 47.8, Strings: 38, Instructions: 309COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00439F50 Relevance: 17.7, Strings: 14, Instructions: 245COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427230 Relevance: 13.1, Strings: 10, Instructions: 567COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041B560 Relevance: 9.4, Strings: 7, Instructions: 651COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004091E0 Relevance: 7.9, Strings: 6, Instructions: 379COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004201B0 Relevance: 6.8, Strings: 5, Instructions: 504COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040CB08 Relevance: 6.5, Strings: 5, Instructions: 286COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041C04E Relevance: 6.5, Strings: 5, Instructions: 256COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043DA00 Relevance: 5.7, Strings: 4, Instructions: 671COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00421290 Relevance: 5.5, Strings: 4, Instructions: 459COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427D90 Relevance: 5.3, Strings: 4, Instructions: 255COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040E158 Relevance: 5.1, Strings: 4, Instructions: 140COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427F95 Relevance: 4.3, Strings: 3, Instructions: 520COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040AF10 Relevance: 4.2, Strings: 3, Instructions: 497COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004095F0 Relevance: 4.1, Strings: 3, Instructions: 393COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040AA70 Relevance: 4.1, Strings: 3, Instructions: 383COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042D4E0 Relevance: 4.1, Strings: 3, Instructions: 372COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426E50 Relevance: 4.1, Strings: 3, Instructions: 339COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00418927 Relevance: 4.1, Strings: 3, Instructions: 327COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041CCF0 Relevance: 4.0, Strings: 3, Instructions: 283COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00435B60 Relevance: 4.0, Strings: 3, Instructions: 258COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041D1A0 Relevance: 4.0, Strings: 3, Instructions: 245COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F093 Relevance: 3.9, Strings: 3, Instructions: 145COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F578 Relevance: 3.9, Strings: 3, Instructions: 142COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404B90 Relevance: 3.3, Strings: 2, Instructions: 792COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043B757 Relevance: 3.1, Strings: 2, Instructions: 648COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404260 Relevance: 2.8, Strings: 2, Instructions: 329COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041C4E0 Relevance: 2.8, Strings: 2, Instructions: 319COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408F70 Relevance: 2.8, Strings: 2, Instructions: 251COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043AE30 Relevance: 2.7, Strings: 2, Instructions: 221COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041A280 Relevance: 2.7, Strings: 2, Instructions: 163COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00414F34 Relevance: 1.8, Strings: 1, Instructions: 558COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00414812 Relevance: 1.8, Strings: 1, Instructions: 543COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004217C0 Relevance: 1.7, Strings: 1, Instructions: 453COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F9CB Relevance: 1.7, APIs: 1, Instructions: 191COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042CC70 Relevance: 1.7, Strings: 1, Instructions: 419COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00444260 Relevance: 1.6, Strings: 1, Instructions: 390COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042FB85 Relevance: 1.6, Strings: 1, Instructions: 366COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043B0B0 Relevance: 1.6, Strings: 1, Instructions: 362COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042AB3B Relevance: 1.6, Strings: 1, Instructions: 360COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042A860 Relevance: 1.6, APIs: 1, Instructions: 100COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405DD0 Relevance: 1.5, Strings: 1, Instructions: 269COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441490 Relevance: 1.5, Strings: 1, Instructions: 252COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042D150 Relevance: 1.5, Strings: 1, Instructions: 236COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043FEB1 Relevance: 1.4, Strings: 1, Instructions: 157COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004269BC Relevance: 1.3, Strings: 1, Instructions: 58COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041EC00 Relevance: .7, Instructions: 722COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004403B0 Relevance: .7, Instructions: 680COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E90 Relevance: .7, Instructions: 669COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406620 Relevance: .7, Instructions: 665COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004073F0 Relevance: .6, Instructions: 611COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004404B0 Relevance: .6, Instructions: 608COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004038B0 Relevance: .6, Instructions: 600COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043194F Relevance: .6, Instructions: 592COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004405A0 Relevance: .5, Instructions: 537COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415599 Relevance: .5, Instructions: 519COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440630 Relevance: .5, Instructions: 502COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004406D0 Relevance: .5, Instructions: 491COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00429F1C Relevance: .5, Instructions: 481COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405880 Relevance: .4, Instructions: 449COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00433992 Relevance: .4, Instructions: 443COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040E970 Relevance: .4, Instructions: 438COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00430765 Relevance: .4, Instructions: 428COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00428C48 Relevance: .4, Instructions: 395COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00434247 Relevance: .4, Instructions: 393COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041C850 Relevance: .4, Instructions: 383COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004184F8 Relevance: .4, Instructions: 371COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00432195 Relevance: .3, Instructions: 329COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406190 Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00432642 Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415F0F Relevance: .3, Instructions: 300COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00428C2A Relevance: .3, Instructions: 263COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00439CF0 Relevance: .2, Instructions: 189COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00417DAA Relevance: .2, Instructions: 174COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E8A0 Relevance: .2, Instructions: 163COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00419E70 Relevance: .2, Instructions: 156COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043F1BA Relevance: .1, Instructions: 146COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043D800 Relevance: .1, Instructions: 144COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043B4A0 Relevance: .1, Instructions: 140COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408920 Relevance: .1, Instructions: 130COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00429DCC Relevance: .1, Instructions: 93COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040C7B6 Relevance: .1, Instructions: 88COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041EA90 Relevance: .1, Instructions: 67COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00437DF0 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042B4E0 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427EAD Relevance: .1, Instructions: 61COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042AF5C Relevance: .1, Instructions: 59COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042DE89 Relevance: .1, Instructions: 51COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043D990 Relevance: .0, Instructions: 46COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402B30 Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440340 Relevance: .0, Instructions: 43COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040D6DE Relevance: .0, Instructions: 38COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041E800 Relevance: .0, Instructions: 21COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004283A6 Relevance: .0, Instructions: 19COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042A4C7 Relevance: .0, Instructions: 6COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|