Windows
Analysis Report
MotivatedFunded.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- MotivatedFunded.exe (PID: 3852 cmdline:
"C:\Users\ user\Deskt op\Motivat edFunded.e xe" MD5: 374EC1E6084A7E4E8CE505C8EB54D157) - cmd.exe (PID: 2300 cmdline:
"C:\Window s\System32 \cmd.exe" /c move Ca lculator C alculator. cmd & Calc ulator.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 616 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 3920 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 4336 cmdline:
findstr /I "opssvc w rsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - tasklist.exe (PID: 6412 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 6600 cmdline:
findstr "A vastUI AVG UI bdservi cehost nsW scSvc ekrn SophosHea lth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 3480 cmdline:
cmd /c md 755831 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - extrac32.exe (PID: 3228 cmdline:
extrac32 / Y /E Delhi MD5: 9472AAB6390E4F1431BAA912FCFF9707) - findstr.exe (PID: 6556 cmdline:
findstr /V "jerusale m" Banglad esh MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 5012 cmdline:
cmd /c cop y /b 75583 1\Dl.com + Warriors + Spas + D ouglas + S port + Msg + Garmin + Frederic k + Barbad os + Sv 75 5831\Dl.co m MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 1436 cmdline:
cmd /c cop y /b ..\Fw + ..\Brig hton + ..\ Earliest + ..\Herita ge + ..\Cl aim + ..\V g + ..\Har dcover + . .\Appropri ate g MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - Dl.com (PID: 5064 cmdline:
Dl.com g MD5: 62D09F076E6E0240548C2F837536A46A) - choice.exe (PID: 4832 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T16:01:51.030285+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49850 | 104.102.49.254 | 443 | TCP |
2025-01-15T16:01:52.367497+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49861 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:01:53.384566+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49870 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:01:54.601533+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49878 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:01:57.403632+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49895 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:01:58.758864+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49905 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:02:00.155105+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49913 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:02:01.439573+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49922 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:02:03.680928+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49936 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:02:04.854584+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49944 | 162.159.135.233 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T16:01:52.863072+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49861 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:01:53.938385+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49870 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:02:04.255965+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49936 | 188.114.96.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T16:01:52.863072+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.5 | 49861 | 188.114.96.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T16:01:53.938385+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.5 | 49870 | 188.114.96.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T16:01:52.367497+0100 | 2059242 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49861 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:01:53.384566+0100 | 2059242 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49870 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:01:54.601533+0100 | 2059242 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49878 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:01:57.403632+0100 | 2059242 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49895 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:01:58.758864+0100 | 2059242 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49905 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:02:00.155105+0100 | 2059242 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49913 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:02:01.439573+0100 | 2059242 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49922 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:02:03.680928+0100 | 2059242 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49936 | 188.114.96.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T16:01:51.838296+0100 | 2059241 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 54671 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T16:01:50.261993+0100 | 2059189 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 62470 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T16:01:50.356372+0100 | 2059191 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 53644 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T16:01:50.322617+0100 | 2059199 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 58908 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T16:01:50.299901+0100 | 2059201 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 59893 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T16:01:50.310499+0100 | 2059203 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 60685 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T16:01:50.333690+0100 | 2059207 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 60461 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T16:01:50.345676+0100 | 2059209 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 62363 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T16:01:50.286997+0100 | 2059211 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 52705 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T16:01:56.868721+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49878 | 188.114.96.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T16:01:51.730718+0100 | 2858666 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49850 | 104.102.49.254 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_004062D5 | |
Source: | Code function: | 0_2_00402E18 | |
Source: | Code function: | 0_2_00406C9B |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_004050CD |
Source: | Code function: | 0_2_004044A5 |
Source: | Code function: | 0_2_00403883 |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_0040497C | |
Source: | Code function: | 0_2_00406ED2 | |
Source: | Code function: | 0_2_004074BB |
Source: | Dropped File: |
Source: | Code function: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_004044A5 |
Source: | Code function: | 0_2_004024FB |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Process created: |
Source: | Window detected: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_004062FC |
Source: | Static PE information: |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: |
Source: | Code function: | 0_2_004062D5 | |
Source: | Code function: | 0_2_00402E18 | |
Source: | Code function: | 0_2_00406C9B |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_004062FC |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00406805 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 121 Windows Management Instrumentation | 1 DLL Side-Loading | 12 Process Injection | 11 Masquerading | 2 OS Credential Dumping | 221 Security Software Discovery | Remote Services | 11 Input Capture | 11 Encrypted Channel | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 1 Native API | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 21 Virtualization/Sandbox Evasion | 11 Input Capture | 21 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 1 Archive Collected Data | 3 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 12 Process Injection | Security Account Manager | 3 Process Discovery | SMB/Windows Admin Shares | 31 Data from Local System | 4 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Deobfuscate/Decode Files or Information | NTDS | 13 File and Directory Discovery | Distributed Component Object Model | 1 Clipboard Data | 15 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | 24 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
24% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
aleksandr-block.com | 188.114.96.3 | true | false | high | |
steamcommunity.com | 104.102.49.254 | true | false | high | |
cdn.discordapp.com | 162.159.135.233 | true | false | high | |
bustlingwakef.click | unknown | unknown | true | unknown | |
washyceehsu.lat | unknown | unknown | true | unknown | |
kickykiduz.lat | unknown | unknown | true | unknown | |
bloodyswif.lat | unknown | unknown | true | unknown | |
savorraiykj.lat | unknown | unknown | true | unknown | |
miniatureyu.lat | unknown | unknown | true | unknown | |
finickypwk.lat | unknown | unknown | true | unknown | |
klipjarifaa.shop | unknown | unknown | true | unknown | |
shoefeatthe.lat | unknown | unknown | true | unknown | |
HQzhESZXqNmORNSM.HQzhESZXqNmORNSM | unknown | unknown | true | unknown | |
leggelatez.lat | unknown | unknown | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
188.114.96.3 | aleksandr-block.com | European Union | 13335 | CLOUDFLARENETUS | false | |
104.102.49.254 | steamcommunity.com | United States | 16625 | AKAMAI-ASUS | false | |
162.159.135.233 | cdn.discordapp.com | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1591972 |
Start date and time: | 2025-01-15 16:00:14 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 1s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 17 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | MotivatedFunded.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@27/25@14/3 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 13.107.253.45, 20.12.23.50
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtSetInformationFile calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
10:01:19 | API Interceptor | |
10:01:23 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
188.114.96.3 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
104.102.49.254 | Get hash | malicious | Socks5Systemz | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
162.159.135.233 | Get hash | malicious | RedLine | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla, AveMaria | Browse |
| ||
Get hash | malicious | Amadey RedLine | Browse |
| ||
Get hash | malicious | Amadey RedLine | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Nanocore | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
steamcommunity.com | Get hash | malicious | PureCrypter, LummaC, LummaC Stealer | Browse |
| |
Get hash | malicious | PureCrypter, LummaC, LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
aleksandr-block.com | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
cdn.discordapp.com | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Metasploit, Meterpreter | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | CStealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Phisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Phisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
AKAMAI-ASUS | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | PureCrypter, LummaC, LummaC Stealer | Browse |
| ||
Get hash | malicious | PureCrypter, LummaC, LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | PureCrypter, LummaC, LummaC Stealer | Browse |
| ||
Get hash | malicious | PureCrypter, LummaC, LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\755831\Dl.com | Get hash | malicious | LummaC Stealer | Browse | ||
Get hash | malicious | Vidar | Browse | |||
Get hash | malicious | RHADAMANTHYS | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 947288 |
Entropy (8bit): | 6.630612696399572 |
Encrypted: | false |
SSDEEP: | 24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK |
MD5: | 62D09F076E6E0240548C2F837536A46A |
SHA1: | 26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2 |
SHA-256: | 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49 |
SHA-512: | 32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 497159 |
Entropy (8bit): | 7.999580894280772 |
Encrypted: | true |
SSDEEP: | 12288:AJ6TmuIkMEB3qhyjzNX7x0wnfx5Hq2BQ2zcXNHlBx:AJumuIzEB3qhyPlr55B54XNHTx |
MD5: | F604E16F02AB3AC60184F4655670B591 |
SHA1: | 38DBADDA26C8D4C9742AA87EF3521D264692ABB8 |
SHA-256: | 62A1FBB8F3EF52A25EA2CBFB63769ACFA474C088428F2E63BE5683DDC4CDB7FC |
SHA-512: | 48507D3A7E760C9CF5AF5AE02E2F0C320382BF7F30790138C70F6866AE20A73402BA54E3AC76B0FFCC2030B865DD8340A602A92EC7E13E7353C1454B1BF10FD6 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\MotivatedFunded.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 7687 |
Entropy (8bit): | 7.9731647255711104 |
Encrypted: | false |
SSDEEP: | 192:q8Kul0otQDMcOAwUK1NlJ4Fw+oZ3gVWIyFHOXe:q8bl0YiXwUIJ4FsgEYe |
MD5: | C3679DEA7E095FA91B055D64DD6D75F3 |
SHA1: | 8614F40F2A78D0C972D970A7255603025DC7E3C9 |
SHA-256: | FC097763CB380FB6D4F91555548A5BBFE4A4387D936FC516439B09EC31B81486 |
SHA-512: | 0374C37FE52EFDED4D74AC2F1B3D39EF918F0F22CE10185DB839C76EDFFC453305DFB4EDD10E5D2DCDF12F2E1FECD9955DCA315F9607F0FA7C252C8CEAEABC26 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2040 |
Entropy (8bit): | 5.035548695751988 |
Encrypted: | false |
SSDEEP: | 48:2k9n9mTsCNvEQH5O5U1nPKrhBzM1FoMPhfq15:2oSEA5O5W+MfH5SD |
MD5: | 6D7ED559499AC1D17944E190AE1AAB13 |
SHA1: | B8E6A57B2F7592A01838C33F1BF6BE63449A2FE0 |
SHA-256: | 94773A7D9FB62636D728A5906F1CE59560587EE8D966C61EA63A69290F760249 |
SHA-512: | 7743F1C52018CBB139819B57C46640208FDF5E94F59FFEC8863EF9D989EE86AF0A7B61BF373EC905FBAEC67C15504EC6B8DB863A3E638540BE7C9515A901FF3E |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 93184 |
Entropy (8bit): | 5.329519226241246 |
Encrypted: | false |
SSDEEP: | 768:tUsFxyLtVSQsbZgar3R/OWel3EYr8qcDP8WBosd0bHazf0Tye4Ur2+9BGmd:thxjgarB/5el3EYrDWyu0uZo2+9BGmd |
MD5: | 47B137544ECB2994B7BA50FA90FC4789 |
SHA1: | 170121935D449F1E51008FFBCB03DD55E29B0359 |
SHA-256: | 5E918B5D930D639688F1C9BDD01DB6D665FEE454842A7A411989B34DB63598AC |
SHA-512: | 71D1A65F919385194DBF8361C49BEBD8951C460720DE9730047C80EE5C96B524724786FF26987350F95E764A76CF720FC90F729E430498D8D5D02812BDF920B7 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\MotivatedFunded.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 77824 |
Entropy (8bit): | 7.997702576026586 |
Encrypted: | true |
SSDEEP: | 1536:9nI9VwUOPDfpE4U5vkv19m5tHuNcRMZowokUO0JjBgw0lvdfbb:9nOzrvkbMO6RQok/0J1gdvdfbb |
MD5: | 21F69D9BF8325AA9D291E4383CCEF80B |
SHA1: | 34407A6E7F7F6758809FF56255F351D8B5153E14 |
SHA-256: | 7C5F4498AC1D534BEB892C169C8CF030760C96CF112354EB6866A4492572C745 |
SHA-512: | F2F049BFE1EE7D42A3719A524DFA0FF6A8187A45DB0B6C97218513FDDF27BCC4683A7263100CC5AA727BD144883A49E4250C5DB96A9B92BF7279FD18A5258AE3 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\MotivatedFunded.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 21866 |
Entropy (8bit): | 5.133729797156198 |
Encrypted: | false |
SSDEEP: | 384:THZp8R7C9sib9aJNNWLw40Aocdhbgg2YQfPxQ5G2rWWHWLKTe2eC6vsvCbV4sEn:lp8k9dR6EpUcdhMJ3qU2rWqZpj2PO |
MD5: | 79F1E83F31CFB9C5098EF121E7D705F1 |
SHA1: | 2601B85C7FAF5BC15446E03792141F064CA8AECF |
SHA-256: | CED786F115FDCEC9D438A173C2845BF6DC6F791B4C7A6147199FFB0CF8A9511B |
SHA-512: | ABE97329BC866F7FEA6D814F95A803D80CA564FE84D9676BE95EB9D12615188496BC90445BF8DB996B6CC2D9EB2BCE5B69253FC67889D498D64F3FFD574CF3B8 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 21866 |
Entropy (8bit): | 5.133729797156198 |
Encrypted: | false |
SSDEEP: | 384:THZp8R7C9sib9aJNNWLw40Aocdhbgg2YQfPxQ5G2rWWHWLKTe2eC6vsvCbV4sEn:lp8k9dR6EpUcdhMJ3qU2rWqZpj2PO |
MD5: | 79F1E83F31CFB9C5098EF121E7D705F1 |
SHA1: | 2601B85C7FAF5BC15446E03792141F064CA8AECF |
SHA-256: | CED786F115FDCEC9D438A173C2845BF6DC6F791B4C7A6147199FFB0CF8A9511B |
SHA-512: | ABE97329BC866F7FEA6D814F95A803D80CA564FE84D9676BE95EB9D12615188496BC90445BF8DB996B6CC2D9EB2BCE5B69253FC67889D498D64F3FFD574CF3B8 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\MotivatedFunded.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 68608 |
Entropy (8bit): | 7.997110004846612 |
Encrypted: | true |
SSDEEP: | 768:wkPTa6BysMKbm8nJLhvMjOuMJlFMyMf57X9hdToZcUnOx5mi01/n4X0KGB6Wwhlb:wwxBZm8HXJPPeXScUOx5mN/4RCAf5J8I |
MD5: | 775CF5C3A5CF9AB71A6F7670FC9B4D38 |
SHA1: | 1E3617ED84B319E3AEE3BF3EBC52AB54A28C6778 |
SHA-256: | 9A677D958D183CB1B4E3309A4AC22D7A990FDD2A25CF116A3990C3174D4E1969 |
SHA-512: | 7316593F19633416CF85FF2979B40CFB1E837E99B7CCCB1B80800ECC4B8E473245349A6A5F4EDEAEB4E22974B58725D7206C1A33C692729E84CAC6EBBF46C975 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\MotivatedFunded.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 490266 |
Entropy (8bit): | 7.998578152880399 |
Encrypted: | true |
SSDEEP: | 12288:YEaVgjX8V7DNgDhE7X5mp6ANY05YaFFrqLFUYZ+VqN+V:YDVgQaDC7pM6AS2YwrqLZZ+VqQV |
MD5: | 3BC68904D45AA890C186549300FC4D80 |
SHA1: | FAC2AF519A5469DADF92B0C5198825E22830FDB5 |
SHA-256: | 3BE16D7C1EE17322A9824560B190D3BB452A07E4A0D0813180DB3767BE6580C6 |
SHA-512: | E40A0FA31F34D4DB55CA79CD795CD338C9D140A89A7AA3A6A3A2BBB5920ECE5418355280BE46457D3FB2D0C20B7BE0C1FC20C5DCC11A1423DF3DC05D13CF3209 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 64512 |
Entropy (8bit): | 6.690377042480581 |
Encrypted: | false |
SSDEEP: | 1536:DqvI932eOypvcLSDOSpZ+Sh+I+FrbCyIN:Dqv+32eOyKODOSpQSAK |
MD5: | C77AF262670E29488DD4A69F514988C6 |
SHA1: | E31396E975D126728BA789D4E98C4A46BE69C7CA |
SHA-256: | CC00A8BF2AF08113E0F258308DF7F6F233F7D5825403CFEC4B1F4C2DA44C4EA4 |
SHA-512: | E2ADAE91FBD22D4C33BB4A5BE0CC44EEFF814AE176CFC4C49E0CFB65D841D544B9AF1ACC7E5CDD8F6E7C961A8CBF482F92FC222D8D32F60ED8326508DEC90719 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\MotivatedFunded.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 87040 |
Entropy (8bit): | 7.997668500371939 |
Encrypted: | true |
SSDEEP: | 1536:flVZl1AmFBwZMUVhqINjPtXEwgwETsMJXzmjn0cmLkpoGCGoMEN2ypF:fzxizhqSPt0uETskzNfLkpoGcdL |
MD5: | 9EBC209950B0E45B4D652F710CB1F190 |
SHA1: | 5F4AED5BC37A47FDE54F8F4462FC0AE40AD120F9 |
SHA-256: | C7DDCCF22C0D0E4D53F1B1DCD757748FC37AC77A34E2962729DED2F3207F127B |
SHA-512: | EC2EBE7DF2D8E6B444F5FFA424F18973E44A84815F57606F1E1CD77F3E1F1A6D929FAE0E8AEBC3FDDCDD0CF6FCD170FD1915341A6B2B9F3D5AC9043ABAF9640E |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 145408 |
Entropy (8bit): | 5.7044909040339045 |
Encrypted: | false |
SSDEEP: | 1536:Gcd0vtmgMbFuz08QuklMBNIimuzaAwusPdKaj6iTcPAs:neAg0Fuz08XvBNbjaAtsPh6 |
MD5: | 76CF030B6B0AC6119F76C12D47E273EF |
SHA1: | C14A9206D246FA7E92CB78D2153637D9B1123CC5 |
SHA-256: | 2CD97944A3415A78B20D23BAF5B1139A0CD3DE8857ACE3AA44BD5F12BAFEE293 |
SHA-512: | 52B2FA48701AC00A316E3FCC3CDDE8D10E825179698FEA4EAD7B0FA27B01BB6976D60E897738C22BEBB2ED35A7B9C4C8B5BF5F9C21B52D9E8A10D7161025C127 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\MotivatedFunded.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 79872 |
Entropy (8bit): | 7.997820152818925 |
Encrypted: | true |
SSDEEP: | 1536:LLa4AHvduYdIwJ7BAYWY4kyIKpYeR61D5gNwqcIzhwbXCYQ7ARH+1Pj:BWvd9dfJaD+KpYeCZqP2yD8RHOPj |
MD5: | 867A0CD79112621022412A7E586E59FA |
SHA1: | C62318669CA41922CAF3C4C55872EA41060347D2 |
SHA-256: | 62883B154C501D943DEDA830A921B69A0B94452AF9282408760107AC820F2689 |
SHA-512: | B8BBB241337D689EFAE5EB755C8367CBB38C4F135FFD293D626EEA54F1D93FFBCD717EF1BC5E41DB249E94E0516262B8770A04B6ECB9842D5325F0590B9459C7 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 145408 |
Entropy (8bit): | 6.433619123395887 |
Encrypted: | false |
SSDEEP: | 3072:lpIbv18mLthfhnueoMmOqDoioO5bLezW9FfTut/Dde6u640ewy4Za9coRC2jfTqR:OphfhnvO5bLezWWt/Dd314V14ZgP0JT |
MD5: | AD02BABB05366B28E00271A60DD73416 |
SHA1: | 06E5C9944FA53938FC6C22B2DD3880C5A3ADBE0E |
SHA-256: | F73E1C7CD65B2F4ED6C00A494359CDA577F7762F689E4676F70E4B9A64219D83 |
SHA-512: | 041B7541E1112B2D2E48231C66C720D7D2469AE1752A19131ACFBE8D39C075FFC2DFB1A9DBB0A5ABC7EDE450DD93AA1338DC0251F1FBB6FDC171A90638D805C5 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\MotivatedFunded.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 58368 |
Entropy (8bit): | 7.996235125644935 |
Encrypted: | true |
SSDEEP: | 1536:Ei85HATA/x81olwBXhysXdvZWa/vl0MXrWSi+OpQHyy+Y:EhDp81rBXNdvZH/tXXrWSrxSi |
MD5: | 1A0922E645EA7610ABD6EAFE8EDD357A |
SHA1: | 4B54A15D9440B3034B32FA9D798C12AAC02C6641 |
SHA-256: | 9A86D051B47BBAEEB2CE12DAC74E52AE14F2F7043197FAC8D54EEABFAECB6C55 |
SHA-512: | F8AA831F9B3717C2B6B83DC7B26AB0A9A23DB12BB05BCFB5E83EBD120BB24D9C911BA90C8072850032D904B7486AD1000D2595475A94E1AF3601333F6414AE21 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\MotivatedFunded.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 52224 |
Entropy (8bit): | 7.996428759632489 |
Encrypted: | true |
SSDEEP: | 1536:A+VupMNX7DToJKaDu58d+bzlo6zRxca8Z7QSQHOT:AF2NX74uTtQa8Z7QSQHOT |
MD5: | 7F54ABA1C1205DE6C32F7866F5C9B34F |
SHA1: | 13A46B11A2D7A6F35060B7795462D524B28070D3 |
SHA-256: | 940B90EE492CE3E86102751F9DA1666B340478170D7654FDA75261413E87C5DF |
SHA-512: | 81704D97153549DF0CACD72F10AFCDE46D9380A903B700351F300CF3403D9110BC92F3430B89617BCB057E24DE65978B78CFE11FE65F62A9F03F893D860BF481 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 138240 |
Entropy (8bit): | 6.624008306422071 |
Encrypted: | false |
SSDEEP: | 3072:APnj0nEoXnmowS2u5hVOoQ7t8T6pUkBJR8CThpmESv+AqVnBY:APj0nEo3tb2j6AUkB0CThp6vmVnK |
MD5: | CA17C7C134DA83E28493EDAE94C73EBF |
SHA1: | 5DFCF136496EC6F1BB4C0AD39488E29C9205E03D |
SHA-256: | 69FE66E45E5049510D520A16C35A11D333BA4B82154E3BC5C32CBAD10BE7DAA3 |
SHA-512: | C122C588F0E8A2CA1D50F208B7E1CA8DE3236662D766D07F265631CAAEA39BAFA7682D8A05C6F72AA9B9C4D950B1FBA5158BB1405921E317DF227287350C3FBC |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\755831\Dl.com |
File Type: | |
Category: | dropped |
Size (bytes): | 36 |
Entropy (8bit): | 3.8537006129630296 |
Encrypted: | false |
SSDEEP: | 3:hGQRALjVLeJKuWJu:hCVLWqu |
MD5: | A1CA4BEBCD03FAFBE2B06A46A694E29A |
SHA1: | FFC88125007C23FF6711147A12F9BBA9C3D197ED |
SHA-256: | C3FA59901D56CE8A95A303B22FD119CB94ABF4F43C4F6D60A81FD78B7D00FA65 |
SHA-512: | 6FE1730BF2A6BBA058C5E1EF309A69079A6ACCA45C0DBCA4E7D79C877257AC08E460AF741459D1E335197CF4DE209F2A2997816F2A2A3868B2C8D086EF789B0E |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 105472 |
Entropy (8bit): | 6.3844243791970365 |
Encrypted: | false |
SSDEEP: | 3072:pdgQa8Bp/LxyA3laW2UDQWf05mjccBiqXvpgFY:bgQaE/loUDtf0accB3gY |
MD5: | A8B094B6BF100EAA5C9EFDCE71F9B0F0 |
SHA1: | 034937194CD2ED127993BCF2593314A1E4BE0849 |
SHA-256: | DCB175A4FBFD20482AAB77F064651AB79FE0BD3935D55E067690F608C16F1EB6 |
SHA-512: | 7871484326A0ABB1AC444DF0F160ACEF78A48AA60639F1C2F055FD0DA052401468E591F6DCF8B6F412FB8A743AF5FA0CA0D9FE1D5739D362CFC0160C9A5B299D |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 147456 |
Entropy (8bit): | 6.665780268312797 |
Encrypted: | false |
SSDEEP: | 3072:d4CE0Imbi80PtCZEMnVIPPBxT/sZydTmRxlHS3NxrHSBRtM:WClbfSCOMVIPPL/sZ7HS3zcM |
MD5: | 0BE61213DB7572E2EB99466AF7667F57 |
SHA1: | A05C1E84C848D6D917622F7F0ECFA53FE67F7B9A |
SHA-256: | 9584802CF23C3BFE57011B353E6D1528897CAA2BBF84132478BDA5B85A0491DD |
SHA-512: | 896897019EEBE7AA3F0C6E1325FE56DA427D9BF7933AAB5BAF9FDC9D5C729B62A19EA533269F14BE6B0D12D0B9427598F33BC25E36667E80FE90F3B845FFC459 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 35945 |
Entropy (8bit): | 7.16659687475096 |
Encrypted: | false |
SSDEEP: | 768:X9OTGQ1Dv7sMvLHfR/ZByLiFuO/ChgZ45VatJVEV3GPkjF:XATGODv7xvTphAiPChgZ2kOE6 |
MD5: | 1F299BC63CCB9A2B8C9FC2132B57F8D5 |
SHA1: | 859134580A5F5DD5947B58E9EC5D9B3D6DB95338 |
SHA-256: | F328D00DFD12FC13869154560FFA5F43BC25D2B52CEAE5F5740F6CB3068895BB |
SHA-512: | CA00CAF38B3471FE232D4DB90E8F9C19ACB735DD3FF6E97C32E4A13C91C278494E2BB2FBDDD7A092445B76E8FE897DB935E6A57A36CB2C008AC3BB89C2FB5D3F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\MotivatedFunded.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 7.996707919225722 |
Encrypted: | true |
SSDEEP: | 1536:4AJgmT2SXBBQcWWpU5aoDCq2vNXLMG27pTDughLP:FT2SRBQHWpUfDCq2l/8P |
MD5: | 1CB9F720505BC0885996FEA2782E4E66 |
SHA1: | 73F37228E97F5969755DACDE3D4773E4B62D50BF |
SHA-256: | BEB3EB1CA7DAE2D96DD0DB7DA4E2F72151FA3CF29BE999AE57356A04F276A22C |
SHA-512: | DD4C2368E298D66FF19A7C0E3BA53624D520BF1DEDFEFD205D90BDFBA1D9B5E7D6C0FC83662A3BB50B7AF8AD4B95A0C5B5FF9D3BD3516DBC8D4E10DB5D0021DB |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 69632 |
Entropy (8bit): | 6.5490665891078725 |
Encrypted: | false |
SSDEEP: | 1536:B/AD1EsdzVXnP94SGGLpRB6M28eFvMVpYhWoXElJUzx:9g5PXPeiR6MKkjGWoUlJUN |
MD5: | 96F6F6B5BB98AF8AAD30572776A16E2A |
SHA1: | CD05AA32F5FF9F72EB204251DD73B950A5C20203 |
SHA-256: | FB082B3E245E1FF010B546140D35D550A89A206EC5B8AABF854CD64708C6240F |
SHA-512: | A7B1DF05076BF49827BE1D61918931EDCE7F572B612430FA8B61EF5FB31D5FDA9911E459ADD946ABC6B87B3ABC8DB90387447C419295640167AC1643B01B0F70 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\755831\Dl.com |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.4189737880103 |
Encrypted: | false |
SSDEEP: | 6144:8Svfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNd0uhiTw:nvloTMW+EZMM6DFyn03w |
MD5: | 095334E941CF663A54DAB58588F77BF9 |
SHA1: | 0144BF98CF2CDBA35FAC245138D82F481F484F45 |
SHA-256: | DE57AC93CDD9F9CA54EB93A1E714BF050B43B2F55DED42928664BD97103035FC |
SHA-512: | C2D114E6C2BFEAD04FE1AD55FD93714829A1EA075F81EB9C2A07B232856106AF14968DF13F7D285CD559EB7ED52EB1585678DD41EEDD32C18E7E0B09D3BB3F00 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.9829928471215545 |
TrID: |
|
File name: | MotivatedFunded.exe |
File size: | 1'158'388 bytes |
MD5: | 374ec1e6084a7e4e8ce505c8eb54d157 |
SHA1: | 03328b03975f5ee6eb5859347f59d7ef50493016 |
SHA256: | fc380182364b976cfd43503a92fe630b0709b0478fdf88adff07357bd692149e |
SHA512: | 4328e6e298632565f944fdd81e84e4b52e31e20edb5760dfad251f761c17d4818677ac0d60e9dbf2c2b6634c68b0522925fcc2f44e3bd947663ce1ad41bbe161 |
SSDEEP: | 24576:ERkuPyTLS0vk7J5ZFuQolYd9KAHCHGBYzqVwSM7jIzyDqfDOZOugt3w3:WkuP90v4FuQolYd9aHCtwSQ0zyDqfDOl |
TLSH: | DC352392C5F4CC22E9A24D3239D94A677E71B1200960C4C7530DDE9ABB80761EF6D7AF |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L...X|.N.................n.......B...8..... |
Icon Hash: | faf8f8e4c2d2c51a |
Entrypoint: | 0x403883 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x4E807C58 [Mon Sep 26 13:21:28 2011 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | be41bf7b8cc010b614bd36bbca606973 |
Signature Valid: | false |
Signature Issuer: | CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | C4229BD22B53E32D95C0C71A271EDAA1 |
Thumbprint SHA-1: | 61D425BC54E26E971EF09688ACD4493CF9081405 |
Thumbprint SHA-256: | C7C51A6D83F45F94EFE47C8DFADDE98DC41B197408DC45A5090AB5F16DC948BD |
Serial: | 042814369854A85F9B8F901267C03CF2 |
Instruction |
---|
sub esp, 000002D4h |
push ebx |
push ebp |
push esi |
push edi |
push 00000020h |
xor ebp, ebp |
pop esi |
mov dword ptr [esp+18h], ebp |
mov dword ptr [esp+10h], 00409268h |
mov dword ptr [esp+14h], ebp |
call dword ptr [00408030h] |
push 00008001h |
call dword ptr [004080B4h] |
push ebp |
call dword ptr [004082C0h] |
push 00000008h |
mov dword ptr [00472EB8h], eax |
call 00007F142CB6177Bh |
push ebp |
push 000002B4h |
mov dword ptr [00472DD0h], eax |
lea eax, dword ptr [esp+38h] |
push eax |
push ebp |
push 00409264h |
call dword ptr [00408184h] |
push 0040924Ch |
push 0046ADC0h |
call 00007F142CB6145Dh |
call dword ptr [004080B0h] |
push eax |
mov edi, 004C30A0h |
push edi |
call 00007F142CB6144Bh |
push ebp |
call dword ptr [00408134h] |
cmp word ptr [004C30A0h], 0022h |
mov dword ptr [00472DD8h], eax |
mov eax, edi |
jne 00007F142CB5ED4Ah |
push 00000022h |
pop esi |
mov eax, 004C30A2h |
push esi |
push eax |
call 00007F142CB61121h |
push eax |
call dword ptr [00408260h] |
mov esi, eax |
mov dword ptr [esp+1Ch], esi |
jmp 00007F142CB5EDD3h |
push 00000020h |
pop ebx |
cmp ax, bx |
jne 00007F142CB5ED4Ah |
add esi, 02h |
cmp word ptr [esi], bx |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x9b34 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xf4000 | 0xe176 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x115964 | 0x5390 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x7a000 | 0x964 | .ndata |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x8000 | 0x2d0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x6dae | 0x6e00 | 00499a6f70259150109c809d6aa0e6ed | False | 0.6611150568181818 | data | 6.508529563136936 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x8000 | 0x2a62 | 0x2c00 | 07990aaa54c3bc638bb87a87f3fb13e3 | False | 0.3526278409090909 | data | 4.390535020989255 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xb000 | 0x67ebc | 0x200 | 014871d9a00f0e0c8c2a7cd25606c453 | False | 0.203125 | data | 1.4308602597540492 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x73000 | 0x81000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0xf4000 | 0xe176 | 0xe200 | 5e2ec978b0037377ab64a965f33096ae | False | 0.962890625 | data | 7.893830302947621 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x103000 | 0xf32 | 0x1000 | 86c2ca7127e42dc0128c41106ccf5516 | False | 0.6005859375 | data | 5.524913322209985 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0xf4220 | 0x9327 | PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced | English | United States | 1.0005574579915586 |
RT_ICON | 0xfd548 | 0x310a | PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced | English | United States | 1.0008762147522703 |
RT_ICON | 0x100654 | 0x1128 | Device independent bitmap graphic, 32 x 64 x 32, image size 4352 | English | United States | 0.7871129326047359 |
RT_ICON | 0x10177c | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.8714539007092199 |
RT_DIALOG | 0x101be4 | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0x101ce4 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x101e00 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x101e60 | 0x3e | data | English | United States | 0.8387096774193549 |
RT_MANIFEST | 0x101ea0 | 0x2d6 | XML 1.0 document, ASCII text, with very long lines (726), with no line terminators | English | United States | 0.5647382920110193 |
DLL | Import |
---|---|
KERNEL32.dll | SetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW |
USER32.dll | GetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW |
GDI32.dll | SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject |
SHELL32.dll | SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation |
ADVAPI32.dll | RegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW |
COMCTL32.dll | ImageList_AddMasked, ImageList_Destroy, ImageList_Create |
ole32.dll | CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance |
VERSION.dll | GetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T16:01:50.261993+0100 | 2059189 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (bloodyswif .lat) | 1 | 192.168.2.5 | 62470 | 1.1.1.1 | 53 | UDP |
2025-01-15T16:01:50.286997+0100 | 2059211 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (washyceehsu .lat) | 1 | 192.168.2.5 | 52705 | 1.1.1.1 | 53 | UDP |
2025-01-15T16:01:50.299901+0100 | 2059201 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (leggelatez .lat) | 1 | 192.168.2.5 | 59893 | 1.1.1.1 | 53 | UDP |
2025-01-15T16:01:50.310499+0100 | 2059203 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (miniatureyu .lat) | 1 | 192.168.2.5 | 60685 | 1.1.1.1 | 53 | UDP |
2025-01-15T16:01:50.322617+0100 | 2059199 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (kickykiduz .lat) | 1 | 192.168.2.5 | 58908 | 1.1.1.1 | 53 | UDP |
2025-01-15T16:01:50.333690+0100 | 2059207 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (savorraiykj .lat) | 1 | 192.168.2.5 | 60461 | 1.1.1.1 | 53 | UDP |
2025-01-15T16:01:50.345676+0100 | 2059209 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (shoefeatthe .lat) | 1 | 192.168.2.5 | 62363 | 1.1.1.1 | 53 | UDP |
2025-01-15T16:01:50.356372+0100 | 2059191 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (finickypwk .lat) | 1 | 192.168.2.5 | 53644 | 1.1.1.1 | 53 | UDP |
2025-01-15T16:01:51.030285+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49850 | 104.102.49.254 | 443 | TCP |
2025-01-15T16:01:51.730718+0100 | 2858666 | ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup | 1 | 192.168.2.5 | 49850 | 104.102.49.254 | 443 | TCP |
2025-01-15T16:01:51.838296+0100 | 2059241 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (aleksandr-block .com) | 1 | 192.168.2.5 | 54671 | 1.1.1.1 | 53 | UDP |
2025-01-15T16:01:52.367497+0100 | 2059242 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (aleksandr-block .com in TLS SNI) | 1 | 192.168.2.5 | 49861 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:01:52.367497+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49861 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:01:52.863072+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.5 | 49861 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:01:52.863072+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49861 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:01:53.384566+0100 | 2059242 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (aleksandr-block .com in TLS SNI) | 1 | 192.168.2.5 | 49870 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:01:53.384566+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49870 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:01:53.938385+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.5 | 49870 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:01:53.938385+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49870 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:01:54.601533+0100 | 2059242 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (aleksandr-block .com in TLS SNI) | 1 | 192.168.2.5 | 49878 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:01:54.601533+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49878 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:01:56.868721+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.5 | 49878 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:01:57.403632+0100 | 2059242 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (aleksandr-block .com in TLS SNI) | 1 | 192.168.2.5 | 49895 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:01:57.403632+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49895 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:01:58.758864+0100 | 2059242 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (aleksandr-block .com in TLS SNI) | 1 | 192.168.2.5 | 49905 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:01:58.758864+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49905 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:02:00.155105+0100 | 2059242 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (aleksandr-block .com in TLS SNI) | 1 | 192.168.2.5 | 49913 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:02:00.155105+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49913 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:02:01.439573+0100 | 2059242 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (aleksandr-block .com in TLS SNI) | 1 | 192.168.2.5 | 49922 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:02:01.439573+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49922 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:02:03.680928+0100 | 2059242 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (aleksandr-block .com in TLS SNI) | 1 | 192.168.2.5 | 49936 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:02:03.680928+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49936 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:02:04.255965+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49936 | 188.114.96.3 | 443 | TCP |
2025-01-15T16:02:04.854584+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49944 | 162.159.135.233 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 15, 2025 16:01:50.384768009 CET | 49850 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 15, 2025 16:01:50.384793043 CET | 443 | 49850 | 104.102.49.254 | 192.168.2.5 |
Jan 15, 2025 16:01:50.384855986 CET | 49850 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 15, 2025 16:01:50.386266947 CET | 49850 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 15, 2025 16:01:50.386282921 CET | 443 | 49850 | 104.102.49.254 | 192.168.2.5 |
Jan 15, 2025 16:01:51.030199051 CET | 443 | 49850 | 104.102.49.254 | 192.168.2.5 |
Jan 15, 2025 16:01:51.030284882 CET | 49850 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 15, 2025 16:01:51.034890890 CET | 49850 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 15, 2025 16:01:51.034905910 CET | 443 | 49850 | 104.102.49.254 | 192.168.2.5 |
Jan 15, 2025 16:01:51.035306931 CET | 443 | 49850 | 104.102.49.254 | 192.168.2.5 |
Jan 15, 2025 16:01:51.077508926 CET | 49850 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 15, 2025 16:01:51.270581961 CET | 49850 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 15, 2025 16:01:51.315329075 CET | 443 | 49850 | 104.102.49.254 | 192.168.2.5 |
Jan 15, 2025 16:01:51.730568886 CET | 443 | 49850 | 104.102.49.254 | 192.168.2.5 |
Jan 15, 2025 16:01:51.730602026 CET | 443 | 49850 | 104.102.49.254 | 192.168.2.5 |
Jan 15, 2025 16:01:51.730645895 CET | 443 | 49850 | 104.102.49.254 | 192.168.2.5 |
Jan 15, 2025 16:01:51.730657101 CET | 443 | 49850 | 104.102.49.254 | 192.168.2.5 |
Jan 15, 2025 16:01:51.730654955 CET | 49850 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 15, 2025 16:01:51.730693102 CET | 443 | 49850 | 104.102.49.254 | 192.168.2.5 |
Jan 15, 2025 16:01:51.730706930 CET | 443 | 49850 | 104.102.49.254 | 192.168.2.5 |
Jan 15, 2025 16:01:51.730720997 CET | 49850 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 15, 2025 16:01:51.730736971 CET | 49850 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 15, 2025 16:01:51.730762005 CET | 49850 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 15, 2025 16:01:51.825356007 CET | 443 | 49850 | 104.102.49.254 | 192.168.2.5 |
Jan 15, 2025 16:01:51.825428009 CET | 443 | 49850 | 104.102.49.254 | 192.168.2.5 |
Jan 15, 2025 16:01:51.825473070 CET | 49850 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 15, 2025 16:01:51.825508118 CET | 443 | 49850 | 104.102.49.254 | 192.168.2.5 |
Jan 15, 2025 16:01:51.825551033 CET | 49850 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 15, 2025 16:01:51.825576067 CET | 49850 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 15, 2025 16:01:51.830144882 CET | 443 | 49850 | 104.102.49.254 | 192.168.2.5 |
Jan 15, 2025 16:01:51.830230951 CET | 49850 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 15, 2025 16:01:51.834800005 CET | 443 | 49850 | 104.102.49.254 | 192.168.2.5 |
Jan 15, 2025 16:01:51.834868908 CET | 49850 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 15, 2025 16:01:51.834882021 CET | 443 | 49850 | 104.102.49.254 | 192.168.2.5 |
Jan 15, 2025 16:01:51.834960938 CET | 443 | 49850 | 104.102.49.254 | 192.168.2.5 |
Jan 15, 2025 16:01:51.835076094 CET | 49850 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 15, 2025 16:01:51.835618973 CET | 49850 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 15, 2025 16:01:51.835639954 CET | 443 | 49850 | 104.102.49.254 | 192.168.2.5 |
Jan 15, 2025 16:01:51.835705042 CET | 49850 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 15, 2025 16:01:51.835712910 CET | 443 | 49850 | 104.102.49.254 | 192.168.2.5 |
Jan 15, 2025 16:01:51.850811005 CET | 49861 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:51.850852966 CET | 443 | 49861 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:51.850996017 CET | 49861 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:51.851536036 CET | 49861 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:51.851552963 CET | 443 | 49861 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:52.367434025 CET | 443 | 49861 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:52.367496967 CET | 49861 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:52.369148970 CET | 49861 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:52.369160891 CET | 443 | 49861 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:52.369462967 CET | 443 | 49861 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:52.371668100 CET | 49861 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:52.371686935 CET | 49861 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:52.371737957 CET | 443 | 49861 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:52.863164902 CET | 443 | 49861 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:52.863440990 CET | 443 | 49861 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:52.864728928 CET | 49861 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:52.865655899 CET | 49861 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:52.865662098 CET | 443 | 49861 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:52.865677118 CET | 49861 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:52.865680933 CET | 443 | 49861 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:52.870574951 CET | 49870 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:52.870629072 CET | 443 | 49870 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:52.870716095 CET | 49870 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:52.871052980 CET | 49870 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:52.871072054 CET | 443 | 49870 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:53.384449005 CET | 443 | 49870 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:53.384566069 CET | 49870 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:53.385761976 CET | 49870 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:53.385780096 CET | 443 | 49870 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:53.386121988 CET | 443 | 49870 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:53.389594078 CET | 49870 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:53.389625072 CET | 49870 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:53.389734983 CET | 443 | 49870 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:53.938488007 CET | 443 | 49870 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:53.938653946 CET | 443 | 49870 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:53.938724041 CET | 443 | 49870 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:53.938730001 CET | 49870 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:53.938757896 CET | 443 | 49870 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:53.938802958 CET | 49870 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:53.938817024 CET | 443 | 49870 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:53.938972950 CET | 443 | 49870 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:53.939063072 CET | 443 | 49870 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:53.939088106 CET | 49870 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:53.939095974 CET | 443 | 49870 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:53.939131975 CET | 49870 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:53.939148903 CET | 443 | 49870 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:53.939291954 CET | 443 | 49870 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:53.939342976 CET | 49870 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:53.939351082 CET | 443 | 49870 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:53.943362951 CET | 443 | 49870 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:53.943430901 CET | 49870 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:53.943438053 CET | 443 | 49870 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:53.983786106 CET | 49870 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:54.028845072 CET | 443 | 49870 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:54.029043913 CET | 443 | 49870 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:54.029117107 CET | 49870 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:54.029130936 CET | 443 | 49870 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:54.029169083 CET | 443 | 49870 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:54.029385090 CET | 443 | 49870 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:54.029444933 CET | 49870 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:54.029562950 CET | 49870 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:54.029583931 CET | 443 | 49870 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:54.029598951 CET | 49870 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:54.029604912 CET | 443 | 49870 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:54.101967096 CET | 49878 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:54.101995945 CET | 443 | 49878 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:54.102088928 CET | 49878 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:54.102519035 CET | 49878 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:54.102535009 CET | 443 | 49878 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:54.601378918 CET | 443 | 49878 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:54.601532936 CET | 49878 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:54.603219986 CET | 49878 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:54.603228092 CET | 443 | 49878 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:54.603568077 CET | 443 | 49878 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:54.604932070 CET | 49878 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:54.605077982 CET | 49878 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:54.605115891 CET | 443 | 49878 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:56.868798018 CET | 443 | 49878 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:56.869040012 CET | 443 | 49878 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:56.869142056 CET | 49878 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:56.869323015 CET | 49878 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:56.869343996 CET | 443 | 49878 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:56.884555101 CET | 49895 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:56.884594917 CET | 443 | 49895 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:56.884684086 CET | 49895 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:56.884960890 CET | 49895 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:56.884974003 CET | 443 | 49895 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:57.403547049 CET | 443 | 49895 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:57.403631926 CET | 49895 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:57.404890060 CET | 49895 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:57.404903889 CET | 443 | 49895 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:57.405354023 CET | 443 | 49895 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:57.406753063 CET | 49895 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:57.406891108 CET | 49895 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:57.407216072 CET | 443 | 49895 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:57.407274961 CET | 49895 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:57.447339058 CET | 443 | 49895 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:58.109735966 CET | 443 | 49895 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:58.110080004 CET | 443 | 49895 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:58.110126972 CET | 49895 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:58.117031097 CET | 49895 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:58.117048025 CET | 443 | 49895 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:58.254898071 CET | 49905 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:58.254950047 CET | 443 | 49905 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:58.255016088 CET | 49905 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:58.255345106 CET | 49905 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:58.255361080 CET | 443 | 49905 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:58.758783102 CET | 443 | 49905 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:58.758863926 CET | 49905 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:58.760531902 CET | 49905 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:58.760546923 CET | 443 | 49905 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:58.761039019 CET | 443 | 49905 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:58.762438059 CET | 49905 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:58.762629986 CET | 49905 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:58.762666941 CET | 443 | 49905 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:58.762741089 CET | 49905 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:58.762749910 CET | 443 | 49905 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:59.477837086 CET | 443 | 49905 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:59.477968931 CET | 443 | 49905 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:59.478025913 CET | 49905 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:59.478171110 CET | 49905 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:59.478192091 CET | 443 | 49905 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:59.668694973 CET | 49913 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:59.668735027 CET | 443 | 49913 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:01:59.668811083 CET | 49913 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:59.669156075 CET | 49913 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:01:59.669167995 CET | 443 | 49913 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:00.155002117 CET | 443 | 49913 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:00.155105114 CET | 49913 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:00.156647921 CET | 49913 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:00.156666994 CET | 443 | 49913 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:00.156996965 CET | 443 | 49913 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:00.158870935 CET | 49913 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:00.159028053 CET | 49913 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:00.159040928 CET | 443 | 49913 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:00.511178017 CET | 443 | 49913 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:00.511301994 CET | 443 | 49913 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:00.511396885 CET | 49913 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:00.511642933 CET | 49913 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:00.511662006 CET | 443 | 49913 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:00.929617882 CET | 49922 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:00.929665089 CET | 443 | 49922 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:00.930166006 CET | 49922 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:00.930166006 CET | 49922 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:00.930210114 CET | 443 | 49922 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:01.439491987 CET | 443 | 49922 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:01.439573050 CET | 49922 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:01.440987110 CET | 49922 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:01.440998077 CET | 443 | 49922 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:01.441279888 CET | 443 | 49922 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:01.443110943 CET | 49922 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:01.443947077 CET | 49922 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:01.443981886 CET | 443 | 49922 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:01.444091082 CET | 49922 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:01.444122076 CET | 443 | 49922 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:01.444248915 CET | 49922 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:01.444287062 CET | 443 | 49922 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:01.444430113 CET | 49922 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:01.444462061 CET | 443 | 49922 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:01.444618940 CET | 49922 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:01.444657087 CET | 443 | 49922 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:01.444886923 CET | 49922 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:01.444919109 CET | 443 | 49922 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:01.444930077 CET | 49922 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:01.444942951 CET | 443 | 49922 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:01.445065975 CET | 49922 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:01.445097923 CET | 443 | 49922 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:01.445126057 CET | 49922 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:01.445256948 CET | 49922 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:01.445295095 CET | 49922 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:01.454014063 CET | 443 | 49922 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:01.454267979 CET | 49922 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:01.454305887 CET | 443 | 49922 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:01.454330921 CET | 49922 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:01.454368114 CET | 49922 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:01.454447031 CET | 49922 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:01.459373951 CET | 443 | 49922 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:03.152559042 CET | 443 | 49922 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:03.152646065 CET | 443 | 49922 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:03.152704954 CET | 49922 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:03.152843952 CET | 49922 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:03.152863979 CET | 443 | 49922 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:03.156790018 CET | 49936 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:03.156830072 CET | 443 | 49936 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:03.156904936 CET | 49936 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:03.157224894 CET | 49936 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:03.157238007 CET | 443 | 49936 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:03.680839062 CET | 443 | 49936 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:03.680927992 CET | 49936 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:03.687006950 CET | 49936 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:03.687020063 CET | 443 | 49936 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:03.687333107 CET | 443 | 49936 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:03.688608885 CET | 49936 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:03.688632011 CET | 49936 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:03.688673019 CET | 443 | 49936 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:04.255961895 CET | 443 | 49936 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:04.256072998 CET | 443 | 49936 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:04.256159067 CET | 49936 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:04.256481886 CET | 49936 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:04.256504059 CET | 443 | 49936 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:04.256520987 CET | 49936 | 443 | 192.168.2.5 | 188.114.96.3 |
Jan 15, 2025 16:02:04.256527901 CET | 443 | 49936 | 188.114.96.3 | 192.168.2.5 |
Jan 15, 2025 16:02:04.387192011 CET | 49944 | 443 | 192.168.2.5 | 162.159.135.233 |
Jan 15, 2025 16:02:04.387248039 CET | 443 | 49944 | 162.159.135.233 | 192.168.2.5 |
Jan 15, 2025 16:02:04.387336016 CET | 49944 | 443 | 192.168.2.5 | 162.159.135.233 |
Jan 15, 2025 16:02:04.387682915 CET | 49944 | 443 | 192.168.2.5 | 162.159.135.233 |
Jan 15, 2025 16:02:04.387697935 CET | 443 | 49944 | 162.159.135.233 | 192.168.2.5 |
Jan 15, 2025 16:02:04.854471922 CET | 443 | 49944 | 162.159.135.233 | 192.168.2.5 |
Jan 15, 2025 16:02:04.854583979 CET | 49944 | 443 | 192.168.2.5 | 162.159.135.233 |
Jan 15, 2025 16:02:04.857232094 CET | 49944 | 443 | 192.168.2.5 | 162.159.135.233 |
Jan 15, 2025 16:02:04.857250929 CET | 443 | 49944 | 162.159.135.233 | 192.168.2.5 |
Jan 15, 2025 16:02:04.857508898 CET | 443 | 49944 | 162.159.135.233 | 192.168.2.5 |
Jan 15, 2025 16:02:04.859390020 CET | 49944 | 443 | 192.168.2.5 | 162.159.135.233 |
Jan 15, 2025 16:02:04.907330036 CET | 443 | 49944 | 162.159.135.233 | 192.168.2.5 |
Jan 15, 2025 16:02:04.996174097 CET | 443 | 49944 | 162.159.135.233 | 192.168.2.5 |
Jan 15, 2025 16:02:04.996253967 CET | 443 | 49944 | 162.159.135.233 | 192.168.2.5 |
Jan 15, 2025 16:02:04.996541977 CET | 49944 | 443 | 192.168.2.5 | 162.159.135.233 |
Jan 15, 2025 16:02:04.996629000 CET | 49944 | 443 | 192.168.2.5 | 162.159.135.233 |
Jan 15, 2025 16:02:04.996629000 CET | 49944 | 443 | 192.168.2.5 | 162.159.135.233 |
Jan 15, 2025 16:02:04.996680975 CET | 443 | 49944 | 162.159.135.233 | 192.168.2.5 |
Jan 15, 2025 16:02:04.996711969 CET | 443 | 49944 | 162.159.135.233 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 15, 2025 16:01:24.136158943 CET | 54061 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 16:01:24.189687014 CET | 53 | 54061 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 16:01:50.228715897 CET | 57150 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 16:01:50.247328997 CET | 53 | 57150 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 16:01:50.261992931 CET | 62470 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 16:01:50.281842947 CET | 53 | 62470 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 16:01:50.286997080 CET | 52705 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 16:01:50.295594931 CET | 53 | 52705 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 16:01:50.299901009 CET | 59893 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 16:01:50.308933973 CET | 53 | 59893 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 16:01:50.310498953 CET | 60685 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 16:01:50.319529057 CET | 53 | 60685 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 16:01:50.322617054 CET | 58908 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 16:01:50.331232071 CET | 53 | 58908 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 16:01:50.333689928 CET | 60461 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 16:01:50.342828989 CET | 53 | 60461 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 16:01:50.345675945 CET | 62363 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 16:01:50.353919983 CET | 53 | 62363 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 16:01:50.356372118 CET | 53644 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 16:01:50.366900921 CET | 53 | 53644 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 16:01:50.372777939 CET | 57792 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 16:01:50.379503965 CET | 53 | 57792 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 16:01:51.838295937 CET | 54671 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 16:01:51.849912882 CET | 53 | 54671 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 16:02:04.261001110 CET | 63441 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 16:02:04.375099897 CET | 53 | 63441 | 1.1.1.1 | 192.168.2.5 |
Jan 15, 2025 16:02:04.378706932 CET | 61605 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 16:02:04.386483908 CET | 53 | 61605 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 15, 2025 16:01:24.136158943 CET | 192.168.2.5 | 1.1.1.1 | 0x5392 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 16:01:50.228715897 CET | 192.168.2.5 | 1.1.1.1 | 0x258d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 16:01:50.261992931 CET | 192.168.2.5 | 1.1.1.1 | 0xc99 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 16:01:50.286997080 CET | 192.168.2.5 | 1.1.1.1 | 0x5888 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 16:01:50.299901009 CET | 192.168.2.5 | 1.1.1.1 | 0xe05 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 16:01:50.310498953 CET | 192.168.2.5 | 1.1.1.1 | 0x4a21 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 16:01:50.322617054 CET | 192.168.2.5 | 1.1.1.1 | 0x82c2 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 16:01:50.333689928 CET | 192.168.2.5 | 1.1.1.1 | 0xd0d0 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 16:01:50.345675945 CET | 192.168.2.5 | 1.1.1.1 | 0x5fd8 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 16:01:50.356372118 CET | 192.168.2.5 | 1.1.1.1 | 0x2525 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 16:01:50.372777939 CET | 192.168.2.5 | 1.1.1.1 | 0x679f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 16:01:51.838295937 CET | 192.168.2.5 | 1.1.1.1 | 0xfe9c | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 16:02:04.261001110 CET | 192.168.2.5 | 1.1.1.1 | 0x4c89 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 16:02:04.378706932 CET | 192.168.2.5 | 1.1.1.1 | 0x32c1 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 15, 2025 16:01:24.189687014 CET | 1.1.1.1 | 192.168.2.5 | 0x5392 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 16:01:50.247328997 CET | 1.1.1.1 | 192.168.2.5 | 0x258d | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 16:01:50.281842947 CET | 1.1.1.1 | 192.168.2.5 | 0xc99 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 16:01:50.295594931 CET | 1.1.1.1 | 192.168.2.5 | 0x5888 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 16:01:50.308933973 CET | 1.1.1.1 | 192.168.2.5 | 0xe05 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 16:01:50.319529057 CET | 1.1.1.1 | 192.168.2.5 | 0x4a21 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 16:01:50.331232071 CET | 1.1.1.1 | 192.168.2.5 | 0x82c2 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 16:01:50.342828989 CET | 1.1.1.1 | 192.168.2.5 | 0xd0d0 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 16:01:50.353919983 CET | 1.1.1.1 | 192.168.2.5 | 0x5fd8 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 16:01:50.366900921 CET | 1.1.1.1 | 192.168.2.5 | 0x2525 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 16:01:50.379503965 CET | 1.1.1.1 | 192.168.2.5 | 0x679f | No error (0) | 104.102.49.254 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 16:01:51.849912882 CET | 1.1.1.1 | 192.168.2.5 | 0xfe9c | No error (0) | 188.114.96.3 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 16:01:51.849912882 CET | 1.1.1.1 | 192.168.2.5 | 0xfe9c | No error (0) | 188.114.97.3 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 16:02:04.375099897 CET | 1.1.1.1 | 192.168.2.5 | 0x4c89 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 16:02:04.386483908 CET | 1.1.1.1 | 192.168.2.5 | 0x32c1 | No error (0) | 162.159.135.233 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 16:02:04.386483908 CET | 1.1.1.1 | 192.168.2.5 | 0x32c1 | No error (0) | 162.159.134.233 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 16:02:04.386483908 CET | 1.1.1.1 | 192.168.2.5 | 0x32c1 | No error (0) | 162.159.130.233 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 16:02:04.386483908 CET | 1.1.1.1 | 192.168.2.5 | 0x32c1 | No error (0) | 162.159.129.233 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 16:02:04.386483908 CET | 1.1.1.1 | 192.168.2.5 | 0x32c1 | No error (0) | 162.159.133.233 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49850 | 104.102.49.254 | 443 | 5064 | C:\Users\user\AppData\Local\Temp\755831\Dl.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 15:01:51 UTC | 219 | OUT | |
2025-01-15 15:01:51 UTC | 1905 | IN | |
2025-01-15 15:01:51 UTC | 14479 | IN | |
2025-01-15 15:01:51 UTC | 16384 | IN | |
2025-01-15 15:01:51 UTC | 3768 | IN | |
2025-01-15 15:01:51 UTC | 510 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49861 | 188.114.96.3 | 443 | 5064 | C:\Users\user\AppData\Local\Temp\755831\Dl.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 15:01:52 UTC | 266 | OUT | |
2025-01-15 15:01:52 UTC | 8 | OUT | |
2025-01-15 15:01:52 UTC | 1138 | IN | |
2025-01-15 15:01:52 UTC | 7 | IN | |
2025-01-15 15:01:52 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49870 | 188.114.96.3 | 443 | 5064 | C:\Users\user\AppData\Local\Temp\755831\Dl.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 15:01:53 UTC | 267 | OUT | |
2025-01-15 15:01:53 UTC | 47 | OUT | |
2025-01-15 15:01:53 UTC | 1126 | IN | |
2025-01-15 15:01:53 UTC | 243 | IN | |
2025-01-15 15:01:53 UTC | 1369 | IN | |
2025-01-15 15:01:53 UTC | 1369 | IN | |
2025-01-15 15:01:53 UTC | 188 | IN | |
2025-01-15 15:01:53 UTC | 1369 | IN | |
2025-01-15 15:01:53 UTC | 1369 | IN | |
2025-01-15 15:01:53 UTC | 1369 | IN | |
2025-01-15 15:01:53 UTC | 1369 | IN | |
2025-01-15 15:01:53 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49878 | 188.114.96.3 | 443 | 5064 | C:\Users\user\AppData\Local\Temp\755831\Dl.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 15:01:54 UTC | 284 | OUT | |
2025-01-15 15:01:54 UTC | 12829 | OUT | |
2025-01-15 15:01:56 UTC | 1136 | IN | |
2025-01-15 15:01:56 UTC | 20 | IN | |
2025-01-15 15:01:56 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.5 | 49895 | 188.114.96.3 | 443 | 5064 | C:\Users\user\AppData\Local\Temp\755831\Dl.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 15:01:57 UTC | 275 | OUT | |
2025-01-15 15:01:57 UTC | 15017 | OUT | |
2025-01-15 15:01:58 UTC | 1131 | IN | |
2025-01-15 15:01:58 UTC | 20 | IN | |
2025-01-15 15:01:58 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.5 | 49905 | 188.114.96.3 | 443 | 5064 | C:\Users\user\AppData\Local\Temp\755831\Dl.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 15:01:58 UTC | 283 | OUT | |
2025-01-15 15:01:58 UTC | 15331 | OUT | |
2025-01-15 15:01:58 UTC | 5224 | OUT | |
2025-01-15 15:01:59 UTC | 1136 | IN | |
2025-01-15 15:01:59 UTC | 20 | IN | |
2025-01-15 15:01:59 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.5 | 49913 | 188.114.96.3 | 443 | 5064 | C:\Users\user\AppData\Local\Temp\755831\Dl.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 15:02:00 UTC | 277 | OUT | |
2025-01-15 15:02:00 UTC | 1369 | OUT | |
2025-01-15 15:02:00 UTC | 1129 | IN | |
2025-01-15 15:02:00 UTC | 20 | IN | |
2025-01-15 15:02:00 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.5 | 49922 | 188.114.96.3 | 443 | 5064 | C:\Users\user\AppData\Local\Temp\755831\Dl.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 15:02:01 UTC | 283 | OUT | |
2025-01-15 15:02:01 UTC | 15331 | OUT | |
2025-01-15 15:02:01 UTC | 15331 | OUT | |
2025-01-15 15:02:01 UTC | 15331 | OUT | |
2025-01-15 15:02:01 UTC | 15331 | OUT | |
2025-01-15 15:02:01 UTC | 15331 | OUT | |
2025-01-15 15:02:01 UTC | 15331 | OUT | |
2025-01-15 15:02:01 UTC | 15331 | OUT | |
2025-01-15 15:02:01 UTC | 15331 | OUT | |
2025-01-15 15:02:01 UTC | 15331 | OUT | |
2025-01-15 15:02:01 UTC | 15331 | OUT | |
2025-01-15 15:02:03 UTC | 1150 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.5 | 49936 | 188.114.96.3 | 443 | 5064 | C:\Users\user\AppData\Local\Temp\755831\Dl.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 15:02:03 UTC | 267 | OUT | |
2025-01-15 15:02:03 UTC | 82 | OUT | |
2025-01-15 15:02:04 UTC | 1124 | IN | |
2025-01-15 15:02:04 UTC | 245 | IN | |
2025-01-15 15:02:04 UTC | 182 | IN | |
2025-01-15 15:02:04 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
9 | 192.168.2.5 | 49944 | 162.159.135.233 | 443 | 5064 | C:\Users\user\AppData\Local\Temp\755831\Dl.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 15:02:04 UTC | 354 | OUT | |
2025-01-15 15:02:04 UTC | 1058 | IN | |
2025-01-15 15:02:04 UTC | 36 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 10:01:17 |
Start date: | 15/01/2025 |
Path: | C:\Users\user\Desktop\MotivatedFunded.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'158'388 bytes |
MD5 hash: | 374EC1E6084A7E4E8CE505C8EB54D157 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 10:01:19 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 10:01:19 |
Start date: | 15/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 10:01:21 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x660000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 10:01:21 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x270000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 10:01:21 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x660000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 10:01:21 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x270000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 10:01:22 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 9 |
Start time: | 10:01:22 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\extrac32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xdc0000 |
File size: | 29'184 bytes |
MD5 hash: | 9472AAB6390E4F1431BAA912FCFF9707 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 10 |
Start time: | 10:01:22 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x270000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 11 |
Start time: | 10:01:22 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 12 |
Start time: | 10:01:22 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 13 |
Start time: | 10:01:23 |
Start date: | 15/01/2025 |
Path: | C:\Users\user\AppData\Local\Temp\755831\Dl.com |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xb70000 |
File size: | 947'288 bytes |
MD5 hash: | 62D09F076E6E0240548C2F837536A46A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Has exited: | true |
Target ID: | 14 |
Start time: | 10:01:23 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\choice.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x2b0000 |
File size: | 28'160 bytes |
MD5 hash: | FCE0E41C87DC4ABBE976998AD26C27E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Execution Graph
Execution Coverage: | 17.8% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 20.7% |
Total number of Nodes: | 1526 |
Total number of Limit Nodes: | 33 |
Graph
Function 004050CD Relevance: 68.5, APIs: 36, Strings: 3, Instructions: 295windowclipboardmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403883 Relevance: 54.6, APIs: 22, Strings: 9, Instructions: 304filestringcomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004074BB Relevance: 5.4, APIs: 4, Instructions: 382COMMON
Control-flow Graph
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062D5 Relevance: 3.0, APIs: 2, Instructions: 14fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405479 Relevance: 58.1, APIs: 32, Strings: 1, Instructions: 345windowstringCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004015A0 Relevance: 56.4, APIs: 15, Strings: 17, Instructions: 351sleepfilewindowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040592C Relevance: 45.7, APIs: 15, Strings: 11, Instructions: 233stringregistrylibraryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401A1F Relevance: 22.9, APIs: 5, Strings: 8, Instructions: 185stringtimeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040337F Relevance: 17.7, APIs: 6, Strings: 4, Instructions: 166fileCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004022FD Relevance: 7.6, APIs: 5, Instructions: 56memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004078C5 Relevance: 5.2, APIs: 4, Instructions: 238COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407AC3 Relevance: 5.2, APIs: 4, Instructions: 211COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407312 Relevance: 5.2, APIs: 4, Instructions: 201COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407752 Relevance: 5.2, APIs: 4, Instructions: 179COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407854 Relevance: 5.2, APIs: 4, Instructions: 169COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004077B2 Relevance: 5.2, APIs: 4, Instructions: 166COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407C5F Relevance: 5.2, APIs: 4, Instructions: 156memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040139D Relevance: 3.0, APIs: 2, Instructions: 42windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E50 Relevance: 3.0, APIs: 2, Instructions: 15fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E30 Relevance: 3.0, APIs: 2, Instructions: 9COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403336 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004037CC Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DAF Relevance: 1.5, APIs: 1, Instructions: 9windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403368 Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403D98 Relevance: 1.5, APIs: 1, Instructions: 6windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403D85 Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040497C Relevance: 65.2, APIs: 33, Strings: 4, Instructions: 470windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004044A5 Relevance: 33.6, APIs: 15, Strings: 4, Instructions: 300stringkeyboardCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406ED2 Relevance: 30.0, APIs: 14, Strings: 3, Instructions: 270filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406C9B Relevance: 29.9, APIs: 9, Strings: 8, Instructions: 190filestringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406805 Relevance: 21.2, APIs: 8, Strings: 4, Instructions: 212stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E18 Relevance: 1.5, APIs: 1, Instructions: 27fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004063AC Relevance: 70.3, APIs: 29, Strings: 11, Instructions: 256libraryloadermemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004040B8 Relevance: 40.5, APIs: 20, Strings: 3, Instructions: 210windowstringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406A99 Relevance: 33.4, APIs: 15, Strings: 4, Instructions: 163filestringmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402880 Relevance: 17.6, APIs: 4, Strings: 6, Instructions: 131registrystringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E55 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 103memoryfileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004060E7 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 72filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DCA Relevance: 12.1, APIs: 8, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004023F0 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 83libraryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402238 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 59synchronizationCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040484E Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040324C Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 40timeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004043AD Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 73stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040209F Relevance: 7.5, APIs: 5, Instructions: 39windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401F80 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowtimeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004027E3 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 60registryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004048CC Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 58windowCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402665 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 56stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406224 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 53stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004020F9 Relevance: 6.0, APIs: 4, Instructions: 45COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004071F8 Relevance: 6.0, APIs: 3, Strings: 1, Instructions: 43stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004032D2 Relevance: 6.0, APIs: 4, Instructions: 33COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406365 Relevance: 6.0, APIs: 4, Instructions: 31memorylibraryloaderCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402797 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 25stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C3F Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 24processCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062A3 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 13stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405DB6 Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|