Windows
Analysis Report
Adobe-Acrobat-Pro-2025.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Adobe-Acrobat-Pro-2025.exe (PID: 5768 cmdline:
"C:\Users\ user\Deskt op\Adobe-A crobat-Pro -2025.exe" MD5: B3EEA0239B9E344A94A25D0C0C17C9D0) - Adobe-Acrobat-Pro-2025.exe (PID: 2316 cmdline:
"C:\Users\ user\Deskt op\Adobe-A crobat-Pro -2025.exe" MD5: B3EEA0239B9E344A94A25D0C0C17C9D0) - WerFault.exe (PID: 6416 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 5 768 -s 908 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["strivehelpeu.bond", "pain-temper.bond", "stripedre-lot.bond", "growthselec.bond", "jarry-deatile.bond", "sobrattyeu.bond", "immolatechallen.bond", "crookedfoshe.bond", "jarry-fixxer.bond"], "Build id": "yau6Na--899083440"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T16:14:22.280853+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49705 | 104.21.80.1 | 443 | TCP |
2025-01-15T16:14:23.342039+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49706 | 104.21.80.1 | 443 | TCP |
2025-01-15T16:14:27.594769+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49713 | 104.21.80.1 | 443 | TCP |
2025-01-15T16:14:28.912666+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49716 | 104.21.80.1 | 443 | TCP |
2025-01-15T16:14:33.444611+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49747 | 104.21.80.1 | 443 | TCP |
2025-01-15T16:14:35.079971+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49759 | 104.21.80.1 | 443 | TCP |
2025-01-15T16:14:39.403619+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49791 | 104.21.80.1 | 443 | TCP |
2025-01-15T16:14:42.715190+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49808 | 104.21.80.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T16:14:22.821880+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49705 | 104.21.80.1 | 443 | TCP |
2025-01-15T16:14:26.946027+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49706 | 104.21.80.1 | 443 | TCP |
2025-01-15T16:14:43.210932+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49808 | 104.21.80.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T16:14:22.821880+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.5 | 49705 | 104.21.80.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T16:14:26.946027+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.5 | 49706 | 104.21.80.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T16:14:28.407852+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49713 | 104.21.80.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T16:14:39.412394+0100 | 2843864 | 1 | A Network Trojan was detected | 192.168.2.5 | 49791 | 104.21.80.1 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Code function: | 1_2_00414F9B |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 1_2_0042D847 | |
Source: | Code function: | 1_2_00424050 | |
Source: | Code function: | 1_2_0043F02C | |
Source: | Code function: | 1_2_0042D9BD | |
Source: | Code function: | 1_2_0043DA20 | |
Source: | Code function: | 1_2_0042EBAA | |
Source: | Code function: | 1_2_0040D4F2 | |
Source: | Code function: | 1_2_0043F5FD | |
Source: | Code function: | 1_2_00441F40 | |
Source: | Code function: | 1_2_0043A7A0 | |
Source: | Code function: | 1_2_0043A7A0 | |
Source: | Code function: | 1_2_0042A050 | |
Source: | Code function: | 1_2_0041405B | |
Source: | Code function: | 1_2_0043B870 | |
Source: | Code function: | 1_2_00414830 | |
Source: | Code function: | 1_2_00414830 | |
Source: | Code function: | 1_2_0042D0F9 | |
Source: | Code function: | 1_2_0042D8AE | |
Source: | Code function: | 1_2_0042D8B3 | |
Source: | Code function: | 1_2_004210B0 | |
Source: | Code function: | 1_2_0042D15C | |
Source: | Code function: | 1_2_0042D15C | |
Source: | Code function: | 1_2_00440960 | |
Source: | Code function: | 1_2_0042D188 | |
Source: | Code function: | 1_2_0042D188 | |
Source: | Code function: | 1_2_004021A0 | |
Source: | Code function: | 1_2_00440A50 | |
Source: | Code function: | 1_2_00428A7F | |
Source: | Code function: | 1_2_0041DA30 | |
Source: | Code function: | 1_2_00424AC0 | |
Source: | Code function: | 1_2_00424AC0 | |
Source: | Code function: | 1_2_004072E0 | |
Source: | Code function: | 1_2_004072E0 | |
Source: | Code function: | 1_2_0042AAF0 | |
Source: | Code function: | 1_2_0043EA83 | |
Source: | Code function: | 1_2_00413A92 | |
Source: | Code function: | 1_2_00413A92 | |
Source: | Code function: | 1_2_00402AA0 | |
Source: | Code function: | 1_2_00408BE0 | |
Source: | Code function: | 1_2_004263E6 | |
Source: | Code function: | 1_2_00420BB0 | |
Source: | Code function: | 1_2_00416BBC | |
Source: | Code function: | 1_2_0043FC42 | |
Source: | Code function: | 1_2_00440C10 | |
Source: | Code function: | 1_2_0041DCA0 | |
Source: | Code function: | 1_2_0040BD40 | |
Source: | Code function: | 1_2_0043FD53 | |
Source: | Code function: | 1_2_0043DD60 | |
Source: | Code function: | 1_2_00437560 | |
Source: | Code function: | 1_2_0042CD69 | |
Source: | Code function: | 1_2_0041BD20 | |
Source: | Code function: | 1_2_0043FE0B | |
Source: | Code function: | 1_2_0042D6DE | |
Source: | Code function: | 1_2_0042D6E9 | |
Source: | Code function: | 1_2_0042EEF7 | |
Source: | Code function: | 1_2_00418690 | |
Source: | Code function: | 1_2_00426F60 | |
Source: | Code function: | 1_2_0041AF75 | |
Source: | Code function: | 1_2_0043DF10 | |
Source: | Code function: | 1_2_0040BFE0 | |
Source: | Code function: | 1_2_00424780 | |
Source: | Code function: | 1_2_00424780 | |
Source: | Code function: | 1_2_00424780 | |
Source: | Code function: | 1_2_0043DF80 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 1_2_004354B0 |
Source: | Code function: | 1_2_004354B0 |
Source: | Code function: | 1_2_00435660 |
Source: | Code function: | 1_2_00424050 | |
Source: | Code function: | 1_2_00409921 | |
Source: | Code function: | 1_2_0042EBAA | |
Source: | Code function: | 1_2_004343BB | |
Source: | Code function: | 1_2_0041AC58 | |
Source: | Code function: | 1_2_00409460 | |
Source: | Code function: | 1_2_004084E0 | |
Source: | Code function: | 1_2_004204E0 | |
Source: | Code function: | 1_2_0040D4F2 | |
Source: | Code function: | 1_2_00441570 | |
Source: | Code function: | 1_2_0043A530 | |
Source: | Code function: | 1_2_004116D0 | |
Source: | Code function: | 1_2_0040DE81 | |
Source: | Code function: | 1_2_00441F40 | |
Source: | Code function: | 1_2_0041DF60 | |
Source: | Code function: | 1_2_004277C0 | |
Source: | Code function: | 1_2_0043A7A0 | |
Source: | Code function: | 1_2_00401040 | |
Source: | Code function: | 1_2_0041405B | |
Source: | Code function: | 1_2_00406070 | |
Source: | Code function: | 1_2_0041600C | |
Source: | Code function: | 1_2_00405810 | |
Source: | Code function: | 1_2_00403830 | |
Source: | Code function: | 1_2_00414830 | |
Source: | Code function: | 1_2_004090B0 | |
Source: | Code function: | 1_2_0041C0B0 | |
Source: | Code function: | 1_2_004210B0 | |
Source: | Code function: | 1_2_00434949 | |
Source: | Code function: | 1_2_0042294C | |
Source: | Code function: | 1_2_0040E95A | |
Source: | Code function: | 1_2_00440960 | |
Source: | Code function: | 1_2_00441930 | |
Source: | Code function: | 1_2_0042E9C5 | |
Source: | Code function: | 1_2_0043B9D0 | |
Source: | Code function: | 1_2_0041A1DC | |
Source: | Code function: | 1_2_004041E0 | |
Source: | Code function: | 1_2_004291E0 | |
Source: | Code function: | 1_2_004329F5 | |
Source: | Code function: | 1_2_0041C990 | |
Source: | Code function: | 1_2_0040A9A0 | |
Source: | Code function: | 1_2_004339AE | |
Source: | Code function: | 1_2_00440A50 | |
Source: | Code function: | 1_2_00428A7F | |
Source: | Code function: | 1_2_0042C210 | |
Source: | Code function: | 1_2_00435230 | |
Source: | Code function: | 1_2_00424AC0 | |
Source: | Code function: | 1_2_004072E0 | |
Source: | Code function: | 1_2_00427AF0 | |
Source: | Code function: | 1_2_00413A92 | |
Source: | Code function: | 1_2_004152B4 | |
Source: | Code function: | 1_2_00411356 | |
Source: | Code function: | 1_2_00440B60 | |
Source: | Code function: | 1_2_00404B10 | |
Source: | Code function: | 1_2_0042DBC8 | |
Source: | Code function: | 1_2_00410BCA | |
Source: | Code function: | 1_2_00427BDF | |
Source: | Code function: | 1_2_004263E6 | |
Source: | Code function: | 1_2_0041B3F0 | |
Source: | Code function: | 1_2_0043BBA7 | |
Source: | Code function: | 1_2_00420BB0 | |
Source: | Code function: | 1_2_0042DC59 | |
Source: | Code function: | 1_2_0043B400 | |
Source: | Code function: | 1_2_00440C10 | |
Source: | Code function: | 1_2_00441C30 | |
Source: | Code function: | 1_2_00405CD0 | |
Source: | Code function: | 1_2_0042DCD8 | |
Source: | Code function: | 1_2_00438CE4 | |
Source: | Code function: | 1_2_0042DCEB | |
Source: | Code function: | 1_2_00439CF0 | |
Source: | Code function: | 1_2_004394F4 | |
Source: | Code function: | 1_2_0042F490 | |
Source: | Code function: | 1_2_00416C9D | |
Source: | Code function: | 1_2_00419570 | |
Source: | Code function: | 1_2_00430D7A | |
Source: | Code function: | 1_2_00437D7D | |
Source: | Code function: | 1_2_00406500 | |
Source: | Code function: | 1_2_0041BD20 | |
Source: | Code function: | 1_2_00424D86 | |
Source: | Code function: | 1_2_00408DB0 | |
Source: | Code function: | 1_2_0041F640 | |
Source: | Code function: | 1_2_0040AE20 | |
Source: | Code function: | 1_2_00402E20 | |
Source: | Code function: | 1_2_0040E6E0 | |
Source: | Code function: | 1_2_0042EEF7 | |
Source: | Code function: | 1_2_00418690 | |
Source: | Code function: | 1_2_00426F60 | |
Source: | Code function: | 1_2_0041C720 | |
Source: | Code function: | 1_2_0041572C | |
Source: | Code function: | 1_2_00428F3B | |
Source: | Code function: | 1_2_0040C7F5 | |
Source: | Code function: | 1_2_00424780 | |
Source: | Code function: | 1_2_0043DF80 |
Source: | Process created: |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 1_2_0043A7A0 |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: |
Source: | Code function: | 1_2_004488FE | |
Source: | Code function: | 1_2_00444977 | |
Source: | Code function: | 1_2_00440904 | |
Source: | Code function: | 1_2_00448269 | |
Source: | Code function: | 1_2_00449AF2 | |
Source: | Code function: | 1_2_0044564C | |
Source: | Code function: | 1_2_00445781 |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior |
Source: | WMI Queries: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_1-13393 |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 1_2_0043F280 |
Source: | Code function: | 0_2_02537FDD | |
Source: | Code function: | 0_2_0253815A |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Code function: | 0_2_02537FDD |
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 211 Process Injection | 23 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 1 Query Registry | Remote Services | 1 Screen Capture | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Disable or Modify Tools | LSASS Memory | 231 Security Software Discovery | Remote Desktop Protocol | 1 Archive Collected Data | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 211 Process Injection | Security Account Manager | 23 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | 41 Data from Local System | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 11 Deobfuscate/Decode Files or Information | NTDS | 1 Process Discovery | Distributed Component Object Model | 2 Clipboard Data | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 3 Obfuscated Files or Information | LSA Secrets | 1 Application Window Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Software Packing | Cached Domain Credentials | 1 File and Directory Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 Timestomp | DCSync | 22 System Information Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 DLL Side-Loading | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
53% | ReversingLabs | ByteCode-MSIL.Trojan.LummaStealer | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
sobrattyeu.bond | 104.21.80.1 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.80.1 | sobrattyeu.bond | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1591985 |
Start date and time: | 2025-01-15 16:13:15 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 56s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 9 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Adobe-Acrobat-Pro-2025.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@4/5@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 20.42.73.29, 20.189.173.22, 20.190.159.4, 13.107.246.45, 172.202.163.200
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
10:14:22 | API Interceptor | |
10:14:36 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.80.1 | Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| |
Get hash | malicious | FormBook, PureLog Stealer | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Amadey | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | CMSBrute | Browse |
| ||
Get hash | malicious | XWorm | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
sobrattyeu.bond | Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Wannacry | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | PureCrypter, LummaC, LummaC Stealer | Browse |
| ||
Get hash | malicious | PureCrypter, LummaC, LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Adobe-Acrobat-Pr_34e0e0c6aac799108c673a33397bb48b249f7_eb91d539_00a5090a-d55f-4cdc-81ec-93f0a05e8dbd\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.9029053895822463 |
Encrypted: | false |
SSDEEP: | 96:h2FpwI4/ZsNg0HjTOAqyS3QXIDcQlc6VcEdcw3V+BHUHZ0ownOgHkEwH3dEFWv53:s7w//Z6eA0LR3EaWGzuiFxZ24IO8Ij |
MD5: | D75093899227E48B93A97EB489394F18 |
SHA1: | 658F3E6FED4E7B85430358F7A41E9FABC50A04E4 |
SHA-256: | 0256E0CB0B7DAA98CA7418D0565D67D527310EE765340BC0CCD2103438C9886C |
SHA-512: | 19626E2EDC1A6D2777D9A7645C5329F765936D0B75BF5B8A6A7CC9DC5BFB2B604995BEE6E2AC01F4D98D4F55BEF5918F9B5C7CC91CB47E3AF932D00D2EDE7C7C |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 152967 |
Entropy (8bit): | 3.7544493426054806 |
Encrypted: | false |
SSDEEP: | 1536:VVnNLqeTtT5Cuy19uBojRRpN4uE2aONUN9NCCDKLTgRAxMs:VVNLt5YVb94uEqq9zKLTgQ |
MD5: | D58F342CA418ABB91138C17780743D8C |
SHA1: | C28D3875D592293D4D1B6630C502AF03E1A45FCC |
SHA-256: | A5416EB578076AE1C1EBEA9646BC48A0FFE2E26E3A2271D2494DD790893DC574 |
SHA-512: | CD73D41CEB077FE760787F49739A0749E4C953DA3CCDFA63272C51DC9E04621EE84F169285AB6403AFF88FEC5B8B22FC63485FC0CC73033364AF62229E45F866 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8430 |
Entropy (8bit): | 3.691486919739247 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJOkjp6B6YEIASU98mgmfMcwVJJpr189boKsftYm:R6lXJZp6B6YEvSU98mgmfYVJ2opfX |
MD5: | D12E34A4BDAE4DE11174DE1507BA3670 |
SHA1: | 3FF8689B81B722017D76E3FE2524469A0F42BED0 |
SHA-256: | 175A56B355B79B80B647DFDD1E683E3F8971B0083DFB1BFAD653C0DAE3C44C69 |
SHA-512: | 89524A0FBAC76D8CE37A6021AC3DDB6C31FF9A069D9C9D35C6B5CC378C27D3714C80DB04C6EC860EA7A4B9822F162F69F51C3482ED98C27CF7F41D96CBC0C8AD |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4810 |
Entropy (8bit): | 4.475317412479773 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zs3Jg77aI9Q/MQWpW8VYAYm8M4JedxPcf6FQ+q8v5dxPcfbFQapZd:uIjfZI7O/Mp7VMJDfTK+fhQapZd |
MD5: | F2EE16EA2C2778747035B0338423F317 |
SHA1: | 3B0E902CFAE095444A6E169877708AEA8046E94A |
SHA-256: | D9B8AC2CF2E6E6258A050B887E0F59FB5F4992976BE7FAA26595819AC04CF3CE |
SHA-512: | 61B39E71E1EC6AAB0FCE479D5CBBB6198AD49BAF9279524AD29C790F2C5ED14701ED25B9261CF520B04161B58982CAB9DC231288E2475A153735EDA6FF6280AD |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.421822433085895 |
Encrypted: | false |
SSDEEP: | 6144:6Svfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNu0uhiTw:pvloTMW+EZMM6DFyc03w |
MD5: | DEB486F395522EC9F10FFDE185BA036D |
SHA1: | F61BABA6E85442AE881C827CDC1930768654B3BD |
SHA-256: | 6B39D97749B7C0124783BD84AEB461FB741ECA4D32C67A7B043F702958699FEB |
SHA-512: | F0C0C5517CA5EE3B5A069C9DD43722C61A72EF7B08B387EBECB1F7F42EBF93A5E212B950F6595B2390DBDBA45BD5ACED3DE56624EFD1CE9728DC972445014C1D |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.6395734526350525 |
TrID: |
|
File name: | Adobe-Acrobat-Pro-2025.exe |
File size: | 459'376 bytes |
MD5: | b3eea0239b9e344a94a25d0c0c17c9d0 |
SHA1: | e5cb8f568df68cb0b8c14811d14096af6690c936 |
SHA256: | a8e028e06b6e58a256e997f803a43b68d4f1224beba4a49c490f6934addaca77 |
SHA512: | cb9f19c1fa57bd877f7092b825963b6160d4ec5b6914f5808d847949d84b6dc3b81f90f886d831b092beee8b335b0218aad209d916bc1b839711a3ccce2dce69 |
SSDEEP: | 12288:nA0Wl/zueVCcPnypztZYU/fyOfEGKEMPC6vbCY:A0izXUtl/aG2EMNjCY |
TLSH: | 88A4E0682668D53BC2AE43B6E4A3510263F5B4D7EEA1FB45BC9414F14C12390AB352FF |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2.................0.............>.... ... ....@.. .......................@............`................................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x421a3e |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0xECEDE332 [Sun Dec 18 02:19:30 2095 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Signature Valid: | false |
Signature Issuer: | CN=DigiCert EV Code Signing CA (SHA2), OU=www.digicert.com, O=DigiCert Inc, C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 332CDC164B1324C3FF3F64E228C5FFFC |
Thumbprint SHA-1: | CBFB3D25134A5FF6FCF2924D5B4BE16194EA7E13 |
Thumbprint SHA-256: | 531855F05B9D55E4F6DDEBC443706382DDB9ACBD2B8AB24004822BE204420943 |
Serial: | 0C9838F673F9B1CCE395CFAB2B6684E4 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x219f0 | 0x4b | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x22000 | 0x598 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x6dc00 | 0x2670 | .idata |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x24000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x219a7 | 0x1c | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x1fa44 | 0x1fc00 | 7c297cc8f463f81875ed0f7ba3dd3ff0 | False | 0.4013056717519685 | data | 5.796591200875089 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x22000 | 0x598 | 0x600 | 511dd0b163083f747b4fa3f1e450067c | False | 0.41015625 | data | 4.038713703339799 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x24000 | 0xc | 0x200 | b1171333753a88cda4e7356665065f4c | False | 0.044921875 | data | 0.10191042566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.idata | 0x26000 | 0x4d400 | 0x4d400 | d14cf3e6fdb9ca0e2d373d61bb5bf1c2 | False | 1.0003350020226538 | data | 7.999513650950077 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x220a0 | 0x30c | data | 0.41923076923076924 | ||
RT_MANIFEST | 0x223ac | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T16:14:22.280853+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49705 | 104.21.80.1 | 443 | TCP |
2025-01-15T16:14:22.821880+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.5 | 49705 | 104.21.80.1 | 443 | TCP |
2025-01-15T16:14:22.821880+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49705 | 104.21.80.1 | 443 | TCP |
2025-01-15T16:14:23.342039+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49706 | 104.21.80.1 | 443 | TCP |
2025-01-15T16:14:26.946027+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.5 | 49706 | 104.21.80.1 | 443 | TCP |
2025-01-15T16:14:26.946027+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49706 | 104.21.80.1 | 443 | TCP |
2025-01-15T16:14:27.594769+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49713 | 104.21.80.1 | 443 | TCP |
2025-01-15T16:14:28.407852+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.5 | 49713 | 104.21.80.1 | 443 | TCP |
2025-01-15T16:14:28.912666+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49716 | 104.21.80.1 | 443 | TCP |
2025-01-15T16:14:33.444611+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49747 | 104.21.80.1 | 443 | TCP |
2025-01-15T16:14:35.079971+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49759 | 104.21.80.1 | 443 | TCP |
2025-01-15T16:14:39.403619+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49791 | 104.21.80.1 | 443 | TCP |
2025-01-15T16:14:39.412394+0100 | 2843864 | ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 | 1 | 192.168.2.5 | 49791 | 104.21.80.1 | 443 | TCP |
2025-01-15T16:14:42.715190+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49808 | 104.21.80.1 | 443 | TCP |
2025-01-15T16:14:43.210932+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49808 | 104.21.80.1 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 15, 2025 16:14:21.789355993 CET | 49705 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:21.789412975 CET | 443 | 49705 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:21.789547920 CET | 49705 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:21.790781021 CET | 49705 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:21.790807962 CET | 443 | 49705 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:22.280777931 CET | 443 | 49705 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:22.280853033 CET | 49705 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:22.285535097 CET | 49705 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:22.285554886 CET | 443 | 49705 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:22.285923004 CET | 443 | 49705 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:22.329283953 CET | 49705 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:22.402611017 CET | 49705 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:22.402611017 CET | 49705 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:22.402782917 CET | 443 | 49705 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:22.821901083 CET | 443 | 49705 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:22.822014093 CET | 443 | 49705 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:22.822175026 CET | 49705 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:22.824492931 CET | 49705 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:22.824547052 CET | 443 | 49705 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:22.824580908 CET | 49705 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:22.824599028 CET | 443 | 49705 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:22.841093063 CET | 49706 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:22.841123104 CET | 443 | 49706 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:22.841195107 CET | 49706 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:22.841737986 CET | 49706 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:22.841748953 CET | 443 | 49706 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:23.341917038 CET | 443 | 49706 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:23.342039108 CET | 49706 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:23.429975986 CET | 49706 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:23.430007935 CET | 443 | 49706 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:23.430769920 CET | 443 | 49706 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:23.431993008 CET | 49706 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:23.432359934 CET | 49706 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:23.432395935 CET | 443 | 49706 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:26.946026087 CET | 443 | 49706 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:26.946316004 CET | 443 | 49706 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:26.946357965 CET | 49706 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:26.946361065 CET | 443 | 49706 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:26.946388006 CET | 443 | 49706 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:26.946436882 CET | 49706 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:26.946444988 CET | 443 | 49706 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:26.946475983 CET | 443 | 49706 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:26.946523905 CET | 49706 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:26.946531057 CET | 443 | 49706 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:26.946542025 CET | 443 | 49706 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:26.946592093 CET | 49706 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:26.946599007 CET | 443 | 49706 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:26.947061062 CET | 443 | 49706 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:26.947108030 CET | 49706 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:26.947117090 CET | 443 | 49706 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:26.951930046 CET | 443 | 49706 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:26.951986074 CET | 49706 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:26.952004910 CET | 443 | 49706 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:26.995718002 CET | 49706 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:27.045778990 CET | 443 | 49706 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:27.045859098 CET | 443 | 49706 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:27.045917988 CET | 49706 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:27.045949936 CET | 443 | 49706 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:27.045970917 CET | 443 | 49706 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:27.046013117 CET | 49706 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:27.046844006 CET | 49706 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:27.046866894 CET | 443 | 49706 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:27.046881914 CET | 49706 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:27.046888113 CET | 443 | 49706 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:27.126918077 CET | 49713 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:27.126969099 CET | 443 | 49713 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:27.127054930 CET | 49713 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:27.127393007 CET | 49713 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:27.127412081 CET | 443 | 49713 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:27.594615936 CET | 443 | 49713 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:27.594769001 CET | 49713 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:27.596229076 CET | 49713 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:27.596240997 CET | 443 | 49713 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:27.596472979 CET | 443 | 49713 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:27.605387926 CET | 49713 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:27.605560064 CET | 49713 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:27.605582952 CET | 443 | 49713 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:28.407860041 CET | 443 | 49713 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:28.407954931 CET | 443 | 49713 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:28.408013105 CET | 49713 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:28.408185959 CET | 49713 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:28.408195019 CET | 443 | 49713 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:28.425729990 CET | 49716 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:28.425771952 CET | 443 | 49716 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:28.425837040 CET | 49716 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:28.426170111 CET | 49716 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:28.426187992 CET | 443 | 49716 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:28.912539959 CET | 443 | 49716 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:28.912666082 CET | 49716 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:29.281836033 CET | 49716 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:29.281862020 CET | 443 | 49716 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:29.282242060 CET | 443 | 49716 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:29.285147905 CET | 49716 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:29.285307884 CET | 49716 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:29.285339117 CET | 443 | 49716 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:29.285379887 CET | 49716 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:29.327331066 CET | 443 | 49716 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:32.869333029 CET | 443 | 49716 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:32.869426966 CET | 443 | 49716 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:32.869594097 CET | 49716 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:32.869905949 CET | 49716 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:32.869925022 CET | 443 | 49716 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:32.964478016 CET | 49747 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:32.964524031 CET | 443 | 49747 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:32.964632034 CET | 49747 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:32.965025902 CET | 49747 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:32.965043068 CET | 443 | 49747 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:33.444552898 CET | 443 | 49747 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:33.444611073 CET | 49747 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:33.446202040 CET | 49747 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:33.446207047 CET | 443 | 49747 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:33.446429014 CET | 443 | 49747 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:33.447642088 CET | 49747 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:33.447794914 CET | 49747 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:33.447813988 CET | 443 | 49747 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:33.447877884 CET | 49747 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:33.447882891 CET | 443 | 49747 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:34.434756994 CET | 443 | 49747 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:34.434851885 CET | 443 | 49747 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:34.434900045 CET | 49747 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:34.434983015 CET | 49747 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:34.435002089 CET | 443 | 49747 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:34.594629049 CET | 49759 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:34.594672918 CET | 443 | 49759 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:34.594733000 CET | 49759 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:34.595473051 CET | 49759 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:34.595484018 CET | 443 | 49759 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:35.079790115 CET | 443 | 49759 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:35.079971075 CET | 49759 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:35.081208944 CET | 49759 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:35.081228971 CET | 443 | 49759 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:35.081495047 CET | 443 | 49759 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:35.085457087 CET | 49759 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:35.085892916 CET | 49759 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:35.085901022 CET | 443 | 49759 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:38.607983112 CET | 443 | 49759 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:38.608232975 CET | 443 | 49759 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:38.608509064 CET | 49759 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:38.608627081 CET | 49759 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:38.608634949 CET | 443 | 49759 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:38.918333054 CET | 49791 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:38.918370962 CET | 443 | 49791 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:38.918437004 CET | 49791 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:38.918814898 CET | 49791 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:38.918831110 CET | 443 | 49791 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:39.403525114 CET | 443 | 49791 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:39.403619051 CET | 49791 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:39.404750109 CET | 49791 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:39.404766083 CET | 443 | 49791 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:39.405327082 CET | 443 | 49791 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:39.409492970 CET | 49791 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:39.410231113 CET | 49791 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:39.410283089 CET | 443 | 49791 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:39.410396099 CET | 49791 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:39.410427094 CET | 443 | 49791 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:39.412246943 CET | 49791 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:39.412300110 CET | 443 | 49791 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:39.412472963 CET | 49791 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:39.412491083 CET | 443 | 49791 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:39.412621975 CET | 49791 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:39.412652016 CET | 443 | 49791 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:39.416364908 CET | 49791 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:39.416414022 CET | 443 | 49791 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:39.416429996 CET | 49791 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:39.416439056 CET | 443 | 49791 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:39.416591883 CET | 49791 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:39.416619062 CET | 443 | 49791 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:39.416642904 CET | 49791 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:39.420057058 CET | 443 | 49791 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:39.420245886 CET | 49791 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:39.420295954 CET | 49791 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:39.420304060 CET | 443 | 49791 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:39.420320034 CET | 49791 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:39.420341969 CET | 443 | 49791 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:39.420439959 CET | 443 | 49791 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:39.420510054 CET | 49791 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:39.420548916 CET | 443 | 49791 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:39.420553923 CET | 49791 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:39.420568943 CET | 49791 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:39.420655012 CET | 443 | 49791 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:42.248635054 CET | 443 | 49791 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:42.248775005 CET | 443 | 49791 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:42.248924971 CET | 49791 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:42.248986006 CET | 49791 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:42.249001026 CET | 443 | 49791 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:42.253639936 CET | 49808 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:42.253714085 CET | 443 | 49808 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:42.253801107 CET | 49808 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:42.254086018 CET | 49808 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:42.254101038 CET | 443 | 49808 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:42.715085983 CET | 443 | 49808 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:42.715189934 CET | 49808 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:42.717394114 CET | 49808 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:42.717401981 CET | 443 | 49808 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:42.717725039 CET | 443 | 49808 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:42.719441891 CET | 49808 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:42.719507933 CET | 49808 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:42.719522953 CET | 443 | 49808 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:43.211052895 CET | 443 | 49808 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:43.211199045 CET | 443 | 49808 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:43.211249113 CET | 49808 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:43.211261988 CET | 443 | 49808 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:43.211400032 CET | 443 | 49808 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:43.211462021 CET | 49808 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:43.211468935 CET | 443 | 49808 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:43.211554050 CET | 443 | 49808 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:43.211600065 CET | 49808 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:43.211608887 CET | 443 | 49808 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:43.211719990 CET | 443 | 49808 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:43.211767912 CET | 49808 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:43.211775064 CET | 443 | 49808 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:43.211869955 CET | 443 | 49808 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:43.211924076 CET | 49808 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:43.211930990 CET | 443 | 49808 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:43.212025881 CET | 443 | 49808 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:43.212078094 CET | 49808 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:43.212084055 CET | 443 | 49808 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:43.212227106 CET | 443 | 49808 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:43.212282896 CET | 49808 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:43.212325096 CET | 49808 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:43.212331057 CET | 443 | 49808 | 104.21.80.1 | 192.168.2.5 |
Jan 15, 2025 16:14:43.212347984 CET | 49808 | 443 | 192.168.2.5 | 104.21.80.1 |
Jan 15, 2025 16:14:43.212352991 CET | 443 | 49808 | 104.21.80.1 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 15, 2025 16:14:21.770875931 CET | 61702 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 15, 2025 16:14:21.783386946 CET | 53 | 61702 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 15, 2025 16:14:21.770875931 CET | 192.168.2.5 | 1.1.1.1 | 0x739d | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 15, 2025 16:14:21.783386946 CET | 1.1.1.1 | 192.168.2.5 | 0x739d | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 16:14:21.783386946 CET | 1.1.1.1 | 192.168.2.5 | 0x739d | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 16:14:21.783386946 CET | 1.1.1.1 | 192.168.2.5 | 0x739d | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 16:14:21.783386946 CET | 1.1.1.1 | 192.168.2.5 | 0x739d | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 16:14:21.783386946 CET | 1.1.1.1 | 192.168.2.5 | 0x739d | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 16:14:21.783386946 CET | 1.1.1.1 | 192.168.2.5 | 0x739d | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 16:14:21.783386946 CET | 1.1.1.1 | 192.168.2.5 | 0x739d | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49705 | 104.21.80.1 | 443 | 2316 | C:\Users\user\Desktop\Adobe-Acrobat-Pro-2025.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 15:14:22 UTC | 262 | OUT | |
2025-01-15 15:14:22 UTC | 8 | OUT | |
2025-01-15 15:14:22 UTC | 1125 | IN | |
2025-01-15 15:14:22 UTC | 7 | IN | |
2025-01-15 15:14:22 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49706 | 104.21.80.1 | 443 | 2316 | C:\Users\user\Desktop\Adobe-Acrobat-Pro-2025.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 15:14:23 UTC | 263 | OUT | |
2025-01-15 15:14:23 UTC | 51 | OUT | |
2025-01-15 15:14:26 UTC | 1132 | IN | |
2025-01-15 15:14:26 UTC | 237 | IN | |
2025-01-15 15:14:26 UTC | 1369 | IN | |
2025-01-15 15:14:26 UTC | 1369 | IN | |
2025-01-15 15:14:26 UTC | 1369 | IN | |
2025-01-15 15:14:26 UTC | 909 | IN | |
2025-01-15 15:14:26 UTC | 1369 | IN | |
2025-01-15 15:14:26 UTC | 1369 | IN | |
2025-01-15 15:14:26 UTC | 1369 | IN | |
2025-01-15 15:14:26 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49713 | 104.21.80.1 | 443 | 2316 | C:\Users\user\Desktop\Adobe-Acrobat-Pro-2025.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 15:14:27 UTC | 272 | OUT | |
2025-01-15 15:14:27 UTC | 12785 | OUT | |
2025-01-15 15:14:28 UTC | 1130 | IN | |
2025-01-15 15:14:28 UTC | 20 | IN | |
2025-01-15 15:14:28 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49716 | 104.21.80.1 | 443 | 2316 | C:\Users\user\Desktop\Adobe-Acrobat-Pro-2025.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 15:14:29 UTC | 279 | OUT | |
2025-01-15 15:14:29 UTC | 15069 | OUT | |
2025-01-15 15:14:32 UTC | 1135 | IN | |
2025-01-15 15:14:32 UTC | 20 | IN | |
2025-01-15 15:14:32 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.5 | 49747 | 104.21.80.1 | 443 | 2316 | C:\Users\user\Desktop\Adobe-Acrobat-Pro-2025.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 15:14:33 UTC | 278 | OUT | |
2025-01-15 15:14:33 UTC | 15331 | OUT | |
2025-01-15 15:14:33 UTC | 5222 | OUT | |
2025-01-15 15:14:34 UTC | 1126 | IN | |
2025-01-15 15:14:34 UTC | 20 | IN | |
2025-01-15 15:14:34 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.5 | 49759 | 104.21.80.1 | 443 | 2316 | C:\Users\user\Desktop\Adobe-Acrobat-Pro-2025.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 15:14:35 UTC | 272 | OUT | |
2025-01-15 15:14:35 UTC | 1382 | OUT | |
2025-01-15 15:14:38 UTC | 1121 | IN | |
2025-01-15 15:14:38 UTC | 20 | IN | |
2025-01-15 15:14:38 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.5 | 49791 | 104.21.80.1 | 443 | 2316 | C:\Users\user\Desktop\Adobe-Acrobat-Pro-2025.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 15:14:39 UTC | 277 | OUT | |
2025-01-15 15:14:39 UTC | 15331 | OUT | |
2025-01-15 15:14:39 UTC | 15331 | OUT | |
2025-01-15 15:14:39 UTC | 15331 | OUT | |
2025-01-15 15:14:39 UTC | 15331 | OUT | |
2025-01-15 15:14:39 UTC | 15331 | OUT | |
2025-01-15 15:14:39 UTC | 15331 | OUT | |
2025-01-15 15:14:39 UTC | 15331 | OUT | |
2025-01-15 15:14:39 UTC | 15331 | OUT | |
2025-01-15 15:14:39 UTC | 15331 | OUT | |
2025-01-15 15:14:39 UTC | 15331 | OUT | |
2025-01-15 15:14:42 UTC | 1129 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.5 | 49808 | 104.21.80.1 | 443 | 2316 | C:\Users\user\Desktop\Adobe-Acrobat-Pro-2025.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 15:14:42 UTC | 263 | OUT | |
2025-01-15 15:14:42 UTC | 86 | OUT | |
2025-01-15 15:14:43 UTC | 1131 | IN | |
2025-01-15 15:14:43 UTC | 238 | IN | |
2025-01-15 15:14:43 UTC | 1369 | IN | |
2025-01-15 15:14:43 UTC | 1369 | IN | |
2025-01-15 15:14:43 UTC | 1369 | IN | |
2025-01-15 15:14:43 UTC | 1369 | IN | |
2025-01-15 15:14:43 UTC | 1198 | IN | |
2025-01-15 15:14:43 UTC | 1369 | IN | |
2025-01-15 15:14:43 UTC | 1369 | IN | |
2025-01-15 15:14:43 UTC | 1369 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 10:14:20 |
Start date: | 15/01/2025 |
Path: | C:\Users\user\Desktop\Adobe-Acrobat-Pro-2025.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x10000 |
File size: | 459'376 bytes |
MD5 hash: | B3EEA0239B9E344A94A25D0C0C17C9D0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 10:14:20 |
Start date: | 15/01/2025 |
Path: | C:\Users\user\Desktop\Adobe-Acrobat-Pro-2025.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x9b0000 |
File size: | 459'376 bytes |
MD5 hash: | B3EEA0239B9E344A94A25D0C0C17C9D0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 5 |
Start time: | 10:14:21 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe0000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 16.6% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 20.5% |
Total number of Nodes: | 39 |
Total number of Limit Nodes: | 4 |
Graph
Function 02537FDD Relevance: 40.5, APIs: 10, Strings: 13, Instructions: 294threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0253815A Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 82threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 008C2880 Relevance: 1.7, APIs: 1, Instructions: 242COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 008C2104 Relevance: 1.6, APIs: 1, Instructions: 54memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 8.9% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 63.7% |
Total number of Nodes: | 237 |
Total number of Limit Nodes: | 15 |
Graph
Function 004116D0 Relevance: 187.5, APIs: 4, Strings: 102, Instructions: 1951COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043A7A0 Relevance: 28.8, APIs: 11, Strings: 5, Instructions: 841memorycomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004204E0 Relevance: 9.2, Strings: 7, Instructions: 434COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409460 Relevance: 9.1, Strings: 7, Instructions: 367COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004084E0 Relevance: 7.8, APIs: 5, Instructions: 258threadCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041DF60 Relevance: 4.5, Strings: 3, Instructions: 731COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040DE81 Relevance: 2.7, Strings: 2, Instructions: 175COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409921 Relevance: 2.6, Strings: 2, Instructions: 139COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043F280 Relevance: 1.5, APIs: 1, Instructions: 14libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042E9C5 Relevance: 1.4, Strings: 1, Instructions: 169COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441570 Relevance: .4, Instructions: 368COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441F40 Relevance: .3, Instructions: 335COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004277C0 Relevance: .3, Instructions: 296COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041AC58 Relevance: .2, Instructions: 236COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004343BB Relevance: .2, Instructions: 209COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043DA20 Relevance: .2, Instructions: 187COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043A530 Relevance: .2, Instructions: 180COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042CD69 Relevance: .2, Instructions: 157COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042D9BD Relevance: .1, Instructions: 126COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043F02C Relevance: .1, Instructions: 57COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043F5FD Relevance: .0, Instructions: 42COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043F220 Relevance: 1.5, APIs: 1, Instructions: 30memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004305BB Relevance: 1.5, APIs: 1, Instructions: 25COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00434231 Relevance: 1.5, APIs: 1, Instructions: 22COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00438695 Relevance: 1.5, APIs: 1, Instructions: 18COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040C7C3 Relevance: 1.5, APIs: 1, Instructions: 17COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040C790 Relevance: 1.5, APIs: 1, Instructions: 17COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043D9F0 Relevance: 1.5, APIs: 1, Instructions: 13memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043D9D0 Relevance: 1.5, APIs: 1, Instructions: 9memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042294C Relevance: 86.7, Strings: 69, Instructions: 431COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00437D7D Relevance: 82.9, Strings: 66, Instructions: 386COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004394F4 Relevance: 82.9, Strings: 66, Instructions: 379COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00424D86 Relevance: 30.8, Strings: 24, Instructions: 843COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00438CE4 Relevance: 26.6, Strings: 21, Instructions: 316COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427AF0 Relevance: 19.1, Strings: 15, Instructions: 367COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401040 Relevance: 8.1, Strings: 6, Instructions: 595COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041F640 Relevance: 8.0, Strings: 6, Instructions: 546COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040AE20 Relevance: 8.0, Strings: 6, Instructions: 502COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043DF80 Relevance: 6.8, Strings: 5, Instructions: 575COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041600C Relevance: 5.7, Strings: 4, Instructions: 733COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040A9A0 Relevance: 5.4, Strings: 4, Instructions: 389COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00414830 Relevance: 4.3, Strings: 3, Instructions: 559COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041B3F0 Relevance: 4.3, Strings: 3, Instructions: 516COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004210B0 Relevance: 4.2, Strings: 3, Instructions: 420COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00416C9D Relevance: 4.1, Strings: 3, Instructions: 361COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00411356 Relevance: 4.0, Strings: 3, Instructions: 252COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040E6E0 Relevance: 4.0, Strings: 3, Instructions: 206COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404B10 Relevance: 3.3, Strings: 2, Instructions: 797COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043BBA7 Relevance: 3.3, Strings: 2, Instructions: 779COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042C210 Relevance: 3.0, Strings: 2, Instructions: 510COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00420BB0 Relevance: 3.0, Strings: 2, Instructions: 458COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043B400 Relevance: 2.9, Strings: 2, Instructions: 428COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00428A7F Relevance: 2.9, Strings: 2, Instructions: 393COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004090B0 Relevance: 2.9, Strings: 2, Instructions: 372COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041AF75 Relevance: 2.9, Strings: 2, Instructions: 368COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041BD20 Relevance: 2.8, Strings: 2, Instructions: 334COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004041E0 Relevance: 2.8, Strings: 2, Instructions: 329COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00435230 Relevance: 2.7, Strings: 2, Instructions: 228COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00419570 Relevance: 2.7, Strings: 2, Instructions: 221COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041C720 Relevance: 2.7, Strings: 2, Instructions: 214COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004021A0 Relevance: 2.7, Strings: 2, Instructions: 173COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041C990 Relevance: 2.6, Strings: 1, Instructions: 1356COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F490 Relevance: 2.1, Strings: 1, Instructions: 899COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440960 Relevance: 1.8, Strings: 1, Instructions: 595COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427BDF Relevance: 1.8, Strings: 1, Instructions: 554COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426F60 Relevance: 1.8, Strings: 1, Instructions: 527COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440A50 Relevance: 1.8, Strings: 1, Instructions: 524COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004263E6 Relevance: 1.8, Strings: 1, Instructions: 517COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00413A92 Relevance: 1.7, Strings: 1, Instructions: 486COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440B60 Relevance: 1.7, Strings: 1, Instructions: 448COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440C10 Relevance: 1.7, Strings: 1, Instructions: 437COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040C7F5 Relevance: 1.6, Strings: 1, Instructions: 390COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408DB0 Relevance: 1.6, Strings: 1, Instructions: 301COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042DBC8 Relevance: 1.5, Strings: 1, Instructions: 283COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042DC59 Relevance: 1.5, Strings: 1, Instructions: 279COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042DCEB Relevance: 1.5, Strings: 1, Instructions: 279COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441C30 Relevance: 1.5, Strings: 1, Instructions: 277COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405CD0 Relevance: 1.5, Strings: 1, Instructions: 265COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042DCD8 Relevance: 1.5, Strings: 1, Instructions: 255COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041A1DC Relevance: 1.5, Strings: 1, Instructions: 209COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043FE0B Relevance: 1.3, Strings: 1, Instructions: 56COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043FD53 Relevance: 1.3, Strings: 1, Instructions: 53COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041405B Relevance: .7, Instructions: 743COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E20 Relevance: .7, Instructions: 670COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406500 Relevance: .7, Instructions: 665COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004072E0 Relevance: .6, Instructions: 625COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403830 Relevance: .6, Instructions: 600COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405810 Relevance: .4, Instructions: 400COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041C0B0 Relevance: .4, Instructions: 394COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004339AE Relevance: .4, Instructions: 391COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00434949 Relevance: .3, Instructions: 348COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00430D7A Relevance: .3, Instructions: 316COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406070 Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441930 Relevance: .3, Instructions: 287COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004329F5 Relevance: .2, Instructions: 240COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041DA30 Relevance: .2, Instructions: 204COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042D188 Relevance: .2, Instructions: 192COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00428F3B Relevance: .2, Instructions: 190COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042D15C Relevance: .2, Instructions: 189COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00439CF0 Relevance: .2, Instructions: 189COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043B9D0 Relevance: .2, Instructions: 158COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043DD60 Relevance: .2, Instructions: 153COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042D0F9 Relevance: .1, Instructions: 149COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043B870 Relevance: .1, Instructions: 130COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408BE0 Relevance: .1, Instructions: 124COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042D6E9 Relevance: .1, Instructions: 118COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042D6DE Relevance: .1, Instructions: 102COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00437560 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042AAF0 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043EA83 Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402AA0 Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043DF10 Relevance: .0, Instructions: 46COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00416BBC Relevance: .0, Instructions: 41COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041DCA0 Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040BFE0 Relevance: .0, Instructions: 19COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040BD40 Relevance: .0, Instructions: 18COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043FC42 Relevance: .0, Instructions: 11COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|