Windows
Analysis Report
Xeno.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Xeno.exe (PID: 5544 cmdline:
"C:\Users\ user\Deskt op\Xeno.ex e" MD5: 1E5F4EE4303AA49C9C32E89132C7B4F9) - Xeno.exe (PID: 3020 cmdline:
"C:\Users\ user\Deskt op\Xeno.ex e" MD5: 1E5F4EE4303AA49C9C32E89132C7B4F9) - WerFault.exe (PID: 1740 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 5 544 -s 924 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["immolatechallen.bond", "jarry-fixxer.bond", "stripedre-lot.bond", "jarry-deatile.bond", "crookedfoshe.bond", "strivehelpeu.bond", "growthselec.bond", "pain-temper.bond", "sobrattyeu.bond"], "Build id": "yau6Na--914510980"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T16:16:08.174345+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49731 | 104.21.96.1 | 443 | TCP |
2025-01-15T16:16:09.762669+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49733 | 104.21.96.1 | 443 | TCP |
2025-01-15T16:16:11.165133+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49737 | 104.21.96.1 | 443 | TCP |
2025-01-15T16:16:24.157230+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49746 | 104.21.96.1 | 443 | TCP |
2025-01-15T16:16:25.542673+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49747 | 104.21.96.1 | 443 | TCP |
2025-01-15T16:16:26.775321+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49748 | 104.21.96.1 | 443 | TCP |
2025-01-15T16:16:28.553985+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49749 | 104.21.96.1 | 443 | TCP |
2025-01-15T16:16:34.346120+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49750 | 104.21.96.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T16:16:08.699297+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49731 | 104.21.96.1 | 443 | TCP |
2025-01-15T16:16:10.264589+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49733 | 104.21.96.1 | 443 | TCP |
2025-01-15T16:16:34.853352+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49750 | 104.21.96.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T16:16:08.699297+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49731 | 104.21.96.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T16:16:10.264589+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.4 | 49733 | 104.21.96.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T16:16:27.517223+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49748 | 104.21.96.1 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Code function: | 1_2_00414B68 |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 1_2_00427090 | |
Source: | Code function: | 1_2_0040D190 | |
Source: | Code function: | 1_2_0042D19A | |
Source: | Code function: | 1_2_00440AB0 | |
Source: | Code function: | 1_2_00440AB0 | |
Source: | Code function: | 1_2_0040D363 | |
Source: | Code function: | 1_2_00440B90 | |
Source: | Code function: | 1_2_00441450 | |
Source: | Code function: | 1_2_0042806B | |
Source: | Code function: | 1_2_00428811 | |
Source: | Code function: | 1_2_00428811 | |
Source: | Code function: | 1_2_004208E0 | |
Source: | Code function: | 1_2_00408080 | |
Source: | Code function: | 1_2_0042C080 | |
Source: | Code function: | 1_2_00425099 | |
Source: | Code function: | 1_2_00425099 | |
Source: | Code function: | 1_2_0042D944 | |
Source: | Code function: | 1_2_0042D955 | |
Source: | Code function: | 1_2_00415901 | |
Source: | Code function: | 1_2_00415901 | |
Source: | Code function: | 1_2_00415901 | |
Source: | Code function: | 1_2_0042D91A | |
Source: | Code function: | 1_2_0040C12D | |
Source: | Code function: | 1_2_004291C3 | |
Source: | Code function: | 1_2_00429986 | |
Source: | Code function: | 1_2_00429986 | |
Source: | Code function: | 1_2_0041A9E5 | |
Source: | Code function: | 1_2_00429986 | |
Source: | Code function: | 1_2_00429986 | |
Source: | Code function: | 1_2_00440190 | |
Source: | Code function: | 1_2_0042A9B0 | |
Source: | Code function: | 1_2_0042EA70 | |
Source: | Code function: | 1_2_00440270 | |
Source: | Code function: | 1_2_00402AE0 | |
Source: | Code function: | 1_2_004072F0 | |
Source: | Code function: | 1_2_004072F0 | |
Source: | Code function: | 1_2_00418281 | |
Source: | Code function: | 1_2_00418376 | |
Source: | Code function: | 1_2_004273C0 | |
Source: | Code function: | 1_2_004273E0 | |
Source: | Code function: | 1_2_00437380 | |
Source: | Code function: | 1_2_0040BC4E | |
Source: | Code function: | 1_2_0043AC10 | |
Source: | Code function: | 1_2_00427CE5 | |
Source: | Code function: | 1_2_0041B571 | |
Source: | Code function: | 1_2_0041DD70 | |
Source: | Code function: | 1_2_00424513 | |
Source: | Code function: | 1_2_00429D10 | |
Source: | Code function: | 1_2_00419E2F | |
Source: | Code function: | 1_2_00419E2F | |
Source: | Code function: | 1_2_0040BD36 | |
Source: | Code function: | 1_2_0041B588 | |
Source: | Code function: | 1_2_0041A591 | |
Source: | Code function: | 1_2_00420DA0 | |
Source: | Code function: | 1_2_0043EDA6 | |
Source: | Code function: | 1_2_0043FE40 | |
Source: | Code function: | 1_2_0040A610 | |
Source: | Code function: | 1_2_00419E2F | |
Source: | Code function: | 1_2_0043D630 | |
Source: | Code function: | 1_2_004406D0 | |
Source: | Code function: | 1_2_004406D0 | |
Source: | Code function: | 1_2_0042E6F5 | |
Source: | Code function: | 1_2_0043D6A0 | |
Source: | Code function: | 1_2_0043FF50 | |
Source: | Code function: | 1_2_0043FF70 | |
Source: | Code function: | 1_2_00418700 | |
Source: | Code function: | 1_2_00418700 | |
Source: | Code function: | 1_2_0042E6F3 | |
Source: | Code function: | 1_2_0042DFC3 | |
Source: | Code function: | 1_2_0042D7C0 | |
Source: | Code function: | 1_2_0043AFD0 | |
Source: | Code function: | 1_2_004197F0 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 1_2_00435030 |
Source: | Code function: | 1_2_03271000 |
Source: | Code function: | 1_2_00435030 |
Source: | Code function: | 1_2_004351D0 |
Source: | Code function: | 1_2_0043D0F0 | |
Source: | Code function: | 1_2_00427090 | |
Source: | Code function: | 1_2_004240A0 | |
Source: | Code function: | 1_2_00411900 | |
Source: | Code function: | 1_2_0042D19A | |
Source: | Code function: | 1_2_00433A7F | |
Source: | Code function: | 1_2_0040D363 | |
Source: | Code function: | 1_2_00414B68 | |
Source: | Code function: | 1_2_00440B90 | |
Source: | Code function: | 1_2_00408570 | |
Source: | Code function: | 1_2_00439FE0 | |
Source: | Code function: | 1_2_00401040 | |
Source: | Code function: | 1_2_00403860 | |
Source: | Code function: | 1_2_0042806B | |
Source: | Code function: | 1_2_00409000 | |
Source: | Code function: | 1_2_00405820 | |
Source: | Code function: | 1_2_0043F82B | |
Source: | Code function: | 1_2_0041C830 | |
Source: | Code function: | 1_2_004408D0 | |
Source: | Code function: | 1_2_004208E0 | |
Source: | Code function: | 1_2_00408080 | |
Source: | Code function: | 1_2_00406080 | |
Source: | Code function: | 1_2_00425099 | |
Source: | Code function: | 1_2_004268B2 | |
Source: | Code function: | 1_2_0041E140 | |
Source: | Code function: | 1_2_0041794B | |
Source: | Code function: | 1_2_0041B950 | |
Source: | Code function: | 1_2_0043B150 | |
Source: | Code function: | 1_2_0042D955 | |
Source: | Code function: | 1_2_00415901 | |
Source: | Code function: | 1_2_0041C110 | |
Source: | Code function: | 1_2_004291C3 | |
Source: | Code function: | 1_2_0041A9E5 | |
Source: | Code function: | 1_2_00441190 | |
Source: | Code function: | 1_2_00440190 | |
Source: | Code function: | 1_2_00419270 | |
Source: | Code function: | 1_2_00440270 | |
Source: | Code function: | 1_2_00404210 | |
Source: | Code function: | 1_2_004072F0 | |
Source: | Code function: | 1_2_00404B40 | |
Source: | Code function: | 1_2_0042F370 | |
Source: | Code function: | 1_2_0043B370 | |
Source: | Code function: | 1_2_00434BD0 | |
Source: | Code function: | 1_2_004093E0 | |
Source: | Code function: | 1_2_00416B82 | |
Source: | Code function: | 1_2_0041BC60 | |
Source: | Code function: | 1_2_00430477 | |
Source: | Code function: | 1_2_00414C04 | |
Source: | Code function: | 1_2_0043AC10 | |
Source: | Code function: | 1_2_00427CE5 | |
Source: | Code function: | 1_2_004174FD | |
Source: | Code function: | 1_2_00430D63 | |
Source: | Code function: | 1_2_00419570 | |
Source: | Code function: | 1_2_00411577 | |
Source: | Code function: | 1_2_00406510 | |
Source: | Code function: | 1_2_00439510 | |
Source: | Code function: | 1_2_00437D15 | |
Source: | Code function: | 1_2_00433539 | |
Source: | Code function: | 1_2_0041F5C0 | |
Source: | Code function: | 1_2_004145E0 | |
Source: | Code function: | 1_2_0041AD89 | |
Source: | Code function: | 1_2_0041C5A0 | |
Source: | Code function: | 1_2_00420DA0 | |
Source: | Code function: | 1_2_0043FE40 | |
Source: | Code function: | 1_2_00402E50 | |
Source: | Code function: | 1_2_0040A610 | |
Source: | Code function: | 1_2_00426E26 | |
Source: | Code function: | 1_2_0040AE25 | |
Source: | Code function: | 1_2_00410E2B | |
Source: | Code function: | 1_2_00438633 | |
Source: | Code function: | 1_2_00438E3A | |
Source: | Code function: | 1_2_004406D0 | |
Source: | Code function: | 1_2_00422EFD | |
Source: | Code function: | 1_2_0043D6A0 | |
Source: | Code function: | 1_2_0043FF50 | |
Source: | Code function: | 1_2_00439770 | |
Source: | Code function: | 1_2_0043FF70 | |
Source: | Code function: | 1_2_00418700 | |
Source: | Code function: | 1_2_00440F00 | |
Source: | Code function: | 1_2_0042DFC3 | |
Source: | Code function: | 1_2_0042D7C0 | |
Source: | Code function: | 1_2_00413FF0 | |
Source: | Code function: | 1_2_0042C790 | |
Source: | Code function: | 1_2_00429FB0 | |
Source: | Code function: | 1_2_0040C7B5 |
Source: | Code function: | ||
Source: | Code function: |
Source: | Process created: |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 1_2_00439FE0 |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: |
Source: | Code function: | 1_2_00443A6A | |
Source: | Code function: | 1_2_00447A72 | |
Source: | Code function: | 1_2_00444AA4 | |
Source: | Code function: | 1_2_00447BBB | |
Source: | Code function: | 1_2_0043FDF2 |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_1-13902 |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 1_2_0043E7C0 |
Source: | Code function: | 0_2_02F97F41 | |
Source: | Code function: | 0_2_02F980BE |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Code function: | 0_2_02F97F41 |
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 211 Process Injection | 23 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 1 Query Registry | Remote Services | 1 Screen Capture | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Disable or Modify Tools | LSASS Memory | 231 Security Software Discovery | Remote Desktop Protocol | 1 Archive Collected Data | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 211 Process Injection | Security Account Manager | 23 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | 41 Data from Local System | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 11 Deobfuscate/Decode Files or Information | NTDS | 1 Process Discovery | Distributed Component Object Model | 3 Clipboard Data | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 3 Obfuscated Files or Information | LSA Secrets | 1 Application Window Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Software Packing | Cached Domain Credentials | 1 File and Directory Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 Timestomp | DCSync | 22 System Information Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 DLL Side-Loading | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
47% | Virustotal | Browse | ||
61% | ReversingLabs | ByteCode-MSIL.Trojan.LummaStealer | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
sobrattyeu.bond | 104.21.96.1 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.96.1 | sobrattyeu.bond | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1591988 |
Start date and time: | 2025-01-15 16:15:13 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 46s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 9 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Xeno.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@4/5@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 20.189.173.22, 40.126.32.140, 172.202.163.200, 13.107.246.45
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
10:16:07 | API Interceptor | |
10:16:21 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.96.1 | Get hash | malicious | FormBook | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | CMSBrute | Browse |
| ||
Get hash | malicious | FormBook | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
sobrattyeu.bond | Get hash | malicious | LummaC, PureLog Stealer | Browse |
| |
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Wannacry | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC, PureLog Stealer | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | PureCrypter, LummaC, LummaC Stealer | Browse |
| ||
Get hash | malicious | PureCrypter, LummaC, LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Xeno.exe_765950b87e97d5d342af7e889eddc96b622feb_0aaebb4a_1d0fc2cc-6029-426a-b8fa-93dceb3eb239\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.8843372462274467 |
Encrypted: | false |
SSDEEP: | 192:35aGlFV5znpweA0LR3bQ1aOGzuiFfZ24IO8St:JRFvnBbLR3MafzuiFfY4IO8o |
MD5: | 37EE175D65AC09999713FC10A881D32C |
SHA1: | D0FD65C0AF63922CEBE6151708B61CDED58DE693 |
SHA-256: | A287193AC21230FD2BCC6947C7EC0B650E8A5F1AD3D1ABEFA7D5259D862DA6A0 |
SHA-512: | CD55C934D5C3C95201298650EFAFE93EF0BD0DE3EDFD2994ECADFE340A1CBC9405487345D7DDE1BAB40D11BADD058DB0FD7A1DF6B8B2CF49DAF4B2D89D57DF79 |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 154379 |
Entropy (8bit): | 3.7657082819032177 |
Encrypted: | false |
SSDEEP: | 1536:nA/RbuBojRapN4uE2aO2/LTg1hcASq02dCDEVfetTc1yJ:ADc4uEqILTg15MFw |
MD5: | 53A4D7BA332C38E2C2E8DF799F12B3C9 |
SHA1: | A76E4F7A72416F4B4592CAC0A04EBCCDF8865907 |
SHA-256: | D4941D01F241D9B3417618CD1592F7AFC2F55079BBA998429C437F2196104673 |
SHA-512: | 2DBD190B3AA995347C6D8118E8172AA816ED19A2FA882BC127FF33CFF2EF050E3BE38584CEE387AAF55E4B4040874620C86D4D8D781848F35FB4D7F3EA69A3F4 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8356 |
Entropy (8bit): | 3.6919959755642533 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJ0uX6x6Y9DSU99zgmfK2wVJkprt89bnMsfMtm:R6lXJt6x6YpSU99zgmf0VJLnff7 |
MD5: | E4959C54BF96A61D63218F63C1092DD5 |
SHA1: | 1EF3647DD17C5F33D8ABE52623F55D10F8483DD8 |
SHA-256: | D88C073FE21C55D7ED8143EFA33B013E144101A31495266C8792D310CE44A5EA |
SHA-512: | B233FE1327A3F66202CD9159D6286DA4BBEE425667D4604EF01511CBA4A5A9774BCB3C2685764EE5383875863B5350F1CBEF708BFEB0F5074C5B9FDD4A691C7A |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4720 |
Entropy (8bit): | 4.4339663858637515 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsUNJg77aI9bIWpW8VYSYm8M4JwH3dxPcf6FvCM+q8vH3dxPcfEQlHUc2:uIjfUnI7dh7VmJwHQfuKHQfEQdUcUXd |
MD5: | C0063F9992D34163D9870267863675BE |
SHA1: | ED5601A5A7DB33E060929BED08BB4576BC77EC0C |
SHA-256: | B768B90F0F43399164AB0DAC08BD01705663A8E874D4EE8AC8BD1AE0CAE478CC |
SHA-512: | F8E750526003C42D6B8458A9AD81CD87C4899D702CAAADB2148B94FF2E956AD3D629EE641724D18E561FB16F0E0112C92CE81651C89085FD670BC61078D7096D |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.465555639896849 |
Encrypted: | false |
SSDEEP: | 6144:CIXfpi67eLPU9skLmb0b4QWSPKaJG8nAgejZMMhA2gX4WABl0uN3dwBCswSbL:nXD94QWlLZMM6YFHZ+L |
MD5: | D4CD3DDBF445C97CD2A9990C09CE3B22 |
SHA1: | 59C15E25E60BDA68D6753A1635DFDBD8422F777C |
SHA-256: | 90C60A2101A8AEE933EC8847C9C613CA2074BD774C4744EA8991D586700F7468 |
SHA-512: | 855EEFB80185D957B6C908AD70556F30C25422ABE04874B52040F1D3C9DDFF5057AD505C81738EBE9F2E25FC17567580C54EB0533C224988F851287AC1AFB91E |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.634650577203108 |
TrID: |
|
File name: | Xeno.exe |
File size: | 455'792 bytes |
MD5: | 1e5f4ee4303aa49c9c32e89132c7b4f9 |
SHA1: | 47a80fa40216ef35cb66dbbf45ffda5eabc803cb |
SHA256: | ae0ad87b9d4cb0599d08afc3890f98d62c7cf02405ed8aab3d5238814d90febb |
SHA512: | 1bb70599944f5c5f0a69a35bbd363510536436608b0cbc76ef6eefda3c9714fac23ff514a1c8e32e4308e1914ccb26cc20d43a4defaf88015d59194b4ea71689 |
SSDEEP: | 12288:ZA0WUbY6uDdzIu5ijuCwTgdMXg7z0xlo2c2gNJ:K0g68I0AuaB2cTJ |
TLSH: | E0A4D0286664D93BC26E47BAF4A39101A3FAA0C7ED51E745BC9418F14D12384AF352FF |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2.................0.............>.... ... ....@.. .......................@............`................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x421a3e |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0xECEDE332 [Sun Dec 18 02:19:30 2095 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Signature Valid: | false |
Signature Issuer: | CN=DigiCert EV Code Signing CA (SHA2), OU=www.digicert.com, O=DigiCert Inc, C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 332CDC164B1324C3FF3F64E228C5FFFC |
Thumbprint SHA-1: | CBFB3D25134A5FF6FCF2924D5B4BE16194EA7E13 |
Thumbprint SHA-256: | 531855F05B9D55E4F6DDEBC443706382DDB9ACBD2B8AB24004822BE204420943 |
Serial: | 0C9838F673F9B1CCE395CFAB2B6684E4 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x219f0 | 0x4b | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x22000 | 0x598 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x6ce00 | 0x2670 | .idata |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x24000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x219a7 | 0x1c | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x1fa44 | 0x1fc00 | 7c297cc8f463f81875ed0f7ba3dd3ff0 | False | 0.4013056717519685 | data | 5.796591200875089 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x22000 | 0x598 | 0x600 | 511dd0b163083f747b4fa3f1e450067c | False | 0.41015625 | data | 4.038713703339799 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x24000 | 0xc | 0x200 | b1171333753a88cda4e7356665065f4c | False | 0.044921875 | data | 0.10191042566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.idata | 0x26000 | 0x4c600 | 0x4c600 | 366e5eae475695c99103b02a700072cd | False | 1.0003388400163666 | data | 7.999481353291953 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x220a0 | 0x30c | data | 0.41923076923076924 | ||
RT_MANIFEST | 0x223ac | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T16:16:08.174345+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49731 | 104.21.96.1 | 443 | TCP |
2025-01-15T16:16:08.699297+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49731 | 104.21.96.1 | 443 | TCP |
2025-01-15T16:16:08.699297+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49731 | 104.21.96.1 | 443 | TCP |
2025-01-15T16:16:09.762669+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49733 | 104.21.96.1 | 443 | TCP |
2025-01-15T16:16:10.264589+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.4 | 49733 | 104.21.96.1 | 443 | TCP |
2025-01-15T16:16:10.264589+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49733 | 104.21.96.1 | 443 | TCP |
2025-01-15T16:16:11.165133+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49737 | 104.21.96.1 | 443 | TCP |
2025-01-15T16:16:24.157230+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49746 | 104.21.96.1 | 443 | TCP |
2025-01-15T16:16:25.542673+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49747 | 104.21.96.1 | 443 | TCP |
2025-01-15T16:16:26.775321+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49748 | 104.21.96.1 | 443 | TCP |
2025-01-15T16:16:27.517223+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49748 | 104.21.96.1 | 443 | TCP |
2025-01-15T16:16:28.553985+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49749 | 104.21.96.1 | 443 | TCP |
2025-01-15T16:16:34.346120+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49750 | 104.21.96.1 | 443 | TCP |
2025-01-15T16:16:34.853352+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49750 | 104.21.96.1 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 15, 2025 16:16:07.644648075 CET | 49731 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:07.644690037 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:07.644768953 CET | 49731 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:07.647718906 CET | 49731 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:07.647732973 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:08.174280882 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:08.174345016 CET | 49731 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:08.180949926 CET | 49731 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:08.180983067 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:08.181392908 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:08.230165958 CET | 49731 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:08.281390905 CET | 49731 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:08.281419039 CET | 49731 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:08.281689882 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:08.699256897 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:08.699537039 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:08.699595928 CET | 49731 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:09.080420971 CET | 49731 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:09.080444098 CET | 443 | 49731 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:09.301959991 CET | 49733 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:09.302022934 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:09.302112103 CET | 49733 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:09.302386999 CET | 49733 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:09.302423954 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:09.762578964 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:09.762669086 CET | 49733 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:09.763951063 CET | 49733 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:09.763992071 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:09.764339924 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:09.765836954 CET | 49733 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:09.765836954 CET | 49733 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:09.765942097 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:10.264607906 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:10.264684916 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:10.264727116 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:10.264738083 CET | 49733 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:10.264755011 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:10.264795065 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:10.264833927 CET | 49733 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:10.264837980 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:10.264852047 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:10.264878988 CET | 49733 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:10.264955997 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:10.264997005 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:10.264997959 CET | 49733 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:10.265007973 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:10.265316010 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:10.265362978 CET | 49733 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:10.265371084 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:10.265412092 CET | 49733 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:10.269345045 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:10.323966026 CET | 49733 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:10.350435972 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:10.350603104 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:10.350663900 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:10.350716114 CET | 49733 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:10.350729942 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:10.350797892 CET | 49733 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:10.350805998 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:10.350831032 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:10.350881100 CET | 49733 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:10.351125002 CET | 49733 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:10.351138115 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:10.351155043 CET | 49733 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:10.351162910 CET | 443 | 49733 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:10.484512091 CET | 49737 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:10.484561920 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:10.484642029 CET | 49737 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:10.485071898 CET | 49737 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:10.485088110 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:11.165040970 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:11.165132999 CET | 49737 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:11.166351080 CET | 49737 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:11.166368008 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:11.166697025 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:11.176815987 CET | 49737 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:11.176815987 CET | 49737 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:11.176868916 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:11.180592060 CET | 49737 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:11.180608988 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:23.658246040 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:23.658369064 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:23.658502102 CET | 49737 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:23.658659935 CET | 49737 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:23.658679008 CET | 443 | 49737 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:23.678132057 CET | 49746 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:23.678189993 CET | 443 | 49746 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:23.680454969 CET | 49746 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:23.680758953 CET | 49746 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:23.680782080 CET | 443 | 49746 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:24.157149076 CET | 443 | 49746 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:24.157229900 CET | 49746 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:24.159110069 CET | 49746 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:24.159123898 CET | 443 | 49746 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:24.159363031 CET | 443 | 49746 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:24.167326927 CET | 49746 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:24.167452097 CET | 49746 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:24.167499065 CET | 443 | 49746 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:24.978060007 CET | 443 | 49746 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:24.978176117 CET | 443 | 49746 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:24.978230000 CET | 49746 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:24.978461981 CET | 49746 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:24.978485107 CET | 443 | 49746 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:25.067162037 CET | 49747 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:25.067271948 CET | 443 | 49747 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:25.067392111 CET | 49747 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:25.067722082 CET | 49747 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:25.067739010 CET | 443 | 49747 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:25.542591095 CET | 443 | 49747 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:25.542673111 CET | 49747 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:25.544950962 CET | 49747 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:25.544964075 CET | 443 | 49747 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:25.545201063 CET | 443 | 49747 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:25.546843052 CET | 49747 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:25.546979904 CET | 49747 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:25.547013998 CET | 443 | 49747 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:25.547071934 CET | 49747 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:25.547080994 CET | 443 | 49747 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:26.189145088 CET | 443 | 49747 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:26.189265013 CET | 443 | 49747 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:26.192616940 CET | 49747 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:26.192908049 CET | 49747 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:26.192955017 CET | 443 | 49747 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:26.311808109 CET | 49748 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:26.311851025 CET | 443 | 49748 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:26.312201023 CET | 49748 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:26.312526941 CET | 49748 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:26.312536955 CET | 443 | 49748 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:26.775008917 CET | 443 | 49748 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:26.775321007 CET | 49748 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:26.777121067 CET | 49748 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:26.777132034 CET | 443 | 49748 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:26.777385950 CET | 443 | 49748 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:26.778732061 CET | 49748 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:26.778732061 CET | 49748 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:26.778768063 CET | 443 | 49748 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:27.517220974 CET | 443 | 49748 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:27.517323017 CET | 443 | 49748 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:27.517376900 CET | 49748 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:27.531589985 CET | 49748 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:27.531619072 CET | 443 | 49748 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:28.086671114 CET | 49749 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:28.086699963 CET | 443 | 49749 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:28.086781025 CET | 49749 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:28.087137938 CET | 49749 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:28.087152958 CET | 443 | 49749 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:28.553857088 CET | 443 | 49749 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:28.553985119 CET | 49749 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:28.555377007 CET | 49749 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:28.555386066 CET | 443 | 49749 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:28.555623055 CET | 443 | 49749 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:28.556827068 CET | 49749 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:28.557523966 CET | 49749 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:28.557559967 CET | 443 | 49749 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:28.557661057 CET | 49749 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:28.557704926 CET | 443 | 49749 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:28.557804108 CET | 49749 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:28.557852983 CET | 443 | 49749 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:28.557961941 CET | 49749 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:28.557992935 CET | 443 | 49749 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:28.558113098 CET | 49749 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:28.558146000 CET | 443 | 49749 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:28.558286905 CET | 49749 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:28.558320045 CET | 443 | 49749 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:28.558327913 CET | 49749 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:28.558677912 CET | 49749 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:28.558715105 CET | 49749 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:28.568193913 CET | 443 | 49749 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:28.568365097 CET | 49749 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:28.568401098 CET | 443 | 49749 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:28.568416119 CET | 49749 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:28.568432093 CET | 443 | 49749 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:28.568440914 CET | 49749 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:28.568486929 CET | 443 | 49749 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:28.568542957 CET | 49749 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:28.568588972 CET | 49749 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:28.568634987 CET | 49749 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:28.573245049 CET | 443 | 49749 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:28.573307991 CET | 49749 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:28.573323011 CET | 443 | 49749 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:33.855189085 CET | 443 | 49749 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:33.855494022 CET | 443 | 49749 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:33.855567932 CET | 49749 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:33.855735064 CET | 49749 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:33.855767012 CET | 443 | 49749 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:33.860513926 CET | 49750 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:33.860584021 CET | 443 | 49750 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:33.860656977 CET | 49750 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:33.860948086 CET | 49750 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:33.860965967 CET | 443 | 49750 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:34.345982075 CET | 443 | 49750 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:34.346120119 CET | 49750 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:34.347466946 CET | 49750 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:34.347484112 CET | 443 | 49750 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:34.347866058 CET | 443 | 49750 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:34.349489927 CET | 49750 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:34.349522114 CET | 49750 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:34.349570990 CET | 443 | 49750 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:34.853410006 CET | 443 | 49750 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:34.853645086 CET | 443 | 49750 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:34.853740931 CET | 443 | 49750 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:34.853832960 CET | 443 | 49750 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:34.853833914 CET | 49750 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:34.853879929 CET | 443 | 49750 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:34.853903055 CET | 49750 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:34.854015112 CET | 443 | 49750 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:34.854063034 CET | 49750 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:34.854073048 CET | 443 | 49750 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:34.854170084 CET | 443 | 49750 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:34.854226112 CET | 49750 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:34.854233027 CET | 443 | 49750 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:34.857933044 CET | 443 | 49750 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:34.857995033 CET | 49750 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:34.858023882 CET | 443 | 49750 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:34.858218908 CET | 443 | 49750 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:34.858272076 CET | 49750 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:34.858423948 CET | 49750 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:34.858449936 CET | 443 | 49750 | 104.21.96.1 | 192.168.2.4 |
Jan 15, 2025 16:16:34.858474016 CET | 49750 | 443 | 192.168.2.4 | 104.21.96.1 |
Jan 15, 2025 16:16:34.858481884 CET | 443 | 49750 | 104.21.96.1 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 15, 2025 16:16:07.627458096 CET | 55761 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 15, 2025 16:16:07.640410900 CET | 53 | 55761 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 15, 2025 16:16:07.627458096 CET | 192.168.2.4 | 1.1.1.1 | 0x89f4 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 15, 2025 16:16:07.640410900 CET | 1.1.1.1 | 192.168.2.4 | 0x89f4 | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 16:16:07.640410900 CET | 1.1.1.1 | 192.168.2.4 | 0x89f4 | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 16:16:07.640410900 CET | 1.1.1.1 | 192.168.2.4 | 0x89f4 | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 16:16:07.640410900 CET | 1.1.1.1 | 192.168.2.4 | 0x89f4 | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 16:16:07.640410900 CET | 1.1.1.1 | 192.168.2.4 | 0x89f4 | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 16:16:07.640410900 CET | 1.1.1.1 | 192.168.2.4 | 0x89f4 | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 16:16:07.640410900 CET | 1.1.1.1 | 192.168.2.4 | 0x89f4 | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49731 | 104.21.96.1 | 443 | 3020 | C:\Users\user\Desktop\Xeno.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 15:16:08 UTC | 262 | OUT | |
2025-01-15 15:16:08 UTC | 8 | OUT | |
2025-01-15 15:16:08 UTC | 1125 | IN | |
2025-01-15 15:16:08 UTC | 7 | IN | |
2025-01-15 15:16:08 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49733 | 104.21.96.1 | 443 | 3020 | C:\Users\user\Desktop\Xeno.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 15:16:09 UTC | 263 | OUT | |
2025-01-15 15:16:09 UTC | 51 | OUT | |
2025-01-15 15:16:10 UTC | 1127 | IN | |
2025-01-15 15:16:10 UTC | 242 | IN | |
2025-01-15 15:16:10 UTC | 1369 | IN | |
2025-01-15 15:16:10 UTC | 1369 | IN | |
2025-01-15 15:16:10 UTC | 172 | IN | |
2025-01-15 15:16:10 UTC | 1369 | IN | |
2025-01-15 15:16:10 UTC | 1369 | IN | |
2025-01-15 15:16:10 UTC | 1369 | IN | |
2025-01-15 15:16:10 UTC | 1369 | IN | |
2025-01-15 15:16:10 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49737 | 104.21.96.1 | 443 | 3020 | C:\Users\user\Desktop\Xeno.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 15:16:11 UTC | 273 | OUT | |
2025-01-15 15:16:11 UTC | 15331 | OUT | |
2025-01-15 15:16:11 UTC | 2788 | OUT | |
2025-01-15 15:16:23 UTC | 1129 | IN | |
2025-01-15 15:16:23 UTC | 20 | IN | |
2025-01-15 15:16:23 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49746 | 104.21.96.1 | 443 | 3020 | C:\Users\user\Desktop\Xeno.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 15:16:24 UTC | 280 | OUT | |
2025-01-15 15:16:24 UTC | 8788 | OUT | |
2025-01-15 15:16:24 UTC | 1123 | IN | |
2025-01-15 15:16:24 UTC | 20 | IN | |
2025-01-15 15:16:24 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49747 | 104.21.96.1 | 443 | 3020 | C:\Users\user\Desktop\Xeno.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 15:16:25 UTC | 273 | OUT | |
2025-01-15 15:16:25 UTC | 15331 | OUT | |
2025-01-15 15:16:25 UTC | 5062 | OUT | |
2025-01-15 15:16:26 UTC | 1129 | IN | |
2025-01-15 15:16:26 UTC | 20 | IN | |
2025-01-15 15:16:26 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49748 | 104.21.96.1 | 443 | 3020 | C:\Users\user\Desktop\Xeno.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 15:16:26 UTC | 276 | OUT | |
2025-01-15 15:16:26 UTC | 1391 | OUT | |
2025-01-15 15:16:27 UTC | 1124 | IN | |
2025-01-15 15:16:27 UTC | 20 | IN | |
2025-01-15 15:16:27 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49749 | 104.21.96.1 | 443 | 3020 | C:\Users\user\Desktop\Xeno.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 15:16:28 UTC | 276 | OUT | |
2025-01-15 15:16:28 UTC | 15331 | OUT | |
2025-01-15 15:16:28 UTC | 15331 | OUT | |
2025-01-15 15:16:28 UTC | 15331 | OUT | |
2025-01-15 15:16:28 UTC | 15331 | OUT | |
2025-01-15 15:16:28 UTC | 15331 | OUT | |
2025-01-15 15:16:28 UTC | 15331 | OUT | |
2025-01-15 15:16:28 UTC | 15331 | OUT | |
2025-01-15 15:16:28 UTC | 15331 | OUT | |
2025-01-15 15:16:28 UTC | 15331 | OUT | |
2025-01-15 15:16:28 UTC | 15331 | OUT | |
2025-01-15 15:16:33 UTC | 1137 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49750 | 104.21.96.1 | 443 | 3020 | C:\Users\user\Desktop\Xeno.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 15:16:34 UTC | 263 | OUT | |
2025-01-15 15:16:34 UTC | 86 | OUT | |
2025-01-15 15:16:34 UTC | 1124 | IN | |
2025-01-15 15:16:34 UTC | 245 | IN | |
2025-01-15 15:16:34 UTC | 912 | IN | |
2025-01-15 15:16:34 UTC | 1369 | IN | |
2025-01-15 15:16:34 UTC | 1369 | IN | |
2025-01-15 15:16:34 UTC | 1369 | IN | |
2025-01-15 15:16:34 UTC | 1369 | IN | |
2025-01-15 15:16:34 UTC | 1369 | IN | |
2025-01-15 15:16:34 UTC | 1369 | IN | |
2025-01-15 15:16:34 UTC | 1369 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 10:16:06 |
Start date: | 15/01/2025 |
Path: | C:\Users\user\Desktop\Xeno.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xb90000 |
File size: | 455'792 bytes |
MD5 hash: | 1E5F4EE4303AA49C9C32E89132C7B4F9 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 10:16:06 |
Start date: | 15/01/2025 |
Path: | C:\Users\user\Desktop\Xeno.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x770000 |
File size: | 455'792 bytes |
MD5 hash: | 1E5F4EE4303AA49C9C32E89132C7B4F9 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 4 |
Start time: | 10:16:06 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xae0000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 14.2% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 21.9% |
Total number of Nodes: | 32 |
Total number of Limit Nodes: | 3 |
Graph
Function 02F97F41 Relevance: 40.5, APIs: 10, Strings: 13, Instructions: 294threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02F980BE Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 82threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01232880 Relevance: 1.7, APIs: 1, Instructions: 243COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01232104 Relevance: 1.6, APIs: 1, Instructions: 54memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 8.3% |
Dynamic/Decrypted Code Coverage: | 5.7% |
Signature Coverage: | 66.4% |
Total number of Nodes: | 298 |
Total number of Limit Nodes: | 16 |
Graph
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00439FE0 Relevance: 32.3, APIs: 11, Strings: 7, Instructions: 802memorycomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00433A7F Relevance: 30.1, Strings: 24, Instructions: 138COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03271000 Relevance: 19.6, APIs: 13, Instructions: 81clipboardsleepmemoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408570 Relevance: 10.7, APIs: 5, Strings: 1, Instructions: 205threadCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043D0F0 Relevance: 4.0, Strings: 3, Instructions: 218COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004240A0 Relevance: 3.2, APIs: 2, Instructions: 242COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427090 Relevance: 2.8, Strings: 2, Instructions: 292COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441450 Relevance: 1.5, Strings: 1, Instructions: 269COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E7C0 Relevance: 1.5, APIs: 1, Instructions: 14libraryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440AB0 Relevance: 1.3, Strings: 1, Instructions: 74COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440B90 Relevance: .3, Instructions: 331COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040D190 Relevance: .1, Instructions: 130COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409A5D Relevance: 3.6, APIs: 1, Strings: 1, Instructions: 71libraryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040C733 Relevance: 3.0, APIs: 2, Instructions: 31COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042E4AC Relevance: 1.6, APIs: 1, Instructions: 96COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042E4A6 Relevance: 1.6, APIs: 1, Instructions: 87COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00438236 Relevance: 1.6, APIs: 1, Instructions: 52COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E740 Relevance: 1.5, APIs: 1, Instructions: 43memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E98B Relevance: 1.5, APIs: 1, Instructions: 37COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00434843 Relevance: 1.5, APIs: 1, Instructions: 27COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004308AD Relevance: 1.5, APIs: 1, Instructions: 21COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040C6E0 Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043D0C0 Relevance: 1.5, APIs: 1, Instructions: 15memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043D0A0 Relevance: 1.5, APIs: 1, Instructions: 9memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041C830 Relevance: 92.5, Strings: 73, Instructions: 1263COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00438633 Relevance: 86.6, Strings: 69, Instructions: 378COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00425099 Relevance: 29.8, Strings: 23, Instructions: 1088COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00439770 Relevance: 16.5, Strings: 13, Instructions: 256COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415901 Relevance: 13.9, Strings: 10, Instructions: 1413COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00437D15 Relevance: 12.8, Strings: 10, Instructions: 279COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00435030 Relevance: 12.4, APIs: 6, Strings: 1, Instructions: 113clipboardCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004408D0 Relevance: 10.1, Strings: 8, Instructions: 149COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00414C04 Relevance: 9.4, Strings: 7, Instructions: 685COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00429FB0 Relevance: 9.2, Strings: 7, Instructions: 490COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040C7B5 Relevance: 8.0, Strings: 6, Instructions: 547COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043D6A0 Relevance: 6.9, Strings: 5, Instructions: 642COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004093E0 Relevance: 6.7, Strings: 5, Instructions: 405COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401040 Relevance: 5.6, Strings: 4, Instructions: 602COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004208E0 Relevance: 5.4, Strings: 4, Instructions: 428COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004291C3 Relevance: 5.3, Strings: 4, Instructions: 311COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041E140 Relevance: 4.5, Strings: 3, Instructions: 719COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040A610 Relevance: 4.2, Strings: 3, Instructions: 414COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004268B2 Relevance: 4.1, Strings: 3, Instructions: 364COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00411577 Relevance: 4.0, Strings: 3, Instructions: 269COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041B571 Relevance: 4.0, Strings: 3, Instructions: 204COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041B588 Relevance: 4.0, Strings: 3, Instructions: 201COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00433539 Relevance: 3.9, Strings: 3, Instructions: 129COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404B40 Relevance: 3.3, Strings: 2, Instructions: 792COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043B370 Relevance: 3.2, Strings: 2, Instructions: 716COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00413FF0 Relevance: 3.0, Strings: 2, Instructions: 503COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041F5C0 Relevance: 3.0, Strings: 2, Instructions: 456COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004145E0 Relevance: 2.9, Strings: 2, Instructions: 428COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409000 Relevance: 2.9, Strings: 2, Instructions: 377COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404210 Relevance: 2.8, Strings: 2, Instructions: 329COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041C110 Relevance: 2.8, Strings: 2, Instructions: 266COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042D955 Relevance: 2.7, Strings: 2, Instructions: 232COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042D7C0 Relevance: 2.7, Strings: 2, Instructions: 231COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004197F0 Relevance: 2.7, Strings: 2, Instructions: 221COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042D944 Relevance: 2.7, Strings: 2, Instructions: 208COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042D91A Relevance: 2.7, Strings: 2, Instructions: 204COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042DFC3 Relevance: 2.7, Strings: 2, Instructions: 187COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00424513 Relevance: 2.6, Strings: 2, Instructions: 93COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00418376 Relevance: 2.6, Strings: 2, Instructions: 82COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00420DA0 Relevance: 1.7, Strings: 1, Instructions: 426COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042C080 Relevance: 1.7, Strings: 1, Instructions: 408COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043AC10 Relevance: 1.6, Strings: 1, Instructions: 381COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041AD89 Relevance: 1.6, Strings: 1, Instructions: 351COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408080 Relevance: 1.5, Strings: 1, Instructions: 291COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041A9E5 Relevance: 1.5, Strings: 1, Instructions: 268COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427CE5 Relevance: 1.5, Strings: 1, Instructions: 263COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441190 Relevance: 1.5, Strings: 1, Instructions: 247COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041C5A0 Relevance: 1.5, Strings: 1, Instructions: 223COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00419270 Relevance: 1.5, Strings: 1, Instructions: 207COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004273C0 Relevance: 1.3, Strings: 1, Instructions: 92COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00418281 Relevance: 1.3, Strings: 1, Instructions: 86COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040BD36 Relevance: 1.3, Strings: 1, Instructions: 75COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040C12D Relevance: 1.3, Strings: 1, Instructions: 52COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F370 Relevance: .9, Instructions: 887COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043FE40 Relevance: .9, Instructions: 870COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043FF50 Relevance: .8, Instructions: 768COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043FF70 Relevance: .7, Instructions: 749COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E50 Relevance: .7, Instructions: 670COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406510 Relevance: .7, Instructions: 665COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004072F0 Relevance: .6, Instructions: 625COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403860 Relevance: .6, Instructions: 600COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440190 Relevance: .6, Instructions: 565COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440270 Relevance: .5, Instructions: 508COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405820 Relevance: .4, Instructions: 400COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041BC60 Relevance: .4, Instructions: 385COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040AE25 Relevance: .4, Instructions: 384COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406080 Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042806B Relevance: .3, Instructions: 296COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041B950 Relevance: .3, Instructions: 294COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00438E3A Relevance: .3, Instructions: 280COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00430D63 Relevance: .3, Instructions: 251COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041A591 Relevance: .2, Instructions: 249COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00430477 Relevance: .2, Instructions: 235COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440F00 Relevance: .2, Instructions: 231COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00434BD0 Relevance: .2, Instructions: 224COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00419570 Relevance: .2, Instructions: 216COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426E26 Relevance: .2, Instructions: 203COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043B150 Relevance: .2, Instructions: 200COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00439510 Relevance: .2, Instructions: 189COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004406D0 Relevance: .2, Instructions: 161COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041794B Relevance: .2, Instructions: 153COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00428811 Relevance: .1, Instructions: 146COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043AFD0 Relevance: .1, Instructions: 141COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043F82B Relevance: .1, Instructions: 132COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042C790 Relevance: .1, Instructions: 117COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042EA70 Relevance: .1, Instructions: 104COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042E6F5 Relevance: .1, Instructions: 82COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040BC4E Relevance: .1, Instructions: 70COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00437380 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042E6F3 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042A9B0 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004273E0 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00429986 Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00419E2F Relevance: .0, Instructions: 49COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043D630 Relevance: .0, Instructions: 46COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402AE0 Relevance: .0, Instructions: 43COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041DD70 Relevance: .0, Instructions: 21COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043EDA6 Relevance: .0, Instructions: 21COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00434231 Relevance: 63.1, APIs: 1, Strings: 35, Instructions: 135memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|