Windows
Analysis Report
file.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- file.exe (PID: 4192 cmdline:
"C:\Users\ user\Deskt op\file.ex e" MD5: B09198B2D83AF5E3D6C58D710D4192E0) - WerFault.exe (PID: 6980 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 4 192 -s 488 MD5: C31336C1EFC2CCB44B4326EA793040F2) - WerFault.exe (PID: 6960 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 4 192 -s 155 2 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["demonstationfukewko.shop", "liabilitynighstjsko.shop", "alcojoldwograpciw.shop", "incredibleextedwj.shop", "shortsvelventysjo.shop", "shatterbreathepsw.shop", "tolerateilusidjukl.shop", "productivelookewr.shop", "strollheavengwu.shop"], "Build id": "P6Mk0M--key"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Trojan_RedLineStealer_ed346e4c | unknown | unknown |
| |
Windows_Trojan_Smokeloader_3687686f | unknown | unknown |
| |
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Code function: | 0_2_004162D6 |
Compliance |
---|
Source: | Unpacked PE file: |
Source: | Static PE information: |
Source: | File opened: | Jump to behavior |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_0043B3B0 | |
Source: | Code function: | 0_2_00410565 | |
Source: | Code function: | 0_2_004156B6 | |
Source: | Code function: | 0_2_004156B6 | |
Source: | Code function: | 0_2_00438879 | |
Source: | Code function: | 0_2_00437998 | |
Source: | Code function: | 0_2_00437998 | |
Source: | Code function: | 0_2_00435B8B | |
Source: | Code function: | 0_2_0041CC60 | |
Source: | Code function: | 0_2_0041CC60 | |
Source: | Code function: | 0_2_0043AE80 | |
Source: | Code function: | 0_2_0041AFE0 | |
Source: | Code function: | 0_2_0041AFE0 | |
Source: | Code function: | 0_2_0043B060 | |
Source: | Code function: | 0_2_00426097 | |
Source: | Code function: | 0_2_00426097 | |
Source: | Code function: | 0_2_0040D160 | |
Source: | Code function: | 0_2_0041210C | |
Source: | Code function: | 0_2_0041B1E0 | |
Source: | Code function: | 0_2_0043A182 | |
Source: | Code function: | 0_2_0043A190 | |
Source: | Code function: | 0_2_004222E7 | |
Source: | Code function: | 0_2_004222ED | |
Source: | Code function: | 0_2_00439389 | |
Source: | Code function: | 0_2_00422422 | |
Source: | Code function: | 0_2_004134B2 | |
Source: | Code function: | 0_2_0043A5D0 | |
Source: | Code function: | 0_2_004245D4 | |
Source: | Code function: | 0_2_00410565 | |
Source: | Code function: | 0_2_00424678 | |
Source: | Code function: | 0_2_004245A8 | |
Source: | Code function: | 0_2_0043B6A0 | |
Source: | Code function: | 0_2_004088F0 | |
Source: | Code function: | 0_2_0043B9D0 | |
Source: | Code function: | 0_2_0043B9D0 | |
Source: | Code function: | 0_2_004069B4 | |
Source: | Code function: | 0_2_00417A65 | |
Source: | Code function: | 0_2_00417A1A | |
Source: | Code function: | 0_2_0041DB22 | |
Source: | Code function: | 0_2_00407C70 | |
Source: | Code function: | 0_2_00407C70 | |
Source: | Code function: | 0_2_00437D40 | |
Source: | Code function: | 0_2_0043AD70 | |
Source: | Code function: | 0_2_00410D77 | |
Source: | Code function: | 0_2_00410D77 | |
Source: | Code function: | 0_2_00402D10 | |
Source: | Code function: | 0_2_00412E93 | |
Source: | Code function: | 0_2_00438F6A | |
Source: | Code function: | 0_2_00414FC0 | |
Source: | Code function: | 0_2_00431F80 | |
Source: | Code function: | 0_2_03692373 | |
Source: | Code function: | 0_2_036BA3E9 | |
Source: | Code function: | 0_2_036BA3F7 | |
Source: | Code function: | 0_2_0368D3C7 | |
Source: | Code function: | 0_2_0369B247 | |
Source: | Code function: | 0_2_0369B247 | |
Source: | Code function: | 0_2_03695227 | |
Source: | Code function: | 0_2_036A62FE | |
Source: | Code function: | 0_2_036A62FE | |
Source: | Code function: | 0_2_036BB2C7 | |
Source: | Code function: | 0_2_036B21E7 | |
Source: | Code function: | 0_2_036B91D1 | |
Source: | Code function: | 0_2_036BB0E7 | |
Source: | Code function: | 0_2_036930FA | |
Source: | Code function: | 0_2_03693719 | |
Source: | Code function: | 0_2_036907CC | |
Source: | Code function: | 0_2_036BB617 | |
Source: | Code function: | 0_2_036A2689 | |
Source: | Code function: | 0_2_036A254E | |
Source: | Code function: | 0_2_036A2554 | |
Source: | Code function: | 0_2_036B95F0 | |
Source: | Code function: | 0_2_0369B447 | |
Source: | Code function: | 0_2_03688B57 | |
Source: | Code function: | 0_2_036B7BFF | |
Source: | Code function: | 0_2_036B7BFF | |
Source: | Code function: | 0_2_0369DA12 | |
Source: | Code function: | 0_2_036B8AE0 | |
Source: | Code function: | 0_2_036A480F | |
Source: | Code function: | 0_2_036BB907 | |
Source: | Code function: | 0_2_0369591D | |
Source: | Code function: | 0_2_0369591D | |
Source: | Code function: | 0_2_0369B917 | |
Source: | Code function: | 0_2_036A483B | |
Source: | Code function: | 0_2_036BA837 | |
Source: | Code function: | 0_2_036A48DF | |
Source: | Code function: | 0_2_03682F77 | |
Source: | Code function: | 0_2_03690FDE | |
Source: | Code function: | 0_2_03690FDE | |
Source: | Code function: | 0_2_036BAFD7 | |
Source: | Code function: | 0_2_036B7FA7 | |
Source: | Code function: | 0_2_0369CEC7 | |
Source: | Code function: | 0_2_0369CEC7 | |
Source: | Code function: | 0_2_03687ED7 | |
Source: | Code function: | 0_2_03687ED7 | |
Source: | Code function: | 0_2_036B5DF2 | |
Source: | Code function: | 0_2_036BBC37 | |
Source: | Code function: | 0_2_036BBC37 | |
Source: | Code function: | 0_2_03697CCC | |
Source: | Code function: | 0_2_03697C81 |
Networking |
---|
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_0042D8F0 |
Source: | Code function: | 0_2_0042D8F0 |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_00421370 | |
Source: | Code function: | 0_2_004046D0 | |
Source: | Code function: | 0_2_00420C42 | |
Source: | Code function: | 0_2_00406030 | |
Source: | Code function: | 0_2_00421090 | |
Source: | Code function: | 0_2_00426097 | |
Source: | Code function: | 0_2_00410140 | |
Source: | Code function: | 0_2_00426148 | |
Source: | Code function: | 0_2_004261C3 | |
Source: | Code function: | 0_2_004261D5 | |
Source: | Code function: | 0_2_00403492 | |
Source: | Code function: | 0_2_00405567 | |
Source: | Code function: | 0_2_004365C0 | |
Source: | Code function: | 0_2_004065F0 | |
Source: | Code function: | 0_2_00403670 | |
Source: | Code function: | 0_2_0043B6A0 | |
Source: | Code function: | 0_2_0040581F | |
Source: | Code function: | 0_2_00433950 | |
Source: | Code function: | 0_2_0043B9D0 | |
Source: | Code function: | 0_2_004069B4 | |
Source: | Code function: | 0_2_00405B18 | |
Source: | Code function: | 0_2_0041DB22 | |
Source: | Code function: | 0_2_00407C70 | |
Source: | Code function: | 0_2_00403CEF | |
Source: | Code function: | 0_2_00402EC0 | |
Source: | Code function: | 0_2_036A63AF | |
Source: | Code function: | 0_2_036903A7 | |
Source: | Code function: | 0_2_036A62FE | |
Source: | Code function: | 0_2_03686297 | |
Source: | Code function: | 0_2_03683127 | |
Source: | Code function: | 0_2_03683517 | |
Source: | Code function: | 0_2_036855DB | |
Source: | Code function: | 0_2_036A15D7 | |
Source: | Code function: | 0_2_036A642A | |
Source: | Code function: | 0_2_036A643C | |
Source: | Code function: | 0_2_036B3BB7 | |
Source: | Code function: | 0_2_03684937 | |
Source: | Code function: | 0_2_036BB907 | |
Source: | Code function: | 0_2_036B6827 | |
Source: | Code function: | 0_2_03683F47 | |
Source: | Code function: | 0_2_03687ED7 | |
Source: | Code function: | 0_2_036BBC37 |
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Source: | Code function: | 0_2_01A7059E |
Source: | Code function: | 0_2_004286B8 |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | File read: | Jump to behavior |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | Unpacked PE file: |
Source: | Unpacked PE file: |
Source: | Code function: | 0_2_01A760C5 | |
Source: | Code function: | 0_2_01A760CC |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_00435C40 |
Source: | Code function: | 0_2_01A6FE7B | |
Source: | Code function: | 0_2_0368092B | |
Source: | Code function: | 0_2_03680D90 |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Windows Management Instrumentation | 1 DLL Side-Loading | 1 Process Injection | 11 Virtualization/Sandbox Evasion | 1 OS Credential Dumping | 121 Security Software Discovery | Remote Services | 1 Archive Collected Data | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Process Injection | LSASS Memory | 11 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 31 Data from Local System | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 11 Deobfuscate/Decode Files or Information | Security Account Manager | 2 Process Discovery | SMB/Windows Admin Shares | 2 Clipboard Data | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 3 Obfuscated Files or Information | NTDS | 1 File and Directory Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 2 Software Packing | LSA Secrets | 12 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
45% | ReversingLabs | Win32.Trojan.Generic | ||
47% | Virustotal | Browse | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
1% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
1% | Virustotal | Browse | ||
1% | Virustotal | Browse | ||
11% | Virustotal | Browse | ||
1% | Virustotal | Browse | ||
1% | Virustotal | Browse | ||
1% | Virustotal | Browse | ||
1% | Virustotal | Browse | ||
1% | Virustotal | Browse | ||
1% | Virustotal | Browse | ||
1% | Virustotal | Browse | ||
1% | Virustotal | Browse | ||
1% | Virustotal | Browse |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
strollheavengwu.shop | 104.21.15.198 | true | true |
| unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
true |
| unknown | |
false |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | unknown | |||
false | high | |||
false | unknown | |||
false | high | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false |
| unknown | ||
false | unknown | |||
false | unknown | |||
false |
| unknown | ||
false |
| unknown | ||
false | unknown | |||
false | high | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | high | |||
false | unknown | |||
false | unknown | |||
false | high | |||
false | unknown | |||
false | high | |||
false | high | |||
false | unknown | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | unknown | |||
false | unknown | |||
false | high | |||
false | high | |||
false | unknown | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | unknown | |||
false | unknown | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.15.198 | strollheavengwu.shop | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1429095 |
Start date and time: | 2024-04-20 21:07:08 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 41s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 10 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | file.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@3/9@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 13.89.179.12
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, onedsblobprdcus17.centralus.cloudapp.azure.com, fe3cr.delivery.mp.microsoft.com
- HTTPS proxy raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenFile calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
Time | Type | Description |
---|---|---|
21:07:59 | API Interceptor | |
21:08:21 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | RisePro Stealer | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, DarkTortilla, LummaC Stealer, PureLog Stealer, RedLine, zgRAT | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Glupteba, Mars Stealer, PureLog Stealer, Stealc, Vidar, zgRAT | Browse |
| ||
Get hash | malicious | Mars Stealer, PureLog Stealer, Stealc, Vidar, zgRAT | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | RisePro Stealer | Browse |
| |
Get hash | malicious | Remcos, DBatLoader | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC, DarkTortilla, LummaC Stealer, PureLog Stealer, RedLine, zgRAT | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | MicroClip | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_5c35b761e7b2886414fdd9b14cedcc55e7ebf4_79a0e859_e937197c-8d4c-4a9e-9e0b-35ae5b0d1770\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.9834677510608091 |
Encrypted: | false |
SSDEEP: | 192:eCnI739UvjP7hTb0U7v+I3jldFPzuiFDZ24IO8kVB:1+0jjVoU7vljlzuiFDY4IO8a |
MD5: | A4157FBBD1C83E318FC3B01B579FFBDE |
SHA1: | 820D692373A651340E6F6A70C8ADE407ADF842B1 |
SHA-256: | EF9395F8C36A834907FA696B5CC124ACD4EC4211264CDE91FA4670816F4FE392 |
SHA-512: | 54101DCB28033977CFF583B7BC864BDAA853A80F517E3F3A6EE0DE968023539914C1C403D5ABDF3438E424D9B5556ADC00B1777B04253C4B67645D51007D9F90 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_f26ec913b0e96e6b4e4a1fab19facc1930b3e25_79a0e859_42dc5897-5fe7-48b0-9f37-20795f382a3b\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.9940038667983384 |
Encrypted: | false |
SSDEEP: | 192:1v739Uv2P7AQ04DmIwsyI3jldFPzuiFoZ24IO8kVB:p02jAr4Dm9sRjlzuiFoY4IO8a |
MD5: | A6E766741089385BA870F56AAA2C4FDF |
SHA1: | 4490A158F27337096CB43244098F182A27EDE6CA |
SHA-256: | A9CAA7710CD6A53DCF18F4B361B8877B452C0C9EA56E7CF5C2C986BA9A799557 |
SHA-512: | D7915078D208FF5D9179D102523107DEEDD7A5B9BED2BA2ACA07314A038E70981EB0D791952ED7D95D2DCE940F1609D9408E29F492F2A3D9C5F26DF8213E77C0 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 53810 |
Entropy (8bit): | 2.646647227419799 |
Encrypted: | false |
SSDEEP: | 192:Rf8nuwXv1MIctObBTNwrQnNAZRZasksMT3WJ5TxxvsEFr:58b1MI7bBB2QnNAZRnMbWJZxxvsi |
MD5: | 97A4ECC975199E051FBD1BF5AED9515D |
SHA1: | 83254B3289B2A0A00156008EC2E987C65552877F |
SHA-256: | BDA55903EF4DB612A5636EA90A604F8AC90EB63B6E9B46943DC2C606A2277B13 |
SHA-512: | 53260669222DE8D59DD8E411C4ADE21E4F8FEF7E5AE054EA91C75C0040CFFA21EE5836E884D851629C072A8ACB73C09BB11D8CDCBC5D8BAEBDBE285224C8F15B |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8372 |
Entropy (8bit): | 3.687403978658031 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJ6CH6IpK6Y9rvSUPmgmf6B6CpN189bua1fiW6m:R6lXJp6IE6YBSUPmgmf5Luwfiy |
MD5: | F58BBD5B86AB6DE491705736F460F282 |
SHA1: | 85C183E4C5CA54499AB6EDD34B1CD62258649C30 |
SHA-256: | 4F6D23034F2EA4104E2B5A090ACB02908D012DE530BF7E3ED52A943ED9CF0F26 |
SHA-512: | C4E91B2876754202C67A6229EFFCF395821E092834F7C0BB14A8DA070B4EB8C7A07E74200C5556B000BA635B37274C5976F36FDFE4F4A3931EDD08AE22AB3343 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4642 |
Entropy (8bit): | 4.415924460228549 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsLJg77aI9CdWpW8VYHDYm8M4JiNFCFvr+q8vjNFiyjuamZ0vd:uIjflI7Is7V/JirgKjriyvmZ0vd |
MD5: | 47157BF8CB10D99D5A63383FC6D506AF |
SHA1: | 5E205B97B1FB71871AE27EB180B7F6D922CC3A2E |
SHA-256: | 42233DB8CEB88E0358EA9E782FDCA416F22FE083CE3182D42D355A24B7673807 |
SHA-512: | 49C8A10E5946D5AB322300316E69DBFCDF2AB4D48C4A28854275F599452B578FF41BCB91494BF7CDF9C309B497C8233CC6C0BD9AFCF785FCE8AAB1AB5D2AA1E6 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1085162 |
Entropy (8bit): | 1.0663006987599164 |
Encrypted: | false |
SSDEEP: | 3072:c7T2n4tPGmTebUHoz8IlAH7EHc7PTyXo/5HXhHxd2k:c/tPacoz8IlAH7Ac/yXihHfr |
MD5: | D64FF6DB72B29FB6ECEBBD1FA6340E82 |
SHA1: | 29F71853EDF1B400C6E527C36D4F37FA4A39E1DA |
SHA-256: | 618DE5D5AB8F55E5F097D1537F714069526E095857EE48F6D8D857F15C076268 |
SHA-512: | C95DDC3565552259E2137EFEB03427A4C730F9310A0AE1E61D0628CDF3DAB53BDB7D787D49B1B5EB767E2F8E0D11D7581CF3A167197F460F9B9C0B87501DB382 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8414 |
Entropy (8bit): | 3.6949518344781525 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJ6Cv6IWF6Y9MSUPJgmf6gz6cIxpDa89bgKsfzgm:R6lXJR6IU6Y2SUPJgmfpz6cSgpfx |
MD5: | AB588C28ACC923B41352280D63340EC1 |
SHA1: | 85F44424F13D6918626513CAB3BE1FAFB5C0F4A8 |
SHA-256: | 879DC327297F273FE17B817945B7147FB3FB41A706BB800AEFACE12969728901 |
SHA-512: | 97DE3740E815D6EAAB022C99C9BC70B854E357A9A18021E8742771AA17A005C50A06288F41295E45F719CC6ECCF3A6C9E0B1E7736A90E1FCE0A21038F038FFF8 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4696 |
Entropy (8bit): | 4.455507687282217 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsLJg77aI9CdWpW8VYHHYm8M4JiNOrQO3Fx+q8vjNOrQONyjuamZ0ed:uIjflI7Is7VDJiGQsKjGQwyvmZ0ed |
MD5: | BD56D4C6CC705090763CBBEE3531CD79 |
SHA1: | 1EF7889A593622D3E8A6D2D85D45C745B34D3E33 |
SHA-256: | C5E816991B8AC5644AF787DE0BDBEABEBB7430FA9171C473DA18FB951E643285 |
SHA-512: | 4C116D120DD1CC04C0325D16F5902288B8E2EE28E6B342B33432B37385CF6CC9EC1B7E386C5729BB331DC30663642982DE990CC91EED517F56BE0CD0332ADDA5 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.465260140383948 |
Encrypted: | false |
SSDEEP: | 6144:jIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNPdwBCswSb6:0XD94+WlLZMM6YFH1+6 |
MD5: | 18AA32B24DB057A15E3D60A1874DE1B8 |
SHA1: | 69CBA63DECA2A0984956FD933C26ECEA9644C1DD |
SHA-256: | B5189BABC1AD2C465003A973B17D9273CCC990311810327BF1169462EE39CD63 |
SHA-512: | 232218D050853B19AA69417E334063586A765EA1B5493A4F8A414581319393E80A8DD5422EF1E75D657102682178807ACC0C355415465C652278A5291A475933 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 6.848879786235133 |
TrID: |
|
File name: | file.exe |
File size: | 406'528 bytes |
MD5: | b09198b2d83af5e3d6c58d710d4192e0 |
SHA1: | f0793f1b004eb60f51c21dcdaade6df86c1419db |
SHA256: | 80f337e35d324639f217f8b36c13d906ab3c8aa4917c0ba1a7b09f52ae3c9a0c |
SHA512: | c1ea5294bea8485c95ce39b2f9c14d067418fe1c1cb4b3379eb07b716ab7031702d111f053a70d7f6895cc69e44070dd298c088ecb223c11e9a83323200a8683 |
SSDEEP: | 6144:i3BIWSBLGNjbvUXu2XzAILZorU0qBflEFReLzsAz:WBIWxHUPXsILYUbzEFoz1 |
TLSH: | AF848C0372E1BC64E52257329F6E9AEC772DF8614E24BB1722C9AE2F18711B1F217711 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................W.......h.Q.....i.....................e-m.......S.....e-V.....Rich....................PE..L....7.c........... |
Icon Hash: | 492145454d4d410d |
Entrypoint: | 0x403d77 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | TERMINAL_SERVER_AWARE |
Time Stamp: | 0x638337B0 [Sun Nov 27 10:10:56 2022 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 1 |
File Version Major: | 5 |
File Version Minor: | 1 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 1 |
Import Hash: | deee2f3ec985195fc99175dfed532c7c |
Instruction |
---|
call 00007F614C83D268h |
jmp 00007F614C835E35h |
push 00000014h |
push 004177E0h |
call 00007F614C83A458h |
call 00007F614C83D439h |
movzx esi, ax |
push 00000002h |
call 00007F614C83D1FBh |
pop ecx |
mov eax, 00005A4Dh |
cmp word ptr [00400000h], ax |
je 00007F614C835E36h |
xor ebx, ebx |
jmp 00007F614C835E65h |
mov eax, dword ptr [0040003Ch] |
cmp dword ptr [eax+00400000h], 00004550h |
jne 00007F614C835E1Dh |
mov ecx, 0000010Bh |
cmp word ptr [eax+00400018h], cx |
jne 00007F614C835E0Fh |
xor ebx, ebx |
cmp dword ptr [eax+00400074h], 0Eh |
jbe 00007F614C835E3Bh |
cmp dword ptr [eax+004000E8h], ebx |
setne bl |
mov dword ptr [ebp-1Ch], ebx |
call 00007F614C839C4Eh |
test eax, eax |
jne 00007F614C835E3Ah |
push 0000001Ch |
call 00007F614C835F11h |
pop ecx |
call 00007F614C839410h |
test eax, eax |
jne 00007F614C835E3Ah |
push 00000010h |
call 00007F614C835F00h |
pop ecx |
call 00007F614C83D274h |
and dword ptr [ebp-04h], 00000000h |
call 00007F614C83C2EDh |
test eax, eax |
jns 00007F614C835E3Ah |
push 0000001Bh |
call 00007F614C835EE6h |
pop ecx |
call dword ptr [004110C8h] |
mov dword ptr [01A14DC0h], eax |
call 00007F614C83D28Fh |
mov dword ptr [0044CD0Ch], eax |
call 00007F614C83CC32h |
test eax, eax |
jns 00007F614C835E3Ah |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x17c34 | 0x78 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x1615000 | 0x17c00 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x11210 | 0x38 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x17178 | 0x40 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x11000 | 0x19c | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0xfec5 | 0x10000 | 3d2d186f6d017cba5b080eafc75e6efb | False | 0.6039276123046875 | data | 6.707537332987908 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x11000 | 0x75c0 | 0x7600 | 5857b641fabf618205667d2eeb322088 | False | 0.3945643538135593 | data | 4.9461038847232155 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x19000 | 0x15fbdc4 | 0x33e00 | 76814f03fbc49d5d35791390cd25443d | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x1615000 | 0x17c00 | 0x17c00 | 17b5ad698c69d82780624f64ffeefd78 | False | 0.31922286184210524 | data | 4.14158676530856 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_CURSOR | 0x1627ae0 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 0 | 0.26439232409381663 | ||
RT_CURSOR | 0x1628988 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 0 | 0.3686823104693141 | ||
RT_CURSOR | 0x1629230 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 0 | 0.49060693641618497 | ||
RT_CURSOR | 0x16297c8 | 0x130 | Device independent bitmap graphic, 32 x 64 x 1, image size 0 | 0.4375 | ||
RT_CURSOR | 0x16298f8 | 0xb0 | Device independent bitmap graphic, 16 x 32 x 1, image size 0 | 0.44886363636363635 | ||
RT_CURSOR | 0x16299d0 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 0 | 0.27238805970149255 | ||
RT_CURSOR | 0x162a878 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 0 | 0.375 | ||
RT_CURSOR | 0x162b120 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 0 | 0.5057803468208093 | ||
RT_ICON | 0x16158d0 | 0x6c8 | Device independent bitmap graphic, 24 x 48 x 8, image size 0 | Romanian | Romania | 0.41359447004608296 |
RT_ICON | 0x1615f98 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 0 | Romanian | Romania | 0.16524896265560166 |
RT_ICON | 0x1618540 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 0 | Romanian | Romania | 0.2154255319148936 |
RT_ICON | 0x16189d8 | 0x6c8 | Device independent bitmap graphic, 24 x 48 x 8, image size 0 | Romanian | Romania | 0.41359447004608296 |
RT_ICON | 0x16190a0 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 0 | Romanian | Romania | 0.16524896265560166 |
RT_ICON | 0x161b648 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 0 | Romanian | Romania | 0.2154255319148936 |
RT_ICON | 0x161bae0 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 0 | Romanian | Romania | 0.37100213219616207 |
RT_ICON | 0x161c988 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 0 | Romanian | Romania | 0.45306859205776173 |
RT_ICON | 0x161d230 | 0x6c8 | Device independent bitmap graphic, 24 x 48 x 8, image size 0 | Romanian | Romania | 0.4619815668202765 |
RT_ICON | 0x161d8f8 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 0 | Romanian | Romania | 0.45664739884393063 |
RT_ICON | 0x161de60 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 0 | Romanian | Romania | 0.2691908713692946 |
RT_ICON | 0x1620408 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 0 | Romanian | Romania | 0.3062851782363977 |
RT_ICON | 0x16214b0 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 0 | Romanian | Romania | 0.350177304964539 |
RT_ICON | 0x1621980 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 0 | Romanian | Romania | 0.5679637526652452 |
RT_ICON | 0x1622828 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 0 | Romanian | Romania | 0.546028880866426 |
RT_ICON | 0x16230d0 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 0 | Romanian | Romania | 0.6184971098265896 |
RT_ICON | 0x1623638 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 0 | Romanian | Romania | 0.4650414937759336 |
RT_ICON | 0x1625be0 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 0 | Romanian | Romania | 0.48686679174484054 |
RT_ICON | 0x1626c88 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 0 | Romanian | Romania | 0.49426229508196723 |
RT_ICON | 0x1627610 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 0 | Romanian | Romania | 0.44769503546099293 |
RT_DIALOG | 0x162b8a8 | 0x52 | data | 0.8780487804878049 | ||
RT_STRING | 0x162b900 | 0x3d2 | data | Romanian | Romania | 0.4539877300613497 |
RT_STRING | 0x162bcd8 | 0x32a | data | Romanian | Romania | 0.47901234567901235 |
RT_STRING | 0x162c008 | 0x1a8 | data | Romanian | Romania | 0.49528301886792453 |
RT_STRING | 0x162c1b0 | 0x30a | data | Romanian | Romania | 0.47429305912596403 |
RT_STRING | 0x162c4c0 | 0x534 | data | Romanian | Romania | 0.44744744744744747 |
RT_STRING | 0x162c9f8 | 0x208 | data | Romanian | Romania | 0.5038461538461538 |
RT_GROUP_CURSOR | 0x1629798 | 0x30 | data | 0.9375 | ||
RT_GROUP_CURSOR | 0x16299a8 | 0x22 | data | 1.0588235294117647 | ||
RT_GROUP_CURSOR | 0x162b688 | 0x30 | data | 0.9375 | ||
RT_GROUP_ICON | 0x1627a78 | 0x68 | data | Romanian | Romania | 0.7115384615384616 |
RT_GROUP_ICON | 0x16189a8 | 0x30 | data | Romanian | Romania | 0.9375 |
RT_GROUP_ICON | 0x1621918 | 0x68 | data | Romanian | Romania | 0.7115384615384616 |
RT_GROUP_ICON | 0x161bab0 | 0x30 | data | Romanian | Romania | 1.0 |
RT_VERSION | 0x162b6b8 | 0x1ec | data | 0.5386178861788617 |
DLL | Import |
---|---|
KERNEL32.dll | LocalCompact, GetUserDefaultLCID, AddConsoleAliasW, CreateHardLinkA, GetTickCount, GetWindowsDirectoryA, EnumTimeFormatsW, FindResourceExA, GetVolumeInformationA, LoadLibraryW, ReadConsoleInputA, CopyFileW, WriteConsoleW, GetCompressedFileSizeA, GetTempPathW, SetThreadLocale, GetLastError, SetLastError, GetProcAddress, GetLocaleInfoA, CreateTimerQueueTimer, SetStdHandle, SetFileAttributesA, WriteConsoleA, InterlockedExchangeAdd, LocalAlloc, SetCalendarInfoW, GetExitCodeThread, RemoveDirectoryW, AddAtomA, GlobalFindAtomW, GetModuleFileNameA, GetOEMCP, GlobalUnWire, LoadLibraryExA, AddConsoleAliasA, OutputDebugStringW, GetComputerNameA, FindFirstChangeNotificationW, GetSystemDefaultLangID, FlushFileBuffers, GetConsoleMode, HeapFree, EncodePointer, DecodePointer, IsProcessorFeaturePresent, GetCommandLineA, RaiseException, RtlUnwind, IsValidCodePage, GetACP, GetCPInfo, GetCurrentThreadId, IsDebuggerPresent, GetProcessHeap, ExitProcess, GetModuleHandleExW, MultiByteToWideChar, WideCharToMultiByte, HeapSize, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, GetFileType, DeleteCriticalSection, GetStartupInfoW, CloseHandle, HeapAlloc, WriteFile, GetModuleFileNameW, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, GetEnvironmentStringsW, FreeEnvironmentStringsW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, InitializeCriticalSectionAndSpinCount, Sleep, GetCurrentProcess, TerminateProcess, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetModuleHandleW, GetStringTypeW, LoadLibraryExW, HeapReAlloc, ReadFile, SetFilePointerEx, LCMapStringW, GetConsoleCP, CreateFileW |
USER32.dll | GetMenuItemID |
GDI32.dll | GetCharacterPlacementW |
ADVAPI32.dll | DeregisterEventSource |
WINHTTP.dll | WinHttpConnect |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
Romanian | Romania |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 20, 2024 21:07:58.616177082 CEST | 49730 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:07:58.616257906 CEST | 443 | 49730 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:07:58.616539001 CEST | 49730 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:07:58.619498014 CEST | 49730 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:07:58.619576931 CEST | 443 | 49730 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:07:58.842104912 CEST | 443 | 49730 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:07:58.842190981 CEST | 49730 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:07:58.845628977 CEST | 49730 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:07:58.845654964 CEST | 443 | 49730 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:07:58.846060991 CEST | 443 | 49730 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:07:58.889622927 CEST | 49730 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:07:58.892736912 CEST | 49730 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:07:58.892774105 CEST | 49730 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:07:58.892839909 CEST | 443 | 49730 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:07:59.379479885 CEST | 443 | 49730 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:07:59.379585028 CEST | 443 | 49730 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:07:59.379790068 CEST | 49730 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:07:59.382050991 CEST | 49730 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:07:59.382111073 CEST | 443 | 49730 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:07:59.384876013 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:07:59.384980917 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:07:59.385072947 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:07:59.385355949 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:07:59.385387897 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:07:59.613991022 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:07:59.614108086 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:07:59.615328074 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:07:59.615348101 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:07:59.616406918 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:07:59.617487907 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:07:59.617547035 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:07:59.617671967 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:00.166169882 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:00.166286945 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:00.166358948 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:00.166377068 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:00.166404009 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:00.166462898 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:00.166492939 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:00.166615963 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:00.166670084 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:00.166693926 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:00.166786909 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:00.166843891 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:00.166857958 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:00.166930914 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:00.166981936 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:00.166994095 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:00.167088985 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:00.167134047 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:00.167145014 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:00.167304993 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:00.167361021 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:00.167613983 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:00.167649031 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:00.167673111 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:00.167686939 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:00.301995993 CEST | 49732 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:00.302081108 CEST | 443 | 49732 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:00.302179098 CEST | 49732 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:00.302531004 CEST | 49732 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:00.302565098 CEST | 443 | 49732 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:00.528089046 CEST | 443 | 49732 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:00.528209925 CEST | 49732 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:00.529409885 CEST | 49732 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:00.529428959 CEST | 443 | 49732 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:00.529839993 CEST | 443 | 49732 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:00.531160116 CEST | 49732 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:00.531311035 CEST | 49732 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:00.531347036 CEST | 443 | 49732 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:00.531413078 CEST | 49732 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:00.531426907 CEST | 443 | 49732 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:01.062228918 CEST | 443 | 49732 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:01.062465906 CEST | 443 | 49732 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:01.062537909 CEST | 49732 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:01.073705912 CEST | 49732 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:01.073745012 CEST | 443 | 49732 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:01.153774977 CEST | 49733 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:01.153811932 CEST | 443 | 49733 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:01.153893948 CEST | 49733 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:01.154165030 CEST | 49733 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:01.154175997 CEST | 443 | 49733 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:01.380569935 CEST | 443 | 49733 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:01.380659103 CEST | 49733 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:01.381727934 CEST | 49733 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:01.381736994 CEST | 443 | 49733 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:01.382236004 CEST | 443 | 49733 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:01.383244038 CEST | 49733 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:01.383372068 CEST | 49733 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:01.383399010 CEST | 443 | 49733 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:01.895772934 CEST | 443 | 49733 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:01.895986080 CEST | 49733 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:02.107629061 CEST | 49734 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:02.107692957 CEST | 443 | 49734 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:02.107775927 CEST | 49734 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:02.108056068 CEST | 49734 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:02.108079910 CEST | 443 | 49734 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:02.334599972 CEST | 443 | 49734 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:02.334697008 CEST | 49734 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:02.335788965 CEST | 49734 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:02.335808039 CEST | 443 | 49734 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:02.336891890 CEST | 443 | 49734 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:02.337941885 CEST | 49734 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:02.338069916 CEST | 49734 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:02.338109970 CEST | 443 | 49734 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:02.338181019 CEST | 49734 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:02.338196039 CEST | 443 | 49734 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:02.918778896 CEST | 443 | 49734 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:02.918967962 CEST | 443 | 49734 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:02.919044971 CEST | 49734 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:02.919111967 CEST | 49734 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:02.919132948 CEST | 443 | 49734 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:03.133863926 CEST | 49735 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:03.133971930 CEST | 443 | 49735 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:03.134082079 CEST | 49735 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:03.134357929 CEST | 49735 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:03.134392977 CEST | 443 | 49735 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:03.360160112 CEST | 443 | 49735 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:03.360408068 CEST | 49735 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:03.362132072 CEST | 49735 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:03.362150908 CEST | 443 | 49735 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:03.362636089 CEST | 443 | 49735 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:03.363781929 CEST | 49735 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:03.363926888 CEST | 49735 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:03.363965034 CEST | 443 | 49735 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:03.879340887 CEST | 443 | 49735 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:03.879437923 CEST | 443 | 49735 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:03.879498005 CEST | 49735 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:03.879607916 CEST | 49735 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:03.879643917 CEST | 443 | 49735 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:03.948112965 CEST | 49736 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:03.948156118 CEST | 443 | 49736 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:03.948374033 CEST | 49736 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:03.948728085 CEST | 49736 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:03.948807001 CEST | 443 | 49736 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:04.170104980 CEST | 443 | 49736 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:04.170361996 CEST | 49736 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:04.199832916 CEST | 49736 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:04.199911118 CEST | 443 | 49736 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:04.200736046 CEST | 443 | 49736 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:04.201982975 CEST | 49736 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:04.201983929 CEST | 49736 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:04.202099085 CEST | 443 | 49736 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:04.722181082 CEST | 443 | 49736 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:04.722398996 CEST | 443 | 49736 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:04.722671032 CEST | 49736 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:04.723547935 CEST | 49736 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:04.723607063 CEST | 443 | 49736 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:05.167412996 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:05.167505026 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:05.167584896 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:05.167860031 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:05.167892933 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:05.390299082 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:05.390393972 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:05.391871929 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:05.391899109 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:05.392165899 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:05.393246889 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:05.394092083 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:05.394133091 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:05.394319057 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:05.394355059 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:05.394505978 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:05.394552946 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:05.394699097 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:05.394743919 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:05.394913912 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:05.394961119 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:05.395181894 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:05.395220995 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:05.395247936 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:05.395275116 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:05.395463943 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:05.395500898 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:05.395550013 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:05.395608902 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:05.395687103 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:05.440131903 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:05.440408945 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:05.440498114 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:05.440558910 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:05.440609932 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:05.440689087 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:05.440730095 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:07.073093891 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:07.073350906 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 20, 2024 21:08:07.073406935 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 20, 2024 21:08:07.073432922 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 20, 2024 21:07:58.470388889 CEST | 51130 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 20, 2024 21:07:58.611799955 CEST | 53 | 51130 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Apr 20, 2024 21:07:58.470388889 CEST | 192.168.2.4 | 1.1.1.1 | 0x3633 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Apr 20, 2024 21:07:58.611799955 CEST | 1.1.1.1 | 192.168.2.4 | 0x3633 | No error (0) | 104.21.15.198 | A (IP address) | IN (0x0001) | false | ||
Apr 20, 2024 21:07:58.611799955 CEST | 1.1.1.1 | 192.168.2.4 | 0x3633 | No error (0) | 172.67.163.209 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49730 | 104.21.15.198 | 443 | 4192 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-04-20 19:07:58 UTC | 267 | OUT | |
2024-04-20 19:07:58 UTC | 8 | OUT | |
2024-04-20 19:07:59 UTC | 810 | IN | |
2024-04-20 19:07:59 UTC | 7 | IN | |
2024-04-20 19:07:59 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49731 | 104.21.15.198 | 443 | 4192 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-04-20 19:07:59 UTC | 268 | OUT | |
2024-04-20 19:07:59 UTC | 52 | OUT | |
2024-04-20 19:08:00 UTC | 808 | IN | |
2024-04-20 19:08:00 UTC | 561 | IN | |
2024-04-20 19:08:00 UTC | 1369 | IN | |
2024-04-20 19:08:00 UTC | 1369 | IN | |
2024-04-20 19:08:00 UTC | 1369 | IN | |
2024-04-20 19:08:00 UTC | 1369 | IN | |
2024-04-20 19:08:00 UTC | 1369 | IN | |
2024-04-20 19:08:00 UTC | 1369 | IN | |
2024-04-20 19:08:00 UTC | 1369 | IN | |
2024-04-20 19:08:00 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49732 | 104.21.15.198 | 443 | 4192 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-04-20 19:08:00 UTC | 286 | OUT | |
2024-04-20 19:08:00 UTC | 15331 | OUT | |
2024-04-20 19:08:00 UTC | 2830 | OUT | |
2024-04-20 19:08:01 UTC | 812 | IN | |
2024-04-20 19:08:01 UTC | 20 | IN | |
2024-04-20 19:08:01 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49733 | 104.21.15.198 | 443 | 4192 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-04-20 19:08:01 UTC | 285 | OUT | |
2024-04-20 19:08:01 UTC | 8782 | OUT | |
2024-04-20 19:08:01 UTC | 818 | IN | |
2024-04-20 19:08:01 UTC | 20 | IN | |
2024-04-20 19:08:01 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49734 | 104.21.15.198 | 443 | 4192 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-04-20 19:08:02 UTC | 286 | OUT | |
2024-04-20 19:08:02 UTC | 15331 | OUT | |
2024-04-20 19:08:02 UTC | 5104 | OUT | |
2024-04-20 19:08:02 UTC | 806 | IN | |
2024-04-20 19:08:02 UTC | 20 | IN | |
2024-04-20 19:08:02 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49735 | 104.21.15.198 | 443 | 4192 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-04-20 19:08:03 UTC | 285 | OUT | |
2024-04-20 19:08:03 UTC | 5448 | OUT | |
2024-04-20 19:08:03 UTC | 802 | IN | |
2024-04-20 19:08:03 UTC | 20 | IN | |
2024-04-20 19:08:03 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49736 | 104.21.15.198 | 443 | 4192 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-04-20 19:08:04 UTC | 285 | OUT | |
2024-04-20 19:08:04 UTC | 1398 | OUT | |
2024-04-20 19:08:04 UTC | 806 | IN | |
2024-04-20 19:08:04 UTC | 20 | IN | |
2024-04-20 19:08:04 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49737 | 104.21.15.198 | 443 | 4192 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-04-20 19:08:05 UTC | 287 | OUT | |
2024-04-20 19:08:05 UTC | 15331 | OUT | |
2024-04-20 19:08:05 UTC | 15331 | OUT | |
2024-04-20 19:08:05 UTC | 15331 | OUT | |
2024-04-20 19:08:05 UTC | 15331 | OUT | |
2024-04-20 19:08:05 UTC | 15331 | OUT | |
2024-04-20 19:08:05 UTC | 15331 | OUT | |
2024-04-20 19:08:05 UTC | 15331 | OUT | |
2024-04-20 19:08:05 UTC | 15331 | OUT | |
2024-04-20 19:08:05 UTC | 15331 | OUT | |
2024-04-20 19:08:05 UTC | 15331 | OUT | |
2024-04-20 19:08:07 UTC | 810 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 21:07:57 |
Start date: | 20/04/2024 |
Path: | C:\Users\user\Desktop\file.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 406'528 bytes |
MD5 hash: | B09198B2D83AF5E3D6C58D710D4192E0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 3 |
Start time: | 21:08:06 |
Start date: | 20/04/2024 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x560000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 21:08:07 |
Start date: | 20/04/2024 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x560000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 8.5% |
Dynamic/Decrypted Code Coverage: | 8% |
Signature Coverage: | 29.2% |
Total number of Nodes: | 349 |
Total number of Limit Nodes: | 19 |
Graph
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004046D0 Relevance: 5.5, Strings: 4, Instructions: 506COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0041CC60 Relevance: 4.1, Strings: 3, Instructions: 328COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0041DB22 Relevance: 3.6, APIs: 2, Instructions: 615COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01A7059E Relevance: 3.0, APIs: 2, Instructions: 41processCOMMON
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0041AFE0 Relevance: 2.6, Strings: 2, Instructions: 130COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004162D6 Relevance: 1.7, APIs: 1, Instructions: 218COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00435B8B Relevance: 1.5, APIs: 1, Instructions: 42memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00435C40 Relevance: 1.5, APIs: 1, Instructions: 16libraryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00420C42 Relevance: .4, Instructions: 431COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00421370 Relevance: .4, Instructions: 381COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00421090 Relevance: .4, Instructions: 373COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0043B3B0 Relevance: .3, Instructions: 255COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0043AE80 Relevance: .2, Instructions: 160COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00438879 Relevance: .1, Instructions: 138COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00437998 Relevance: .1, Instructions: 138COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0041210C Relevance: .1, Instructions: 112COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00410565 Relevance: .0, Instructions: 25COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004286B8 Relevance: .0, Instructions: 19COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0368003C Relevance: 12.8, APIs: 5, Strings: 2, Instructions: 515memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00427C0B Relevance: 12.3, APIs: 1, Strings: 6, Instructions: 72memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00437E48 Relevance: 3.6, APIs: 1, Strings: 1, Instructions: 90libraryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004241EB Relevance: 3.6, APIs: 2, Instructions: 582COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00435AA0 Relevance: 3.6, APIs: 1, Strings: 1, Instructions: 53memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00439580 Relevance: 3.5, APIs: 1, Strings: 1, Instructions: 45memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0041DE00 Relevance: 3.2, APIs: 2, Instructions: 215COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0042DFB8 Relevance: 3.1, APIs: 2, Instructions: 123COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 03680E0F Relevance: 3.0, APIs: 2, Instructions: 15COMMON
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004394EC Relevance: 1.5, APIs: 1, Instructions: 38memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0041860C Relevance: 1.5, APIs: 1, Instructions: 33COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01A7025D Relevance: 1.3, APIs: 1, Instructions: 48memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0042D8F0 Relevance: 21.2, APIs: 6, Strings: 6, Instructions: 155clipboardCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00426097 Relevance: 7.1, Strings: 5, Instructions: 837COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036A62FE Relevance: 7.1, Strings: 5, Instructions: 837COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 03684937 Relevance: 5.5, Strings: 4, Instructions: 506COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0369CEC7 Relevance: 4.1, Strings: 3, Instructions: 328COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0368092B Relevance: 3.8, Strings: 3, Instructions: 90COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036855DB Relevance: 3.3, Strings: 2, Instructions: 800COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00405567 Relevance: 3.0, Strings: 2, Instructions: 510COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0043B9D0 Relevance: 2.9, Strings: 2, Instructions: 360COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036BBC37 Relevance: 2.9, Strings: 2, Instructions: 360COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040581F Relevance: 2.8, Strings: 2, Instructions: 267COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00405B18 Relevance: 2.7, Strings: 2, Instructions: 231COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0369B247 Relevance: 2.6, Strings: 2, Instructions: 130COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004365C0 Relevance: 2.0, Strings: 1, Instructions: 700COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036B6827 Relevance: 2.0, Strings: 1, Instructions: 700COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004261D5 Relevance: 1.7, Strings: 1, Instructions: 432COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036A643C Relevance: 1.7, Strings: 1, Instructions: 432COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00426148 Relevance: 1.7, Strings: 1, Instructions: 429COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036A63AF Relevance: 1.7, Strings: 1, Instructions: 429COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004261C3 Relevance: 1.6, Strings: 1, Instructions: 388COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036A642A Relevance: 1.6, Strings: 1, Instructions: 388COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00417A65 Relevance: 1.6, Strings: 1, Instructions: 357COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 03697CCC Relevance: 1.6, Strings: 1, Instructions: 357COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004065F0 Relevance: 1.5, Strings: 1, Instructions: 262COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004245D4 Relevance: 1.4, Strings: 1, Instructions: 188COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036A483B Relevance: 1.4, Strings: 1, Instructions: 188COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00424678 Relevance: 1.4, Strings: 1, Instructions: 169COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036A48DF Relevance: 1.4, Strings: 1, Instructions: 169COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004245A8 Relevance: 1.4, Strings: 1, Instructions: 126COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036A480F Relevance: 1.4, Strings: 1, Instructions: 126COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004134B2 Relevance: 1.3, Strings: 1, Instructions: 70COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 03693719 Relevance: 1.3, Strings: 1, Instructions: 70COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00437D40 Relevance: 1.3, Strings: 1, Instructions: 44COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036B7FA7 Relevance: 1.3, Strings: 1, Instructions: 44COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00407C70 Relevance: .9, Instructions: 864COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 03687ED7 Relevance: .9, Instructions: 864COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 03683517 Relevance: .7, Instructions: 698COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 03683F47 Relevance: .6, Instructions: 632COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00406030 Relevance: .5, Instructions: 497COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 03686297 Relevance: .5, Instructions: 497COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036A15D7 Relevance: .4, Instructions: 381COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004069B4 Relevance: .4, Instructions: 379COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004088F0 Relevance: .4, Instructions: 373COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 03688B57 Relevance: .4, Instructions: 373COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00403670 Relevance: .3, Instructions: 336COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00403CEF Relevance: .3, Instructions: 325COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0041B1E0 Relevance: .3, Instructions: 310COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0369B447 Relevance: .3, Instructions: 310COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0369B917 Relevance: .3, Instructions: 291COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0043B6A0 Relevance: .3, Instructions: 290COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036BB907 Relevance: .3, Instructions: 290COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036BB617 Relevance: .3, Instructions: 255COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00410D77 Relevance: .2, Instructions: 240COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 03690FDE Relevance: .2, Instructions: 240COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00403492 Relevance: .2, Instructions: 229COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00433950 Relevance: .2, Instructions: 192COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036B3BB7 Relevance: .2, Instructions: 192COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0043B060 Relevance: .2, Instructions: 166COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036BB2C7 Relevance: .2, Instructions: 166COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036BB0E7 Relevance: .2, Instructions: 160COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00402D10 Relevance: .2, Instructions: 152COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 03682F77 Relevance: .2, Instructions: 152COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00414FC0 Relevance: .1, Instructions: 146COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 03695227 Relevance: .1, Instructions: 146COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036B7BFF Relevance: .1, Instructions: 138COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036B8AE0 Relevance: .1, Instructions: 138COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00412E93 Relevance: .1, Instructions: 136COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036930FA Relevance: .1, Instructions: 136COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00410140 Relevance: .1, Instructions: 132COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036903A7 Relevance: .1, Instructions: 132COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 03692373 Relevance: .1, Instructions: 112COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00402EC0 Relevance: .1, Instructions: 100COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 03683127 Relevance: .1, Instructions: 100COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0043AD70 Relevance: .1, Instructions: 92COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036BAFD7 Relevance: .1, Instructions: 92COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00438F6A Relevance: .1, Instructions: 81COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036B91D1 Relevance: .1, Instructions: 81COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0369DA12 Relevance: .1, Instructions: 69COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00431F80 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036B21E7 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01A6FE7B Relevance: .1, Instructions: 61COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004222ED Relevance: .1, Instructions: 52COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036A2554 Relevance: .1, Instructions: 52COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0043A5D0 Relevance: .0, Instructions: 47COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036BA837 Relevance: .0, Instructions: 47COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 03680D90 Relevance: .0, Instructions: 43COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036B5DF2 Relevance: .0, Instructions: 42COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004222E7 Relevance: .0, Instructions: 32COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036A254E Relevance: .0, Instructions: 32COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036907CC Relevance: .0, Instructions: 25COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00439389 Relevance: .0, Instructions: 24COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036B95F0 Relevance: .0, Instructions: 24COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040D160 Relevance: .0, Instructions: 21COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0368D3C7 Relevance: .0, Instructions: 21COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00417A1A Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 03697C81 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0043A182 Relevance: .0, Instructions: 14COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036BA3E9 Relevance: .0, Instructions: 14COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00422422 Relevance: .0, Instructions: 12COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036A2689 Relevance: .0, Instructions: 12COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0043A190 Relevance: .0, Instructions: 11COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036BA3F7 Relevance: .0, Instructions: 11COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 036ADB57 Relevance: 21.2, APIs: 6, Strings: 6, Instructions: 155clipboardCOMMON
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |