Windows
Analysis Report
2FjvjcayaH.exe
Overview
General Information
Sample name: | 2FjvjcayaH.exerenamed because original name is a hash value |
Original sample name: | 673225d992723665f19c4cf40e14b5f7.exe |
Analysis ID: | 1429207 |
MD5: | 673225d992723665f19c4cf40e14b5f7 |
SHA1: | 22312b0dc54b70c3d76e66d94b9b01f71266ffb4 |
SHA256: | f1c35a47842119856e0067aa4b390cdce620b3d69262266a9923278fbac15ff8 |
Tags: | 32exetrojan |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- 2FjvjcayaH.exe (PID: 7516 cmdline:
"C:\Users\ user\Deskt op\2Fjvjca yaH.exe" MD5: 673225D992723665F19C4CF40E14B5F7) - WerFault.exe (PID: 7676 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 516 -s 146 4 MD5: C31336C1EFC2CCB44B4326EA793040F2) - WerFault.exe (PID: 7744 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 516 -s 161 2 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["demonstationfukewko.shop", "liabilitynighstjsko.shop", "alcojoldwograpciw.shop", "incredibleextedwj.shop", "shortsvelventysjo.shop", "shatterbreathepsw.shop", "tolerateilusidjukl.shop", "productivelookewr.shop", "strollheavengwu.shop"], "Build id": "P6Mk0M--key"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Trojan_Smokeloader_3687686f | unknown | unknown |
| |
Windows_Trojan_RedLineStealer_ed346e4c | unknown | unknown |
| |
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer | Yara detected LummaC Stealer | Joe Security | ||
Click to see the 1 entries |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Code function: | 0_2_004162D6 |
Compliance |
---|
Source: | Unpacked PE file: |
Source: | Static PE information: |
Source: | File opened: | Jump to behavior |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_0043B3B0 | |
Source: | Code function: | 0_2_00410565 | |
Source: | Code function: | 0_2_004156B6 | |
Source: | Code function: | 0_2_004156B6 | |
Source: | Code function: | 0_2_00438879 | |
Source: | Code function: | 0_2_00437998 | |
Source: | Code function: | 0_2_00437998 | |
Source: | Code function: | 0_2_00435B8B | |
Source: | Code function: | 0_2_0041CC60 | |
Source: | Code function: | 0_2_0041CC60 | |
Source: | Code function: | 0_2_0043AE80 | |
Source: | Code function: | 0_2_00414FC0 | |
Source: | Code function: | 0_2_0041AFE0 | |
Source: | Code function: | 0_2_0041AFE0 | |
Source: | Code function: | 0_2_0043B060 | |
Source: | Code function: | 0_2_00426097 | |
Source: | Code function: | 0_2_00426097 | |
Source: | Code function: | 0_2_0040D160 | |
Source: | Code function: | 0_2_0041210C | |
Source: | Code function: | 0_2_0041B1E0 | |
Source: | Code function: | 0_2_0043A182 | |
Source: | Code function: | 0_2_0043A190 | |
Source: | Code function: | 0_2_004222E7 | |
Source: | Code function: | 0_2_004222ED | |
Source: | Code function: | 0_2_00439389 | |
Source: | Code function: | 0_2_00422422 | |
Source: | Code function: | 0_2_004134B2 | |
Source: | Code function: | 0_2_0043A5D0 | |
Source: | Code function: | 0_2_004245D4 | |
Source: | Code function: | 0_2_00410565 | |
Source: | Code function: | 0_2_00424678 | |
Source: | Code function: | 0_2_004245A8 | |
Source: | Code function: | 0_2_0043B6A0 | |
Source: | Code function: | 0_2_004088F0 | |
Source: | Code function: | 0_2_0043B9D0 | |
Source: | Code function: | 0_2_0043B9D0 | |
Source: | Code function: | 0_2_004069B4 | |
Source: | Code function: | 0_2_00417A65 | |
Source: | Code function: | 0_2_00417A1A | |
Source: | Code function: | 0_2_0041DB22 | |
Source: | Code function: | 0_2_00407C70 | |
Source: | Code function: | 0_2_00407C70 | |
Source: | Code function: | 0_2_00437D40 | |
Source: | Code function: | 0_2_0043AD70 | |
Source: | Code function: | 0_2_00410D77 | |
Source: | Code function: | 0_2_00410D77 | |
Source: | Code function: | 0_2_00402D10 | |
Source: | Code function: | 0_2_00412E93 | |
Source: | Code function: | 0_2_00438F6A | |
Source: | Code function: | 0_2_00431F80 | |
Source: | Code function: | 0_2_01BE21E7 | |
Source: | Code function: | 0_2_01BE91D1 | |
Source: | Code function: | 0_2_01BC30FA | |
Source: | Code function: | 0_2_01BEB0E7 | |
Source: | Code function: | 0_2_01BEA3F7 | |
Source: | Code function: | 0_2_01BEA3E9 | |
Source: | Code function: | 0_2_01BBD3C7 | |
Source: | Code function: | 0_2_01BC2373 | |
Source: | Code function: | 0_2_01BD62FE | |
Source: | Code function: | 0_2_01BD62FE | |
Source: | Code function: | 0_2_01BEB2C7 | |
Source: | Code function: | 0_2_01BC5227 | |
Source: | Code function: | 0_2_01BCB247 | |
Source: | Code function: | 0_2_01BCB247 | |
Source: | Code function: | 0_2_01BE95F0 | |
Source: | Code function: | 0_2_01BD2554 | |
Source: | Code function: | 0_2_01BD254E | |
Source: | Code function: | 0_2_01BCB447 | |
Source: | Code function: | 0_2_01BC07CC | |
Source: | Code function: | 0_2_01BC3719 | |
Source: | Code function: | 0_2_01BD2689 | |
Source: | Code function: | 0_2_01BEB617 | |
Source: | Code function: | 0_2_01BC591D | |
Source: | Code function: | 0_2_01BC591D | |
Source: | Code function: | 0_2_01BCB917 | |
Source: | Code function: | 0_2_01BEB907 | |
Source: | Code function: | 0_2_01BD480F | |
Source: | Code function: | 0_2_01BD48DF | |
Source: | Code function: | 0_2_01BD483B | |
Source: | Code function: | 0_2_01BEA837 | |
Source: | Code function: | 0_2_01BE7BFF | |
Source: | Code function: | 0_2_01BE7BFF | |
Source: | Code function: | 0_2_01BB8B57 | |
Source: | Code function: | 0_2_01BE8AE0 | |
Source: | Code function: | 0_2_01BCDA12 | |
Source: | Code function: | 0_2_01BE5DF2 | |
Source: | Code function: | 0_2_01BC7C81 | |
Source: | Code function: | 0_2_01BC7CCC | |
Source: | Code function: | 0_2_01BEBC37 | |
Source: | Code function: | 0_2_01BEBC37 | |
Source: | Code function: | 0_2_01BE7FA7 | |
Source: | Code function: | 0_2_01BC0FDE | |
Source: | Code function: | 0_2_01BC0FDE | |
Source: | Code function: | 0_2_01BEAFD7 | |
Source: | Code function: | 0_2_01BB2F77 | |
Source: | Code function: | 0_2_01BB7ED7 | |
Source: | Code function: | 0_2_01BB7ED7 | |
Source: | Code function: | 0_2_01BCCEC7 | |
Source: | Code function: | 0_2_01BCCEC7 |
Networking |
---|
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_0042D8F0 |
Source: | Code function: | 0_2_0042D8F0 |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_00421370 | |
Source: | Code function: | 0_2_004046D0 | |
Source: | Code function: | 0_2_00420C42 | |
Source: | Code function: | 0_2_00406030 | |
Source: | Code function: | 0_2_00421090 | |
Source: | Code function: | 0_2_00426097 | |
Source: | Code function: | 0_2_00410140 | |
Source: | Code function: | 0_2_00426148 | |
Source: | Code function: | 0_2_004261C3 | |
Source: | Code function: | 0_2_004261D5 | |
Source: | Code function: | 0_2_00403492 | |
Source: | Code function: | 0_2_00405567 | |
Source: | Code function: | 0_2_004365C0 | |
Source: | Code function: | 0_2_004065F0 | |
Source: | Code function: | 0_2_00403670 | |
Source: | Code function: | 0_2_0043B6A0 | |
Source: | Code function: | 0_2_0040581F | |
Source: | Code function: | 0_2_00433950 | |
Source: | Code function: | 0_2_0043B9D0 | |
Source: | Code function: | 0_2_004069B4 | |
Source: | Code function: | 0_2_00405B18 | |
Source: | Code function: | 0_2_0041DB22 | |
Source: | Code function: | 0_2_00407C70 | |
Source: | Code function: | 0_2_00403CEF | |
Source: | Code function: | 0_2_00402EC0 | |
Source: | Code function: | 0_2_01BB3127 | |
Source: | Code function: | 0_2_01BD63AF | |
Source: | Code function: | 0_2_01BC03A7 | |
Source: | Code function: | 0_2_01BB6297 | |
Source: | Code function: | 0_2_01BD62FE | |
Source: | Code function: | 0_2_01BB55DB | |
Source: | Code function: | 0_2_01BD15D7 | |
Source: | Code function: | 0_2_01BB3517 | |
Source: | Code function: | 0_2_01BD643C | |
Source: | Code function: | 0_2_01BD642A | |
Source: | Code function: | 0_2_01BB4937 | |
Source: | Code function: | 0_2_01BEB907 | |
Source: | Code function: | 0_2_01BE6827 | |
Source: | Code function: | 0_2_01BE3BB7 | |
Source: | Code function: | 0_2_01BEBC37 | |
Source: | Code function: | 0_2_01BB3F47 | |
Source: | Code function: | 0_2_01BB7ED7 |
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Source: | Code function: | 0_2_01C1F5E6 |
Source: | Code function: | 0_2_004286B8 |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | File read: | Jump to behavior |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | Unpacked PE file: |
Source: | Unpacked PE file: |
Source: | Code function: | 0_2_01C25114 | |
Source: | Code function: | 0_2_01C2510D |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_00435C40 |
Source: | Code function: | 0_2_01BB092B | |
Source: | Code function: | 0_2_01BB0D90 | |
Source: | Code function: | 0_2_01C1EEC3 |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Windows Management Instrumentation | 1 DLL Side-Loading | 1 Process Injection | 11 Virtualization/Sandbox Evasion | 1 OS Credential Dumping | 121 Security Software Discovery | Remote Services | 1 Archive Collected Data | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Process Injection | LSASS Memory | 11 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 31 Data from Local System | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 11 Deobfuscate/Decode Files or Information | Security Account Manager | 2 Process Discovery | SMB/Windows Admin Shares | 2 Clipboard Data | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 3 Obfuscated Files or Information | NTDS | 1 File and Directory Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 2 Software Packing | LSA Secrets | 12 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
39% | ReversingLabs | Win32.Packed.Generic | ||
43% | Virustotal | Browse | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
1% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
11% | Virustotal | Browse | ||
1% | Virustotal | Browse | ||
1% | Virustotal | Browse | ||
14% | Virustotal | Browse | ||
1% | Virustotal | Browse | ||
1% | Virustotal | Browse | ||
1% | Virustotal | Browse | ||
1% | Virustotal | Browse | ||
1% | Virustotal | Browse | ||
1% | Virustotal | Browse | ||
1% | Virustotal | Browse |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
strollheavengwu.shop | 104.21.15.198 | true | true |
| unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
false |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | unknown | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | unknown | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | unknown | |||
false | high | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | unknown | |||
false | high | |||
false | unknown | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | unknown | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.15.198 | strollheavengwu.shop | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1429207 |
Start date and time: | 2024-04-21 10:46:05 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 33s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 10 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 2FjvjcayaH.exerenamed because original name is a hash value |
Original Sample Name: | 673225d992723665f19c4cf40e14b5f7.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@3/9@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 20.42.65.92
- Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
- HTTPS proxy raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
Time | Type | Description |
---|---|---|
10:46:58 | API Interceptor | |
10:47:22 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.15.198 | Get hash | malicious | LummaC | Browse | ||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
strollheavengwu.shop | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Python Stealer, CStealer | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Clipboard Hijacker, RisePro Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | RisePro Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | RisePro Stealer | Browse |
| ||
Get hash | malicious | Remcos, DBatLoader | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_2FjvjcayaH.exe_363a9054c440a65f09d92467b29511a9aaf17_22fc85c3_f909bf4d-7151-41f6-a060-721012387cc8\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.9933807586401565 |
Encrypted: | false |
SSDEEP: | 96:f08UXC4MRsFHqSXtq/wSZQXIDcQqc6/cEFcw34+HbHg/PB6Heao8Fa99Oy4HVs2k:fl+cRlTM0U7v1jtdFPzuiFQZ24IO8q |
MD5: | 73E1840E3D65B304C82345A2306B2A80 |
SHA1: | D754199541767D2D860414E7D4C4FCEACB35F7C0 |
SHA-256: | 1B621770FC8A2B702CEF41D79412120DD63E942F98674DEBD56E1350713E6CB3 |
SHA-512: | A29D7702999DEB18338ABC277B108D582CBA7526579868A4B55D7FA675B44B988DB22D7C41B498EA670731D70AD54F64053CA4363798D77747FD6F31F0E89790 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_2FjvjcayaH.exe_629f4833c94957fd7494c037d86647ccd7cf21e6_22fc85c3_aa0fd20e-f8d8-45c3-bd22-9875b6de912b\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 1.0027004816421847 |
Encrypted: | false |
SSDEEP: | 192:f0DiotcFlA904DmIwshjtdFPzuiFwZ24IO8q:StcFlA+4Dm9shj9zuiFwY4IO8q |
MD5: | ABAEAAB3D8EB659D77C2C4DC44D16223 |
SHA1: | 740CFD9DB0456FCEC3314EA03C3B1882C50ED51B |
SHA-256: | 0ADCE32D61F7642D2243598B858A3038B10E2C518AF981081EAAA3E217E4B779 |
SHA-512: | 0A1C873506FFEA678100FCEC90B648446DBC3144C5F83BEF336EBF0EAF05B1C21E1AD59D9CCF240CF919C092BCD05583D648C94133E317417595ACA3A0430D84 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 54810 |
Entropy (8bit): | 2.6910006497091308 |
Encrypted: | false |
SSDEEP: | 384:1yIEHUtjB0PqazTHSurLYo3Z0IEJ8jeZg8nvNJ:1A0tjB9azjtYo3Z0yjeG+ |
MD5: | 33AD9EAFCEF4C044BA8D02104C9B3E0B |
SHA1: | 47010BC1C1A2D3E9815ED20D90237C2010F8321E |
SHA-256: | 4EF9B4C738024AC0EFB430424E4A7904BAD2967D52FCE97A66E543C1A512005E |
SHA-512: | A2FE26E2BDBF6CE8DDEDF7AAA091705370C8B09984C3D771954634011FE2FDEA3AEA1747EF3D7C106F5A840B9B41932816C1ADFD1FACA3CB884A1C412E0C8388 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8410 |
Entropy (8bit): | 3.6949769059223723 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJUjl6IS6Y9gSUky7gmfsspNl89bcJ1fYUm:R6lXJul6IS6YKSUky7gmfs1crfK |
MD5: | 1FA19A3ED2ACECBE8E6FC37B4943188F |
SHA1: | D8A419ECB5FC4386854DAA11C80032C6CBE7B5DC |
SHA-256: | E6CD5F738F559D88E6AC18298507E5DFFA841A689C69D0DD64DA63B3B6A43BD7 |
SHA-512: | 219FDFCB445CE56DD6FB2900C662391B324FE9C2C9885EBC0E69788DD2228F616BFE39B5FF1353801314F16D206F7682CFDA9EDA0C59E5B8B12EEDF9BD09152A |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4684 |
Entropy (8bit): | 4.445001447074971 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsoJg77aI9cCOWpW8VY7Ym8M4JGNzlFcC5+q8v1Nze3cdAund:uIjfuI7Xv7VnJGVZK1Ve3cdAund |
MD5: | B3C40FB23AF78C56F5ED1F0C3816D105 |
SHA1: | B8C4464A5C8CA8BC950D6922EA0AF3C9C165E59D |
SHA-256: | 5B7750ADD7DAF43ED068E1F44136A7830DAE5D6C9BB35FC3C3911F633FAE280A |
SHA-512: | 23CB3A9F3B27AC1387BABB7B7DD36EAF9B6F5DF585DE1DEC128813322DF6AAE98DEE5E770A894A6B546DCF7B2BFE7F05B0070172206C0FCE0424B863A01A1CCE |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1086182 |
Entropy (8bit): | 1.0345242294912402 |
Encrypted: | false |
SSDEEP: | 1536:+fw0SKJmz2r6OV7oJMWRFHDPVMRX1i9HYQ:+fwoURM75WRlVMU |
MD5: | 4A381A141B9FE183B49B5D08444DB2E5 |
SHA1: | DF0366CFDE83F2F6E19D827FC46425D9A1986E47 |
SHA-256: | 5C73E937719FDC216A2C3C1F135B6FE9BDCD76320017812E13EE70FF93EBACED |
SHA-512: | ED67C4B419394FD1A55CC9DC34788CC7E1A0E1BE95E41F171FC79F47260B54FFCCCE82AE931942ED00A92725AA8D80054B9C03E46F97E42D35D674BCFC6E02EE |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8442 |
Entropy (8bit): | 3.697702087584247 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJUw6IB6Y9nSUUyJhGgmfPE6cI/pDa89byBsf0MGm:R6lXJr6IB6Y9SUUyegmfPE6cMy6fN |
MD5: | 5229331828C7B40D8C53F55E8B6E9D7D |
SHA1: | E309B8F31C45F4E503F2F5658709D4BF9D8A8375 |
SHA-256: | 0753CF022CF1BFCE6A1A082A62F0D3EB9C539DBA34C7C8091D24B3334CFD8CE2 |
SHA-512: | DAA84546FB5CD7DFDB264AF8ACF71D243AF3D34102EB2EABF016F288AB27F3881C13CDD5826E02FCA2AF82BD34C540FFE28EBFE3F6C33A2DEA8E25C1E499470F |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4726 |
Entropy (8bit): | 4.473946497483791 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsoJg77aI9cCOWpW8VYNOYm8M4JGNOFO3FX7+q8v1NOFOU3cdAuWd:uIjfuI7Xv7VAJGK+7K1Kb3cdAuWd |
MD5: | 20C859C210DB9EDD6D7A6FEA9891F20A |
SHA1: | 345B3F43FA87669E6B6F8A3F8B5B8C79DA7B5193 |
SHA-256: | D4684415A5318EB882D0B700D9E81E794B062B677681250C331363A9193CA442 |
SHA-512: | 9B2018DB8B524BFB8529A3AF6CCF29BE0F34E7DDC8BDDC2F5D016B8121B27DC6FBAB94FF7A14337B3E35AC8C16BEC40E6D93B767C3376C401F45B5A259017A48 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.4654056957998876 |
Encrypted: | false |
SSDEEP: | 6144:OIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNOdwBCswSbO:DXD94+WlLZMM6YFHE+O |
MD5: | 6425F4FF8B1AC561AF75EB7041B87A3B |
SHA1: | 568931499B9B6BF87FDC358E13A33DBE3794EC5F |
SHA-256: | 74D39ED43E66C5971AEE3261FB17C12A2D050B6FAAC9F4580B82035CD9A6D050 |
SHA-512: | 005EDDA58D47184729E2C002E0D66D2A08E59570A5B8EDE6E2DB7781A386B63287CC74B5F6F0C449F3D0462170F6DE3F07495C5C15ADFDA104C1191E20FD069D |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 6.925631425727434 |
TrID: |
|
File name: | 2FjvjcayaH.exe |
File size: | 389'632 bytes |
MD5: | 673225d992723665f19c4cf40e14b5f7 |
SHA1: | 22312b0dc54b70c3d76e66d94b9b01f71266ffb4 |
SHA256: | f1c35a47842119856e0067aa4b390cdce620b3d69262266a9923278fbac15ff8 |
SHA512: | 1c516e7e2e32e7362127831aba6315a61b392d7e59e2740789fc8b31df4e25733ac5454f38a7282a94f4bb230c6289f028491f5ec128f18e3d1603e31d93c4b6 |
SSDEEP: | 6144:g6WEE0gcnLCISNHx1iBDSUB1O9FyMb8eE:LWR0goLCnBzi1So1Mb0 |
TLSH: | 9A84CE11BEE1D8E0F0E6C63148319E51C2ABFC266D31865B36C8764EFE702D14A6E767 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................................./.......]..............w+..............w......Rich............PE..L......e................... |
Icon Hash: | cd0d3d2e4e054d05 |
Entrypoint: | 0x403c12 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | TERMINAL_SERVER_AWARE |
Time Stamp: | 0x650FEFDA [Sun Sep 24 08:14:18 2023 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 1 |
File Version Major: | 5 |
File Version Minor: | 1 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 1 |
Import Hash: | 2497a562a80e46afc8082945c685e4fc |
Instruction |
---|
call 00007F459947E815h |
jmp 00007F4599477AE5h |
push 00000014h |
push 00415DB8h |
call 00007F459947B50Dh |
call 00007F459947D88Eh |
movzx esi, ax |
push 00000002h |
call 00007F459947E7A8h |
pop ecx |
mov eax, 00005A4Dh |
cmp word ptr [00400000h], ax |
je 00007F4599477AE6h |
xor ebx, ebx |
jmp 00007F4599477B15h |
mov eax, dword ptr [0040003Ch] |
cmp dword ptr [eax+00400000h], 00004550h |
jne 00007F4599477ACDh |
mov ecx, 0000010Bh |
cmp word ptr [eax+00400018h], cx |
jne 00007F4599477ABFh |
xor ebx, ebx |
cmp dword ptr [eax+00400074h], 0Eh |
jbe 00007F4599477AEBh |
cmp dword ptr [eax+004000E8h], ebx |
setne bl |
mov dword ptr [ebp-1Ch], ebx |
call 00007F459947B384h |
test eax, eax |
jne 00007F4599477AEAh |
push 0000001Ch |
call 00007F4599477BC1h |
pop ecx |
call 00007F459947B0C0h |
test eax, eax |
jne 00007F4599477AEAh |
push 00000010h |
call 00007F4599477BB0h |
pop ecx |
call 00007F459947D5D7h |
and dword ptr [ebp-04h], 00000000h |
call 00007F459947CED3h |
test eax, eax |
jns 00007F4599477AEAh |
push 0000001Bh |
call 00007F4599477B96h |
pop ecx |
call dword ptr [004100D4h] |
mov dword ptr [01A12CC8h], eax |
call 00007F459947E7FCh |
mov dword ptr [0044AC80h], eax |
call 00007F459947E3F9h |
test eax, eax |
jns 00007F4599477AEAh |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x161ec | 0x64 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x1613000 | 0x15898 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x10200 | 0x38 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x15750 | 0x40 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x10000 | 0x198 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0xe853 | 0xea00 | 2f6d7763e7e8a069786126f4b44587de | False | 0.6032151442307693 | data | 6.6820897019994785 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x10000 | 0x6b54 | 0x6c00 | d3e88c58797bb52829bea0fa43a59d2b | False | 0.3938802083333333 | data | 4.764016162972145 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x17000 | 0x15fbce0 | 0x33e00 | 3d026e9d98c89fed4f91e2375da2906e | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x1613000 | 0x15898 | 0x15a00 | 890f771f9dd082c5ae23eeb15b9edbff | False | 0.4096482117052023 | data | 5.1792638864470755 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x1613720 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors | Romanian | Romania | 0.48507462686567165 |
RT_ICON | 0x16145c8 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors | Romanian | Romania | 0.5992779783393501 |
RT_ICON | 0x1614e70 | 0x6c8 | Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colors | Romanian | Romania | 0.646889400921659 |
RT_ICON | 0x1615538 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors | Romanian | Romania | 0.6473988439306358 |
RT_ICON | 0x1615aa0 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9216 | Romanian | Romania | 0.3896265560165975 |
RT_ICON | 0x1618048 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4096 | Romanian | Romania | 0.5082082551594747 |
RT_ICON | 0x16190f0 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2304 | Romanian | Romania | 0.5819672131147541 |
RT_ICON | 0x1619a78 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1024 | Romanian | Romania | 0.675531914893617 |
RT_ICON | 0x1619f58 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 0 | Romanian | Romania | 0.40671641791044777 |
RT_ICON | 0x161ae00 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 0 | Romanian | Romania | 0.4368231046931408 |
RT_ICON | 0x161b6a8 | 0x6c8 | Device independent bitmap graphic, 24 x 48 x 8, image size 0 | Romanian | Romania | 0.5374423963133641 |
RT_ICON | 0x161bd70 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 0 | Romanian | Romania | 0.41040462427745666 |
RT_ICON | 0x161c2d8 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 0 | Romanian | Romania | 0.45363070539419087 |
RT_ICON | 0x161e880 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 0 | Romanian | Romania | 0.47115384615384615 |
RT_ICON | 0x161f928 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 0 | Romanian | Romania | 0.4905737704918033 |
RT_ICON | 0x16202b0 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 0 | Romanian | Romania | 0.5452127659574468 |
RT_ICON | 0x1620790 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors | Romanian | Romania | 0.3288912579957356 |
RT_ICON | 0x1621638 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors | Romanian | Romania | 0.46886281588447654 |
RT_ICON | 0x1621ee0 | 0x6c8 | Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colors | Romanian | Romania | 0.4326036866359447 |
RT_ICON | 0x16225a8 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors | Romanian | Romania | 0.2658959537572254 |
RT_ICON | 0x1622b10 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9600 | Romanian | Romania | 0.15280082987551868 |
RT_ICON | 0x16250b8 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4224 | Romanian | Romania | 0.2861163227016886 |
RT_ICON | 0x1626160 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | Romanian | Romania | 0.33237704918032784 |
RT_ICON | 0x1626ae8 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | Romanian | Romania | 0.37056737588652483 |
RT_DIALOG | 0x16271b8 | 0x52 | data | 0.8780487804878049 | ||
RT_STRING | 0x1627210 | 0x432 | data | Romanian | Romania | 0.45251396648044695 |
RT_STRING | 0x1627648 | 0x4d4 | data | Romanian | Romania | 0.44660194174757284 |
RT_STRING | 0x1627b20 | 0x13a | data | Romanian | Romania | 0.5286624203821656 |
RT_STRING | 0x1627c60 | 0x30a | data | Romanian | Romania | 0.47429305912596403 |
RT_STRING | 0x1627f70 | 0x638 | data | Romanian | Romania | 0.43027638190954776 |
RT_STRING | 0x16285a8 | 0x2ec | data | Romanian | Romania | 0.47058823529411764 |
RT_GROUP_ICON | 0x1619ee0 | 0x76 | data | Romanian | Romania | 0.6610169491525424 |
RT_GROUP_ICON | 0x1620718 | 0x76 | data | Romanian | Romania | 0.6694915254237288 |
RT_GROUP_ICON | 0x1626f50 | 0x76 | data | Romanian | Romania | 0.6694915254237288 |
RT_VERSION | 0x1626fc8 | 0x1ec | data | 0.5386178861788617 |
DLL | Import |
---|---|
KERNEL32.dll | LocalCompact, GetUserDefaultLCID, AddConsoleAliasW, CreateHardLinkA, GetTickCount, EnumTimeFormatsW, FindResourceExA, GetVolumeInformationA, WriteConsoleW, GetCompressedFileSizeA, GetTempPathW, SetThreadLocale, GetLastError, SetLastError, GetProcAddress, CreateTimerQueueTimer, CopyFileA, GetLocaleInfoA, SetFileAttributesA, LoadLibraryA, WriteConsoleA, InterlockedExchangeAdd, LocalAlloc, SetCalendarInfoW, GetExitCodeThread, RemoveDirectoryW, AddAtomA, GlobalFindAtomW, GetModuleFileNameA, GetOEMCP, GlobalUnWire, LoadLibraryExA, ReadConsoleInputW, GetWindowsDirectoryW, GetCurrentProcessId, AddConsoleAliasA, GetComputerNameA, FindFirstChangeNotificationW, SetStdHandle, GetSystemDefaultLangID, OutputDebugStringW, FlushFileBuffers, HeapFree, EncodePointer, DecodePointer, ExitProcess, GetModuleHandleExW, MultiByteToWideChar, WideCharToMultiByte, GetCommandLineA, RaiseException, RtlUnwind, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetCPInfo, GetCurrentThreadId, IsDebuggerPresent, GetProcessHeap, HeapSize, EnterCriticalSection, LeaveCriticalSection, ReadFile, GetConsoleMode, ReadConsoleW, GetStdHandle, GetFileType, DeleteCriticalSection, GetStartupInfoW, CloseHandle, UnhandledExceptionFilter, SetUnhandledExceptionFilter, InitializeCriticalSectionAndSpinCount, Sleep, GetCurrentProcess, TerminateProcess, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetModuleHandleW, WriteFile, GetModuleFileNameW, LoadLibraryExW, HeapAlloc, QueryPerformanceCounter, GetSystemTimeAsFileTime, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetStringTypeW, HeapReAlloc, SetFilePointerEx, LCMapStringW, GetConsoleCP, CreateFileW |
GDI32.dll | GetCharacterPlacementW |
ADVAPI32.dll | DeregisterEventSource |
WINHTTP.dll | WinHttpConnect |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
Romanian | Romania |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 21, 2024 10:46:57.765297890 CEST | 49730 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:57.765378952 CEST | 443 | 49730 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:57.765712976 CEST | 49730 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:57.769748926 CEST | 49730 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:57.769855022 CEST | 443 | 49730 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:58.005903006 CEST | 443 | 49730 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:58.006045103 CEST | 49730 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:58.010756016 CEST | 49730 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:58.010807991 CEST | 443 | 49730 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:58.011322021 CEST | 443 | 49730 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:58.060194016 CEST | 49730 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:58.078843117 CEST | 49730 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:58.078843117 CEST | 49730 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:58.079308033 CEST | 443 | 49730 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:58.570815086 CEST | 443 | 49730 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:58.571110964 CEST | 443 | 49730 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:58.571296930 CEST | 49730 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:58.584162951 CEST | 49730 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:58.584223032 CEST | 443 | 49730 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:58.701806068 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:58.701894045 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:58.701976061 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:58.714658022 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:58.714690924 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:58.938561916 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:58.938802958 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:58.972528934 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:58.972559929 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:58.973653078 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:58.979810953 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:58.979849100 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:58.980282068 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:59.485768080 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:59.485882998 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:59.485980988 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:59.485996008 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:59.486063957 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:59.486145973 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:59.486162901 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:59.486185074 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:59.486251116 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:59.486265898 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:59.486366987 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:59.486427069 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:59.486439943 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:59.486537933 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:59.486598015 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:59.486610889 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:59.486690044 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:59.486752033 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:59.486766100 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:59.486917019 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:59.486982107 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:59.487699986 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:59.487730026 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:59.487754107 CEST | 49731 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:59.487767935 CEST | 443 | 49731 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:59.686296940 CEST | 49732 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:59.686321020 CEST | 443 | 49732 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:59.686413050 CEST | 49732 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:59.686825991 CEST | 49732 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:59.686832905 CEST | 443 | 49732 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:59.913007021 CEST | 443 | 49732 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:59.913085938 CEST | 49732 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:59.914841890 CEST | 49732 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:59.914845943 CEST | 443 | 49732 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:59.915880919 CEST | 443 | 49732 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:59.917395115 CEST | 49732 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:59.917552948 CEST | 49732 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:59.917591095 CEST | 443 | 49732 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:46:59.917674065 CEST | 49732 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:46:59.917681932 CEST | 443 | 49732 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:00.448019028 CEST | 443 | 49732 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:00.448311090 CEST | 443 | 49732 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:00.448369026 CEST | 49732 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:00.448395967 CEST | 49732 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:00.590272903 CEST | 49733 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:00.590377092 CEST | 443 | 49733 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:00.590481997 CEST | 49733 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:00.590874910 CEST | 49733 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:00.590900898 CEST | 443 | 49733 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:00.818396091 CEST | 443 | 49733 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:00.818500042 CEST | 49733 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:00.820065975 CEST | 49733 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:00.820089102 CEST | 443 | 49733 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:00.820523977 CEST | 443 | 49733 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:00.822009087 CEST | 49733 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:00.822128057 CEST | 49733 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:00.822206020 CEST | 443 | 49733 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:01.347004890 CEST | 443 | 49733 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:01.347289085 CEST | 443 | 49733 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:01.347373962 CEST | 49733 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:01.347455025 CEST | 49733 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:01.347506046 CEST | 443 | 49733 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:01.581135988 CEST | 49734 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:01.581176996 CEST | 443 | 49734 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:01.581305981 CEST | 49734 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:01.581733942 CEST | 49734 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:01.581744909 CEST | 443 | 49734 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:01.808657885 CEST | 443 | 49734 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:01.808731079 CEST | 49734 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:01.810297012 CEST | 49734 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:01.810306072 CEST | 443 | 49734 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:01.810797930 CEST | 443 | 49734 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:01.812228918 CEST | 49734 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:01.812364101 CEST | 49734 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:01.812402010 CEST | 443 | 49734 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:01.812479019 CEST | 49734 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:01.812488079 CEST | 443 | 49734 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:02.377453089 CEST | 443 | 49734 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:02.377718925 CEST | 49734 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:02.652024031 CEST | 49735 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:02.652122974 CEST | 443 | 49735 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:02.652240038 CEST | 49735 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:02.652625084 CEST | 49735 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:02.652664900 CEST | 443 | 49735 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:02.878257990 CEST | 443 | 49735 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:02.878520012 CEST | 49735 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:02.880433083 CEST | 49735 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:02.880460024 CEST | 443 | 49735 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:02.880976915 CEST | 443 | 49735 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:02.882550001 CEST | 49735 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:02.882680893 CEST | 49735 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:02.882739067 CEST | 443 | 49735 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:03.394783020 CEST | 443 | 49735 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:03.395122051 CEST | 443 | 49735 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:03.395241022 CEST | 49735 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:03.409638882 CEST | 49735 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:03.409681082 CEST | 443 | 49735 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:03.539652109 CEST | 49736 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:03.539742947 CEST | 443 | 49736 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:03.540039062 CEST | 49736 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:03.540502071 CEST | 49736 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:03.540580988 CEST | 443 | 49736 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:03.766402960 CEST | 443 | 49736 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:03.766544104 CEST | 49736 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:03.769629955 CEST | 49736 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:03.769680977 CEST | 443 | 49736 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:03.770199060 CEST | 443 | 49736 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:03.772219896 CEST | 49736 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:03.772299051 CEST | 49736 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:03.772429943 CEST | 443 | 49736 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:04.281485081 CEST | 443 | 49736 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:04.281799078 CEST | 443 | 49736 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:04.281925917 CEST | 49736 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:04.281925917 CEST | 49736 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:04.828780890 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:04.828840971 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:04.828938007 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:04.829268932 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:04.829283953 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:05.054821014 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:05.055054903 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:05.056816101 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:05.056824923 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:05.057311058 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:05.058527946 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:05.059653997 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:05.059703112 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:05.059839010 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:05.059880018 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:05.060003996 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:05.060044050 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:05.060194969 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:05.060220957 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:05.060381889 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:05.060409069 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:05.060586929 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:05.060616016 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:05.060625076 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:05.060805082 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:05.060837030 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:05.108119965 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:05.108285904 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:05.108321905 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:05.108338118 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:05.156119108 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:05.156594992 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:05.156656027 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:05.156711102 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:05.200133085 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:05.200303078 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:05.244193077 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:05.374841928 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:06.740811110 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:06.741064072 CEST | 443 | 49737 | 104.21.15.198 | 192.168.2.4 |
Apr 21, 2024 10:47:06.741210938 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Apr 21, 2024 10:47:06.741210938 CEST | 49737 | 443 | 192.168.2.4 | 104.21.15.198 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 21, 2024 10:46:57.651890039 CEST | 55307 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 21, 2024 10:46:57.758488894 CEST | 53 | 55307 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Apr 21, 2024 10:46:57.651890039 CEST | 192.168.2.4 | 1.1.1.1 | 0x7383 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Apr 21, 2024 10:46:57.758488894 CEST | 1.1.1.1 | 192.168.2.4 | 0x7383 | No error (0) | 104.21.15.198 | A (IP address) | IN (0x0001) | false | ||
Apr 21, 2024 10:46:57.758488894 CEST | 1.1.1.1 | 192.168.2.4 | 0x7383 | No error (0) | 172.67.163.209 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49730 | 104.21.15.198 | 443 | 7516 | C:\Users\user\Desktop\2FjvjcayaH.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-04-21 08:46:58 UTC | 267 | OUT | |
2024-04-21 08:46:58 UTC | 8 | OUT | |
2024-04-21 08:46:58 UTC | 814 | IN | |
2024-04-21 08:46:58 UTC | 7 | IN | |
2024-04-21 08:46:58 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49731 | 104.21.15.198 | 443 | 7516 | C:\Users\user\Desktop\2FjvjcayaH.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-04-21 08:46:58 UTC | 268 | OUT | |
2024-04-21 08:46:58 UTC | 52 | OUT | |
2024-04-21 08:46:59 UTC | 818 | IN | |
2024-04-21 08:46:59 UTC | 551 | IN | |
2024-04-21 08:46:59 UTC | 1369 | IN | |
2024-04-21 08:46:59 UTC | 1369 | IN | |
2024-04-21 08:46:59 UTC | 1369 | IN | |
2024-04-21 08:46:59 UTC | 1369 | IN | |
2024-04-21 08:46:59 UTC | 1369 | IN | |
2024-04-21 08:46:59 UTC | 1369 | IN | |
2024-04-21 08:46:59 UTC | 1369 | IN | |
2024-04-21 08:46:59 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49732 | 104.21.15.198 | 443 | 7516 | C:\Users\user\Desktop\2FjvjcayaH.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-04-21 08:46:59 UTC | 286 | OUT | |
2024-04-21 08:46:59 UTC | 15331 | OUT | |
2024-04-21 08:46:59 UTC | 2830 | OUT | |
2024-04-21 08:47:00 UTC | 806 | IN | |
2024-04-21 08:47:00 UTC | 20 | IN | |
2024-04-21 08:47:00 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49733 | 104.21.15.198 | 443 | 7516 | C:\Users\user\Desktop\2FjvjcayaH.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-04-21 08:47:00 UTC | 285 | OUT | |
2024-04-21 08:47:00 UTC | 8782 | OUT | |
2024-04-21 08:47:01 UTC | 812 | IN | |
2024-04-21 08:47:01 UTC | 20 | IN | |
2024-04-21 08:47:01 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49734 | 104.21.15.198 | 443 | 7516 | C:\Users\user\Desktop\2FjvjcayaH.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-04-21 08:47:01 UTC | 286 | OUT | |
2024-04-21 08:47:01 UTC | 15331 | OUT | |
2024-04-21 08:47:01 UTC | 5104 | OUT | |
2024-04-21 08:47:02 UTC | 806 | IN | |
2024-04-21 08:47:02 UTC | 20 | IN | |
2024-04-21 08:47:02 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49735 | 104.21.15.198 | 443 | 7516 | C:\Users\user\Desktop\2FjvjcayaH.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-04-21 08:47:02 UTC | 285 | OUT | |
2024-04-21 08:47:02 UTC | 5439 | OUT | |
2024-04-21 08:47:03 UTC | 816 | IN | |
2024-04-21 08:47:03 UTC | 20 | IN | |
2024-04-21 08:47:03 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49736 | 104.21.15.198 | 443 | 7516 | C:\Users\user\Desktop\2FjvjcayaH.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-04-21 08:47:03 UTC | 285 | OUT | |
2024-04-21 08:47:03 UTC | 1396 | OUT | |
2024-04-21 08:47:04 UTC | 808 | IN | |
2024-04-21 08:47:04 UTC | 20 | IN | |
2024-04-21 08:47:04 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49737 | 104.21.15.198 | 443 | 7516 | C:\Users\user\Desktop\2FjvjcayaH.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-04-21 08:47:05 UTC | 287 | OUT | |
2024-04-21 08:47:05 UTC | 15331 | OUT | |
2024-04-21 08:47:05 UTC | 15331 | OUT | |
2024-04-21 08:47:05 UTC | 15331 | OUT | |
2024-04-21 08:47:05 UTC | 15331 | OUT | |
2024-04-21 08:47:05 UTC | 15331 | OUT | |
2024-04-21 08:47:05 UTC | 15331 | OUT | |
2024-04-21 08:47:05 UTC | 15331 | OUT | |
2024-04-21 08:47:05 UTC | 15331 | OUT | |
2024-04-21 08:47:05 UTC | 15331 | OUT | |
2024-04-21 08:47:05 UTC | 15331 | OUT | |
2024-04-21 08:47:06 UTC | 818 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 10:46:56 |
Start date: | 21/04/2024 |
Path: | C:\Users\user\Desktop\2FjvjcayaH.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 389'632 bytes |
MD5 hash: | 673225D992723665F19C4CF40E14B5F7 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 3 |
Start time: | 10:47:06 |
Start date: | 21/04/2024 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x900000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 10:47:07 |
Start date: | 21/04/2024 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x900000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 9% |
Dynamic/Decrypted Code Coverage: | 9.7% |
Signature Coverage: | 29.1% |
Total number of Nodes: | 361 |
Total number of Limit Nodes: | 19 |
Graph
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004046D0 Relevance: 5.5, Strings: 4, Instructions: 506COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0041CC60 Relevance: 4.1, Strings: 3, Instructions: 328COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0041DB22 Relevance: 3.6, APIs: 2, Instructions: 615COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01C1F5E6 Relevance: 3.0, APIs: 2, Instructions: 41processCOMMON
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0041AFE0 Relevance: 2.6, Strings: 2, Instructions: 130COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004162D6 Relevance: 1.7, APIs: 1, Instructions: 218COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00435B8B Relevance: 1.5, APIs: 1, Instructions: 42memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00435C40 Relevance: 1.5, APIs: 1, Instructions: 16libraryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00420C42 Relevance: .4, Instructions: 431COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00421370 Relevance: .4, Instructions: 381COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00421090 Relevance: .4, Instructions: 373COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0043B3B0 Relevance: .3, Instructions: 255COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0043AE80 Relevance: .2, Instructions: 160COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00414FC0 Relevance: .1, Instructions: 146COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00438879 Relevance: .1, Instructions: 138COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00437998 Relevance: .1, Instructions: 138COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0041210C Relevance: .1, Instructions: 112COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00410565 Relevance: .0, Instructions: 25COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004286B8 Relevance: .0, Instructions: 19COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BB003C Relevance: 12.8, APIs: 5, Strings: 2, Instructions: 515memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00427C0B Relevance: 12.3, APIs: 1, Strings: 6, Instructions: 72memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00437E48 Relevance: 3.6, APIs: 1, Strings: 1, Instructions: 90libraryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004241EB Relevance: 3.6, APIs: 2, Instructions: 582COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00435AA0 Relevance: 3.6, APIs: 1, Strings: 1, Instructions: 53memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00439580 Relevance: 3.5, APIs: 1, Strings: 1, Instructions: 45memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0041DE00 Relevance: 3.2, APIs: 2, Instructions: 215COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0042DFB8 Relevance: 3.1, APIs: 2, Instructions: 123COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BB0E0F Relevance: 3.0, APIs: 2, Instructions: 15COMMON
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004394EC Relevance: 1.5, APIs: 1, Instructions: 38memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0041860C Relevance: 1.5, APIs: 1, Instructions: 33COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01C1F2A5 Relevance: 1.3, APIs: 1, Instructions: 48memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0042D8F0 Relevance: 21.2, APIs: 6, Strings: 6, Instructions: 155clipboardCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00426097 Relevance: 7.1, Strings: 5, Instructions: 837COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BD62FE Relevance: 7.1, Strings: 5, Instructions: 837COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BB4937 Relevance: 5.5, Strings: 4, Instructions: 506COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BCCEC7 Relevance: 4.1, Strings: 3, Instructions: 328COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BB092B Relevance: 3.8, Strings: 3, Instructions: 90COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BB55DB Relevance: 3.3, Strings: 2, Instructions: 800COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00405567 Relevance: 3.0, Strings: 2, Instructions: 510COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0043B9D0 Relevance: 2.9, Strings: 2, Instructions: 360COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BEBC37 Relevance: 2.9, Strings: 2, Instructions: 360COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040581F Relevance: 2.8, Strings: 2, Instructions: 267COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00405B18 Relevance: 2.7, Strings: 2, Instructions: 231COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BCB247 Relevance: 2.6, Strings: 2, Instructions: 130COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004365C0 Relevance: 2.0, Strings: 1, Instructions: 700COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BE6827 Relevance: 2.0, Strings: 1, Instructions: 700COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004261D5 Relevance: 1.7, Strings: 1, Instructions: 432COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BD643C Relevance: 1.7, Strings: 1, Instructions: 432COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00426148 Relevance: 1.7, Strings: 1, Instructions: 429COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BD63AF Relevance: 1.7, Strings: 1, Instructions: 429COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004261C3 Relevance: 1.6, Strings: 1, Instructions: 388COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BD642A Relevance: 1.6, Strings: 1, Instructions: 388COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00417A65 Relevance: 1.6, Strings: 1, Instructions: 357COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BC7CCC Relevance: 1.6, Strings: 1, Instructions: 357COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004065F0 Relevance: 1.5, Strings: 1, Instructions: 262COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004245D4 Relevance: 1.4, Strings: 1, Instructions: 188COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BD483B Relevance: 1.4, Strings: 1, Instructions: 188COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00424678 Relevance: 1.4, Strings: 1, Instructions: 169COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BD48DF Relevance: 1.4, Strings: 1, Instructions: 169COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004245A8 Relevance: 1.4, Strings: 1, Instructions: 126COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BD480F Relevance: 1.4, Strings: 1, Instructions: 126COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004134B2 Relevance: 1.3, Strings: 1, Instructions: 70COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BC3719 Relevance: 1.3, Strings: 1, Instructions: 70COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00437D40 Relevance: 1.3, Strings: 1, Instructions: 44COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BE7FA7 Relevance: 1.3, Strings: 1, Instructions: 44COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00407C70 Relevance: .9, Instructions: 864COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BB7ED7 Relevance: .9, Instructions: 864COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BB3517 Relevance: .7, Instructions: 698COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BB3F47 Relevance: .6, Instructions: 632COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00406030 Relevance: .5, Instructions: 497COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BB6297 Relevance: .5, Instructions: 497COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BD15D7 Relevance: .4, Instructions: 381COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004069B4 Relevance: .4, Instructions: 379COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004088F0 Relevance: .4, Instructions: 373COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BB8B57 Relevance: .4, Instructions: 373COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00403670 Relevance: .3, Instructions: 336COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00403CEF Relevance: .3, Instructions: 325COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0041B1E0 Relevance: .3, Instructions: 310COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BCB447 Relevance: .3, Instructions: 310COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BCB917 Relevance: .3, Instructions: 291COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0043B6A0 Relevance: .3, Instructions: 290COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BEB907 Relevance: .3, Instructions: 290COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BEB617 Relevance: .3, Instructions: 255COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00410D77 Relevance: .2, Instructions: 240COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BC0FDE Relevance: .2, Instructions: 240COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00403492 Relevance: .2, Instructions: 229COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00433950 Relevance: .2, Instructions: 192COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BE3BB7 Relevance: .2, Instructions: 192COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0043B060 Relevance: .2, Instructions: 166COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BEB2C7 Relevance: .2, Instructions: 166COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BEB0E7 Relevance: .2, Instructions: 160COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00402D10 Relevance: .2, Instructions: 152COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BB2F77 Relevance: .2, Instructions: 152COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BC5227 Relevance: .1, Instructions: 146COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BE7BFF Relevance: .1, Instructions: 138COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BE8AE0 Relevance: .1, Instructions: 138COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00412E93 Relevance: .1, Instructions: 136COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BC30FA Relevance: .1, Instructions: 136COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00410140 Relevance: .1, Instructions: 132COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BC03A7 Relevance: .1, Instructions: 132COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BC2373 Relevance: .1, Instructions: 112COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00402EC0 Relevance: .1, Instructions: 100COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BB3127 Relevance: .1, Instructions: 100COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0043AD70 Relevance: .1, Instructions: 92COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BEAFD7 Relevance: .1, Instructions: 92COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00438F6A Relevance: .1, Instructions: 81COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BE91D1 Relevance: .1, Instructions: 81COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BCDA12 Relevance: .1, Instructions: 69COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00431F80 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BE21E7 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01C1EEC3 Relevance: .1, Instructions: 61COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004222ED Relevance: .1, Instructions: 52COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BD2554 Relevance: .1, Instructions: 52COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0043A5D0 Relevance: .0, Instructions: 47COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BEA837 Relevance: .0, Instructions: 47COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BB0D90 Relevance: .0, Instructions: 43COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BE5DF2 Relevance: .0, Instructions: 42COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004222E7 Relevance: .0, Instructions: 32COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BD254E Relevance: .0, Instructions: 32COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BC07CC Relevance: .0, Instructions: 25COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00439389 Relevance: .0, Instructions: 24COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BE95F0 Relevance: .0, Instructions: 24COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040D160 Relevance: .0, Instructions: 21COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BBD3C7 Relevance: .0, Instructions: 21COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00417A1A Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BC7C81 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0043A182 Relevance: .0, Instructions: 14COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BEA3E9 Relevance: .0, Instructions: 14COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00422422 Relevance: .0, Instructions: 12COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BD2689 Relevance: .0, Instructions: 12COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0043A190 Relevance: .0, Instructions: 11COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BEA3F7 Relevance: .0, Instructions: 11COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01BDDB57 Relevance: 21.2, APIs: 6, Strings: 6, Instructions: 155clipboardCOMMON
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |