Windows
Analysis Report
Magic_V_pro_setup_stable_latest_release_version_9_709.exe
Overview
General Information
Detection
LummaC Stealer
Score: | 64 |
Range: | 0 - 100 |
Confidence: | 100% |
Compliance
Score: | 33 |
Range: | 0 - 100 |
Signatures
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
C2 URLs / IPs found in malware configuration
Drops password protected ZIP file
Sample uses string decryption to hide its real strings
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses attrib.exe to hide files
Uses schtasks.exe or at.exe to add and modify task schedules
Connects to a URL shortener service
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
EXE planting / hijacking vulnerabilities found
Enables security privileges
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w10x64
Magic_V_pro_setup_stable_latest_release_version_9_709.exe (PID: 2500 cmdline:
"C:\Users\ user\Deskt op\Magic_V _pro_setup _stable_la test_relea se_version _9_709.exe " MD5: 4F4E6DD4D4B9D96E69B7F8F97E867023) Magic_V_pro_setup_stable_latest_release_version_9_709.tmp (PID: 1408 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-3LF 26.tmp\Mag ic_V_pro_s etup_stabl e_latest_r elease_ver sion_9_709 .tmp" /SL5 ="$1042C,1 192681,727 040,C:\Use rs\user\De sktop\Magi c_V_pro_se tup_stable _latest_re lease_vers ion_9_709. exe" MD5: 6C66FDD38C098F271FDE6E9E74DBD0EB) Magic_V_pro_setup_stable_latest_release_version_9_709.exe (PID: 4260 cmdline:
"C:\Users\ user\Deskt op\Magic_V _pro_setup _stable_la test_relea se_version _9_709.exe " /verysil ent /sp- MD5: 4F4E6DD4D4B9D96E69B7F8F97E867023) Magic_V_pro_setup_stable_latest_release_version_9_709.tmp (PID: 6800 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-Q5O PF.tmp\Mag ic_V_pro_s etup_stabl e_latest_r elease_ver sion_9_709 .tmp" /SL5 ="$30420,1 192681,727 040,C:\Use rs\user\De sktop\Magi c_V_pro_se tup_stable _latest_re lease_vers ion_9_709. exe" /very silent /sp - MD5: 6C66FDD38C098F271FDE6E9E74DBD0EB) idp.exe (PID: 7596 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-R3S KQ.tmp\idp .exe" x "C :\Users\us er\AppData \Local\Tem p\is-R3SKQ .tmp\logs" -o"C:\Use rs\user\Ap pData\Loca l\Programs \Common" - y -pCC3ba8 B679c926fc 9911aeDE90 09E589CBD3 667C48439c 630418D27f Dbb52Fc8 MD5: 6482EE0F372469D1190C74BD70D76153) conhost.exe (PID: 7604 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cmd.exe (PID: 7656 cmdline:
"cmd" /c a ttrib +h + S "C:\User s\user\App Data\Local \Programs\ Common\tas kshostw.ex e" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 7664 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) attrib.exe (PID: 7708 cmdline:
attrib +h +S "C:\Use rs\user\Ap pData\Loca l\Programs \Common\ta skshostw.e xe" MD5: 0E938DD280E83B1596EC6AA48729C2B0) schtasks.exe (PID: 7724 cmdline:
"schtasks. exe" /crea te /xml C: \Users\use r\AppData\ Local\Temp \is-R3SKQ. tmp\lang / tn WhatsAp pSyncTaskM achineCore /f MD5: 48C2FE20575769DE916F48EF0676A965) conhost.exe (PID: 7732 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cmd.exe (PID: 7796 cmdline:
"C:\Window s\system32 \cmd.exe" /C ""C:\Us ers\user\A ppData\Loc al\Temp\is -R3SKQ.tmp .cmd"" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 7804 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
taskshostw.exe (PID: 7772 cmdline:
C:\Users\u ser\AppDat a\Local\pr ograms\com mon\tasksh ostw.exe C :\Windows\ system32\c onfig\syst emprofile\ AppData\Lo cal\progra ms\common\ taskshostw .exe MD5: 33645B3AFD79ED29F7E6F476D7F6ED4B)
taskshostw.exe (PID: 8128 cmdline:
C:\Users\u ser\AppDat a\Local\pr ograms\com mon\tasksh ostw.exe MD5: 33645B3AFD79ED29F7E6F476D7F6ED4B)
- cleanup
{"C2 url": ["willpowerwav.site", "uncertainyelemz.bet", "hobbyedsmoker.live", "presentymusse.world", "deaddereaste.today", "subawhipnator.life", "privileggoe.live", "boltetuurked.digital"], "Build id": "ROmgOO--"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |
Persistence and Installation Behavior |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-08T03:14:26.697100+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49717 | 104.18.111.161 | 443 | TCP |
2025-03-08T03:14:29.297286+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49719 | 164.132.58.105 | 443 | TCP |
2025-03-08T03:14:49.607822+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49727 | 172.67.194.165 | 443 | TCP |
2025-03-08T03:14:51.824281+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49728 | 172.67.194.165 | 443 | TCP |
2025-03-08T03:15:41.810908+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49729 | 172.67.194.165 | 443 | TCP |
2025-03-08T03:15:44.107187+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49730 | 172.67.194.165 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-08T03:14:50.090104+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49727 | 172.67.194.165 | 443 | TCP |
2025-03-08T03:15:42.293386+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49729 | 172.67.194.165 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-08T03:14:50.090104+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49727 | 172.67.194.165 | 443 | TCP |
2025-03-08T03:15:42.293386+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49729 | 172.67.194.165 | 443 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | EXE: | Jump to behavior |
Compliance |
---|
Source: | EXE: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 10_2_00FF6CE2 |
Source: | Code function: | 10_2_00FF7904 |
Source: | Code function: | 17_2_00447A90 | |
Source: | Code function: | 17_2_00444C00 | |
Source: | Code function: | 17_2_00446040 | |
Source: | Code function: | 17_2_0041083A | |
Source: | Code function: | 17_2_0041083A | |
Source: | Code function: | 17_2_0042F8C9 | |
Source: | Code function: | 17_2_004298F0 | |
Source: | Code function: | 17_2_0044108A | |
Source: | Code function: | 17_2_004400A0 | |
Source: | Code function: | 17_2_004400A0 | |
Source: | Code function: | 17_2_00443100 | |
Source: | Code function: | 17_2_00443100 | |
Source: | Code function: | 17_2_00443100 | |
Source: | Code function: | 17_2_0041D12C | |
Source: | Code function: | 17_2_0041D12C | |
Source: | Code function: | 17_2_0040A1A0 | |
Source: | Code function: | 17_2_004201AB | |
Source: | Code function: | 17_2_004469B0 | |
Source: | Code function: | 17_2_00445A52 | |
Source: | Code function: | 17_2_00421260 | |
Source: | Code function: | 17_2_0041C221 | |
Source: | Code function: | 17_2_0041C221 | |
Source: | Code function: | 17_2_0042D23F | |
Source: | Code function: | 17_2_004232C0 | |
Source: | Code function: | 17_2_0043CAD0 | |
Source: | Code function: | 17_2_00433ADD | |
Source: | Code function: | 17_2_0042C2E0 | |
Source: | Code function: | 17_2_00446AE0 | |
Source: | Code function: | 17_2_0040FAFA | |
Source: | Code function: | 17_2_00440A80 | |
Source: | Code function: | 17_2_00440A80 | |
Source: | Code function: | 17_2_0040EB00 | |
Source: | Code function: | 17_2_00426380 | |
Source: | Code function: | 17_2_0041ABA1 | |
Source: | Code function: | 17_2_0041ABA1 | |
Source: | Code function: | 17_2_00429BA0 | |
Source: | Code function: | 17_2_0041FBB0 | |
Source: | Code function: | 17_2_0042C3BD | |
Source: | Code function: | 17_2_0042C3BD | |
Source: | Code function: | 17_2_00444C40 | |
Source: | Code function: | 17_2_00444C40 | |
Source: | Code function: | 17_2_00425453 | |
Source: | Code function: | 17_2_00424C60 | |
Source: | Code function: | 17_2_0043347A | |
Source: | Code function: | 17_2_00423400 | |
Source: | Code function: | 17_2_00447CB0 | |
Source: | Code function: | 17_2_00429D50 | |
Source: | Code function: | 17_2_00445553 | |
Source: | Code function: | 17_2_00411D78 | |
Source: | Code function: | 17_2_0042E534 | |
Source: | Code function: | 17_2_004475C0 | |
Source: | Code function: | 17_2_0041DD90 | |
Source: | Code function: | 17_2_0041DD90 | |
Source: | Code function: | 17_2_0041DD90 | |
Source: | Code function: | 17_2_004025A0 | |
Source: | Code function: | 17_2_0043F640 | |
Source: | Code function: | 17_2_0043F640 | |
Source: | Code function: | 17_2_00411E6A | |
Source: | Code function: | 17_2_00411605 | |
Source: | Code function: | 17_2_0042BE06 | |
Source: | Code function: | 17_2_00418E80 | |
Source: | Code function: | 17_2_004206A0 | |
Source: | Code function: | 17_2_0041A757 | |
Source: | Code function: | 17_2_00402770 | |
Source: | Code function: | 17_2_0042BF10 | |
Source: | Code function: | 17_2_0042FF10 | |
Source: | Code function: | 17_2_0042B7C8 | |
Source: | Code function: | 17_2_00433FCE | |
Source: | Code function: | 17_2_00433FCE | |
Source: | Code function: | 17_2_00411FF7 | |
Source: | Code function: | 17_2_00433FCC | |
Source: | Code function: | 17_2_00433FCC | |
Source: | Code function: | 17_2_0040A7A0 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | DNS query: | ||
Source: | DNS query: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 17_2_0043AF10 |
Source: | Code function: | 17_2_0043AF10 |
System Summary |
---|
Source: | Zip Entry: |
Source: | Code function: | 10_2_00FF8752 |
Source: | Code function: | 4_3_00927D93 | |
Source: | Code function: | 4_3_0092DF71 | |
Source: | Code function: | 10_2_0105CD3B | |
Source: | Code function: | 10_2_01056D56 | |
Source: | Code function: | 10_2_0106ADF0 | |
Source: | Code function: | 10_2_01088110 | |
Source: | Code function: | 10_2_01084170 | |
Source: | Code function: | 10_2_01074020 | |
Source: | Code function: | 10_2_01074270 | |
Source: | Code function: | 10_2_010602BA | |
Source: | Code function: | 10_2_010802C0 | |
Source: | Code function: | 10_2_0104C50E | |
Source: | Code function: | 10_2_0106C530 | |
Source: | Code function: | 10_2_0100C5E6 | |
Source: | Code function: | 10_2_0100C417 | |
Source: | Code function: | 10_2_0108C410 | |
Source: | Code function: | 10_2_01068630 | |
Source: | Code function: | 10_2_01074660 | |
Source: | Code function: | 10_2_01094910 | |
Source: | Code function: | 10_2_01078930 | |
Source: | Code function: | 10_2_01078830 | |
Source: | Code function: | 10_2_01090B90 | |
Source: | Code function: | 10_2_01098BE0 | |
Source: | Code function: | 10_2_01098A20 | |
Source: | Code function: | 10_2_01094AE9 | |
Source: | Code function: | 10_2_01038C03 | |
Source: | Code function: | 10_2_01090FB0 | |
Source: | Code function: | 10_2_0106D010 | |
Source: | Code function: | 10_2_01071310 | |
Source: | Code function: | 10_2_01069370 | |
Source: | Code function: | 10_2_00FF1598 | |
Source: | Code function: | 10_2_01045775 | |
Source: | Code function: | 10_2_01079690 | |
Source: | Code function: | 10_2_010656A0 | |
Source: | Code function: | 10_2_00FF5A88 | |
Source: | Code function: | 10_2_00FF1A67 | |
Source: | Code function: | 10_2_01071A20 | |
Source: | Code function: | 10_2_01039A5D | |
Source: | Code function: | 10_2_01079A80 | |
Source: | Code function: | 10_2_00FF9C00 | |
Source: | Code function: | 10_2_01091CF0 | |
Source: | Code function: | 10_2_01081FC0 | |
Source: | Code function: | 10_2_01089E20 | |
Source: | Code function: | 10_2_01049E89 | |
Source: | Code function: | 10_2_0100A11A | |
Source: | Code function: | 10_2_01086150 | |
Source: | Code function: | 10_2_01066180 | |
Source: | Code function: | 10_2_01082040 | |
Source: | Code function: | 10_2_010720F0 | |
Source: | Code function: | 10_2_0104237F | |
Source: | Code function: | 10_2_0108A3E0 | |
Source: | Code function: | 10_2_0106A590 | |
Source: | Code function: | 10_2_0107A4A0 | |
Source: | Code function: | 10_2_0107A750 | |
Source: | Code function: | 10_2_01092900 | |
Source: | Code function: | 10_2_0100E991 | |
Source: | Code function: | 10_2_0106E860 | |
Source: | Code function: | 10_2_0107A8B0 | |
Source: | Code function: | 10_2_01052B00 | |
Source: | Code function: | 10_2_01092AB0 | |
Source: | Code function: | 10_2_0103ECF6 | |
Source: | Code function: | 10_2_0108AF20 | |
Source: | Code function: | 10_2_0107AE20 | |
Source: | Code function: | 10_2_01093020 | |
Source: | Code function: | 10_2_0106F0D0 | |
Source: | Code function: | 10_2_010830E8 | |
Source: | Code function: | 10_2_0104B272 | |
Source: | Code function: | 10_2_0108B490 | |
Source: | Code function: | 10_2_0108F640 | |
Source: | Code function: | 10_2_010978C0 | |
Source: | Code function: | 10_2_01077B30 | |
Source: | Code function: | 10_2_01083A20 | |
Source: | Code function: | 10_2_01087AE0 | |
Source: | Code function: | 10_2_01083D40 | |
Source: | Code function: | 10_2_0107FCA9 | |
Source: | Code function: | 10_2_01093F70 | |
Source: | Code function: | 10_2_0101FF7C | |
Source: | Code function: | 17_2_0040BA10 | |
Source: | Code function: | 17_2_00447FB0 | |
Source: | Code function: | 17_2_00401040 | |
Source: | Code function: | 17_2_00446040 | |
Source: | Code function: | 17_2_0041A855 | |
Source: | Code function: | 17_2_00446810 | |
Source: | Code function: | 17_2_00410020 | |
Source: | Code function: | 17_2_00432830 | |
Source: | Code function: | 17_2_004328D0 | |
Source: | Code function: | 17_2_004298F0 | |
Source: | Code function: | 17_2_004388A0 | |
Source: | Code function: | 17_2_004400A0 | |
Source: | Code function: | 17_2_0042F156 | |
Source: | Code function: | 17_2_00436162 | |
Source: | Code function: | 17_2_00446170 | |
Source: | Code function: | 17_2_00443100 | |
Source: | Code function: | 17_2_0043290E | |
Source: | Code function: | 17_2_00444115 | |
Source: | Code function: | 17_2_00413913 | |
Source: | Code function: | 17_2_0043291D | |
Source: | Code function: | 17_2_004089D0 | |
Source: | Code function: | 17_2_004349E0 | |
Source: | Code function: | 17_2_00410990 | |
Source: | Code function: | 17_2_0040A1A0 | |
Source: | Code function: | 17_2_004201AB | |
Source: | Code function: | 17_2_004381BB | |
Source: | Code function: | 17_2_0040CA40 | |
Source: | Code function: | 17_2_0043AA40 | |
Source: | Code function: | 17_2_00447250 | |
Source: | Code function: | 17_2_00445A52 | |
Source: | Code function: | 17_2_00421260 | |
Source: | Code function: | 17_2_00429210 | |
Source: | Code function: | 17_2_00446230 | |
Source: | Code function: | 17_2_00433ADD | |
Source: | Code function: | 17_2_0042C2E0 | |
Source: | Code function: | 17_2_00446AE0 | |
Source: | Code function: | 17_2_004462F0 | |
Source: | Code function: | 17_2_00440A80 | |
Source: | Code function: | 17_2_00402AB0 | |
Source: | Code function: | 17_2_00421AB0 | |
Source: | Code function: | 17_2_0041535E | |
Source: | Code function: | 17_2_0040E360 | |
Source: | Code function: | 17_2_0040EB00 | |
Source: | Code function: | 17_2_0041CB11 | |
Source: | Code function: | 17_2_0043EB10 | |
Source: | Code function: | 17_2_0043F320 | |
Source: | Code function: | 17_2_0043C338 | |
Source: | Code function: | 17_2_004093C0 | |
Source: | Code function: | 17_2_004503DE | |
Source: | Code function: | 17_2_004403E0 | |
Source: | Code function: | 17_2_004363F8 | |
Source: | Code function: | 17_2_00426380 | |
Source: | Code function: | 17_2_00433396 | |
Source: | Code function: | 17_2_0041ABA1 | |
Source: | Code function: | 17_2_00429BA0 | |
Source: | Code function: | 17_2_0041FBB0 | |
Source: | Code function: | 17_2_0042C3BD | |
Source: | Code function: | 17_2_00438C40 | |
Source: | Code function: | 17_2_00424C60 | |
Source: | Code function: | 17_2_004034C0 | |
Source: | Code function: | 17_2_00437CC1 | |
Source: | Code function: | 17_2_00407CF0 | |
Source: | Code function: | 17_2_0043ACF0 | |
Source: | Code function: | 17_2_0042D48E | |
Source: | Code function: | 17_2_0041B4A4 | |
Source: | Code function: | 17_2_0043D4B2 | |
Source: | Code function: | 17_2_00429D50 | |
Source: | Code function: | 17_2_0043ED70 | |
Source: | Code function: | 17_2_00421D10 | |
Source: | Code function: | 17_2_0042CD16 | |
Source: | Code function: | 17_2_00429D2E | |
Source: | Code function: | 17_2_00419D3C | |
Source: | Code function: | 17_2_004475C0 | |
Source: | Code function: | 17_2_0043DD8B | |
Source: | Code function: | 17_2_0041DD90 | |
Source: | Code function: | 17_2_0040C5A0 | |
Source: | Code function: | 17_2_004215A0 | |
Source: | Code function: | 17_2_004235B0 | |
Source: | Code function: | 17_2_00408E40 | |
Source: | Code function: | 17_2_0043F640 | |
Source: | Code function: | 17_2_0041C65D | |
Source: | Code function: | 17_2_00403E60 | |
Source: | Code function: | 17_2_00415E70 | |
Source: | Code function: | 17_2_00435E03 | |
Source: | Code function: | 17_2_00431600 | |
Source: | Code function: | 17_2_00411605 | |
Source: | Code function: | 17_2_004336C2 | |
Source: | Code function: | 17_2_00431ED0 | |
Source: | Code function: | 17_2_0043C6D0 | |
Source: | Code function: | 17_2_00446EE0 | |
Source: | Code function: | 17_2_00439EF4 | |
Source: | Code function: | 17_2_00425E80 | |
Source: | Code function: | 17_2_004206A0 | |
Source: | Code function: | 17_2_0041BF43 | |
Source: | Code function: | 17_2_00427F6B | |
Source: | Code function: | 17_2_00420F00 | |
Source: | Code function: | 17_2_0042BF10 | |
Source: | Code function: | 17_2_00442710 | |
Source: | Code function: | 17_2_00443F22 | |
Source: | Code function: | 17_2_0042B7C8 | |
Source: | Code function: | 17_2_00418FD7 | |
Source: | Code function: | 17_2_004127E0 | |
Source: | Code function: | 17_2_00411FF7 | |
Source: | Code function: | 17_2_0041B7A5 | |
Source: | Code function: | 22_2_004503DE | |
Source: | Code function: | 22_2_03FB7E00 | |
Source: | Code function: | 22_2_03FCD729 | |
Source: | Code function: | 22_2_03FC1AC0 | |
Source: | Code function: | 22_2_03FBF670 | |
Source: | Code function: | 22_2_03FC1150 |
Source: | Dropped File: |
Source: | Process token adjusted: | Jump to behavior |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 10_2_0100458B | |
Source: | Code function: | 10_2_00FF9749 |
Source: | Code function: | 10_2_00FF96A5 |
Source: | Code function: | 17_2_004349E0 |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Key value created or modified: | Jump to behavior |
Source: | String found in binary or memory: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Key value created or modified: | Jump to behavior |
Source: | Window found: | Jump to behavior |
Source: | Window detected: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 10_2_01078180 |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 4_3_0092BE8D | |
Source: | Code function: | 4_3_0092B4B5 | |
Source: | Code function: | 4_2_008A4DC1 | |
Source: | Code function: | 4_2_008A581D | |
Source: | Code function: | 4_2_008A4DC1 | |
Source: | Code function: | 10_2_0109510E | |
Source: | Code function: | 10_2_0109549E | |
Source: | Code function: | 17_2_0044D291 | |
Source: | Code function: | 17_2_0044C9AF | |
Source: | Code function: | 17_2_00445EE1 | |
Source: | Code function: | 17_2_0044D6FD | |
Source: | Code function: | 17_2_0044D701 | |
Source: | Code function: | 17_2_0044D709 | |
Source: | Code function: | 17_2_03FF1C1F | |
Source: | Code function: | 17_2_03FF1C1F | |
Source: | Code function: | 17_2_03FF1C1F | |
Source: | Code function: | 17_2_03FF1AD7 | |
Source: | Code function: | 17_2_03FF1C1F | |
Source: | Code function: | 17_2_03FF0ABD | |
Source: | Code function: | 17_2_03FF1AD7 | |
Source: | Code function: | 17_2_03FF0299 | |
Source: | Code function: | 17_2_03FF0299 | |
Source: | Code function: | 17_2_03FF0274 | |
Source: | Code function: | 17_2_03FF0299 | |
Source: | Code function: | 17_2_03FF0299 | |
Source: | Code function: | 17_2_03FF0278 | |
Source: | Code function: | 17_2_03FF0189 | |
Source: | Code function: | 17_2_03FF06AC | |
Source: | Code function: | 17_2_03FF1AD7 | |
Source: | Code function: | 17_2_03FF0299 | |
Source: | Code function: | 17_2_03FF0189 |
Source: | Static PE information: |
Persistence and Installation Behavior |
---|
Source: | Process created: |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Boot Survival |
---|
Source: | Process created: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: | 22_2_03FB1FCB |
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | API coverage: |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: |
Source: | Code function: | 10_2_00FF6CE2 |
Source: | Code function: | 10_2_00FF7904 |
Source: | Code function: | 10_2_00FFA0D3 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 22_2_03FB1FCB |
Source: | Code function: | 17_2_00444660 |
Source: | Code function: | 10_2_01078180 |
Source: | Code function: | 22_2_03FB2720 | |
Source: | Code function: | 22_2_03FB2ADA | |
Source: | Code function: | 22_2_03FB1227 | |
Source: | Code function: | 22_2_03FB65CC | |
Source: | Code function: | 22_2_03FB39C3 | |
Source: | Code function: | 22_2_03FC0D30 | |
Source: | Code function: | 22_2_03FC0D1D |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Code function: | 10_2_010958D0 |
Source: | Code function: | 10_2_00FFAFFD |
Source: | Code function: | 10_2_0102CFFF |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | 1 Spearphishing Link | 11 Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Deobfuscate/Decode Files or Information | OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | 3 Ingress Tool Transfer | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 Native API | 1 DLL Search Order Hijacking | 1 DLL Search Order Hijacking | 4 Obfuscated Files or Information | LSASS Memory | 3 File and Directory Discovery | Remote Desktop Protocol | 2 Clipboard Data | 11 Encrypted Channel | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 12 Command and Scripting Interpreter | 1 Scheduled Task/Job | 1 Access Token Manipulation | 2 Software Packing | Security Account Manager | 27 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 4 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | 1 Scheduled Task/Job | Login Hook | 11 Process Injection | 1 DLL Side-Loading | NTDS | 221 Security Software Discovery | Distributed Component Object Model | Input Capture | 115 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | 1 Scheduled Task/Job | 1 DLL Search Order Hijacking | LSA Secrets | 2 Virtualization/Sandbox Evasion | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Masquerading | Cached Domain Credentials | 1 Process Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 2 Virtualization/Sandbox Evasion | DCSync | 2 System Owner/User Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 Access Token Manipulation | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
Network Topology | Malvertising | Exploit Public-Facing Application | Command and Scripting Interpreter | At | At | 11 Process Injection | /etc/passwd and /etc/shadow | Network Sniffing | Direct Cloud VM Connections | Data Staged | Web Protocols | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Internal Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
3% | Virustotal | Browse | ||
3% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | TR/AVI.Lumma.jtxjg | ||
67% | ReversingLabs | Win32.Spyware.Lummastealer | ||
0% | ReversingLabs | |||
0% | ReversingLabs | |||
0% | ReversingLabs | |||
0% | ReversingLabs | |||
0% | ReversingLabs | |||
0% | ReversingLabs | |||
0% | ReversingLabs |
⊘No Antivirus matches
⊘No Antivirus matches
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
rea.grupolalegion.ec | 190.92.154.206 | true | false | high | |
tinyurl.com | 104.18.111.161 | true | false | high | |
rentry.org | 164.132.58.105 | true | false | high | |
willpowerwav.site | 172.67.194.165 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false |
| unknown | |
true |
| unknown | |
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
164.132.58.105 | rentry.org | France | 16276 | OVHFR | false | |
190.92.154.206 | rea.grupolalegion.ec | Argentina | 10986 | DesarrollosDigitalesdePulsarConsultingAR | false | |
104.18.111.161 | tinyurl.com | United States | 13335 | CLOUDFLARENETUS | false | |
172.67.194.165 | willpowerwav.site | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1632503 |
Start date and time: | 2025-03-08 03:13:19 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 8m 50s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 23 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Magic_V_pro_setup_stable_latest_release_version_9_709.exe |
Detection: | MAL |
Classification: | mal64.troj.evad.winEXE@23/12@4/4 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 23.60.203.209
- Excluded domains from analysis (whitelisted): fs.microsoft.com, ctldl.windowsupdate.com, c.pki.goog
- Execution Graph export aborted for target Magic_V_pro_setup_stable_latest_release_version_9_709.tmp, PID 6800 because there are no executed function
- Execution Graph export aborted for target taskshostw.exe, PID 8128 because it is empty
- Not all processes where analyzed, report is missing behavior information
- Report creation exceeded maximum time and may have missing disassembly code information.
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
02:14:40 | Task Scheduler | |
21:14:29 | API Interceptor | |
21:14:49 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
164.132.58.105 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Babadeda, RedLine | Browse | |||
Get hash | malicious | Babadeda, RHADAMANTHYS, RedLine | Browse | |||
Get hash | malicious | AsyncRAT, Clipboard Hijacker | Browse | |||
Get hash | malicious | AsyncRAT, Clipboard Hijacker | Browse | |||
190.92.154.206 | Get hash | malicious | CAPTCHA Scam ClickFix, LummaC Stealer | Browse | ||
Get hash | malicious | CAPTCHA Scam ClickFix | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | CAPTCHA Scam ClickFix, LummaC Stealer | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
104.18.111.161 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | AsyncRAT, XWorm | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AsyncRAT, XWorm | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
tinyurl.com | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | CobaltStrike, Metasploit | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
rentry.org | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Babadeda, RedLine | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
rea.grupolalegion.ec | Get hash | malicious | CAPTCHA Scam ClickFix, LummaC Stealer | Browse |
| |
Get hash | malicious | CAPTCHA Scam ClickFix | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | CAPTCHA Scam ClickFix, LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | RedLine | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
OVHFR | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | ScreenConnect Tool | Browse |
| ||
Get hash | malicious | ScreenConnect Tool | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
DesarrollosDigitalesdePulsarConsultingAR | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | CAPTCHA Scam ClickFix, LummaC Stealer | Browse |
| ||
Get hash | malicious | CAPTCHA Scam ClickFix | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | CAPTCHA Scam ClickFix, LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Amadey, GCleaner, LummaC Stealer, PureLog Stealer, Stealc, SystemBC, Vidar | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | RedLine | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
37f463bf4616ecd445d4a1937da06e19 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | DarkCloud | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | DarkCloud | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\is-QC304.tmp\_isetup\_setup64.tmp | Get hash | malicious | PureLog Stealer | Browse | ||
Get hash | malicious | PureLog Stealer | Browse | |||
Get hash | malicious | MicroClip | Browse | |||
Get hash | malicious | MicroClip | Browse | |||
Get hash | malicious | MicroClip | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | RHADAMANTHYS | Browse | |||
Get hash | malicious | RHADAMANTHYS | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | Unknown | Browse |
Process: | C:\Users\user\AppData\Local\Temp\is-R3SKQ.tmp\idp.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1427456 |
Entropy (8bit): | 7.142790634598866 |
Encrypted: | false |
SSDEEP: | 24576:jyRjE+yRYwp3ufMx1FxH98F5iULtFx3qMGRm5UJWoHI7vaBvJD6WYc9Z:jyG+8tVYiULtL3XG3uvSJD6lc9Z |
MD5: | 33645B3AFD79ED29F7E6F476D7F6ED4B |
SHA1: | D49C57882892F2B600CA440A3E05B7209560A9D0 |
SHA-256: | 0796140E4F63122408C2D2D536F5C12BD68D8AF54437E767225FE6B88CE61BC5 |
SHA-512: | F935A4F6B507D2F63519EDE5B3EC52EF629FEEE8FD5ECF402D6F1368829BA0792A45DE3C9ACC1BDC19D352951A747F900CEDB7376EAC775DE3D8EE5EAAC4A123 |
Malicious: | true |
Antivirus: |
|
Preview: |
C:\Users\user\AppData\Local\Temp\is-3LF26.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp 

Download File
Process: | C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2541056 |
Entropy (8bit): | 6.38139342357515 |
Encrypted: | false |
SSDEEP: | 49152:Yg2qPtc1e5OS7bPGoUl+x/grN4azvchYk2HAT:YvqPCnrN4azvSYPU |
MD5: | 6C66FDD38C098F271FDE6E9E74DBD0EB |
SHA1: | 27FBE48E15EDCBE0F216C9D0CFAA242DCED5D71C |
SHA-256: | 253ABB0DA942F3CE4FB839624077180BDAE8109E82518E6442259A667900DB6F |
SHA-512: | 031642B8B219CC46208CDC18107C54BB080C44F0877971D47A052268D9571E67F7F7C786C17F1F78561F976D4BF86F7F9A74453B6B0C9592164CF4299033C540 |
Malicious: | true |
Antivirus: |
|
Preview: |
C:\Users\user\AppData\Local\Temp\is-Q5OPF.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp 

Download File
Process: | C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2541056 |
Entropy (8bit): | 6.38139342357515 |
Encrypted: | false |
SSDEEP: | 49152:Yg2qPtc1e5OS7bPGoUl+x/grN4azvchYk2HAT:YvqPCnrN4azvSYPU |
MD5: | 6C66FDD38C098F271FDE6E9E74DBD0EB |
SHA1: | 27FBE48E15EDCBE0F216C9D0CFAA242DCED5D71C |
SHA-256: | 253ABB0DA942F3CE4FB839624077180BDAE8109E82518E6442259A667900DB6F |
SHA-512: | 031642B8B219CC46208CDC18107C54BB080C44F0877971D47A052268D9571E67F7F7C786C17F1F78561F976D4BF86F7F9A74453B6B0C9592164CF4299033C540 |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-3LF26.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 6144 |
Entropy (8bit): | 4.720366600008286 |
Encrypted: | false |
SSDEEP: | 96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0 |
MD5: | E4211D6D009757C078A9FAC7FF4F03D4 |
SHA1: | 019CD56BA687D39D12D4B13991C9A42EA6BA03DA |
SHA-256: | 388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95 |
SHA-512: | 17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-3LF26.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 237568 |
Entropy (8bit): | 6.42067568634536 |
Encrypted: | false |
SSDEEP: | 3072:dnSx3lws+iWbUmJmE8dxMw7r+mjT5PbzEFwyGIyTcHY10tSB9j:IP0bUmQEUr+mRcbTx4N |
MD5: | 55C310C0319260D798757557AB3BF636 |
SHA1: | 0892EB7ED31D8BB20A56C6835990749011A2D8DE |
SHA-256: | 54E7E0AD32A22B775131A6288F083ED3286A9A436941377FC20F85DD9AD983ED |
SHA-512: | E0082109737097658677D7963CBF28D412DCA3FA8F5812C2567E53849336CE45EBAE2C0430DF74BFE16C0F3EEBB46961BC1A10F32CA7947692A900162128AE57 |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-Q5OPF.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 193 |
Entropy (8bit): | 4.536947302398739 |
Encrypted: | false |
SSDEEP: | 6:YHNwvorYoK9AcEu4sXj0wvorYoK9AcEu4sXjjK/sn:K+w8XusXj3w8XusXj2/sn |
MD5: | 51EDFFA18B8D028241EA809E609B0B74 |
SHA1: | F3C69EB23E10EB3F00363E17E1F60973FC00998A |
SHA-256: | 70E4C2790B106189BAA4C38DC3A9FE17975D1E667425B0D97DA2F9CAB24D560A |
SHA-512: | 2CFFDB56D09311D079916E4EC61360A5A48041E65C4DADC315F14C88E1665FA608ADABA7E5536A99E278E9570571EA7BE8B46C4114FA18734CBA4C44FCE438F4 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-Q5OPF.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 6144 |
Entropy (8bit): | 4.720366600008286 |
Encrypted: | false |
SSDEEP: | 96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0 |
MD5: | E4211D6D009757C078A9FAC7FF4F03D4 |
SHA1: | 019CD56BA687D39D12D4B13991C9A42EA6BA03DA |
SHA-256: | 388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95 |
SHA-512: | 17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-Q5OPF.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 237568 |
Entropy (8bit): | 6.42067568634536 |
Encrypted: | false |
SSDEEP: | 3072:dnSx3lws+iWbUmJmE8dxMw7r+mjT5PbzEFwyGIyTcHY10tSB9j:IP0bUmQEUr+mRcbTx4N |
MD5: | 55C310C0319260D798757557AB3BF636 |
SHA1: | 0892EB7ED31D8BB20A56C6835990749011A2D8DE |
SHA-256: | 54E7E0AD32A22B775131A6288F083ED3286A9A436941377FC20F85DD9AD983ED |
SHA-512: | E0082109737097658677D7963CBF28D412DCA3FA8F5812C2567E53849336CE45EBAE2C0430DF74BFE16C0F3EEBB46961BC1A10F32CA7947692A900162128AE57 |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-Q5OPF.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 847360 |
Entropy (8bit): | 6.655399003035542 |
Encrypted: | false |
SSDEEP: | 24576:N5Oh3oXwjoThmYgKmRCcBcIGvymfIRNM9+1nG0:Ng9ogjoVsRlBAPV+40 |
MD5: | 6482EE0F372469D1190C74BD70D76153 |
SHA1: | 9001213D28E5B0B18AA24114A38A1EFE1A767698 |
SHA-256: | 4B7FC7818F3168945DBEDADCFD7AAF470B88543EF6B685619AD1C942AC3B1DED |
SHA-512: | 6A5C2BDF58CD8DEADF51302D8F8B17A14908809EF700A1E366E7D107B1E22ABE8CAF1F68E7EB9D35E9B519793699C3492323F6577C3569A56AC3C845516625F3 |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-Q5OPF.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 1995 |
Entropy (8bit): | 4.9796258677616265 |
Encrypted: | false |
SSDEEP: | 48:cghUsneYWM1q8YuFdOFQO033ODOiQdKrZLRY4v:Hh3t1bYuFdOFQOMdKrZLv |
MD5: | 66DE708C5BDDF15322A95F29747A94C8 |
SHA1: | 48836F6D40DDC8B1A39704EA447514C4B31CF010 |
SHA-256: | 77020648C6B89E1ECE72DBA36770C99DF2FAF22720B48954F779D6E97D3C1F7C |
SHA-512: | 52A61E84CEE3F5746C6F283D112BE9F5540D1C93A5BCA219CB4CD19CE95AF0D102CC6C94DC1129F50634CAB87522DE6CFD674C9B94E70BD97E35A0CA7130B4D0 |
Malicious: | true |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-Q5OPF.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 872079 |
Entropy (8bit): | 7.999807731924545 |
Encrypted: | true |
SSDEEP: | 24576:1iogHB5rPWDwQ76O6+UTmIlEEEqf4odxz84j60baO:0B57uD6DKIS+4od5j6s3 |
MD5: | A00434CD4070751DB9FEA5D285239290 |
SHA1: | A3E17391476A50D36B333D1628307B9B39E46CE4 |
SHA-256: | E4480CC6CF5996E19F86B8A453EF18B69BC81B2246FC7B72E6A5CBA3E8294EC2 |
SHA-512: | F749C479F89FF63789F37D17E52B11A497D7F8261CBA085694733F2B9418A84CB832E8C81E28780C343FAF4148B65996952C785E20997DD1CABEDDFC279894C3 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-R3SKQ.tmp\idp.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 508 |
Entropy (8bit): | 5.0513362940619775 |
Encrypted: | false |
SSDEEP: | 6:AMpnOMvotkMylHcAxXF2Saiewkn23fzIsEBWrlST3wkn23fzIsCv1Aiewkn23fz0:pt6wnRwsfT4TAfCqYfebeQJA1tNoVtv |
MD5: | C574476CB7F806938DDA7E9F3D20A282 |
SHA1: | 6499859081EE693C14957A6DC8D8F6B14B1FD77C |
SHA-256: | 6A2383C095E5554E5B32EA6F4682B8C302234E2D05ADD6FD070A186D6438604F |
SHA-512: | 934F67163D144380D3D039451BF67B6318CD24E4BE77742A96727C6B4640E6597D3BA85BDBC40B03B17C3AA08C9B7CB2DB03E4D68504BF01A15D2E4BDB8777E0 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.866381639014143 |
TrID: |
|
File name: | Magic_V_pro_setup_stable_latest_release_version_9_709.exe |
File size: | 3'548'416 bytes |
MD5: | 4f4e6dd4d4b9d96e69b7f8f97e867023 |
SHA1: | 51db1de1d11976911dee96ed18b1fc903ea16676 |
SHA256: | 43b9bb932501d8d186d9fd49ee5fa1a1c47283e1db898a68b5c846eb7b971aee |
SHA512: | dfc58630f2fedddbbedd7a27143fd5334182882e7d124a40d9f9f38eea09802a785d7d0d71082a90f885136c57a8e65986493c97fb9b4f306a76ddc33701f904 |
SSDEEP: | 98304:61QTsRIY+m6UVFUeY5CwAJj3aohMvl6t82B:mbRItvUIeY5CVJTaohMvot82B |
TLSH: | 59F50227B288A53EC4AE27354673A01058FBBAADF4177E1677F0C48CCF661C11E3A665 |
File Content Preview: | MZP.....................@...............................................!..L.!..This program must be run under Win32..$7....................................................................................................................................... |
Icon Hash: | 2f232d67b7934633 |
Entrypoint: | 0x4a7ed0 |
Entrypoint Section: | .itext |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x5DA1B5ED [Sat Oct 12 11:15:57 2019 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | eb5bc6ff6263b364dfbfb78bdb48ed59 |
Signature Valid: | true |
Signature Issuer: | CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE |
Signature Validation Error: | The operation completed successfully |
Error Number: | 0 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | BD805C8B63C8B5305BBF421B7D75F321 |
Thumbprint SHA-1: | C10322D45BAAA43A3F8575C2FA56C9252CC98CA8 |
Thumbprint SHA-256: | 869FFB4DCE5270739ADEFD56C4B0CB86E84241E76CD39D3F8EEAD4550206628F |
Serial: | 3931A71B7B628759789BA848 |
Instruction |
---|
push ebp |
mov ebp, esp |
add esp, FFFFFFA4h |
push ebx |
push esi |
push edi |
xor eax, eax |
mov dword ptr [ebp-3Ch], eax |
mov dword ptr [ebp-40h], eax |
mov dword ptr [ebp-5Ch], eax |
mov dword ptr [ebp-30h], eax |
mov dword ptr [ebp-38h], eax |
mov dword ptr [ebp-34h], eax |
mov dword ptr [ebp-2Ch], eax |
mov dword ptr [ebp-28h], eax |
mov dword ptr [ebp-14h], eax |
mov eax, 004A2BC4h |
call 00007F8BC151E17Dh |
xor eax, eax |
push ebp |
push 004A85C2h |
push dword ptr fs:[eax] |
mov dword ptr fs:[eax], esp |
xor edx, edx |
push ebp |
push 004A857Eh |
push dword ptr fs:[edx] |
mov dword ptr fs:[edx], esp |
mov eax, dword ptr [004B0634h] |
call 00007F8BC15B227Bh |
call 00007F8BC15B1DD2h |
lea edx, dword ptr [ebp-14h] |
xor eax, eax |
call 00007F8BC15337A8h |
mov edx, dword ptr [ebp-14h] |
mov eax, 004B3714h |
call 00007F8BC1518A07h |
push 00000002h |
push 00000000h |
push 00000001h |
mov ecx, dword ptr [004B3714h] |
mov dl, 01h |
mov eax, dword ptr [00423698h] |
call 00007F8BC153480Fh |
mov dword ptr [004B3718h], eax |
xor edx, edx |
push ebp |
push 004A852Ah |
push dword ptr fs:[edx] |
mov dword ptr fs:[edx], esp |
call 00007F8BC15B2303h |
mov dword ptr [004B3720h], eax |
mov eax, dword ptr [004B3720h] |
cmp dword ptr [eax+0Ch], 01h |
jne 00007F8BC15B8BBAh |
mov eax, dword ptr [004B3720h] |
mov edx, 00000028h |
call 00007F8BC1535104h |
mov edx, dword ptr [004B3720h] |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0xb6000 | 0x9a | .edata |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xb4000 | 0xf1c | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xb9000 | 0x5acc | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x35fbd0 | 0x2930 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0xb8000 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0xb42e0 | 0x240 | .idata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0xb5000 | 0x1a4 | .didata |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0xa50e8 | 0xa5200 | f082ee6260fd65bd4406603aefa5b38a | False | 0.35601136686222556 | data | 6.369284753795082 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.itext | 0xa7000 | 0x1668 | 0x1800 | 01fc0e6510748ac1fa24729bd4c8d31d | False | 0.541015625 | data | 5.951810643537571 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.data | 0xa9000 | 0x37a4 | 0x3800 | 34fa73ad8332bf3785e4314a4334a782 | False | 0.36063058035714285 | data | 5.035168539011174 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.bss | 0xad000 | 0x6778 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0xb4000 | 0xf1c | 0x1000 | daddecfdccd86a491d85012d9e547c63 | False | 0.36474609375 | data | 4.791610915860562 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.didata | 0xb5000 | 0x1a4 | 0x200 | be0581a07bd7d21a29f93f8752d3e826 | False | 0.345703125 | data | 2.7458225536678693 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.edata | 0xb6000 | 0x9a | 0x200 | c7a09d734ff63f677dfd4d18e3440fdf | False | 0.2578125 | data | 1.881069204504408 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.tls | 0xb7000 | 0x18 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rdata | 0xb8000 | 0x5d | 0x200 | 955f17d4899f3cf7664168fa46e1b316 | False | 0.189453125 | data | 1.3799881252217987 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0xb9000 | 0x5acc | 0x5c00 | 63aa3c5851a8624416f1023d843c0f2e | False | 0.3392917798913043 | data | 4.968005209574528 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0xb9528 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 192, 16 important colors | English | United States | 0.6317567567567568 |
RT_ICON | 0xb9650 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 320, 256 important colors | English | United States | 0.5823699421965318 |
RT_ICON | 0xb9bb8 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 640, 16 important colors | English | United States | 0.5120967741935484 |
RT_ICON | 0xb9ea0 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors | English | United States | 0.5455776173285198 |
RT_ICON | 0xba748 | 0x668 | Device independent bitmap graphic, 48 x 96 x 4, image size 1536 | English | United States | 0.36341463414634145 |
RT_ICON | 0xbadb0 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 2688 | English | United States | 0.423773987206823 |
RT_STRING | 0xbbc58 | 0x360 | data | 0.34375 | ||
RT_STRING | 0xbbfb8 | 0x260 | data | 0.3256578947368421 | ||
RT_STRING | 0xbc218 | 0x45c | data | 0.4068100358422939 | ||
RT_STRING | 0xbc674 | 0x40c | data | 0.3754826254826255 | ||
RT_STRING | 0xbca80 | 0x2d4 | data | 0.39226519337016574 | ||
RT_STRING | 0xbcd54 | 0xb8 | data | 0.6467391304347826 | ||
RT_STRING | 0xbce0c | 0x9c | data | 0.6410256410256411 | ||
RT_STRING | 0xbcea8 | 0x374 | data | 0.4230769230769231 | ||
RT_STRING | 0xbd21c | 0x398 | data | 0.3358695652173913 | ||
RT_STRING | 0xbd5b4 | 0x368 | data | 0.3795871559633027 | ||
RT_STRING | 0xbd91c | 0x2a4 | data | 0.4275147928994083 | ||
RT_RCDATA | 0xbdbc0 | 0x10 | data | 1.5 | ||
RT_RCDATA | 0xbdbd0 | 0x2c4 | data | 0.6384180790960452 | ||
RT_RCDATA | 0xbde94 | 0x2c | data | 1.2045454545454546 | ||
RT_GROUP_ICON | 0xbdec0 | 0x5a | data | English | United States | 0.7333333333333333 |
RT_VERSION | 0xbdf1c | 0x584 | data | English | United States | 0.26274787535410765 |
RT_MANIFEST | 0xbe4a0 | 0x62c | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.4240506329113924 |
DLL | Import |
---|---|
kernel32.dll | GetACP, GetExitCodeProcess, LocalFree, CloseHandle, SizeofResource, VirtualProtect, VirtualFree, GetFullPathNameW, ExitProcess, HeapAlloc, GetCPInfoExW, RtlUnwind, GetCPInfo, GetStdHandle, GetModuleHandleW, FreeLibrary, HeapDestroy, ReadFile, CreateProcessW, GetLastError, GetModuleFileNameW, SetLastError, FindResourceW, CreateThread, CompareStringW, LoadLibraryA, ResetEvent, GetVersion, RaiseException, FormatMessageW, SwitchToThread, GetExitCodeThread, GetCurrentThread, LoadLibraryExW, LockResource, GetCurrentThreadId, UnhandledExceptionFilter, VirtualQuery, VirtualQueryEx, Sleep, EnterCriticalSection, SetFilePointer, LoadResource, SuspendThread, GetTickCount, GetFileSize, GetStartupInfoW, GetFileAttributesW, InitializeCriticalSection, GetThreadPriority, SetThreadPriority, GetCurrentProcess, VirtualAlloc, GetSystemInfo, GetCommandLineW, LeaveCriticalSection, GetProcAddress, ResumeThread, GetVersionExW, VerifyVersionInfoW, HeapCreate, GetWindowsDirectoryW, VerSetConditionMask, GetDiskFreeSpaceW, FindFirstFileW, GetUserDefaultUILanguage, lstrlenW, QueryPerformanceCounter, SetEndOfFile, HeapFree, WideCharToMultiByte, FindClose, MultiByteToWideChar, LoadLibraryW, SetEvent, CreateFileW, GetLocaleInfoW, GetSystemDirectoryW, DeleteFileW, GetLocalTime, GetEnvironmentVariableW, WaitForSingleObject, WriteFile, ExitThread, DeleteCriticalSection, TlsGetValue, GetDateFormatW, SetErrorMode, IsValidLocale, TlsSetValue, CreateDirectoryW, GetSystemDefaultUILanguage, EnumCalendarInfoW, LocalAlloc, GetUserDefaultLangID, RemoveDirectoryW, CreateEventW, SetThreadLocale, GetThreadLocale |
comctl32.dll | InitCommonControls |
version.dll | GetFileVersionInfoSizeW, VerQueryValueW, GetFileVersionInfoW |
user32.dll | CreateWindowExW, TranslateMessage, CharLowerBuffW, CallWindowProcW, CharUpperW, PeekMessageW, GetSystemMetrics, SetWindowLongW, MessageBoxW, DestroyWindow, CharNextW, MsgWaitForMultipleObjects, LoadStringW, ExitWindowsEx, DispatchMessageW |
oleaut32.dll | SysAllocStringLen, SafeArrayPtrOfIndex, VariantCopy, SafeArrayGetLBound, SafeArrayGetUBound, VariantInit, VariantClear, SysFreeString, SysReAllocStringLen, VariantChangeType, SafeArrayCreate |
netapi32.dll | NetWkstaGetInfo, NetApiBufferFree |
advapi32.dll | RegQueryValueExW, AdjustTokenPrivileges, LookupPrivilegeValueW, RegCloseKey, OpenProcessToken, RegOpenKeyExW |
Name | Ordinal | Address |
---|---|---|
TMethodImplementationIntercept | 3 | 0x453ac0 |
__dbk_fcall_wrapper | 2 | 0x40d3dc |
dbkFCallWrapperAddr | 1 | 0x4b063c |
Description | Data |
---|---|
Comments | This installation was built with Inno Setup. |
CompanyName | Nash Norton, Inc. |
FileDescription | Jeron |
FileVersion | 1.0.2.2 |
LegalCopyright | |
OriginalFileName | |
ProductName | Jeron |
ProductVersion | 1.0.2.2 |
Translation | 0x0000 0x04b0 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-08T03:14:26.697100+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49717 | 104.18.111.161 | 443 | TCP |
2025-03-08T03:14:29.297286+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49719 | 164.132.58.105 | 443 | TCP |
2025-03-08T03:14:49.607822+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49727 | 172.67.194.165 | 443 | TCP |
2025-03-08T03:14:50.090104+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49727 | 172.67.194.165 | 443 | TCP |
2025-03-08T03:14:50.090104+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49727 | 172.67.194.165 | 443 | TCP |
2025-03-08T03:14:51.824281+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49728 | 172.67.194.165 | 443 | TCP |
2025-03-08T03:15:41.810908+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49729 | 172.67.194.165 | 443 | TCP |
2025-03-08T03:15:42.293386+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49729 | 172.67.194.165 | 443 | TCP |
2025-03-08T03:15:42.293386+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49729 | 172.67.194.165 | 443 | TCP |
2025-03-08T03:15:44.107187+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49730 | 172.67.194.165 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 8, 2025 03:14:24.904486895 CET | 49717 | 443 | 192.168.2.4 | 104.18.111.161 |
Mar 8, 2025 03:14:24.904580116 CET | 443 | 49717 | 104.18.111.161 | 192.168.2.4 |
Mar 8, 2025 03:14:24.904664040 CET | 49717 | 443 | 192.168.2.4 | 104.18.111.161 |
Mar 8, 2025 03:14:24.907175064 CET | 49717 | 443 | 192.168.2.4 | 104.18.111.161 |
Mar 8, 2025 03:14:24.907213926 CET | 443 | 49717 | 104.18.111.161 | 192.168.2.4 |
Mar 8, 2025 03:14:26.697002888 CET | 443 | 49717 | 104.18.111.161 | 192.168.2.4 |
Mar 8, 2025 03:14:26.697099924 CET | 49717 | 443 | 192.168.2.4 | 104.18.111.161 |
Mar 8, 2025 03:14:26.702001095 CET | 49717 | 443 | 192.168.2.4 | 104.18.111.161 |
Mar 8, 2025 03:14:26.702029943 CET | 443 | 49717 | 104.18.111.161 | 192.168.2.4 |
Mar 8, 2025 03:14:26.702436924 CET | 443 | 49717 | 104.18.111.161 | 192.168.2.4 |
Mar 8, 2025 03:14:26.745959997 CET | 49717 | 443 | 192.168.2.4 | 104.18.111.161 |
Mar 8, 2025 03:14:26.773997068 CET | 49717 | 443 | 192.168.2.4 | 104.18.111.161 |
Mar 8, 2025 03:14:26.820338011 CET | 443 | 49717 | 104.18.111.161 | 192.168.2.4 |
Mar 8, 2025 03:14:27.348328114 CET | 443 | 49717 | 104.18.111.161 | 192.168.2.4 |
Mar 8, 2025 03:14:27.348470926 CET | 443 | 49717 | 104.18.111.161 | 192.168.2.4 |
Mar 8, 2025 03:14:27.348548889 CET | 49717 | 443 | 192.168.2.4 | 104.18.111.161 |
Mar 8, 2025 03:14:27.350883007 CET | 49717 | 443 | 192.168.2.4 | 104.18.111.161 |
Mar 8, 2025 03:14:27.350941896 CET | 443 | 49717 | 104.18.111.161 | 192.168.2.4 |
Mar 8, 2025 03:14:27.391495943 CET | 49719 | 443 | 192.168.2.4 | 164.132.58.105 |
Mar 8, 2025 03:14:27.391565084 CET | 443 | 49719 | 164.132.58.105 | 192.168.2.4 |
Mar 8, 2025 03:14:27.391665936 CET | 49719 | 443 | 192.168.2.4 | 164.132.58.105 |
Mar 8, 2025 03:14:27.392154932 CET | 49719 | 443 | 192.168.2.4 | 164.132.58.105 |
Mar 8, 2025 03:14:27.392178059 CET | 443 | 49719 | 164.132.58.105 | 192.168.2.4 |
Mar 8, 2025 03:14:29.297152996 CET | 443 | 49719 | 164.132.58.105 | 192.168.2.4 |
Mar 8, 2025 03:14:29.297286034 CET | 49719 | 443 | 192.168.2.4 | 164.132.58.105 |
Mar 8, 2025 03:14:29.330991030 CET | 49719 | 443 | 192.168.2.4 | 164.132.58.105 |
Mar 8, 2025 03:14:29.331068993 CET | 443 | 49719 | 164.132.58.105 | 192.168.2.4 |
Mar 8, 2025 03:14:29.331533909 CET | 443 | 49719 | 164.132.58.105 | 192.168.2.4 |
Mar 8, 2025 03:14:29.355928898 CET | 49719 | 443 | 192.168.2.4 | 164.132.58.105 |
Mar 8, 2025 03:14:29.400353909 CET | 443 | 49719 | 164.132.58.105 | 192.168.2.4 |
Mar 8, 2025 03:14:30.111773968 CET | 443 | 49719 | 164.132.58.105 | 192.168.2.4 |
Mar 8, 2025 03:14:30.111870050 CET | 443 | 49719 | 164.132.58.105 | 192.168.2.4 |
Mar 8, 2025 03:14:30.112030029 CET | 49719 | 443 | 192.168.2.4 | 164.132.58.105 |
Mar 8, 2025 03:14:30.115581036 CET | 49719 | 443 | 192.168.2.4 | 164.132.58.105 |
Mar 8, 2025 03:14:30.115614891 CET | 443 | 49719 | 164.132.58.105 | 192.168.2.4 |
Mar 8, 2025 03:14:30.115638018 CET | 49719 | 443 | 192.168.2.4 | 164.132.58.105 |
Mar 8, 2025 03:14:30.115648031 CET | 443 | 49719 | 164.132.58.105 | 192.168.2.4 |
Mar 8, 2025 03:14:30.413836956 CET | 49721 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:30.413878918 CET | 443 | 49721 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:30.413949013 CET | 49721 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:30.414840937 CET | 49721 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:30.414854050 CET | 443 | 49721 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:32.169879913 CET | 443 | 49721 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:32.169945002 CET | 49721 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:32.195110083 CET | 49721 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:32.195147038 CET | 443 | 49721 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:32.196093082 CET | 443 | 49721 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:32.196229935 CET | 49721 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:32.196645975 CET | 49721 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:32.240333080 CET | 443 | 49721 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:32.646811008 CET | 443 | 49721 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:32.646871090 CET | 49721 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:32.649214983 CET | 49721 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:32.649291992 CET | 443 | 49721 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:32.649444103 CET | 49721 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:32.659291029 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:32.659351110 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:32.659418106 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:32.659759998 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:32.659780979 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:34.441905022 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:34.441996098 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:34.444916010 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:34.444928885 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:34.445259094 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:34.445430040 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:34.445883036 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:34.488331079 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:34.919311047 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:34.919406891 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:34.919437885 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:34.919492006 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.008663893 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.008690119 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.008737087 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.008750916 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.008817911 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.008831978 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.008913040 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.043826103 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.043880939 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.043919086 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.043942928 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.043976068 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.043998003 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.077966928 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.078017950 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.078047037 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.078058004 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.078095913 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.078119040 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.118768930 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.118829966 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.118863106 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.118872881 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.118918896 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.148854017 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.148897886 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.148935080 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.148942947 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.148988008 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.169971943 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.170016050 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.170042038 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.170051098 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.170128107 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.170128107 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.192992926 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.193043947 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.193078995 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.193089962 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.193120003 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.193145037 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.210870981 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.210930109 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.210952997 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.210961103 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.211011887 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.211025000 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.211087942 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.227379084 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.227425098 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.227464914 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.227474928 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.227514029 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.227534056 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.240484953 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.240530968 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.240571976 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.240581036 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.240628958 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.251151085 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.251257896 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.251271009 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.251339912 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.263505936 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.263555050 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.263613939 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.263622999 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.263672113 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.273283005 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.273329020 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.273372889 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.273380995 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.273437023 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.284141064 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.284185886 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.284224033 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.284233093 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.284291029 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.296979904 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.297027111 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.297060013 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.297068119 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.297128916 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.303708076 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.303755045 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.303793907 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.303801060 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.303864002 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.314368963 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.314416885 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.314454079 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.314460993 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.314507961 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.325056076 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.325103045 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.325141907 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.325159073 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.325191021 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.325215101 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.338545084 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.338587999 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.338627100 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.338650942 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.338681936 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.338704109 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.351294041 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.351337910 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.351373911 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.351382017 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.351438999 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.361159086 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.361205101 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.361237049 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.361243010 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.361299038 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.372883081 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.372927904 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.372963905 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.372986078 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.373024940 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.373045921 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.387973070 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.388016939 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.388055086 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.388077974 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.388119936 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.388149023 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.391058922 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.391103029 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.391138077 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.391144991 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.391187906 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.400847912 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.400890112 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.400928020 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.400935888 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.400984049 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.416776896 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.416821003 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.416862965 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.416879892 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.416917086 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.416938066 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.430419922 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.430464029 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.430500984 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.430524111 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.430541992 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.430583000 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.443048954 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.443093061 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.443128109 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.443140030 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.443197966 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.453093052 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.453140974 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.453177929 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.453186035 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.453234911 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.453241110 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.453468084 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.469361067 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.469408035 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.469448090 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.469470024 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.469504118 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.469527960 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.479340076 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.479387045 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.479425907 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.479450941 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.479490995 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.479515076 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.482930899 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.482985973 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.487845898 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.487858057 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.487905979 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.492683887 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.492728949 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.492769957 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.492779016 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.492842913 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.508475065 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.508521080 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.508569002 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.508594036 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.508641958 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.508665085 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.522054911 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.522082090 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.522154093 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.522171021 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.522243977 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.534729004 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.534753084 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.534810066 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.534828901 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.534884930 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.544929981 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.544954062 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.545006037 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.545020103 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.545066118 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.556018114 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.556041002 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.556087971 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.556101084 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.556148052 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.571397066 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.571419001 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.571487904 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.571502924 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.571549892 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.574364901 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.574385881 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.574433088 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.574440956 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.574491978 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.584755898 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.584783077 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.584852934 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.584866047 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.585129976 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.600532055 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.600559950 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.600620031 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.600636005 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.600686073 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.613653898 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.613687038 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.613745928 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.613756895 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.613811970 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.631371975 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.631433964 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.631500959 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.631510973 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.631553888 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.631593943 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.647002935 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.647063017 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.647202015 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.647202015 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.647213936 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.648617029 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.648649931 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.648669958 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.648700953 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.648713112 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.648749113 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.648823977 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.663602114 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.663661957 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.663821936 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.663821936 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.663835049 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.663975000 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.666603088 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.666646004 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.666733980 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.666733980 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.666742086 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.666800976 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.676930904 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.676989079 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.677119017 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.677119017 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.677130938 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.680591106 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.692347050 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.692389011 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.692481041 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.692481995 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.692493916 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.692691088 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.705667019 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.705713034 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.705852032 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.705852032 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.705884933 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.708673954 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.718517065 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.718560934 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.718642950 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.718642950 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.718652010 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.718810081 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.738435984 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.738476038 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.738548040 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.738555908 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.738744020 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.738827944 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.738967896 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.738967896 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:35.738977909 CET | 443 | 49724 | 190.92.154.206 | 192.168.2.4 |
Mar 8, 2025 03:14:35.739109039 CET | 49724 | 443 | 192.168.2.4 | 190.92.154.206 |
Mar 8, 2025 03:14:47.875945091 CET | 49727 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:14:47.876008987 CET | 443 | 49727 | 172.67.194.165 | 192.168.2.4 |
Mar 8, 2025 03:14:47.876096010 CET | 49727 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:14:47.877335072 CET | 49727 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:14:47.877372026 CET | 443 | 49727 | 172.67.194.165 | 192.168.2.4 |
Mar 8, 2025 03:14:49.607589960 CET | 443 | 49727 | 172.67.194.165 | 192.168.2.4 |
Mar 8, 2025 03:14:49.607821941 CET | 49727 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:14:49.612375021 CET | 49727 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:14:49.612427950 CET | 443 | 49727 | 172.67.194.165 | 192.168.2.4 |
Mar 8, 2025 03:14:49.612674952 CET | 443 | 49727 | 172.67.194.165 | 192.168.2.4 |
Mar 8, 2025 03:14:49.679079056 CET | 49727 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:14:49.679079056 CET | 49727 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:14:49.679296970 CET | 443 | 49727 | 172.67.194.165 | 192.168.2.4 |
Mar 8, 2025 03:14:50.090025902 CET | 443 | 49727 | 172.67.194.165 | 192.168.2.4 |
Mar 8, 2025 03:14:50.090157986 CET | 443 | 49727 | 172.67.194.165 | 192.168.2.4 |
Mar 8, 2025 03:14:50.090249062 CET | 443 | 49727 | 172.67.194.165 | 192.168.2.4 |
Mar 8, 2025 03:14:50.090276003 CET | 49727 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:14:50.090320110 CET | 443 | 49727 | 172.67.194.165 | 192.168.2.4 |
Mar 8, 2025 03:14:50.090508938 CET | 49727 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:14:50.090527058 CET | 443 | 49727 | 172.67.194.165 | 192.168.2.4 |
Mar 8, 2025 03:14:50.090801001 CET | 443 | 49727 | 172.67.194.165 | 192.168.2.4 |
Mar 8, 2025 03:14:50.090972900 CET | 49727 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:14:50.091169119 CET | 49727 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:14:50.091206074 CET | 443 | 49727 | 172.67.194.165 | 192.168.2.4 |
Mar 8, 2025 03:14:50.091232061 CET | 49727 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:14:50.091248035 CET | 443 | 49727 | 172.67.194.165 | 192.168.2.4 |
Mar 8, 2025 03:14:50.227298021 CET | 49728 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:14:50.227395058 CET | 443 | 49728 | 172.67.194.165 | 192.168.2.4 |
Mar 8, 2025 03:14:50.227490902 CET | 49728 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:14:50.227902889 CET | 49728 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:14:50.227937937 CET | 443 | 49728 | 172.67.194.165 | 192.168.2.4 |
Mar 8, 2025 03:14:51.824280977 CET | 49728 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:15:40.122445107 CET | 49729 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:15:40.122558117 CET | 443 | 49729 | 172.67.194.165 | 192.168.2.4 |
Mar 8, 2025 03:15:40.122725964 CET | 49729 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:15:40.123730898 CET | 49729 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:15:40.123769999 CET | 443 | 49729 | 172.67.194.165 | 192.168.2.4 |
Mar 8, 2025 03:15:41.810759068 CET | 443 | 49729 | 172.67.194.165 | 192.168.2.4 |
Mar 8, 2025 03:15:41.810908079 CET | 49729 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:15:41.812017918 CET | 49729 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:15:41.812069893 CET | 443 | 49729 | 172.67.194.165 | 192.168.2.4 |
Mar 8, 2025 03:15:41.812906981 CET | 443 | 49729 | 172.67.194.165 | 192.168.2.4 |
Mar 8, 2025 03:15:41.855329037 CET | 49729 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:15:41.863141060 CET | 49729 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:15:41.863141060 CET | 49729 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:15:41.863558054 CET | 443 | 49729 | 172.67.194.165 | 192.168.2.4 |
Mar 8, 2025 03:15:42.293421984 CET | 443 | 49729 | 172.67.194.165 | 192.168.2.4 |
Mar 8, 2025 03:15:42.293550968 CET | 443 | 49729 | 172.67.194.165 | 192.168.2.4 |
Mar 8, 2025 03:15:42.293643951 CET | 49729 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:15:42.293659925 CET | 443 | 49729 | 172.67.194.165 | 192.168.2.4 |
Mar 8, 2025 03:15:42.293688059 CET | 443 | 49729 | 172.67.194.165 | 192.168.2.4 |
Mar 8, 2025 03:15:42.293979883 CET | 443 | 49729 | 172.67.194.165 | 192.168.2.4 |
Mar 8, 2025 03:15:42.294025898 CET | 49729 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:15:42.294064045 CET | 49729 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:15:42.294228077 CET | 49729 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:15:42.294275999 CET | 443 | 49729 | 172.67.194.165 | 192.168.2.4 |
Mar 8, 2025 03:15:42.294329882 CET | 49729 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:15:42.294346094 CET | 443 | 49729 | 172.67.194.165 | 192.168.2.4 |
Mar 8, 2025 03:15:42.424360991 CET | 49730 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:15:42.424393892 CET | 443 | 49730 | 172.67.194.165 | 192.168.2.4 |
Mar 8, 2025 03:15:42.424515963 CET | 49730 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:15:42.424935102 CET | 49730 | 443 | 192.168.2.4 | 172.67.194.165 |
Mar 8, 2025 03:15:42.424947023 CET | 443 | 49730 | 172.67.194.165 | 192.168.2.4 |
Mar 8, 2025 03:15:44.107187033 CET | 49730 | 443 | 192.168.2.4 | 172.67.194.165 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 8, 2025 03:14:24.891801119 CET | 58295 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 8, 2025 03:14:24.899269104 CET | 53 | 58295 | 1.1.1.1 | 192.168.2.4 |
Mar 8, 2025 03:14:27.361787081 CET | 63401 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 8, 2025 03:14:27.389595032 CET | 53 | 63401 | 1.1.1.1 | 192.168.2.4 |
Mar 8, 2025 03:14:30.202147961 CET | 55279 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 8, 2025 03:14:30.411114931 CET | 53 | 55279 | 1.1.1.1 | 192.168.2.4 |
Mar 8, 2025 03:14:47.858890057 CET | 61965 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 8, 2025 03:14:47.871201992 CET | 53 | 61965 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Mar 8, 2025 03:14:24.891801119 CET | 192.168.2.4 | 1.1.1.1 | 0x6841 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 8, 2025 03:14:27.361787081 CET | 192.168.2.4 | 1.1.1.1 | 0xc1f6 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 8, 2025 03:14:30.202147961 CET | 192.168.2.4 | 1.1.1.1 | 0xcb1a | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 8, 2025 03:14:47.858890057 CET | 192.168.2.4 | 1.1.1.1 | 0x27f7 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Mar 8, 2025 03:14:24.899269104 CET | 1.1.1.1 | 192.168.2.4 | 0x6841 | No error (0) | 104.18.111.161 | A (IP address) | IN (0x0001) | false | ||
Mar 8, 2025 03:14:24.899269104 CET | 1.1.1.1 | 192.168.2.4 | 0x6841 | No error (0) | 104.17.112.233 | A (IP address) | IN (0x0001) | false | ||
Mar 8, 2025 03:14:27.389595032 CET | 1.1.1.1 | 192.168.2.4 | 0xc1f6 | No error (0) | 164.132.58.105 | A (IP address) | IN (0x0001) | false | ||
Mar 8, 2025 03:14:30.411114931 CET | 1.1.1.1 | 192.168.2.4 | 0xcb1a | No error (0) | 190.92.154.206 | A (IP address) | IN (0x0001) | false | ||
Mar 8, 2025 03:14:47.871201992 CET | 1.1.1.1 | 192.168.2.4 | 0x27f7 | No error (0) | 172.67.194.165 | A (IP address) | IN (0x0001) | false | ||
Mar 8, 2025 03:14:47.871201992 CET | 1.1.1.1 | 192.168.2.4 | 0x27f7 | No error (0) | 104.21.44.37 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49717 | 104.18.111.161 | 443 | 6800 | C:\Users\user\AppData\Local\Temp\is-Q5OPF.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-08 02:14:26 UTC | 192 | OUT | |
2025-03-08 02:14:27 UTC | 1259 | IN | |
2025-03-08 02:14:27 UTC | 110 | IN | |
2025-03-08 02:14:27 UTC | 491 | IN | |
2025-03-08 02:14:27 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49719 | 164.132.58.105 | 443 | 6800 | C:\Users\user\AppData\Local\Temp\is-Q5OPF.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-08 02:14:29 UTC | 251 | OUT | |
2025-03-08 02:14:30 UTC | 316 | IN | |
2025-03-08 02:14:30 UTC | 43 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49721 | 190.92.154.206 | 443 | 6800 | C:\Users\user\AppData\Local\Temp\is-Q5OPF.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-08 02:14:32 UTC | 159 | OUT | |
2025-03-08 02:14:32 UTC | 644 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49724 | 190.92.154.206 | 443 | 6800 | C:\Users\user\AppData\Local\Temp\is-Q5OPF.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-08 02:14:34 UTC | 158 | OUT | |
2025-03-08 02:14:34 UTC | 644 | IN | |
2025-03-08 02:14:34 UTC | 724 | IN | |
2025-03-08 02:14:35 UTC | 14994 | IN | |
2025-03-08 02:14:35 UTC | 16384 | IN | |
2025-03-08 02:14:35 UTC | 16384 | IN | |
2025-03-08 02:14:35 UTC | 16384 | IN | |
2025-03-08 02:14:35 UTC | 16384 | IN | |
2025-03-08 02:14:35 UTC | 16384 | IN | |
2025-03-08 02:14:35 UTC | 16384 | IN | |
2025-03-08 02:14:35 UTC | 16384 | IN | |
2025-03-08 02:14:35 UTC | 666 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49727 | 172.67.194.165 | 443 | 7772 | C:\Users\user\AppData\Local\Programs\Common\taskshostw.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-08 02:14:49 UTC | 264 | OUT | |
2025-03-08 02:14:49 UTC | 8 | OUT | |
2025-03-08 02:14:50 UTC | 564 | IN | |
2025-03-08 02:14:50 UTC | 805 | IN | |
2025-03-08 02:14:50 UTC | 1369 | IN | |
2025-03-08 02:14:50 UTC | 1369 | IN | |
2025-03-08 02:14:50 UTC | 1014 | IN | |
2025-03-08 02:14:50 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49729 | 172.67.194.165 | 443 | 8128 | C:\Users\user\AppData\Local\Programs\Common\taskshostw.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-08 02:15:41 UTC | 264 | OUT | |
2025-03-08 02:15:41 UTC | 8 | OUT | |
2025-03-08 02:15:42 UTC | 200 | IN | |
2025-03-08 02:15:42 UTC | 1169 | IN | |
2025-03-08 02:15:42 UTC | 1369 | IN | |
2025-03-08 02:15:42 UTC | 1369 | IN | |
2025-03-08 02:15:42 UTC | 572 | IN | |
2025-03-08 02:15:42 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 21:14:17 |
Start date: | 07/03/2025 |
Path: | C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 3'548'416 bytes |
MD5 hash: | 4F4E6DD4D4B9D96E69B7F8F97E867023 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 21:14:18 |
Start date: | 07/03/2025 |
Path: | C:\Users\user\AppData\Local\Temp\is-3LF26.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 2'541'056 bytes |
MD5 hash: | 6C66FDD38C098F271FDE6E9E74DBD0EB |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Antivirus matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 3 |
Start time: | 21:14:23 |
Start date: | 07/03/2025 |
Path: | C:\Users\user\Desktop\Magic_V_pro_setup_stable_latest_release_version_9_709.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 3'548'416 bytes |
MD5 hash: | 4F4E6DD4D4B9D96E69B7F8F97E867023 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Reputation: | low |
Has exited: | true |
Target ID: | 4 |
Start time: | 21:14:23 |
Start date: | 07/03/2025 |
Path: | C:\Users\user\AppData\Local\Temp\is-Q5OPF.tmp\Magic_V_pro_setup_stable_latest_release_version_9_709.tmp |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 2'541'056 bytes |
MD5 hash: | 6C66FDD38C098F271FDE6E9E74DBD0EB |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Antivirus matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 10 |
Start time: | 21:14:37 |
Start date: | 07/03/2025 |
Path: | C:\Users\user\AppData\Local\Temp\is-R3SKQ.tmp\idp.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xff0000 |
File size: | 847'360 bytes |
MD5 hash: | 6482EE0F372469D1190C74BD70D76153 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 11 |
Start time: | 21:14:37 |
Start date: | 07/03/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff62fc20000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 12 |
Start time: | 21:14:38 |
Start date: | 07/03/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xc70000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 13 |
Start time: | 21:14:38 |
Start date: | 07/03/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff62fc20000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 14 |
Start time: | 21:14:38 |
Start date: | 07/03/2025 |
Path: | C:\Windows\SysWOW64\attrib.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1b0000 |
File size: | 19'456 bytes |
MD5 hash: | 0E938DD280E83B1596EC6AA48729C2B0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 15 |
Start time: | 21:14:38 |
Start date: | 07/03/2025 |
Path: | C:\Windows\SysWOW64\schtasks.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xfe0000 |
File size: | 187'904 bytes |
MD5 hash: | 48C2FE20575769DE916F48EF0676A965 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 16 |
Start time: | 21:14:38 |
Start date: | 07/03/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff62fc20000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 17 |
Start time: | 21:14:40 |
Start date: | 07/03/2025 |
Path: | C:\Users\user\AppData\Local\Programs\Common\taskshostw.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'427'456 bytes |
MD5 hash: | 33645B3AFD79ED29F7E6F476D7F6ED4B |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | Borland Delphi |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 18 |
Start time: | 21:14:41 |
Start date: | 07/03/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xc70000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 19 |
Start time: | 21:14:41 |
Start date: | 07/03/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff62fc20000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 22 |
Start time: | 21:15:37 |
Start date: | 07/03/2025 |
Path: | C:\Users\user\AppData\Local\Programs\Common\taskshostw.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'427'456 bytes |
MD5 hash: | 33645B3AFD79ED29F7E6F476D7F6ED4B |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | Borland Delphi |
Has exited: | true |