Windows
Analysis Report
DangerousMidlands.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- DangerousMidlands.exe (PID: 6604 cmdline:
"C:\Users\ user\Deskt op\Dangero usMidlands .exe" MD5: E4AE7D2D997AD9CDB1E4C138E4DD10DF) - cmd.exe (PID: 6552 cmdline:
"C:\Window s\System32 \cmd.exe" /c move Wi nds Winds. cmd & Wind s.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6556 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 4768 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 1984 cmdline:
findstr /I "opssvc w rsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - tasklist.exe (PID: 2316 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 5304 cmdline:
findstr "A vastUI AVG UI bdservi cehost nsW scSvc ekrn SophosHea lth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 1412 cmdline:
cmd /c md 243744 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - findstr.exe (PID: 4668 cmdline:
findstr /V "Hawaiian " Higher MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 5248 cmdline:
cmd /c cop y /b ..\De corative + ..\Proper ties + ..\ Restricted + ..\Jour ney + ..\R espiratory + ..\Stat ions + ..\ Flush x MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - Provider.com (PID: 320 cmdline:
Provider.c om x MD5: 62D09F076E6E0240548C2F837536A46A) - choice.exe (PID: 3452 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:53:21.440947+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49813 | 104.102.49.254 | 443 | TCP |
2025-01-10T11:53:22.541969+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49819 | 104.21.112.1 | 443 | TCP |
2025-01-10T11:53:23.458143+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49825 | 104.21.112.1 | 443 | TCP |
2025-01-10T11:53:24.564423+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49836 | 104.21.112.1 | 443 | TCP |
2025-01-10T11:53:25.574366+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49842 | 104.21.112.1 | 443 | TCP |
2025-01-10T11:53:26.680554+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49853 | 104.21.112.1 | 443 | TCP |
2025-01-10T11:53:27.888696+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49859 | 104.21.112.1 | 443 | TCP |
2025-01-10T11:53:28.862598+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49868 | 104.21.112.1 | 443 | TCP |
2025-01-10T11:53:29.851045+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49876 | 104.21.112.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:53:22.989711+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49819 | 104.21.112.1 | 443 | TCP |
2025-01-10T11:53:23.935191+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49825 | 104.21.112.1 | 443 | TCP |
2025-01-10T11:53:30.327292+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49876 | 104.21.112.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:53:22.989711+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.5 | 49819 | 104.21.112.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:53:23.935191+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.5 | 49825 | 104.21.112.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:53:20.714155+0100 | 2058354 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 58516 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:53:20.737764+0100 | 2058358 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 56241 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:53:20.674859+0100 | 2058360 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 54336 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:53:20.701058+0100 | 2058362 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 55678 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:53:20.658233+0100 | 2058364 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 53378 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:53:20.687809+0100 | 2058370 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 62686 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:53:20.765193+0100 | 2058374 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 65202 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:53:20.644288+0100 | 2058285 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 51320 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:53:20.726650+0100 | 2058376 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 55132 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:53:29.343514+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49868 | 104.21.112.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:53:21.940479+0100 | 2858666 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49813 | 104.102.49.254 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00406301 | |
Source: | Code function: | 0_2_00406CC7 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_004050F9 |
Source: | Code function: | 0_2_004044D1 |
Source: | Code function: | 0_2_004038AF |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_0040737E | |
Source: | Code function: | 0_2_00406EFE | |
Source: | Code function: | 0_2_004079A2 | |
Source: | Code function: | 0_2_004049A8 |
Source: | Dropped File: |
Source: | Code function: |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_004044D1 |
Source: | Code function: | 0_2_004024FB |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Process created: |
Source: | Window detected: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00406328 |
Source: | Static PE information: |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Code function: | 0_2_00406301 | |
Source: | Code function: | 0_2_00406CC7 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_00406328 |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00406831 |
Source: | Key value queried: | Jump to behavior |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 21 Windows Management Instrumentation | 1 DLL Side-Loading | 12 Process Injection | 11 Masquerading | 2 OS Credential Dumping | 11 Security Software Discovery | Remote Services | 11 Input Capture | 11 Encrypted Channel | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 1 Native API | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 11 Virtualization/Sandbox Evasion | 11 Input Capture | 11 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 1 Archive Collected Data | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 12 Process Injection | Security Account Manager | 3 Process Discovery | SMB/Windows Admin Shares | 31 Data from Local System | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Deobfuscate/Decode Files or Information | NTDS | 13 File and Directory Discovery | Distributed Component Object Model | 1 Clipboard Data | 14 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | 25 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
72% | Virustotal | Browse | ||
63% | ReversingLabs | Win32.Trojan.Leonem |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
steamcommunity.com | 104.102.49.254 | true | false | high | |
sputnik-1985.com | 104.21.112.1 | true | false | high | |
sustainskelet.lat | unknown | unknown | false | high | |
spellshagey.biz | unknown | unknown | true | unknown | |
crosshuaht.lat | unknown | unknown | false | high | |
rapeflowwj.lat | unknown | unknown | false | high | |
qjEfWPoTOhObtQTmQsEomFwND.qjEfWPoTOhObtQTmQsEomFwND | unknown | unknown | true | unknown | |
grannyejh.lat | unknown | unknown | false | high | |
aspecteirs.lat | unknown | unknown | false | high | |
discokeyus.lat | unknown | unknown | false | high | |
energyaffai.lat | unknown | unknown | false | high | |
necklacebudi.lat | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.112.1 | sputnik-1985.com | United States | 13335 | CLOUDFLARENETUS | false | |
104.102.49.254 | steamcommunity.com | United States | 16625 | AKAMAI-ASUS | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1587446 |
Start date and time: | 2025-01-10 11:51:56 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 44s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 15 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | DangerousMidlands.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@22/21@12/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.12.23.50
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtSetInformationFile calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
05:52:50 | API Interceptor | |
05:52:55 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.112.1 | Get hash | malicious | FormBook | Browse |
| |
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | CMSBrute | Browse |
| ||
104.102.49.254 | Get hash | malicious | Socks5Systemz | Browse |
| |
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
sputnik-1985.com | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, PrivateLoader | Browse |
| ||
steamcommunity.com | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
AKAMAI-ASUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | HTMLPhisher | Browse |
| |
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\243744\Provider.com | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 947288 |
Entropy (8bit): | 6.630612696399572 |
Encrypted: | false |
SSDEEP: | 24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK |
MD5: | 62D09F076E6E0240548C2F837536A46A |
SHA1: | 26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2 |
SHA-256: | 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49 |
SHA-512: | 32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 480802 |
Entropy (8bit): | 7.999570513719399 |
Encrypted: | true |
SSDEEP: | 6144:yZqJSxlijuUh7yvC6a8LiBhV6xySLiB3YpbtFzemj08R5Hd+gUDwoXUBURmqhrg0:ynxgovCj+CV6xyRB3YpRFzLQOjmkURmC |
MD5: | CCFF1C842A7BE2ADB62A7798303AC102 |
SHA1: | A41749C1FE6FDB9AF57B2A1E7D51809E4D8CAFD6 |
SHA-256: | 4D63ED24F3EC7A908BD6AB5F50A281B22D6D9E50A4DAACDCFC674C6A0330D260 |
SHA-512: | 3AB6BB4794327497B0117D36B5372C59BE969DE4EB858D73183AF1F975570FED5263FDB4E2FDE5E1B3B77E4411A929466C667D229BCB489D76D30D343E16CDAD |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\DangerousMidlands.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 147456 |
Entropy (8bit): | 6.565237445575705 |
Encrypted: | false |
SSDEEP: | 3072:3JR8CThpmESv+AqVnBypIbv18mLthfhnueoMmOqDoioO5bLezW9FfTut/Dde6u6n:30CThp6vmVnjphfhnvO5bLezWWt/Dd3N |
MD5: | DC929F37378E213E4DC1B0826FB74898 |
SHA1: | A69E81714004FE12E4693DFDF24D8C83D5B7F068 |
SHA-256: | 64B5C7A58D07FB10F42AC199F9046182D3CE0EF42498D2626E3C28263F49DFC7 |
SHA-512: | C7DF6A8934B0807FC22E481B95BA30BE92F4B3CB3B24391C9A31EFC3A2D04600B0E4A4993825C5895DF212D1C7C691AFA791375BA446AEC34E58B1C1DE6A6EB6 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\DangerousMidlands.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 95232 |
Entropy (8bit): | 6.707611937223872 |
Encrypted: | false |
SSDEEP: | 1536:pSh+I+FrbCyI7P4Cxi8q0vQEcmFdni8yDGVFE5gOHu1CwCMIBZwneAJu7QnswIPS:pSAU4CE0Imbi80PtCZEMnVIPS |
MD5: | 71CBECF5584BFC8B9346E3FE0A43ACCF |
SHA1: | 25073C60DAA0EC28B5E76AD6AD9C35875D7B6849 |
SHA-256: | 7F3031D667C30A2FC62EDB0A56F4CFD21320921BEF9F3B2725C90B633B3EE37A |
SHA-512: | C6F3C72CE0CF8EA7008F02DF2A6507A6A6D5FC6ECFF421500CE9F1DB97FD10B6CAAA8B82E6589C837EF3E8334C00EEDC92C68CFD564473D067E04C6E61308E2C |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\DangerousMidlands.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 137216 |
Entropy (8bit): | 4.836893557448978 |
Encrypted: | false |
SSDEEP: | 768:HD9vmPukxhSaAwuXc/mex/SGKAGWRqA60dTcR4qYnGfAHE9AUsFxyLtVSQsbZgal:jmuzaAwusPdKaj6iTcPAsAhxjgarB/T |
MD5: | 638C2D1C19311968EC6BFC046351D617 |
SHA1: | EB379983E76E174A1683A624FC5692F81C78DB68 |
SHA-256: | 35D0CE6C16A2C20BE07646BAC9AC3259AE25CE50F294C536CF4D76331696412E |
SHA-512: | B767C634453B3FC7A39DBD7C5B1F69EB8A3291ED0B37AEB6857CD0BFDBB92DE1154288F8D6ED9EDCD2AFE93640D396C3537E35EA256107523C7917CBC9AD9CE8 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\DangerousMidlands.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 74752 |
Entropy (8bit): | 7.997347607421002 |
Encrypted: | true |
SSDEEP: | 1536:Z8tdf5p4TFsxg9eJOP+4nnqW18830IuGMvqJr:Z8H5p4JSxOGU1h0WuUr |
MD5: | 94F9EAAFC205B6C78656295C491B421C |
SHA1: | EFFE02799C7BF9555500688804019A0C6E554069 |
SHA-256: | B8D00124EA438F2D867CFDC01168F30E697B15639DEF134AB2F886C75F7C9DEA |
SHA-512: | 5E18D34DE030E157A7175442ADD8F30F07790E7941686A7AA0842D7D82EC65C9B01ED18796602DAA9C5E65E279F185927AD515B5BF0698DB3D0FB1991D54EBF7 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\DangerousMidlands.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 31266 |
Entropy (8bit): | 7.9941765994189105 |
Encrypted: | true |
SSDEEP: | 384:L9E2LsOL34+WmaO+LxrsyhFNHoxhOE0yZDpwAq74Mk6gGZqoV8ZX0EQJFfQ+SO19:dZaO+tXjiOp38NiZpGX0I+SO1v0k490 |
MD5: | 6E195AFBB009162B963D86D3093DC9E6 |
SHA1: | 74F3DD30D7320D82088DA4C99B6CFF2DBA64E3FF |
SHA-256: | E14150275A35C6F9707E8C86CD172B7A5EDFD5D00DC75AED0CB2E0CB5561A999 |
SHA-512: | 3B34DA382477890FE12932E9054C221551F8D70031768B0BBDC6BD7BDA442C77A4084BF61A4A9987DBE9B4C84C2B6C146C0B1517821353D1D3D1BEDB54335F2E |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\DangerousMidlands.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2119 |
Entropy (8bit): | 5.1143687740907335 |
Encrypted: | false |
SSDEEP: | 48:F9n9mTsCNvEQH5O5U1nPKrhBzM1FoMPhfq1koCd:HSEA5O5W+MfH5S1Cd |
MD5: | 0928C31DDF50E741DA974C5F82B97877 |
SHA1: | 83885458BE15C85F7DE8E9A46DCB11A2D94CDD73 |
SHA-256: | 0ADF235125F7761DD8AA466903FAA0512C60806DB20C830031450F71AEBE83F0 |
SHA-512: | 4A6E0E4BC5CD1C8277542FC9565FD9145B405B29B413B68D3FA44847092C8E27C4F28DA1415F44CFC28027784AB67375E4319DDBB04FD8DFFB1EEEDF096DCE45 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\DangerousMidlands.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 89088 |
Entropy (8bit): | 6.123338834341429 |
Encrypted: | false |
SSDEEP: | 1536:B3YRYfv2j62SfuVGHj1vtK7h6R8anHsWccd0vtmgMbFuz08QuklMBNIi:BoRC2jfTq8QLeAg0Fuz08XvBNv |
MD5: | 2D27A00E0478620A373A7D06452DD7A5 |
SHA1: | 76E6A8A7697B80EE22534D3D08C125B9252D3CD8 |
SHA-256: | BAC544FB084F7AA2A5AD3AB35D5017C16654775CCAE1813100F55B9214C0B58A |
SHA-512: | 56FD8E5B58D7FFB9F641ADCA79C5B9E4B84C81C6ECFBBA0615D23C5EBE07B63CB16491CE6D16B76B3249C4231D9B47FCFB3E52FCD9644E2F6B32BD5BD16F22A8 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\DangerousMidlands.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 84992 |
Entropy (8bit): | 7.997619621069733 |
Encrypted: | true |
SSDEEP: | 1536:Tltg41vSjvV7C+vC3oHoi6cqeOADAI0pjifRgm+Bs/2xVecCjHMsvI8e77:T3gyIvVxv6O6uOA87pefFz/2S7jHUt |
MD5: | 89E88C858A03BD5A6DE374E80A224AEA |
SHA1: | E175DCECF146C60431C4A972CD88ACF482511367 |
SHA-256: | 06746AA0952AB17A8B300D08402ED041E23947678E39B054748751586266EE67 |
SHA-512: | 56668A082FC0C37F4819428B6CDA761B071C7052D134712F6D4934BB9A917E39EF79A1E32F8BAC995AB83F0572B817D0929BDBBE0497B8A5B788A09633DA836C |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\DangerousMidlands.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 115712 |
Entropy (8bit): | 6.647443692867202 |
Encrypted: | false |
SSDEEP: | 3072:SlaW2UDQWf05mjccBiqXvpgF4qv+32eOyKODOSpy:SloUDtf0accB3gBmmLsiSM |
MD5: | 099455C137087BDDE548653451591C5F |
SHA1: | 9F24F2BFE2FDB233B68C119D4F2640DACDA4F7B4 |
SHA-256: | F6FD37C0370E316EEF9894D797B2D7EB6581D6871FDC36BCD9ABE538D70BFFF1 |
SHA-512: | 78E13C74BAA56475BBA24E6A7003F2ADD3D84BB084310DF3ED5436D99AAA18DC9F856C11039FD0A50D5A3E3242D87B01F60EB4C2C3120F7ACF31D5565F31C0F7 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\DangerousMidlands.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 53248 |
Entropy (8bit): | 7.997032535375572 |
Encrypted: | true |
SSDEEP: | 768:317yh5tKNP43FIL9HFCGKUlL6r1fFOw1EuG9A6NG15p5MpvQosxNE8TQjAOwb:317yhK39HFCXS6r1ti3S6NG1ho4TQj8b |
MD5: | 42744DF3D5F328D0E4ADF75ECB84AE01 |
SHA1: | F79F66118832CA26C61877C0FCF50E82CE1206B0 |
SHA-256: | 2ABA7D10FCB586C7A9F6F8AA366C8D905962CADEFEBDEBDF40262B3861964BC9 |
SHA-512: | C453F41CA3BC7EFFBDBFC73AB4F5D0A829A84156818A98DCD46C588F54AF48E2ECCB8F5182EBD884AED1A2AFD965770E88B5F5E8BDAC6897C9628FEB049169AC |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\DangerousMidlands.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 66560 |
Entropy (8bit): | 7.996603256033337 |
Encrypted: | true |
SSDEEP: | 1536:SbYIYCRk2KLn92CNaEIKHUut4v9tGO4Qct9Euer+gJitVtHwh:S9nRHZKB41tGfEd+gJWVtHwh |
MD5: | 1C7D09A2823F7721B1BCBAAB272C7769 |
SHA1: | 7F6EA5FCEFBE39D47A7ABE32A04E417D949AFB3E |
SHA-256: | 66A3BD71F206C8728C1852C2E98546F673F22117D828B99648A68CBE828C3E2F |
SHA-512: | 8CD1B96D16E92037E862A20A6B60F7ADE7B89D18D77C15BA643E241F1EECDEEF8E1BACD26A24909F8FED03CA5B90DD50043FE744288F975CF32ACA8E2508A80A |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\DangerousMidlands.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 94208 |
Entropy (8bit): | 7.997838751328475 |
Encrypted: | true |
SSDEEP: | 1536:Kibpd4Vn0t/fu17j6sEnAlL7hVW2hrTgSPFMgT4cpGiT6BjySLR/C9d46WQy0:DgVO/ml6sEnARVVBhAYegT/pGY6xySAl |
MD5: | B4244A9E46D4B64DD56234864E5B721C |
SHA1: | F1D69C64D2AD10C2C89044A5500F6522019305D2 |
SHA-256: | C0B207F6049B94B641E32053970DF8FBD99D0539447281C8AF5C55CDC3339F3D |
SHA-512: | 23F5D7F09EF5C875CE57C5CACF63CA534D032FCD1DE0A0BDFF24B9C3F326CA79646BD2B99608817343298D6DDB9912A5E53C6F6C9D064C1D393E9020FCCDDCF2 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\DangerousMidlands.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 75776 |
Entropy (8bit): | 7.997221375382162 |
Encrypted: | true |
SSDEEP: | 1536:LuwMPT+49LtPBk1lTBtlTxcK0hXWvC+sqmrLgA3Wqod:iq4ZJUBtIpfqOLD3WqI |
MD5: | 1EE234F30B4027F57C70065B52CC92BF |
SHA1: | E4A6D4E53C39787CC399D81E74360C177065A256 |
SHA-256: | E32FC368261F27E66EF7D985747337F70575EC941381ADFECAD33E93B0BD9E2E |
SHA-512: | 2583A6373E19A1E499B7C229159203AD15288E69C5790C1223A59AF4117CFC0F2645C4FD13CE69ED0135E89ED2F720CA642ACF366CBDAC406CA23DAF1060F5A5 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\DangerousMidlands.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 82944 |
Entropy (8bit): | 6.65354929800658 |
Encrypted: | false |
SSDEEP: | 1536:DmV3BxZxu6/sPYcSyRXzW8/uC6LdTmHwANUQlHS3cctlxWboHdMJ3RraSXL2j:eBxT/sZydTmRxlHS3NxrHSBRtk |
MD5: | B2DBC762459E3EAF29095374A2B5EC0B |
SHA1: | 570A3DDE0ECB5F2CD7D4D6F993B0F2366DAF113C |
SHA-256: | C1B063A68FE6EB8B0A0CE8A1C3F4C12B04E9654D4A9947F4A1BEDDD2682B423C |
SHA-512: | 42B321EF781E27B3939C255D1D245060CBBF3FE7ABADCBA2123BA9D1A9EFFD33EC1083A931B48D4F913C7FE429D2B1CB0F98767A44845CA7C0DE647BB18D3CB3 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\DangerousMidlands.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 96256 |
Entropy (8bit): | 6.296173308905339 |
Encrypted: | false |
SSDEEP: | 1536:yAD1EsdzVXnP94SGGLpRB6M28eFvMVpYhWoXElJUzdlDfFgQa8BpDzdZPp7HE+tq:yg5PXPeiR6MKkjGWoUlJUPdgQa8Bp/L8 |
MD5: | B54B81D6FF5835691E471815AD6AC529 |
SHA1: | DF77BF36D1DDFDF633B1C2D90902CBAA164D2B3D |
SHA-256: | 2F35A3E8CF1B4FF4A1B1B6E0BF0528F5B3E4893E5B9DE11149C0B9D9894B5F90 |
SHA-512: | 8E878C4DD9F2914246FDA4A96B422DAA91FBD87E2439AF0AF7D5D167C6EAFC2A9DF6AF0A212923F033214D902C09563D264A392DB44E52C2A823DA186CBCD10E |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\DangerousMidlands.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 96281 |
Entropy (8bit): | 6.721598942885351 |
Encrypted: | false |
SSDEEP: | 1536:Fel3EYrDWyu0uZo2+9BGmdATGODv7xvTphAiPChgZ2kOE6:FelDWy4ZNoGmROL7F1G7ho2kOb |
MD5: | DD6237162BA6E2648F4D111980507B94 |
SHA1: | 73A85F1962375B48CA015A0A25D1325CE387334B |
SHA-256: | 81FE7B33F68FF82682039B4D647F75FFF71407AFB08883F0464357CE070280C8 |
SHA-512: | 4A55B0790E1887C83DF82025BAC5F79CE7542BBCDFB8D4A01ED4913822AAC462EAECDFE967D227D850BF7B50A594D4E12A16DAC65C7EADE67D597D7019B79879 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\DangerousMidlands.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 27167 |
Entropy (8bit): | 5.073345242372113 |
Encrypted: | false |
SSDEEP: | 384:bs6DsjnnxWUgBbajiZ7cVgrEuIvSkKD3cdaoW48MtsttBvCWs5ZVxTPRqm1WJVs:bs64jnnx9gdVMg2+tt1x0LYJVs |
MD5: | D353D15E539CD507F7FC381A8CA10E09 |
SHA1: | FAB6EBCBC6D869B72C05F1E9DBAEBE39A1A81ABB |
SHA-256: | 143DE3EFB5FFFE4746EBFDF13A082DE16129CFBA040434188A93D49E40963CAF |
SHA-512: | 80A1B63F063B88E3C88E62668778209EC28E446BCEA347838035F6544480C2099A0F9106B86296D79B1FA8F40E21B33AA812C959D286F14F52F099C15F595268 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 27167 |
Entropy (8bit): | 5.073345242372113 |
Encrypted: | false |
SSDEEP: | 384:bs6DsjnnxWUgBbajiZ7cVgrEuIvSkKD3cdaoW48MtsttBvCWs5ZVxTPRqm1WJVs:bs64jnnx9gdVMg2+tt1x0LYJVs |
MD5: | D353D15E539CD507F7FC381A8CA10E09 |
SHA1: | FAB6EBCBC6D869B72C05F1E9DBAEBE39A1A81ABB |
SHA-256: | 143DE3EFB5FFFE4746EBFDF13A082DE16129CFBA040434188A93D49E40963CAF |
SHA-512: | 80A1B63F063B88E3C88E62668778209EC28E446BCEA347838035F6544480C2099A0F9106B86296D79B1FA8F40E21B33AA812C959D286F14F52F099C15F595268 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\DangerousMidlands.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 84992 |
Entropy (8bit): | 6.665012790239393 |
Encrypted: | false |
SSDEEP: | 1536:ZrKoUn9r5C03Eq30BcrTrhCX4aVmoJiKwtk2ukC5HRu+OoQjz7nts/M26N7oKzYA:gPnj0nEoXnmowS2u5hVOoQ7t8T6pUkt |
MD5: | F2C8EECA01CC54C87CE44804EF31F4F6 |
SHA1: | 07301C1548162ACC98BEBC9C155563644AC10971 |
SHA-256: | 0BED453D8D06C358EA9FDCDA0BC3538D7C21B3B5EEFB3D7C83CE324A501BF782 |
SHA-512: | 82907789042D33D753C2AC44B44BD8EF11FB9728998577C34E461C309E1CCE01ADE194B99E0E222637AC8D9EFD5A4B1D8264F6FE1409CD0363A5031E5B67D116 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.9763801195793285 |
TrID: |
|
File name: | DangerousMidlands.exe |
File size: | 1'270'226 bytes |
MD5: | e4ae7d2d997ad9cdb1e4c138e4dd10df |
SHA1: | fc1755d4bf9e0ae7e6ae1cfd4f2100388523ee8c |
SHA256: | a2338d0fb90c8e190571b32d5e5fce6b943b9fd10d8900c82d39ee1335183e0e |
SHA512: | 43ef9c12da2a160b9c961f8d2282786357acc21ad42d2e4afa24f6d0b4b3830b60af3cf2c2e71a79a93ee967fded7b6a21db3a3a6e5db3ae2abd308bb0799aa1 |
SSDEEP: | 24576:Kd0HzzFvwGLyNRCqplgMxKJDFd+CTqO+I:e09wGLyNRChMxaF4CTH |
TLSH: | DE4523CBDFA04F1BDD850DB554328AAECE367E311960C39B6218EE483675393EA14763 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................t.......B...8..... |
Icon Hash: | 68e8d6e4e4f0f918 |
Entrypoint: | 0x4038af |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x4F47E2E4 [Fri Feb 24 19:20:04 2012 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | be41bf7b8cc010b614bd36bbca606973 |
Signature Valid: | false |
Signature Issuer: | CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 464C015DAA50884AB4DD5502E6B164B0 |
Thumbprint SHA-1: | 96B7B1EF175BBA4BDE33A05402134289B28B5BCB |
Thumbprint SHA-256: | ABC429325881B54BEC561B7B5A635E0E0AC9C94742F1324EBE5EB9AF6AE0CCC5 |
Serial: | 0D1A340F78D7D000E089FDBAAD6522DF |
Instruction |
---|
sub esp, 000002D4h |
push ebx |
push ebp |
push esi |
push edi |
push 00000020h |
xor ebp, ebp |
pop esi |
mov dword ptr [esp+18h], ebp |
mov dword ptr [esp+10h], 0040A268h |
mov dword ptr [esp+14h], ebp |
call dword ptr [00409030h] |
push 00008001h |
call dword ptr [004090B4h] |
push ebp |
call dword ptr [004092C0h] |
push 00000008h |
mov dword ptr [0047EB98h], eax |
call 00007F4B20BCFE0Bh |
push ebp |
push 000002B4h |
mov dword ptr [0047EAB0h], eax |
lea eax, dword ptr [esp+38h] |
push eax |
push ebp |
push 0040A264h |
call dword ptr [00409184h] |
push 0040A24Ch |
push 00476AA0h |
call 00007F4B20BCFAEDh |
call dword ptr [004090B0h] |
push eax |
mov edi, 004CF0A0h |
push edi |
call 00007F4B20BCFADBh |
push ebp |
call dword ptr [00409134h] |
cmp word ptr [004CF0A0h], 0022h |
mov dword ptr [0047EAB8h], eax |
mov eax, edi |
jne 00007F4B20BCD3DAh |
push 00000022h |
pop esi |
mov eax, 004CF0A2h |
push esi |
push eax |
call 00007F4B20BCF7B1h |
push eax |
call dword ptr [00409260h] |
mov esi, eax |
mov dword ptr [esp+1Ch], esi |
jmp 00007F4B20BCD463h |
push 00000020h |
pop ebx |
cmp ax, bx |
jne 00007F4B20BCD3DAh |
add esi, 02h |
cmp word ptr [esi], bx |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xac40 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x100000 | 0x3487e | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x13383a | 0x2998 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x86000 | 0x994 | .ndata |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x9000 | 0x2d0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x728c | 0x7400 | 419d4e1be1ac35a5db9c47f553b27cea | False | 0.6566540948275862 | data | 6.499708590628113 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x9000 | 0x2b6e | 0x2c00 | cca1ca3fbf99570f6de9b43ce767f368 | False | 0.3678977272727273 | data | 4.497932535153822 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xc000 | 0x72b9c | 0x200 | 77f0839f8ebea31040e462523e1c770e | False | 0.279296875 | data | 1.8049406284608531 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x7f000 | 0x81000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x100000 | 0x3487e | 0x34a00 | 85d752eae522ee88e13b71a35850c520 | False | 0.9565162930522565 | data | 7.9000568077464965 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x135000 | 0xfd6 | 0x1000 | c9953916bea715d4da4ed72b6d31b9e2 | False | 0.59814453125 | data | 5.588920117438316 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x100220 | 0x2c160 | PNG image data, 512 x 512, 8-bit/color RGBA, non-interlaced | English | United States | 0.989954368243842 |
RT_ICON | 0x12c380 | 0x42a1 | PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced | English | United States | 1.0009380313067948 |
RT_ICON | 0x130624 | 0x165d | PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced | English | United States | 1.0019213973799126 |
RT_ICON | 0x131c84 | 0x2668 | Device independent bitmap graphic, 48 x 96 x 32, image size 9792 | English | United States | 0.36279495524816924 |
RT_DIALOG | 0x1342ec | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0x1343ec | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x134508 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x134568 | 0x3e | data | English | United States | 0.8387096774193549 |
RT_MANIFEST | 0x1345a8 | 0x2d6 | XML 1.0 document, ASCII text, with very long lines (726), with no line terminators | English | United States | 0.5647382920110193 |
DLL | Import |
---|---|
KERNEL32.dll | SetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW |
USER32.dll | GetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW |
GDI32.dll | SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject |
SHELL32.dll | SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation |
ADVAPI32.dll | RegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW |
COMCTL32.dll | ImageList_AddMasked, ImageList_Destroy, ImageList_Create |
ole32.dll | CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance |
VERSION.dll | GetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T11:53:20.644288+0100 | 2058285 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (spellshagey .biz) | 1 | 192.168.2.5 | 51320 | 1.1.1.1 | 53 | UDP |
2025-01-10T11:53:20.658233+0100 | 2058364 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (grannyejh .lat) | 1 | 192.168.2.5 | 53378 | 1.1.1.1 | 53 | UDP |
2025-01-10T11:53:20.674859+0100 | 2058360 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (discokeyus .lat) | 1 | 192.168.2.5 | 54336 | 1.1.1.1 | 53 | UDP |
2025-01-10T11:53:20.687809+0100 | 2058370 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (necklacebudi .lat) | 1 | 192.168.2.5 | 62686 | 1.1.1.1 | 53 | UDP |
2025-01-10T11:53:20.701058+0100 | 2058362 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (energyaffai .lat) | 1 | 192.168.2.5 | 55678 | 1.1.1.1 | 53 | UDP |
2025-01-10T11:53:20.714155+0100 | 2058354 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (aspecteirs .lat) | 1 | 192.168.2.5 | 58516 | 1.1.1.1 | 53 | UDP |
2025-01-10T11:53:20.726650+0100 | 2058376 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (sustainskelet .lat) | 1 | 192.168.2.5 | 55132 | 1.1.1.1 | 53 | UDP |
2025-01-10T11:53:20.737764+0100 | 2058358 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (crosshuaht .lat) | 1 | 192.168.2.5 | 56241 | 1.1.1.1 | 53 | UDP |
2025-01-10T11:53:20.765193+0100 | 2058374 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (rapeflowwj .lat) | 1 | 192.168.2.5 | 65202 | 1.1.1.1 | 53 | UDP |
2025-01-10T11:53:21.440947+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49813 | 104.102.49.254 | 443 | TCP |
2025-01-10T11:53:21.940479+0100 | 2858666 | ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup | 1 | 192.168.2.5 | 49813 | 104.102.49.254 | 443 | TCP |
2025-01-10T11:53:22.541969+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49819 | 104.21.112.1 | 443 | TCP |
2025-01-10T11:53:22.989711+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.5 | 49819 | 104.21.112.1 | 443 | TCP |
2025-01-10T11:53:22.989711+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49819 | 104.21.112.1 | 443 | TCP |
2025-01-10T11:53:23.458143+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49825 | 104.21.112.1 | 443 | TCP |
2025-01-10T11:53:23.935191+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.5 | 49825 | 104.21.112.1 | 443 | TCP |
2025-01-10T11:53:23.935191+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49825 | 104.21.112.1 | 443 | TCP |
2025-01-10T11:53:24.564423+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49836 | 104.21.112.1 | 443 | TCP |
2025-01-10T11:53:25.574366+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49842 | 104.21.112.1 | 443 | TCP |
2025-01-10T11:53:26.680554+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49853 | 104.21.112.1 | 443 | TCP |
2025-01-10T11:53:27.888696+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49859 | 104.21.112.1 | 443 | TCP |
2025-01-10T11:53:28.862598+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49868 | 104.21.112.1 | 443 | TCP |
2025-01-10T11:53:29.343514+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.5 | 49868 | 104.21.112.1 | 443 | TCP |
2025-01-10T11:53:29.851045+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49876 | 104.21.112.1 | 443 | TCP |
2025-01-10T11:53:30.327292+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49876 | 104.21.112.1 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 10, 2025 11:53:20.795949936 CET | 49813 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:53:20.796026945 CET | 443 | 49813 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:53:20.796112061 CET | 49813 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:53:20.797656059 CET | 49813 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:53:20.797686100 CET | 443 | 49813 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:53:21.440860987 CET | 443 | 49813 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:53:21.440947056 CET | 49813 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:53:21.460021973 CET | 49813 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:53:21.460064888 CET | 443 | 49813 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:53:21.460436106 CET | 443 | 49813 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:53:21.513492107 CET | 49813 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:53:21.540040970 CET | 49813 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:53:21.583340883 CET | 443 | 49813 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:53:21.940526962 CET | 443 | 49813 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:53:21.940557003 CET | 443 | 49813 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:53:21.940563917 CET | 443 | 49813 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:53:21.940603018 CET | 443 | 49813 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:53:21.940624952 CET | 443 | 49813 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:53:21.940649033 CET | 49813 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:53:21.940665960 CET | 443 | 49813 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:53:21.940696001 CET | 49813 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:53:21.940732956 CET | 49813 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:53:22.035857916 CET | 443 | 49813 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:53:22.035892010 CET | 443 | 49813 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:53:22.035933971 CET | 49813 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:53:22.035970926 CET | 443 | 49813 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:53:22.035991907 CET | 49813 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:53:22.036017895 CET | 49813 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:53:22.040955067 CET | 443 | 49813 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:53:22.041012049 CET | 49813 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:53:22.041019917 CET | 443 | 49813 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:53:22.041059017 CET | 49813 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:53:22.041062117 CET | 443 | 49813 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:53:22.041105032 CET | 49813 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:53:22.053134918 CET | 49813 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:53:22.053154945 CET | 443 | 49813 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:53:22.053191900 CET | 49813 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 11:53:22.053199053 CET | 443 | 49813 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 11:53:22.071398973 CET | 49819 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:22.071440935 CET | 443 | 49819 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:22.071530104 CET | 49819 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:22.071948051 CET | 49819 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:22.071965933 CET | 443 | 49819 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:22.541846991 CET | 443 | 49819 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:22.541969061 CET | 49819 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:22.543843031 CET | 49819 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:22.543857098 CET | 443 | 49819 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:22.544118881 CET | 443 | 49819 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:22.545568943 CET | 49819 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:22.545613050 CET | 49819 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:22.545639992 CET | 443 | 49819 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:22.989695072 CET | 443 | 49819 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:22.989799023 CET | 443 | 49819 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:22.989938974 CET | 49819 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:22.997200966 CET | 49819 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:22.997235060 CET | 443 | 49819 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:22.997246981 CET | 49819 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:22.997253895 CET | 443 | 49819 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:23.003144979 CET | 49825 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:23.003206968 CET | 443 | 49825 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:23.003341913 CET | 49825 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:23.003693104 CET | 49825 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:23.003706932 CET | 443 | 49825 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:23.458014011 CET | 443 | 49825 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:23.458142996 CET | 49825 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:23.459615946 CET | 49825 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:23.459625006 CET | 443 | 49825 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:23.459877014 CET | 443 | 49825 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:23.461064100 CET | 49825 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:23.461091042 CET | 49825 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:23.461122036 CET | 443 | 49825 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:23.935184002 CET | 443 | 49825 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:23.935237885 CET | 443 | 49825 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:23.935265064 CET | 443 | 49825 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:23.935290098 CET | 443 | 49825 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:23.935287952 CET | 49825 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:23.935321093 CET | 443 | 49825 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:23.935339928 CET | 49825 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:23.935368061 CET | 443 | 49825 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:23.935403109 CET | 49825 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:23.935408115 CET | 443 | 49825 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:23.935478926 CET | 443 | 49825 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:23.935503960 CET | 443 | 49825 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:23.935513020 CET | 49825 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:23.935518980 CET | 443 | 49825 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:23.935555935 CET | 49825 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:23.939944029 CET | 443 | 49825 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:23.940020084 CET | 443 | 49825 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:23.940067053 CET | 49825 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:23.940082073 CET | 443 | 49825 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:23.982314110 CET | 49825 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:24.021858931 CET | 443 | 49825 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:24.021925926 CET | 443 | 49825 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:24.022030115 CET | 443 | 49825 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:24.022080898 CET | 49825 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:24.022110939 CET | 49825 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:24.022325993 CET | 49825 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:24.022341013 CET | 443 | 49825 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:24.022353888 CET | 49825 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:24.022360086 CET | 443 | 49825 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:24.083842039 CET | 49836 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:24.083894968 CET | 443 | 49836 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:24.084104061 CET | 49836 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:24.084456921 CET | 49836 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:24.084470034 CET | 443 | 49836 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:24.564308882 CET | 443 | 49836 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:24.564423084 CET | 49836 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:24.565943956 CET | 49836 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:24.565965891 CET | 443 | 49836 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:24.566397905 CET | 443 | 49836 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:24.568310976 CET | 49836 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:24.568310976 CET | 49836 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:24.568346977 CET | 443 | 49836 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:25.092554092 CET | 443 | 49836 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:25.092854023 CET | 443 | 49836 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:25.092916965 CET | 49836 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:25.093101025 CET | 49836 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:25.093120098 CET | 443 | 49836 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:25.111512899 CET | 49842 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:25.111568928 CET | 443 | 49842 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:25.111643076 CET | 49842 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:25.111980915 CET | 49842 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:25.111995935 CET | 443 | 49842 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:25.574126959 CET | 443 | 49842 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:25.574366093 CET | 49842 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:25.575828075 CET | 49842 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:25.575838089 CET | 443 | 49842 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:25.587688923 CET | 443 | 49842 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:25.589147091 CET | 49842 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:25.589287996 CET | 49842 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:25.589344025 CET | 443 | 49842 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:25.589413881 CET | 49842 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:25.631340981 CET | 443 | 49842 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:26.118707895 CET | 443 | 49842 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:26.118839979 CET | 443 | 49842 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:26.118901014 CET | 49842 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:26.119299889 CET | 49842 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:26.119321108 CET | 443 | 49842 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:26.198426962 CET | 49853 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:26.198481083 CET | 443 | 49853 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:26.198559999 CET | 49853 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:26.198978901 CET | 49853 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:26.198991060 CET | 443 | 49853 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:26.680413008 CET | 443 | 49853 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:26.680553913 CET | 49853 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:26.682025909 CET | 49853 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:26.682039976 CET | 443 | 49853 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:26.682420969 CET | 443 | 49853 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:26.683768988 CET | 49853 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:26.683933973 CET | 49853 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:26.683964014 CET | 443 | 49853 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:26.684036970 CET | 49853 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:26.684046030 CET | 443 | 49853 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:27.311089039 CET | 443 | 49853 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:27.311217070 CET | 443 | 49853 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:27.311453104 CET | 49853 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:27.311640024 CET | 49853 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:27.311661959 CET | 443 | 49853 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:27.399533987 CET | 49859 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:27.399596930 CET | 443 | 49859 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:27.399683952 CET | 49859 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:27.400393963 CET | 49859 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:27.400408983 CET | 443 | 49859 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:27.888519049 CET | 443 | 49859 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:27.888695955 CET | 49859 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:27.890264034 CET | 49859 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:27.890290976 CET | 443 | 49859 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:27.890619993 CET | 443 | 49859 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:27.891869068 CET | 49859 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:27.891973972 CET | 49859 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:27.891989946 CET | 443 | 49859 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:28.332238913 CET | 443 | 49859 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:28.332511902 CET | 443 | 49859 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:28.332580090 CET | 49859 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:28.332729101 CET | 49859 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:28.332751036 CET | 443 | 49859 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:28.376836061 CET | 49868 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:28.376877069 CET | 443 | 49868 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:28.376961946 CET | 49868 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:28.377285957 CET | 49868 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:28.377301931 CET | 443 | 49868 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:28.862330914 CET | 443 | 49868 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:28.862597942 CET | 49868 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:28.863902092 CET | 49868 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:28.863914967 CET | 443 | 49868 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:28.864161015 CET | 443 | 49868 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:28.865334988 CET | 49868 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:28.865427971 CET | 49868 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:28.865433931 CET | 443 | 49868 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:29.343518972 CET | 443 | 49868 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:29.343621016 CET | 443 | 49868 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:29.343899012 CET | 49868 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:29.344178915 CET | 49868 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:29.344196081 CET | 443 | 49868 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:29.359512091 CET | 49876 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:29.359555960 CET | 443 | 49876 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:29.360038996 CET | 49876 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:29.360470057 CET | 49876 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:29.360486031 CET | 443 | 49876 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:29.850961924 CET | 443 | 49876 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:29.851044893 CET | 49876 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:29.852349043 CET | 49876 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:29.852360964 CET | 443 | 49876 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:29.852606058 CET | 443 | 49876 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:29.853796959 CET | 49876 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:29.853826046 CET | 49876 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:29.853851080 CET | 443 | 49876 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:30.327279091 CET | 443 | 49876 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:30.327377081 CET | 443 | 49876 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:30.327495098 CET | 49876 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:30.327764988 CET | 49876 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:30.327784061 CET | 443 | 49876 | 104.21.112.1 | 192.168.2.5 |
Jan 10, 2025 11:53:30.327795029 CET | 49876 | 443 | 192.168.2.5 | 104.21.112.1 |
Jan 10, 2025 11:53:30.327800035 CET | 443 | 49876 | 104.21.112.1 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 10, 2025 11:52:56.157007933 CET | 50270 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 11:52:56.165319920 CET | 53 | 50270 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 11:53:20.644288063 CET | 51320 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 11:53:20.653472900 CET | 53 | 51320 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 11:53:20.658232927 CET | 53378 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 11:53:20.666726112 CET | 53 | 53378 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 11:53:20.674859047 CET | 54336 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 11:53:20.684578896 CET | 53 | 54336 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 11:53:20.687808990 CET | 62686 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 11:53:20.697024107 CET | 53 | 62686 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 11:53:20.701057911 CET | 55678 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 11:53:20.709705114 CET | 53 | 55678 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 11:53:20.714154959 CET | 58516 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 11:53:20.722651958 CET | 53 | 58516 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 11:53:20.726650000 CET | 55132 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 11:53:20.735461950 CET | 53 | 55132 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 11:53:20.737763882 CET | 56241 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 11:53:20.747159958 CET | 53 | 56241 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 11:53:20.765192986 CET | 65202 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 11:53:20.774941921 CET | 53 | 65202 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 11:53:20.777049065 CET | 58123 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 11:53:20.784740925 CET | 53 | 58123 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 11:53:22.059478998 CET | 61503 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 11:53:22.070341110 CET | 53 | 61503 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 10, 2025 11:52:56.157007933 CET | 192.168.2.5 | 1.1.1.1 | 0x9e5b | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:53:20.644288063 CET | 192.168.2.5 | 1.1.1.1 | 0xd276 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:53:20.658232927 CET | 192.168.2.5 | 1.1.1.1 | 0xd0a0 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:53:20.674859047 CET | 192.168.2.5 | 1.1.1.1 | 0xd829 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:53:20.687808990 CET | 192.168.2.5 | 1.1.1.1 | 0x24c8 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:53:20.701057911 CET | 192.168.2.5 | 1.1.1.1 | 0xe140 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:53:20.714154959 CET | 192.168.2.5 | 1.1.1.1 | 0xc490 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:53:20.726650000 CET | 192.168.2.5 | 1.1.1.1 | 0xfc98 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:53:20.737763882 CET | 192.168.2.5 | 1.1.1.1 | 0x8497 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:53:20.765192986 CET | 192.168.2.5 | 1.1.1.1 | 0x9cb7 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:53:20.777049065 CET | 192.168.2.5 | 1.1.1.1 | 0x9986 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:53:22.059478998 CET | 192.168.2.5 | 1.1.1.1 | 0x42e1 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 10, 2025 11:52:56.165319920 CET | 1.1.1.1 | 192.168.2.5 | 0x9e5b | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:53:20.653472900 CET | 1.1.1.1 | 192.168.2.5 | 0xd276 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:53:20.666726112 CET | 1.1.1.1 | 192.168.2.5 | 0xd0a0 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:53:20.684578896 CET | 1.1.1.1 | 192.168.2.5 | 0xd829 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:53:20.697024107 CET | 1.1.1.1 | 192.168.2.5 | 0x24c8 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:53:20.709705114 CET | 1.1.1.1 | 192.168.2.5 | 0xe140 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:53:20.722651958 CET | 1.1.1.1 | 192.168.2.5 | 0xc490 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:53:20.735461950 CET | 1.1.1.1 | 192.168.2.5 | 0xfc98 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:53:20.747159958 CET | 1.1.1.1 | 192.168.2.5 | 0x8497 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:53:20.774941921 CET | 1.1.1.1 | 192.168.2.5 | 0x9cb7 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 11:53:20.784740925 CET | 1.1.1.1 | 192.168.2.5 | 0x9986 | No error (0) | 104.102.49.254 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 11:53:22.070341110 CET | 1.1.1.1 | 192.168.2.5 | 0x42e1 | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 11:53:22.070341110 CET | 1.1.1.1 | 192.168.2.5 | 0x42e1 | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 11:53:22.070341110 CET | 1.1.1.1 | 192.168.2.5 | 0x42e1 | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 11:53:22.070341110 CET | 1.1.1.1 | 192.168.2.5 | 0x42e1 | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 11:53:22.070341110 CET | 1.1.1.1 | 192.168.2.5 | 0x42e1 | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 11:53:22.070341110 CET | 1.1.1.1 | 192.168.2.5 | 0x42e1 | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 11:53:22.070341110 CET | 1.1.1.1 | 192.168.2.5 | 0x42e1 | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49813 | 104.102.49.254 | 443 | 320 | C:\Users\user\AppData\Local\Temp\243744\Provider.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 10:53:21 UTC | 219 | OUT | |
2025-01-10 10:53:21 UTC | 1905 | IN | |
2025-01-10 10:53:21 UTC | 14479 | IN | |
2025-01-10 10:53:22 UTC | 16384 | IN | |
2025-01-10 10:53:22 UTC | 3768 | IN | |
2025-01-10 10:53:22 UTC | 495 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49819 | 104.21.112.1 | 443 | 320 | C:\Users\user\AppData\Local\Temp\243744\Provider.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 10:53:22 UTC | 263 | OUT | |
2025-01-10 10:53:22 UTC | 8 | OUT | |
2025-01-10 10:53:22 UTC | 1125 | IN | |
2025-01-10 10:53:22 UTC | 7 | IN | |
2025-01-10 10:53:22 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49825 | 104.21.112.1 | 443 | 320 | C:\Users\user\AppData\Local\Temp\243744\Provider.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 10:53:23 UTC | 264 | OUT | |
2025-01-10 10:53:23 UTC | 81 | OUT | |
2025-01-10 10:53:23 UTC | 1125 | IN | |
2025-01-10 10:53:23 UTC | 244 | IN | |
2025-01-10 10:53:23 UTC | 1369 | IN | |
2025-01-10 10:53:23 UTC | 1369 | IN | |
2025-01-10 10:53:23 UTC | 1369 | IN | |
2025-01-10 10:53:23 UTC | 1369 | IN | |
2025-01-10 10:53:23 UTC | 1369 | IN | |
2025-01-10 10:53:23 UTC | 344 | IN | |
2025-01-10 10:53:23 UTC | 1369 | IN | |
2025-01-10 10:53:23 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49836 | 104.21.112.1 | 443 | 320 | C:\Users\user\AppData\Local\Temp\243744\Provider.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 10:53:24 UTC | 282 | OUT | |
2025-01-10 10:53:24 UTC | 12837 | OUT | |
2025-01-10 10:53:25 UTC | 1132 | IN | |
2025-01-10 10:53:25 UTC | 20 | IN | |
2025-01-10 10:53:25 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.5 | 49842 | 104.21.112.1 | 443 | 320 | C:\Users\user\AppData\Local\Temp\243744\Provider.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 10:53:25 UTC | 278 | OUT | |
2025-01-10 10:53:25 UTC | 15055 | OUT | |
2025-01-10 10:53:26 UTC | 1124 | IN | |
2025-01-10 10:53:26 UTC | 20 | IN | |
2025-01-10 10:53:26 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.5 | 49853 | 104.21.112.1 | 443 | 320 | C:\Users\user\AppData\Local\Temp\243744\Provider.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 10:53:26 UTC | 281 | OUT | |
2025-01-10 10:53:26 UTC | 15331 | OUT | |
2025-01-10 10:53:26 UTC | 5232 | OUT | |
2025-01-10 10:53:27 UTC | 1127 | IN | |
2025-01-10 10:53:27 UTC | 20 | IN | |
2025-01-10 10:53:27 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.5 | 49859 | 104.21.112.1 | 443 | 320 | C:\Users\user\AppData\Local\Temp\243744\Provider.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 10:53:27 UTC | 281 | OUT | |
2025-01-10 10:53:27 UTC | 1264 | OUT | |
2025-01-10 10:53:28 UTC | 1122 | IN | |
2025-01-10 10:53:28 UTC | 20 | IN | |
2025-01-10 10:53:28 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.5 | 49868 | 104.21.112.1 | 443 | 320 | C:\Users\user\AppData\Local\Temp\243744\Provider.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 10:53:28 UTC | 281 | OUT | |
2025-01-10 10:53:28 UTC | 1133 | OUT | |
2025-01-10 10:53:29 UTC | 1120 | IN | |
2025-01-10 10:53:29 UTC | 20 | IN | |
2025-01-10 10:53:29 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.5 | 49876 | 104.21.112.1 | 443 | 320 | C:\Users\user\AppData\Local\Temp\243744\Provider.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 10:53:29 UTC | 265 | OUT | |
2025-01-10 10:53:29 UTC | 116 | OUT | |
2025-01-10 10:53:30 UTC | 1126 | IN | |
2025-01-10 10:53:30 UTC | 54 | IN | |
2025-01-10 10:53:30 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 05:52:49 |
Start date: | 10/01/2025 |
Path: | C:\Users\user\Desktop\DangerousMidlands.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'270'226 bytes |
MD5 hash: | E4AE7D2D997AD9CDB1E4C138E4DD10DF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 05:52:50 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 05:52:50 |
Start date: | 10/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 05:52:52 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x370000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 05:52:52 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xc00000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 05:52:53 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x370000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 05:52:53 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xc00000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 05:52:53 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 9 |
Start time: | 05:52:54 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xc00000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 10 |
Start time: | 05:52:54 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 11 |
Start time: | 05:52:54 |
Start date: | 10/01/2025 |
Path: | C:\Users\user\AppData\Local\Temp\243744\Provider.com |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x450000 |
File size: | 947'288 bytes |
MD5 hash: | 62D09F076E6E0240548C2F837536A46A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Reputation: | moderate |
Has exited: | true |
Target ID: | 12 |
Start time: | 05:52:54 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\choice.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x870000 |
File size: | 28'160 bytes |
MD5 hash: | FCE0E41C87DC4ABBE976998AD26C27E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Execution Graph
Execution Coverage: | 17.8% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 21% |
Total number of Nodes: | 1482 |
Total number of Limit Nodes: | 26 |
Graph
Function 004050F9 Relevance: 66.8, APIs: 36, Strings: 2, Instructions: 295windowclipboardmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004038AF Relevance: 52.8, APIs: 22, Strings: 8, Instructions: 304filestringcomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004015A0 Relevance: 56.4, APIs: 15, Strings: 17, Instructions: 351sleepfilewindowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405958 Relevance: 44.0, APIs: 15, Strings: 10, Instructions: 233stringregistrylibraryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401A1F Relevance: 22.9, APIs: 5, Strings: 8, Instructions: 185stringtimeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040337F Relevance: 15.9, APIs: 6, Strings: 3, Instructions: 175fileCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004022FD Relevance: 7.6, APIs: 5, Instructions: 56memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040139D Relevance: 3.0, APIs: 2, Instructions: 42windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E7C Relevance: 3.0, APIs: 2, Instructions: 15fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E5C Relevance: 3.0, APIs: 2, Instructions: 9COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403336 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004037F8 Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DDB Relevance: 1.5, APIs: 1, Instructions: 9windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403368 Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DC4 Relevance: 1.5, APIs: 1, Instructions: 6windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DB1 Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004049A8 Relevance: 65.2, APIs: 33, Strings: 4, Instructions: 470windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406CC7 Relevance: 31.7, APIs: 9, Strings: 9, Instructions: 190filestringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004044D1 Relevance: 30.0, APIs: 15, Strings: 2, Instructions: 300stringkeyboardCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406EFE Relevance: 30.0, APIs: 14, Strings: 3, Instructions: 270filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406831 Relevance: 19.5, APIs: 8, Strings: 3, Instructions: 212stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004079A2 Relevance: .3, Instructions: 347COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040737E Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004063D8 Relevance: 70.3, APIs: 29, Strings: 11, Instructions: 256libraryloadermemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004040E4 Relevance: 40.5, APIs: 20, Strings: 3, Instructions: 210windowstringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406AC5 Relevance: 35.2, APIs: 15, Strings: 5, Instructions: 163filestringmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402880 Relevance: 17.6, APIs: 4, Strings: 6, Instructions: 131registrystringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406113 Relevance: 15.8, APIs: 7, Strings: 2, Instructions: 72filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E55 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 103memoryfileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004023F0 Relevance: 14.1, APIs: 3, Strings: 5, Instructions: 83libraryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DF6 Relevance: 12.1, APIs: 8, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402238 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 59synchronizationCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040487A Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040324C Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 40timeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040209F Relevance: 7.5, APIs: 5, Instructions: 39windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401F80 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowtimeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004043D9 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 73stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004027E3 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 60registryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402665 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 56stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406250 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 53stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004020F9 Relevance: 6.0, APIs: 4, Instructions: 45COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407224 Relevance: 6.0, APIs: 3, Strings: 1, Instructions: 43stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004032D2 Relevance: 6.0, APIs: 4, Instructions: 33COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406391 Relevance: 6.0, APIs: 4, Instructions: 31memorylibraryloaderCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004048F8 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 58windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402797 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 25stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C6B Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 24processCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062CF Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 13stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405DE2 Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|