Windows
Analysis Report
zapytanie 2025.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- zapytanie 2025.exe (PID: 1012 cmdline:
"C:\Users\ user\Deskt op\zapytan ie 2025.ex e" MD5: 15FE2AC3357C534E280CC8D9DE964AED) - zapytanie 2025.exe (PID: 6508 cmdline:
"C:\Users\ user\Deskt op\zapytan ie 2025.ex e" MD5: 15FE2AC3357C534E280CC8D9DE964AED)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
AsyncRAT | AsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques. | No Attribution |
{"Server": "quin.ydns.eu,185.38.142.240", "Port": "1962,1940", "Version": "0.5.8", "MutexName": "dLOEY8XRq1oB", "Autorun": "false", "Group": "null"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse | Detects file containing reversed ASEP Autorun registry keys | ditekSHen |
| |
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
Click to see the 9 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
Windows_Trojan_Asyncrat_11a11ba1 | unknown | unknown |
| |
Click to see the 26 entries |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-13T10:03:23.576128+0100 | 2035595 | 1 | Domain Observed Used for C2 Detected | 185.38.142.240 | 1940 | 192.168.2.5 | 49724 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-13T10:03:23.576128+0100 | 2035607 | 1 | Domain Observed Used for C2 Detected | 185.38.142.240 | 1940 | 192.168.2.5 | 49724 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-13T10:03:23.576128+0100 | 2842478 | 1 | Malware Command and Control Activity Detected | 185.38.142.240 | 1940 | 192.168.2.5 | 49724 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | TCP traffic: |
Source: | ASN Name: |
Source: | DNS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_00EEE0B4 | |
Source: | Code function: | 0_2_06E9DAD8 | |
Source: | Code function: | 0_2_06E98608 | |
Source: | Code function: | 0_2_06E9A550 | |
Source: | Code function: | 0_2_06E992A0 | |
Source: | Code function: | 0_2_06E992B0 | |
Source: | Code function: | 0_2_06E9F158 | |
Source: | Code function: | 0_2_06E98E78 | |
Source: | Code function: | 0_2_06E98A40 | |
Source: | Code function: | 0_2_06E90B98 | |
Source: | Code function: | 0_2_08BBB468 | |
Source: | Code function: | 0_2_08BBED58 | |
Source: | Code function: | 0_2_08BB0006 | |
Source: | Code function: | 0_2_08BB0040 | |
Source: | Code function: | 0_2_08BB56E8 | |
Source: | Code function: | 0_2_08BB56D9 | |
Source: | Code function: | 3_2_02BC6868 | |
Source: | Code function: | 3_2_02BC5F98 | |
Source: | Code function: | 3_2_02BCA648 | |
Source: | Code function: | 3_2_02BC5C50 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00EEDA71 |
Source: | Static PE information: |
Boot Survival |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Binary or memory string: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior |
Source: | File Volume queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Lowering of HIPS / PFW / Operating System Security Settings |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Windows Management Instrumentation | 1 Scheduled Task/Job | 112 Process Injection | 1 Masquerading | OS Credential Dumping | 121 Security Software Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 Scheduled Task/Job | 1 DLL Side-Loading | 1 Scheduled Task/Job | 1 Disable or Modify Tools | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 DLL Side-Loading | 31 Virtualization/Sandbox Evasion | Security Account Manager | 31 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 112 Process Injection | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | 11 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 12 Obfuscated Files or Information | LSA Secrets | 13 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 2 Software Packing | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 Timestomp | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 DLL Side-Loading | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
44% | Virustotal | Browse | ||
34% | ReversingLabs | |||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
quin.ydns.eu | unknown | unknown | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
185.38.142.240 | unknown | Portugal | 47674 | NETSOLUTIONSNL | true |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1589896 |
Start date and time: | 2025-01-13 10:02:10 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 55s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | zapytanie 2025.exe |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@3/1@3/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 184.28.90.27, 172.202.163.200, 13.107.246.45
- Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target zapytanie 2025.exe, PID 6508 because it is empty
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
Time | Type | Description |
---|---|---|
04:03:01 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
185.38.142.240 | Get hash | malicious | AsyncRAT | Browse | ||
Get hash | malicious | AsyncRAT, PureLog Stealer | Browse | |||
Get hash | malicious | AsyncRAT, PureLog Stealer | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
NETSOLUTIONSNL | Get hash | malicious | RedLine | Browse |
| |
Get hash | malicious | RedLine | Browse |
| ||
Get hash | malicious | AsyncRAT | Browse |
| ||
Get hash | malicious | AsyncRAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | AsyncRAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | RedLine | Browse |
| ||
Get hash | malicious | RedLine | Browse |
| ||
Get hash | malicious | RedLine | Browse |
|
Process: | C:\Users\user\Desktop\zapytanie 2025.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1216 |
Entropy (8bit): | 5.34331486778365 |
Encrypted: | false |
SSDEEP: | 24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ |
MD5: | 1330C80CAAC9A0FB172F202485E9B1E8 |
SHA1: | 86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492 |
SHA-256: | B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560 |
SHA-512: | 75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2 |
Malicious: | true |
Reputation: | high, very likely benign file |
Preview: |
File type: | |
Entropy (8bit): | 7.641338470740373 |
TrID: |
|
File name: | zapytanie 2025.exe |
File size: | 702'976 bytes |
MD5: | 15fe2ac3357c534e280cc8d9de964aed |
SHA1: | af1e4824a0a4954c69fe91b6ad54e66a4f3a7511 |
SHA256: | 441c8c73ea3f781774e9ee684d4d51127ec736c9fb6423fad0aea20695abd3c3 |
SHA512: | c32bfa3d04b1e67b2019afd9ee25b136e1880279f32a17a30128d2e574eb19578996167015cb620b91e3380186bc20b997045db426d4420ea4e1977b730acbdc |
SSDEEP: | 12288:r8dStNKcItS4StNKcItSfl12tZ9uLUxL7HNHJTs2aInH5am38Dj11WWh2fab8fXk:r8yNK1t4NK1tOqLBCIHom383WxfaoXpe |
TLSH: | EBE4F1203A9ADB03C0A66FF41521E2B457B45E8DAA21D3079FDA3DEF7C77B042944A53 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....T................0.................. ........@.. ....................... ............@................................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x4acfae |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0xF2C954B2 [Wed Jan 28 10:51:30 2099 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
call far 0000h : 003E9999h |
aas |
int CCh |
dec esp |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xacf5b | 0x4f | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xae000 | 0x594 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xb0000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0xaaaa8 | 0x70 | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0xaafc4 | 0xab000 | 5f546096487be6875767caa1600203c0 | False | 0.8826183296783626 | data | 7.64947126519897 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0xae000 | 0x594 | 0x600 | 9ad58527891a2a6016ce6039f19eae9d | False | 0.4134114583333333 | data | 4.032472233215396 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xb0000 | 0xc | 0x200 | cdd4228ce5fef9938235403e72991139 | False | 0.044921875 | data | 0.10191042566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0xae090 | 0x304 | data | 0.4326424870466321 | ||
RT_MANIFEST | 0xae3a4 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-13T10:03:23.576128+0100 | 2842478 | ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s) | 1 | 185.38.142.240 | 1940 | 192.168.2.5 | 49724 | TCP |
2025-01-13T10:03:23.576128+0100 | 2030673 | ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) | 1 | 185.38.142.240 | 1940 | 192.168.2.5 | 49724 | TCP |
2025-01-13T10:03:23.576128+0100 | 2035595 | ET MALWARE Generic AsyncRAT Style SSL Cert | 1 | 185.38.142.240 | 1940 | 192.168.2.5 | 49724 | TCP |
2025-01-13T10:03:23.576128+0100 | 2035607 | ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) | 1 | 185.38.142.240 | 1940 | 192.168.2.5 | 49724 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 13, 2025 10:03:22.889520884 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:03:22.894460917 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:03:22.894575119 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:03:22.907658100 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:03:22.912506104 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:03:23.552273989 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:03:23.552326918 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:03:23.552436113 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:03:23.571294069 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:03:23.576128006 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:03:24.257055998 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:03:24.297278881 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:03:24.481025934 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:03:24.487875938 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:03:24.487952948 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:03:24.494456053 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:03:25.977696896 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:03:26.031606913 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:03:26.095381975 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:03:26.140875101 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:03:37.126183033 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:03:37.131218910 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:03:37.131294966 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:03:37.136086941 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:03:37.574894905 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:03:37.625461102 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:03:37.705136061 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:03:37.707472086 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:03:37.712337017 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:03:37.712397099 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:03:37.717139959 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:03:49.782661915 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:03:49.787609100 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:03:49.787686110 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:03:49.792655945 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:03:50.382143021 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:03:50.437969923 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:03:50.509856939 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:03:50.522011042 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:03:50.526900053 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:03:50.526956081 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:03:50.531846046 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:03:55.993263006 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:03:56.047493935 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:03:56.121965885 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:03:56.172369957 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:04:02.438517094 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:04:02.443458080 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:02.443515062 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:04:02.448385954 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:02.732140064 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:02.781800032 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:04:02.862020969 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:02.863992929 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:04:02.868858099 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:02.868915081 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:04:02.873797894 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:15.094880104 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:04:15.099993944 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:15.100161076 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:04:15.105093002 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:15.396262884 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:15.438127995 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:04:15.526149035 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:15.527518988 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:04:15.532368898 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:15.532428026 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:04:15.537308931 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:26.603774071 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:26.661753893 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:04:26.734409094 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:26.782092094 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:04:27.835112095 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:04:27.840270042 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:27.840342999 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:04:27.845246077 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:28.340081930 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:28.391469955 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:04:28.472141027 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:28.473536968 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:04:28.478427887 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:28.478497982 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:04:28.483378887 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:40.438708067 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:04:40.443981886 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:40.444168091 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:04:40.449454069 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:41.025719881 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:41.078938961 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:04:41.158514023 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:41.160013914 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:04:41.165150881 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:41.165229082 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:04:41.170253038 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:53.095186949 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:04:53.100253105 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:53.100344896 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:04:53.105190039 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:53.388775110 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:53.438446999 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:04:53.519639015 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:53.521285057 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:04:53.526122093 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:53.526174068 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:04:53.531058073 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:55.999870062 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:56.047832966 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:04:56.129040956 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:04:56.172792912 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:05:05.755537987 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:05:05.760693073 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:05:05.760756016 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:05:05.765595913 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:05:06.061837912 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:05:06.110374928 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:05:06.191827059 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:05:06.196012020 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:05:06.200931072 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:05:06.200987101 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:05:06.205837965 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:05:08.360667944 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:05:08.365814924 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:05:08.365878105 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:05:08.370773077 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:05:08.661606073 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:05:08.704149961 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:05:08.894717932 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:05:08.898648977 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:05:08.903575897 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Jan 13, 2025 10:05:08.904208899 CET | 49724 | 1940 | 192.168.2.5 | 185.38.142.240 |
Jan 13, 2025 10:05:08.909069061 CET | 1940 | 49724 | 185.38.142.240 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 13, 2025 10:03:07.793204069 CET | 61992 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 13, 2025 10:03:07.807765961 CET | 53 | 61992 | 1.1.1.1 | 192.168.2.5 |
Jan 13, 2025 10:03:12.814002991 CET | 63311 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 13, 2025 10:03:12.833627939 CET | 53 | 63311 | 1.1.1.1 | 192.168.2.5 |
Jan 13, 2025 10:03:17.844820023 CET | 59761 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 13, 2025 10:03:17.870762110 CET | 53 | 59761 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 13, 2025 10:03:07.793204069 CET | 192.168.2.5 | 1.1.1.1 | 0xbd9d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 13, 2025 10:03:12.814002991 CET | 192.168.2.5 | 1.1.1.1 | 0x5f42 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 13, 2025 10:03:17.844820023 CET | 192.168.2.5 | 1.1.1.1 | 0x15cc | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 13, 2025 10:03:07.807765961 CET | 1.1.1.1 | 192.168.2.5 | 0xbd9d | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 13, 2025 10:03:12.833627939 CET | 1.1.1.1 | 192.168.2.5 | 0x5f42 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 13, 2025 10:03:17.870762110 CET | 1.1.1.1 | 192.168.2.5 | 0x15cc | Name error (3) | none | none | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 04:03:01 |
Start date: | 13/01/2025 |
Path: | C:\Users\user\Desktop\zapytanie 2025.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x460000 |
File size: | 702'976 bytes |
MD5 hash: | 15FE2AC3357C534E280CC8D9DE964AED |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 3 |
Start time: | 04:03:01 |
Start date: | 13/01/2025 |
Path: | C:\Users\user\Desktop\zapytanie 2025.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xa30000 |
File size: | 702'976 bytes |
MD5 hash: | 15FE2AC3357C534E280CC8D9DE964AED |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 10% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 193 |
Total number of Limit Nodes: | 12 |
Graph
Function 08BBB468 Relevance: 7.0, Strings: 5, Instructions: 724COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08BBED58 Relevance: 6.8, Strings: 5, Instructions: 591COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08BB0006 Relevance: 4.6, Instructions: 4580COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08BB0040 Relevance: 4.6, Instructions: 4562COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08BB56E8 Relevance: 3.4, Instructions: 3434COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08BB56D9 Relevance: 3.4, Instructions: 3420COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E9DAD8 Relevance: .5, Instructions: 517COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EEB261 Relevance: 1.7, APIs: 1, Instructions: 204COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EE590C Relevance: 1.6, APIs: 1, Instructions: 99COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EE4514 Relevance: 1.6, APIs: 1, Instructions: 96COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E9B0A8 Relevance: 1.6, APIs: 1, Instructions: 66COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E9AE20 Relevance: 1.6, APIs: 1, Instructions: 66threadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EECDE0 Relevance: 1.6, APIs: 1, Instructions: 65COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EED738 Relevance: 1.6, APIs: 1, Instructions: 64COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E9B0B0 Relevance: 1.6, APIs: 1, Instructions: 63COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E9AE28 Relevance: 1.6, APIs: 1, Instructions: 63threadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E9AEF9 Relevance: 1.6, APIs: 1, Instructions: 55memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E9AF00 Relevance: 1.6, APIs: 1, Instructions: 53memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E9AD70 Relevance: 1.6, APIs: 1, Instructions: 52threadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E9AD78 Relevance: 1.5, APIs: 1, Instructions: 49threadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E9D7A0 Relevance: 1.5, APIs: 1, Instructions: 48windowCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E97B7C Relevance: 1.5, APIs: 1, Instructions: 47windowCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EEB460 Relevance: 1.5, APIs: 1, Instructions: 47COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08BBA7B9 Relevance: 1.4, Strings: 1, Instructions: 111COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08BBA7C8 Relevance: 1.3, Strings: 1, Instructions: 86COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08BBFE7F Relevance: 1.3, Strings: 1, Instructions: 70COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08BBFE90 Relevance: 1.3, Strings: 1, Instructions: 62COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08BBF570 Relevance: .3, Instructions: 255COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08BBAE40 Relevance: .1, Instructions: 141COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08BBB5A7 Relevance: .1, Instructions: 117COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08BBFCD9 Relevance: .1, Instructions: 114COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08BB96E0 Relevance: .1, Instructions: 113COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08BBFCE8 Relevance: .1, Instructions: 110COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08BBF688 Relevance: .1, Instructions: 103COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08BB92D8 Relevance: .1, Instructions: 99COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08BB9C48 Relevance: .1, Instructions: 88COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CDD4C4 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CDD3D8 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08BB9C39 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08BB9E51 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08BBB268 Relevance: .1, Instructions: 73COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CED01C Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CED1D4 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08BB9E60 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08BB9870 Relevance: .1, Instructions: 71COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CED005 Relevance: .1, Instructions: 62COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CDD3D3 Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CDD4BF Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CED1CF Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08BB9DB0 Relevance: .0, Instructions: 49COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08BB9DD0 Relevance: .0, Instructions: 41COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08BB9F49 Relevance: .0, Instructions: 27COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08BBB262 Relevance: .0, Instructions: 25COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E992B0 Relevance: 1.6, Strings: 1, Instructions: 312COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E992A0 Relevance: 1.4, Strings: 1, Instructions: 134COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E9F158 Relevance: .3, Instructions: 340COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E98608 Relevance: .3, Instructions: 312COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E9A550 Relevance: .3, Instructions: 312COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E98E78 Relevance: .3, Instructions: 312COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E98A40 Relevance: .3, Instructions: 312COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EEE0B4 Relevance: .3, Instructions: 264COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E90B98 Relevance: .2, Instructions: 216COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08BB51C1 Relevance: 6.3, Strings: 5, Instructions: 67COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08BB51D0 Relevance: 6.3, Strings: 5, Instructions: 62COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08BBEB20 Relevance: 5.2, Strings: 4, Instructions: 150COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC5F98 Relevance: 1.5, Strings: 1, Instructions: 281COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC6868 Relevance: .3, Instructions: 266COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC1727 Relevance: 5.4, Strings: 4, Instructions: 444COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC1962 Relevance: 3.9, Strings: 3, Instructions: 183COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC0EBA Relevance: 3.9, Strings: 3, Instructions: 166COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC0D20 Relevance: 2.6, Strings: 2, Instructions: 133COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC9520 Relevance: 2.6, Strings: 2, Instructions: 111COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC8B27 Relevance: 2.6, Strings: 2, Instructions: 55COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC5F8C Relevance: 1.5, Strings: 1, Instructions: 291COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC9CB0 Relevance: 1.5, Strings: 1, Instructions: 213COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC9A58 Relevance: 1.4, Strings: 1, Instructions: 127COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC9509 Relevance: 1.4, Strings: 1, Instructions: 111COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC1339 Relevance: 1.3, Strings: 1, Instructions: 91COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC0D10 Relevance: 1.3, Strings: 1, Instructions: 89COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC9438 Relevance: 1.3, Strings: 1, Instructions: 67COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC35C9 Relevance: 1.3, Strings: 1, Instructions: 64COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC993F Relevance: 1.3, Strings: 1, Instructions: 58COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC9950 Relevance: 1.3, Strings: 1, Instructions: 57COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BCA470 Relevance: 1.3, Strings: 1, Instructions: 53COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC0E3F Relevance: 1.3, Strings: 1, Instructions: 46COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC8F80 Relevance: 1.3, Strings: 1, Instructions: 44COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC2D63 Relevance: .3, Instructions: 297COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC685F Relevance: .3, Instructions: 258COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BCA0A8 Relevance: .3, Instructions: 251COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC2E38 Relevance: .2, Instructions: 227COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC36A0 Relevance: .1, Instructions: 121COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC96D3 Relevance: .1, Instructions: 120COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC0AA0 Relevance: .1, Instructions: 118COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC11D0 Relevance: .1, Instructions: 114COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC40B8 Relevance: .1, Instructions: 90COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC40AF Relevance: .1, Instructions: 90COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC0998 Relevance: .1, Instructions: 77COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC929B Relevance: .1, Instructions: 71COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC09A8 Relevance: .1, Instructions: 71COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BCA09B Relevance: .1, Instructions: 59COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BCB450 Relevance: .1, Instructions: 59COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC1431 Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BCB460 Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC1440 Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC3691 Relevance: .0, Instructions: 48COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC9010 Relevance: .0, Instructions: 41COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC9008 Relevance: .0, Instructions: 41COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC25F1 Relevance: .0, Instructions: 24COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC0A8F Relevance: .0, Instructions: 9COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC0A73 Relevance: .0, Instructions: 9COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02BC2600 Relevance: .0, Instructions: 8COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|