Windows
Analysis Report
Order Details.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Order Details.exe (PID: 2032 cmdline:
"C:\Users\ user\Deskt op\Order D etails.exe " MD5: 06C48EF3E45A7DAFEDBD596368918830) - Order Details.exe (PID: 908 cmdline:
"C:\Users\ user\Deskt op\Order D etails.exe " MD5: 06C48EF3E45A7DAFEDBD596368918830)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
404 Keylogger, Snake Keylogger | Snake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram. | No Attribution |
{"Exfil Mode": "SMTP", "Username": "frankichong@yulifertilizer.com.my", "Password": "Ayfc931319*", "Host": "yulifertilizer.com.my", "Port": "25", "Version": "5.1"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_SnakeKeylogger | Yara detected Snake Keylogger | Joe Security | ||
Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown |
| |
MALWARE_Win_SnakeKeylogger | Detects Snake Keylogger | ditekSHen |
| |
MALWARE_Win_DLInjector02 | Detects downloader injector | ditekSHen |
| |
Click to see the 15 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
MALWARE_Win_DLInjector02 | Detects downloader injector | ditekSHen |
| |
MALWARE_Win_DLInjector02 | Detects downloader injector | ditekSHen |
| |
MALWARE_Win_DLInjector02 | Detects downloader injector | ditekSHen |
| |
MALWARE_Win_DLInjector02 | Detects downloader injector | ditekSHen |
| |
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
Click to see the 34 entries |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-16T02:24:02.848711+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49732 | 104.21.32.1 | 443 | TCP |
2025-01-16T02:24:06.855237+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49738 | 104.21.32.1 | 443 | TCP |
2025-01-16T02:24:08.097022+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49740 | 104.21.32.1 | 443 | TCP |
2025-01-16T02:24:09.347621+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49742 | 104.21.32.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-16T02:24:00.739904+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49730 | 193.122.6.168 | 80 | TCP |
2025-01-16T02:24:02.255513+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49730 | 193.122.6.168 | 80 | TCP |
2025-01-16T02:24:03.536813+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49733 | 193.122.6.168 | 80 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Location Tracking |
---|
Source: | DNS query: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: |
Source: | Code function: | 1_2_019AF007 | |
Source: | Code function: | 1_2_019AF007 | |
Source: | Code function: | 1_2_019AE528 | |
Source: | Code function: | 1_2_019AEB5B | |
Source: | Code function: | 1_2_019AED3C | |
Source: | Code function: | 1_2_05EDCAA0 | |
Source: | Code function: | 1_2_05EDC1F0 | |
Source: | Code function: | 1_2_05ED11C0 | |
Source: | Code function: | 1_2_05EDF1B8 | |
Source: | Code function: | 1_2_05EDBD98 | |
Source: | Code function: | 1_2_05ED1966 | |
Source: | Code function: | 1_2_05ED0D60 | |
Source: | Code function: | 1_2_05EDED60 | |
Source: | Code function: | 1_2_05EDB940 | |
Source: | Code function: | 1_2_05EDE908 | |
Source: | Code function: | 1_2_05ED0900 | |
Source: | Code function: | 1_2_05EDB4E8 | |
Source: | Code function: | 1_2_05ED04A0 | |
Source: | Code function: | 1_2_05EDE4B0 | |
Source: | Code function: | 1_2_05ED0040 | |
Source: | Code function: | 1_2_05EDE058 | |
Source: | Code function: | 1_2_05EDDC00 | |
Source: | Code function: | 1_2_05EDD7A8 | |
Source: | Code function: | 1_2_05EDD350 | |
Source: | Code function: | 1_2_05EDCEF8 | |
Source: | Code function: | 1_2_05EDFA68 | |
Source: | Code function: | 1_2_05EDC648 | |
Source: | Code function: | 1_2_05ED1620 | |
Source: | Code function: | 1_2_05EDF610 | |
Source: | Code function: | 1_2_06FB8608 | |
Source: | Code function: | 1_2_06FB5EC8 | |
Source: | Code function: | 1_2_06FB36CE | |
Source: | Code function: | 1_2_06FB5A70 | |
Source: | Code function: | 1_2_06FB5618 | |
Source: | Code function: | 1_2_06FB6BD0 | |
Source: | Code function: | 1_2_06FB33B8 | |
Source: | Code function: | 1_2_06FB33A8 | |
Source: | Code function: | 1_2_06FB6778 | |
Source: | Code function: | 1_2_06FB6320 | |
Source: | Code function: | 1_2_06FB08F0 | |
Source: | Code function: | 1_2_06FB74A8 | |
Source: | Code function: | 1_2_06FB0498 | |
Source: | Code function: | 1_2_06FB7050 | |
Source: | Code function: | 1_2_06FB0040 | |
Source: | Code function: | 1_2_06FB81B0 | |
Source: | Code function: | 1_2_06FB5198 | |
Source: | Code function: | 1_2_06FB7D58 | |
Source: | Code function: | 1_2_06FB0D48 | |
Source: | Code function: | 1_2_06FB7900 |
Networking |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | DNS query: | ||
Source: | DNS query: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | HTTPS traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Code function: | 0_2_027BAE48 | |
Source: | Code function: | 0_2_027B3118 | |
Source: | Code function: | 1_2_019AC190 | |
Source: | Code function: | 1_2_019A6108 | |
Source: | Code function: | 1_2_019AF007 | |
Source: | Code function: | 1_2_019AB328 | |
Source: | Code function: | 1_2_019AC470 | |
Source: | Code function: | 1_2_019A6730 | |
Source: | Code function: | 1_2_019AC753 | |
Source: | Code function: | 1_2_019A9858 | |
Source: | Code function: | 1_2_019ABBD3 | |
Source: | Code function: | 1_2_019A4AD9 | |
Source: | Code function: | 1_2_019ACA33 | |
Source: | Code function: | 1_2_019ABEB0 | |
Source: | Code function: | 1_2_019AE517 | |
Source: | Code function: | 1_2_019AE528 | |
Source: | Code function: | 1_2_019A3573 | |
Source: | Code function: | 1_2_019AB4F3 | |
Source: | Code function: | 1_2_05ED7D90 | |
Source: | Code function: | 1_2_05ED8460 | |
Source: | Code function: | 1_2_05ED3870 | |
Source: | Code function: | 1_2_05EDCAA0 | |
Source: | Code function: | 1_2_05EDC1E0 | |
Source: | Code function: | 1_2_05EDC1F0 | |
Source: | Code function: | 1_2_05ED11C0 | |
Source: | Code function: | 1_2_05EDF1A9 | |
Source: | Code function: | 1_2_05EDF1B8 | |
Source: | Code function: | 1_2_05ED11B0 | |
Source: | Code function: | 1_2_05EDBD88 | |
Source: | Code function: | 1_2_05EDBD98 | |
Source: | Code function: | 1_2_05ED0D60 | |
Source: | Code function: | 1_2_05EDED60 | |
Source: | Code function: | 1_2_05EDB940 | |
Source: | Code function: | 1_2_05ED0D51 | |
Source: | Code function: | 1_2_05EDED50 | |
Source: | Code function: | 1_2_05EDB930 | |
Source: | Code function: | 1_2_05EDE908 | |
Source: | Code function: | 1_2_05ED0900 | |
Source: | Code function: | 1_2_05EDB4E8 | |
Source: | Code function: | 1_2_05EDE8F8 | |
Source: | Code function: | 1_2_05ED08F0 | |
Source: | Code function: | 1_2_05EDB4D7 | |
Source: | Code function: | 1_2_05ED04A0 | |
Source: | Code function: | 1_2_05EDE4A0 | |
Source: | Code function: | 1_2_05EDE4B0 | |
Source: | Code function: | 1_2_05ED0490 | |
Source: | Code function: | 1_2_05ED3860 | |
Source: | Code function: | 1_2_05EDE049 | |
Source: | Code function: | 1_2_05ED0040 | |
Source: | Code function: | 1_2_05EDE058 | |
Source: | Code function: | 1_2_05ED0006 | |
Source: | Code function: | 1_2_05EDDC00 | |
Source: | Code function: | 1_2_05ED73E8 | |
Source: | Code function: | 1_2_05EDDBF1 | |
Source: | Code function: | 1_2_05ED73D8 | |
Source: | Code function: | 1_2_05EDD7A8 | |
Source: | Code function: | 1_2_05EDD798 | |
Source: | Code function: | 1_2_05EDD340 | |
Source: | Code function: | 1_2_05EDD350 | |
Source: | Code function: | 1_2_05EDCEE9 | |
Source: | Code function: | 1_2_05EDCEF8 | |
Source: | Code function: | 1_2_05EDCA90 | |
Source: | Code function: | 1_2_05EDFA68 | |
Source: | Code function: | 1_2_05EDC648 | |
Source: | Code function: | 1_2_05EDFA59 | |
Source: | Code function: | 1_2_05EDC638 | |
Source: | Code function: | 1_2_05EDF600 | |
Source: | Code function: | 1_2_05EDF610 | |
Source: | Code function: | 1_2_06FBB6E8 | |
Source: | Code function: | 1_2_06FBD670 | |
Source: | Code function: | 1_2_06FBAA58 | |
Source: | Code function: | 1_2_06FB8608 | |
Source: | Code function: | 1_2_06FBC388 | |
Source: | Code function: | 1_2_06FBB0A0 | |
Source: | Code function: | 1_2_06FB8C51 | |
Source: | Code function: | 1_2_06FBD028 | |
Source: | Code function: | 1_2_06FBA408 | |
Source: | Code function: | 1_2_06FBC9D8 | |
Source: | Code function: | 1_2_06FB11A0 | |
Source: | Code function: | 1_2_06FBBD38 | |
Source: | Code function: | 1_2_06FBB6D9 | |
Source: | Code function: | 1_2_06FB5EC8 | |
Source: | Code function: | 1_2_06FB5EB8 | |
Source: | Code function: | 1_2_06FB5A70 | |
Source: | Code function: | 1_2_06FBD661 | |
Source: | Code function: | 1_2_06FB5A60 | |
Source: | Code function: | 1_2_06FBAA52 | |
Source: | Code function: | 1_2_06FB5618 | |
Source: | Code function: | 1_2_06FB5609 | |
Source: | Code function: | 1_2_06FB8602 | |
Source: | Code function: | 1_2_06FBA3F8 | |
Source: | Code function: | 1_2_06FB6BD0 | |
Source: | Code function: | 1_2_06FB6BC1 | |
Source: | Code function: | 1_2_06FB33B8 | |
Source: | Code function: | 1_2_06FB33A8 | |
Source: | Code function: | 1_2_06FB6778 | |
Source: | Code function: | 1_2_06FBC378 | |
Source: | Code function: | 1_2_06FB676A | |
Source: | Code function: | 1_2_06FB3730 | |
Source: | Code function: | 1_2_06FB6320 | |
Source: | Code function: | 1_2_06FB6311 | |
Source: | Code function: | 1_2_06FB78F0 | |
Source: | Code function: | 1_2_06FB08F0 | |
Source: | Code function: | 1_2_06FB08E0 | |
Source: | Code function: | 1_2_06FB74A8 | |
Source: | Code function: | 1_2_06FB0498 | |
Source: | Code function: | 1_2_06FB7497 | |
Source: | Code function: | 1_2_06FB0488 | |
Source: | Code function: | 1_2_06FBB08F | |
Source: | Code function: | 1_2_06FB7050 | |
Source: | Code function: | 1_2_06FB7049 | |
Source: | Code function: | 1_2_06FB0040 | |
Source: | Code function: | 1_2_06FB4430 | |
Source: | Code function: | 1_2_06FB2818 | |
Source: | Code function: | 1_2_06FBD018 | |
Source: | Code function: | 1_2_06FB2807 | |
Source: | Code function: | 1_2_06FB0006 | |
Source: | Code function: | 1_2_06FBC9C8 | |
Source: | Code function: | 1_2_06FB81B0 | |
Source: | Code function: | 1_2_06FB81A0 | |
Source: | Code function: | 1_2_06FB5198 | |
Source: | Code function: | 1_2_06FB1191 | |
Source: | Code function: | 1_2_06FB518A | |
Source: | Code function: | 1_2_06FB7D58 | |
Source: | Code function: | 1_2_06FB0D48 | |
Source: | Code function: | 1_2_06FB7D48 | |
Source: | Code function: | 1_2_06FB0D39 | |
Source: | Code function: | 1_2_06FBBD28 | |
Source: | Code function: | 1_2_06FB7900 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: |
Source: | Static PE information: |
Source: | Code function: | 1_2_05ED2AC9 | |
Source: | Code function: | 1_2_05ED2E79 |
Source: | Static PE information: |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | File source: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 1_2_05ED7D90 |
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 111 Process Injection | 1 Masquerading | 1 OS Credential Dumping | 1 Query Registry | Remote Services | 1 Email Collection | 11 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Disable or Modify Tools | LSASS Memory | 1 Security Software Discovery | Remote Desktop Protocol | 1 Archive Collected Data | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 31 Virtualization/Sandbox Evasion | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | 1 Data from Local System | 2 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 111 Process Injection | NTDS | 31 Virtualization/Sandbox Evasion | Distributed Component Object Model | Input Capture | 13 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 3 Obfuscated Files or Information | LSA Secrets | 1 Application Window Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Software Packing | Cached Domain Credentials | 1 System Network Configuration Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 Timestomp | DCSync | 13 System Information Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 DLL Side-Loading | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
51% | Virustotal | Browse | ||
39% | ReversingLabs | ByteCode-MSIL.Trojan.Zilla | ||
100% | Avira | HEUR/AGEN.1311171 | ||
100% | Joe Sandbox ML |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
reallyfreegeoip.org | 104.21.32.1 | true | false | high | |
checkip.dyndns.com | 193.122.6.168 | true | false | high | |
checkip.dyndns.org | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.32.1 | reallyfreegeoip.org | United States | 13335 | CLOUDFLARENETUS | false | |
193.122.6.168 | checkip.dyndns.com | United States | 31898 | ORACLE-BMC-31898US | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1592377 |
Start date and time: | 2025-01-16 02:23:07 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 7m 14s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Order Details.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@3/1@2/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.45
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
Time | Type | Description |
---|---|---|
20:24:01 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.32.1 | Get hash | malicious | FormBook | Browse |
| |
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | Azorult, GuLoader | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | CMSBrute | Browse |
| ||
193.122.6.168 | Get hash | malicious | MassLogger RAT | Browse |
| |
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | GuLoader, MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
reallyfreegeoip.org | Get hash | malicious | MassLogger RAT | Browse |
| |
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
checkip.dyndns.com | Get hash | malicious | MassLogger RAT | Browse |
| |
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
ORACLE-BMC-31898US | Get hash | malicious | Metasploit | Browse |
| |
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | HTMLPhisher | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Porn Scam | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
54328bd36c14bd82ddaa0c04b25ed9ad | Get hash | malicious | MassLogger RAT | Browse |
| |
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
|
Process: | C:\Users\user\Desktop\Order Details.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 706 |
Entropy (8bit): | 5.349842958726647 |
Encrypted: | false |
SSDEEP: | 12:Q3La/hhkvoDLI4MWuCqDLI4MWuPTAq1KDLI4M9XKbbDLI4MWuPJKAVKhat92n4M6:MLUE4K5E4KH1qE4qXKDE4KhKiKhg84j |
MD5: | 9BA266AD16952A9A57C3693E0BCFED48 |
SHA1: | 5DB70A3A7F1DB4E3879265AB336B2FA1AFBCECD5 |
SHA-256: | A6DFD14E82D7D47195A1EC7F31E64C2820AB8721EF4B5825E21E742093B55C0E |
SHA-512: | 678E1F639379FC24919B7CF562FA19CE53363CBD4B0EAB66486F6F8D5DD5958DE3AAE8D7842EE868EFCC39D907FDC1A3ACF464E29D37B0DAEE9874C39730FE8E |
Malicious: | true |
Reputation: | moderate, very likely benign file |
Preview: |
File type: | |
Entropy (8bit): | 7.202602340768788 |
TrID: |
|
File name: | Order Details.exe |
File size: | 591'360 bytes |
MD5: | 06c48ef3e45a7dafedbd596368918830 |
SHA1: | 6ec2e82db6d702ddc0f4b302a4d8f02fd4c36c36 |
SHA256: | 1e2333cb4fb3ecca06d22bb3b6255e5ac62b7ba43c3bceb8c17252657f34ba1e |
SHA512: | 075339ded9d2831723318812cc50ed50978548a1df7df82a57fb2cdab97a788e8ca220131fbdb24c1d5f456c089237a6561f05a01c71075352db060eec792088 |
SSDEEP: | 12288:ZbRKjP7ne23gAcdtfD19UK/IBW+hb9LiRPXPgm:DKjP7e23gAcvfD1sW+Vo |
TLSH: | 7DC4BE9C2B9889F5D87645F29CF2545E7B78A90221F0E46420CB0EDDADDAF43099837F |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.................. ... ....@.. .......................`............@................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x491bce |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0xDA00EF84 [Sun Nov 25 02:40:04 2085 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x91b80 | 0x4b | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x92000 | 0x5a6 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x94000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x8fbd4 | 0x8fc00 | 33e25ca7c5528830a043e61fe47164c2 | False | 0.5194616168478261 | data | 7.213000127966721 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x92000 | 0x5a6 | 0x600 | c474081526abd64245cfd3ae4521545e | False | 0.4173177083333333 | data | 4.084105898819439 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x94000 | 0xc | 0x200 | 48598e14c8fb96c5183ccca32e3b49d0 | False | 0.044921875 | data | 0.10191042566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x920a0 | 0x31c | data | 0.4296482412060301 | ||
RT_MANIFEST | 0x923bc | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-16T02:24:00.739904+0100 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49730 | 193.122.6.168 | 80 | TCP |
2025-01-16T02:24:02.255513+0100 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49730 | 193.122.6.168 | 80 | TCP |
2025-01-16T02:24:02.848711+0100 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.4 | 49732 | 104.21.32.1 | 443 | TCP |
2025-01-16T02:24:03.536813+0100 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49733 | 193.122.6.168 | 80 | TCP |
2025-01-16T02:24:06.855237+0100 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.4 | 49738 | 104.21.32.1 | 443 | TCP |
2025-01-16T02:24:08.097022+0100 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.4 | 49740 | 104.21.32.1 | 443 | TCP |
2025-01-16T02:24:09.347621+0100 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.4 | 49742 | 104.21.32.1 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 16, 2025 02:23:59.845639944 CET | 49730 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:23:59.850481987 CET | 80 | 49730 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:23:59.850619078 CET | 49730 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:23:59.852308035 CET | 49730 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:23:59.857140064 CET | 80 | 49730 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:24:00.498305082 CET | 80 | 49730 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:24:00.504251003 CET | 49730 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:00.509315014 CET | 80 | 49730 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:24:00.694583893 CET | 80 | 49730 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:24:00.739903927 CET | 49730 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:00.749083996 CET | 49731 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:00.749171972 CET | 443 | 49731 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:00.749631882 CET | 49731 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:00.804876089 CET | 49731 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:00.804955959 CET | 443 | 49731 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:01.278129101 CET | 443 | 49731 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:01.278356075 CET | 49731 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:01.283165932 CET | 49731 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:01.283221960 CET | 443 | 49731 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:01.283581972 CET | 443 | 49731 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:01.333765030 CET | 49731 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:01.896434069 CET | 49731 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:01.939408064 CET | 443 | 49731 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:02.006443977 CET | 443 | 49731 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:02.006591082 CET | 443 | 49731 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:02.006769896 CET | 49731 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:02.012423038 CET | 49731 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:02.015245914 CET | 49730 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:02.020207882 CET | 80 | 49730 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:24:02.205658913 CET | 80 | 49730 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:24:02.210061073 CET | 49732 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:02.210103989 CET | 443 | 49732 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:02.210304976 CET | 49732 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:02.210602999 CET | 49732 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:02.210635900 CET | 443 | 49732 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:02.255512953 CET | 49730 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:02.700874090 CET | 443 | 49732 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:02.702832937 CET | 49732 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:02.702914953 CET | 443 | 49732 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:02.848818064 CET | 443 | 49732 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:02.848972082 CET | 443 | 49732 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:02.849184990 CET | 49732 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:02.849587917 CET | 49732 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:02.852876902 CET | 49730 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:02.854196072 CET | 49733 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:02.858442068 CET | 80 | 49730 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:24:02.858640909 CET | 49730 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:02.859606028 CET | 80 | 49733 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:24:02.859786034 CET | 49733 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:02.859786987 CET | 49733 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:02.865122080 CET | 80 | 49733 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:24:03.486785889 CET | 80 | 49733 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:24:03.487869978 CET | 49734 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:03.487914085 CET | 443 | 49734 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:03.487991095 CET | 49734 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:03.488224983 CET | 49734 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:03.488238096 CET | 443 | 49734 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:03.536813021 CET | 49733 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:03.967657089 CET | 443 | 49734 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:03.969508886 CET | 49734 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:03.969584942 CET | 443 | 49734 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:04.116931915 CET | 443 | 49734 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:04.117074013 CET | 443 | 49734 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:04.117192030 CET | 49734 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:04.117546082 CET | 49734 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:04.120826960 CET | 49735 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:04.125796080 CET | 80 | 49735 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:24:04.126038074 CET | 49735 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:04.126038074 CET | 49735 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:04.131033897 CET | 80 | 49735 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:24:04.770755053 CET | 80 | 49735 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:24:04.772172928 CET | 49736 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:04.772269011 CET | 443 | 49736 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:04.772355080 CET | 49736 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:04.772654057 CET | 49736 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:04.772675037 CET | 443 | 49736 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:04.818172932 CET | 49735 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:05.232516050 CET | 443 | 49736 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:05.233975887 CET | 49736 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:05.234070063 CET | 443 | 49736 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:05.367386103 CET | 443 | 49736 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:05.367530107 CET | 443 | 49736 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:05.367702007 CET | 49736 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:05.367899895 CET | 49736 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:05.371675968 CET | 49735 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:05.372214079 CET | 49737 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:05.377260923 CET | 80 | 49735 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:24:05.377440929 CET | 80 | 49737 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:24:05.377444029 CET | 49735 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:05.377522945 CET | 49737 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:05.377589941 CET | 49737 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:05.382911921 CET | 80 | 49737 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:24:06.005024910 CET | 80 | 49737 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:24:06.017859936 CET | 49738 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:06.017967939 CET | 443 | 49738 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:06.018044949 CET | 49738 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:06.018255949 CET | 49738 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:06.018276930 CET | 443 | 49738 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:06.052531004 CET | 49737 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:06.660830975 CET | 443 | 49738 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:06.662334919 CET | 49738 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:06.662415981 CET | 443 | 49738 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:06.855379105 CET | 443 | 49738 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:06.855539083 CET | 443 | 49738 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:06.855707884 CET | 49738 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:06.855834961 CET | 49738 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:06.858599901 CET | 49737 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:06.859096050 CET | 49739 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:06.863949060 CET | 80 | 49737 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:24:06.864034891 CET | 80 | 49739 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:24:06.864058971 CET | 49737 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:06.864098072 CET | 49739 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:06.864165068 CET | 49739 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:06.869098902 CET | 80 | 49739 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:24:07.496551037 CET | 80 | 49739 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:24:07.501498938 CET | 49740 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:07.501589060 CET | 443 | 49740 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:07.501692057 CET | 49740 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:07.502232075 CET | 49740 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:07.502314091 CET | 443 | 49740 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:07.540946007 CET | 49739 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:07.961690903 CET | 443 | 49740 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:07.963654041 CET | 49740 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:07.963740110 CET | 443 | 49740 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:08.097086906 CET | 443 | 49740 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:08.097229958 CET | 443 | 49740 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:08.097470999 CET | 49740 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:08.097588062 CET | 49740 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:08.100622892 CET | 49739 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:08.101541042 CET | 49741 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:08.105670929 CET | 80 | 49739 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:24:08.105734110 CET | 49739 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:08.106492043 CET | 80 | 49741 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:24:08.106698036 CET | 49741 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:08.106698990 CET | 49741 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:08.111675024 CET | 80 | 49741 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:24:08.742722988 CET | 80 | 49741 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:24:08.752826929 CET | 49742 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:08.752921104 CET | 443 | 49742 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:08.753012896 CET | 49742 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:08.753458977 CET | 49742 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:08.753540039 CET | 443 | 49742 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:08.786935091 CET | 49741 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:09.210362911 CET | 443 | 49742 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:09.212102890 CET | 49742 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:09.212188005 CET | 443 | 49742 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:09.347718000 CET | 443 | 49742 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:09.347877979 CET | 443 | 49742 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:09.348022938 CET | 49742 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:09.348263979 CET | 49742 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:09.351396084 CET | 49741 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:09.352579117 CET | 49743 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:09.356555939 CET | 80 | 49741 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:24:09.356724977 CET | 49741 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:09.357469082 CET | 80 | 49743 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:24:09.357692003 CET | 49743 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:09.357692003 CET | 49743 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:09.362723112 CET | 80 | 49743 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:24:10.062796116 CET | 80 | 49743 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:24:10.097768068 CET | 49744 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:10.097820997 CET | 443 | 49744 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:10.098043919 CET | 49744 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:10.098232031 CET | 49744 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:10.098249912 CET | 443 | 49744 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:10.115083933 CET | 49743 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:24:10.558015108 CET | 443 | 49744 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:10.559623003 CET | 49744 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:10.559675932 CET | 443 | 49744 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:10.686152935 CET | 443 | 49744 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:10.686305046 CET | 443 | 49744 | 104.21.32.1 | 192.168.2.4 |
Jan 16, 2025 02:24:10.686469078 CET | 49744 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:24:10.686784983 CET | 49744 | 443 | 192.168.2.4 | 104.21.32.1 |
Jan 16, 2025 02:25:08.579365015 CET | 80 | 49733 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:25:08.582257032 CET | 49733 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:25:15.068242073 CET | 80 | 49743 | 193.122.6.168 | 192.168.2.4 |
Jan 16, 2025 02:25:15.068310976 CET | 49743 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:25:50.069111109 CET | 49743 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 16, 2025 02:25:50.074033976 CET | 80 | 49743 | 193.122.6.168 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 16, 2025 02:23:59.828330040 CET | 59904 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 16, 2025 02:23:59.835450888 CET | 53 | 59904 | 1.1.1.1 | 192.168.2.4 |
Jan 16, 2025 02:24:00.738914013 CET | 59375 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 16, 2025 02:24:00.746440887 CET | 53 | 59375 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 16, 2025 02:23:59.828330040 CET | 192.168.2.4 | 1.1.1.1 | 0x2628 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 16, 2025 02:24:00.738914013 CET | 192.168.2.4 | 1.1.1.1 | 0xb52a | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 16, 2025 02:23:59.835450888 CET | 1.1.1.1 | 192.168.2.4 | 0x2628 | No error (0) | checkip.dyndns.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 16, 2025 02:23:59.835450888 CET | 1.1.1.1 | 192.168.2.4 | 0x2628 | No error (0) | 193.122.6.168 | A (IP address) | IN (0x0001) | false | ||
Jan 16, 2025 02:23:59.835450888 CET | 1.1.1.1 | 192.168.2.4 | 0x2628 | No error (0) | 132.226.247.73 | A (IP address) | IN (0x0001) | false | ||
Jan 16, 2025 02:23:59.835450888 CET | 1.1.1.1 | 192.168.2.4 | 0x2628 | No error (0) | 158.101.44.242 | A (IP address) | IN (0x0001) | false | ||
Jan 16, 2025 02:23:59.835450888 CET | 1.1.1.1 | 192.168.2.4 | 0x2628 | No error (0) | 193.122.130.0 | A (IP address) | IN (0x0001) | false | ||
Jan 16, 2025 02:23:59.835450888 CET | 1.1.1.1 | 192.168.2.4 | 0x2628 | No error (0) | 132.226.8.169 | A (IP address) | IN (0x0001) | false | ||
Jan 16, 2025 02:24:00.746440887 CET | 1.1.1.1 | 192.168.2.4 | 0xb52a | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false | ||
Jan 16, 2025 02:24:00.746440887 CET | 1.1.1.1 | 192.168.2.4 | 0xb52a | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false | ||
Jan 16, 2025 02:24:00.746440887 CET | 1.1.1.1 | 192.168.2.4 | 0xb52a | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false | ||
Jan 16, 2025 02:24:00.746440887 CET | 1.1.1.1 | 192.168.2.4 | 0xb52a | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false | ||
Jan 16, 2025 02:24:00.746440887 CET | 1.1.1.1 | 192.168.2.4 | 0xb52a | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false | ||
Jan 16, 2025 02:24:00.746440887 CET | 1.1.1.1 | 192.168.2.4 | 0xb52a | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false | ||
Jan 16, 2025 02:24:00.746440887 CET | 1.1.1.1 | 192.168.2.4 | 0xb52a | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49730 | 193.122.6.168 | 80 | 908 | C:\Users\user\Desktop\Order Details.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 16, 2025 02:23:59.852308035 CET | 151 | OUT | |
Jan 16, 2025 02:24:00.498305082 CET | 273 | IN | |
Jan 16, 2025 02:24:00.504251003 CET | 127 | OUT | |
Jan 16, 2025 02:24:00.694583893 CET | 273 | IN | |
Jan 16, 2025 02:24:02.015245914 CET | 127 | OUT | |
Jan 16, 2025 02:24:02.205658913 CET | 273 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49733 | 193.122.6.168 | 80 | 908 | C:\Users\user\Desktop\Order Details.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 16, 2025 02:24:02.859786987 CET | 127 | OUT | |
Jan 16, 2025 02:24:03.486785889 CET | 273 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49735 | 193.122.6.168 | 80 | 908 | C:\Users\user\Desktop\Order Details.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 16, 2025 02:24:04.126038074 CET | 151 | OUT | |
Jan 16, 2025 02:24:04.770755053 CET | 273 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49737 | 193.122.6.168 | 80 | 908 | C:\Users\user\Desktop\Order Details.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 16, 2025 02:24:05.377589941 CET | 151 | OUT | |
Jan 16, 2025 02:24:06.005024910 CET | 273 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49739 | 193.122.6.168 | 80 | 908 | C:\Users\user\Desktop\Order Details.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 16, 2025 02:24:06.864165068 CET | 151 | OUT | |
Jan 16, 2025 02:24:07.496551037 CET | 273 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49741 | 193.122.6.168 | 80 | 908 | C:\Users\user\Desktop\Order Details.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 16, 2025 02:24:08.106698990 CET | 151 | OUT | |
Jan 16, 2025 02:24:08.742722988 CET | 273 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49743 | 193.122.6.168 | 80 | 908 | C:\Users\user\Desktop\Order Details.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 16, 2025 02:24:09.357692003 CET | 151 | OUT | |
Jan 16, 2025 02:24:10.062796116 CET | 273 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49731 | 104.21.32.1 | 443 | 908 | C:\Users\user\Desktop\Order Details.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-16 01:24:01 UTC | 85 | OUT | |
2025-01-16 01:24:02 UTC | 853 | IN | |
2025-01-16 01:24:02 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49732 | 104.21.32.1 | 443 | 908 | C:\Users\user\Desktop\Order Details.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-16 01:24:02 UTC | 61 | OUT | |
2025-01-16 01:24:02 UTC | 855 | IN | |
2025-01-16 01:24:02 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49734 | 104.21.32.1 | 443 | 908 | C:\Users\user\Desktop\Order Details.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-16 01:24:03 UTC | 85 | OUT | |
2025-01-16 01:24:04 UTC | 861 | IN | |
2025-01-16 01:24:04 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49736 | 104.21.32.1 | 443 | 908 | C:\Users\user\Desktop\Order Details.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-16 01:24:05 UTC | 85 | OUT | |
2025-01-16 01:24:05 UTC | 851 | IN | |
2025-01-16 01:24:05 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49738 | 104.21.32.1 | 443 | 908 | C:\Users\user\Desktop\Order Details.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-16 01:24:06 UTC | 61 | OUT | |
2025-01-16 01:24:06 UTC | 859 | IN | |
2025-01-16 01:24:06 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49740 | 104.21.32.1 | 443 | 908 | C:\Users\user\Desktop\Order Details.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-16 01:24:07 UTC | 61 | OUT | |
2025-01-16 01:24:08 UTC | 852 | IN | |
2025-01-16 01:24:08 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49742 | 104.21.32.1 | 443 | 908 | C:\Users\user\Desktop\Order Details.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-16 01:24:09 UTC | 61 | OUT | |
2025-01-16 01:24:09 UTC | 859 | IN | |
2025-01-16 01:24:09 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49744 | 104.21.32.1 | 443 | 908 | C:\Users\user\Desktop\Order Details.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-16 01:24:10 UTC | 85 | OUT | |
2025-01-16 01:24:10 UTC | 851 | IN | |
2025-01-16 01:24:10 UTC | 362 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 20:23:58 |
Start date: | 15/01/2025 |
Path: | C:\Users\user\Desktop\Order Details.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x590000 |
File size: | 591'360 bytes |
MD5 hash: | 06C48EF3E45A7DAFEDBD596368918830 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 20:23:58 |
Start date: | 15/01/2025 |
Path: | C:\Users\user\Desktop\Order Details.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xf50000 |
File size: | 591'360 bytes |
MD5 hash: | 06C48EF3E45A7DAFEDBD596368918830 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 5.8% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 76% |
Total number of Nodes: | 25 |
Total number of Limit Nodes: | 1 |
Graph
Function 027BAE48 Relevance: 1.9, Strings: 1, Instructions: 615COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 027B9F60 Relevance: 1.6, APIs: 1, Instructions: 103COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 027BAB78 Relevance: 1.6, APIs: 1, Instructions: 101memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 027BA8F8 Relevance: 1.6, APIs: 1, Instructions: 94threadCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 027B9F48 Relevance: 1.6, APIs: 1, Instructions: 91threadCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 027BAC98 Relevance: 1.6, APIs: 1, Instructions: 73threadCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CFD5E8 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CFD4FC Relevance: .1, Instructions: 75COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CFD5E3 Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CFD4F7 Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 027B3118 Relevance: .1, Instructions: 88COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 11.3% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 37.9% |
Total number of Nodes: | 29 |
Total number of Limit Nodes: | 2 |
Graph
Function 019A6730 Relevance: 5.5, Strings: 4, Instructions: 455COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A9858 Relevance: 3.4, Strings: 2, Instructions: 863COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A6108 Relevance: 3.0, Strings: 2, Instructions: 515COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A3573 Relevance: 2.9, Strings: 2, Instructions: 418COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019AB328 Relevance: 2.9, Strings: 2, Instructions: 356COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019AC470 Relevance: 2.7, Strings: 2, Instructions: 201COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019AC753 Relevance: 2.7, Strings: 2, Instructions: 192COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB8C51 Relevance: 2.7, Strings: 2, Instructions: 189COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A4AD9 Relevance: 2.7, Strings: 2, Instructions: 189COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019AC190 Relevance: 2.7, Strings: 2, Instructions: 187COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019ACA33 Relevance: 2.7, Strings: 2, Instructions: 186COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019ABEB0 Relevance: 2.7, Strings: 2, Instructions: 186COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019ABBD3 Relevance: 2.7, Strings: 2, Instructions: 183COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019AB4F3 Relevance: 2.7, Strings: 2, Instructions: 151COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05ED7D90 Relevance: 1.9, APIs: 1, Instructions: 357COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB11A0 Relevance: .7, Instructions: 745COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019AF007 Relevance: .7, Instructions: 718COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB8608 Relevance: .3, Instructions: 296COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05EDCAA0 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FBB6E8 Relevance: .2, Instructions: 219COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FBD670 Relevance: .2, Instructions: 219COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FBC388 Relevance: .2, Instructions: 219COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FBA408 Relevance: .2, Instructions: 219COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FBC9D8 Relevance: .2, Instructions: 219COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FBBD38 Relevance: .2, Instructions: 219COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FBAA58 Relevance: .2, Instructions: 218COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FBB0A0 Relevance: .2, Instructions: 218COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FBD028 Relevance: .2, Instructions: 218COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB1191 Relevance: .2, Instructions: 178COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FBB08F Relevance: .2, Instructions: 172COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FBD018 Relevance: .2, Instructions: 170COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FBAA52 Relevance: .2, Instructions: 162COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FBC378 Relevance: .1, Instructions: 123COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FBC9C8 Relevance: .1, Instructions: 123COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB8602 Relevance: .1, Instructions: 114COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FBBD28 Relevance: .1, Instructions: 114COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FBA3F8 Relevance: .1, Instructions: 113COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FBD661 Relevance: .1, Instructions: 111COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FBB6D9 Relevance: .1, Instructions: 110COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A6E58 Relevance: 10.5, Strings: 8, Instructions: 498COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A77F0 Relevance: 3.2, Strings: 2, Instructions: 699COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A87E9 Relevance: 2.8, Strings: 2, Instructions: 335COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A56A8 Relevance: 2.8, Strings: 2, Instructions: 264COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB23E0 Relevance: 2.7, Strings: 2, Instructions: 239COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A5C08 Relevance: 2.7, Strings: 2, Instructions: 232COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB9510 Relevance: 2.7, Strings: 2, Instructions: 210COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A3428 Relevance: 2.6, Strings: 2, Instructions: 112COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A0C8F Relevance: 1.7, Strings: 1, Instructions: 407COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A0CA0 Relevance: 1.6, Strings: 1, Instructions: 395COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05ED8174 Relevance: 1.6, APIs: 1, Instructions: 62libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019AA650 Relevance: 1.4, Strings: 1, Instructions: 128COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019AA818 Relevance: .4, Instructions: 413COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A7438 Relevance: .2, Instructions: 201COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019ACEC7 Relevance: .2, Instructions: 172COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019ACED8 Relevance: .2, Instructions: 167COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019AE2D9 Relevance: .2, Instructions: 159COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019ACD10 Relevance: .1, Instructions: 141COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FBDCC0 Relevance: .1, Instructions: 136COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A3908 Relevance: .1, Instructions: 134COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB9A49 Relevance: .1, Instructions: 132COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019AF0E9 Relevance: .1, Instructions: 130COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A9A63 Relevance: .1, Instructions: 125COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019AE1F8 Relevance: .1, Instructions: 119COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB9500 Relevance: .1, Instructions: 117COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019AD7CE Relevance: .1, Instructions: 113COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019AD7EB Relevance: .1, Instructions: 112COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB9A58 Relevance: .1, Instructions: 111COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019AD76E Relevance: .1, Instructions: 107COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019AD620 Relevance: .1, Instructions: 103COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A4DC8 Relevance: .1, Instructions: 101COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FBDCB1 Relevance: .1, Instructions: 93COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A76D0 Relevance: .1, Instructions: 93COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019ADF79 Relevance: .1, Instructions: 93COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019AA809 Relevance: .1, Instructions: 91COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A76E0 Relevance: .1, Instructions: 87COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A4DBB Relevance: .1, Instructions: 86COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019AD11F Relevance: .1, Instructions: 82COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A2060 Relevance: .1, Instructions: 77COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 016BD4F0 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A5A70 Relevance: .1, Instructions: 74COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 016CD044 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A215C Relevance: .1, Instructions: 69COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB96F0 Relevance: .1, Instructions: 68COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A39ED Relevance: .1, Instructions: 68COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019AD60F Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FBE0C0 Relevance: .1, Instructions: 62COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 016BD4EB Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A1F61 Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB2670 Relevance: .1, Instructions: 55COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB9350 Relevance: .1, Instructions: 55COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB9999 Relevance: .1, Instructions: 55COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB8EC1 Relevance: .1, Instructions: 54COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019AE208 Relevance: .1, Instructions: 54COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A5607 Relevance: .1, Instructions: 54COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 016CD03F Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A1F08 Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB25E8 Relevance: .0, Instructions: 37COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019ADF08 Relevance: .0, Instructions: 37COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019AD449 Relevance: .0, Instructions: 36COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB9760 Relevance: .0, Instructions: 35COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019ADEB0 Relevance: .0, Instructions: 32COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A2010 Relevance: .0, Instructions: 28COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019AD4B4 Relevance: .0, Instructions: 27COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A2020 Relevance: .0, Instructions: 19COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A8258 Relevance: .0, Instructions: 18COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019AA70D Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A5EA8 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019AFBEB Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A5EB8 Relevance: .0, Instructions: 12COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB2807 Relevance: 12.9, Strings: 10, Instructions: 389COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019AE528 Relevance: 1.8, Strings: 1, Instructions: 596COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05EDC1F0 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05ED11C0 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05EDF1B8 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05EDBD98 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05ED0D60 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05EDED60 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05EDB940 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05EDE908 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05ED0900 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05EDB4E8 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05ED04A0 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05EDE4B0 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05ED0040 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05EDE058 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05EDDC00 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05EDD7A8 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05EDD350 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05EDCEF8 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05EDFA68 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05EDC648 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05EDF610 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB5EC8 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB5A70 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB5618 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB6BD0 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB6778 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB6320 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB08F0 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB74A8 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB0498 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB7050 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB0040 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB81B0 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB5198 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB7D58 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB0D48 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB7900 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB33B8 Relevance: .2, Instructions: 222COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05ED1620 Relevance: .2, Instructions: 220COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05ED1966 Relevance: .2, Instructions: 202COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019AEB5B Relevance: .2, Instructions: 193COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB33A8 Relevance: .1, Instructions: 133COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019AED3C Relevance: .1, Instructions: 116COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06FB36CE Relevance: .0, Instructions: 17COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A21E3 Relevance: 5.4, Strings: 4, Instructions: 427COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 019A6088 Relevance: 5.0, Strings: 4, Instructions: 49COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|