Analysis Report PAD.Console.Host.exe
Overview
General Information
Detection
Score: | 23 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
No yara matches |
---|
Sigma Overview |
---|
No Sigma rule has matched |
---|
Signature Overview |
---|
- • Compliance
- • Networking
- • System Summary
- • Data Obfuscation
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • Language, Device and Operating System Detection
Click to jump to signature section
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Classification label: |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Process created: | ||
Source: | Process created: |
Source: | Key value queried: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation: |
---|
Binary contains a suspicious time stamp |
Source: | Static PE information: |
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | Process Injection1 | Virtualization/Sandbox Evasion1 | OS Credential Dumping | Query Registry1 | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Data Obfuscation | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Disable or Modify Tools1 | LSASS Memory | Security Software Discovery11 | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Process Injection1 | Security Account Manager | Virtualization/Sandbox Evasion1 | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Timestomp1 | NTDS | System Information Discovery12 | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | Remote System Discovery1 | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse | ||
0% | ReversingLabs |
No Antivirus matches |
---|
No Antivirus matches |
---|
No Antivirus matches |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe |
No contacted domains info |
---|
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high |
No contacted IP infos |
---|
General Information |
---|
Joe Sandbox Version: | 31.0.0 Emerald |
Analysis ID: | 371286 |
Start date: | 18.03.2021 |
Start time: | 15:34:30 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 5m 50s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | PAD.Console.Host.exe |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 25 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | SUS |
Classification: | sus23.winEXE@2/4@0/0 |
EGA Information: | Failed |
HDC Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
Warnings: | Show All
|
Time | Type | Description |
---|---|---|
15:35:28 | API Interceptor |
No context |
---|
No context |
---|
No context |
---|
No context |
---|
No context |
---|
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 13526 |
Entropy (8bit): | 3.7795341765126143 |
Encrypted: | false |
SSDEEP: | 192:4U/JA/BEFo4HRHEDNQPa1v5Vlbk/u7sJS274ltbfo7:TCEWgRHEDmalZg/u7sJX4ltbo7 |
MD5: | F2D816F02524E56E564762DADEEB0BDA |
SHA1: | 29D47A83D6629EF47B0CB11C277AFD514F804E8F |
SHA-256: | 95DC7AF3E7A8DB1EE92C9B0E127585B88A190A996C8238CA35BF8C880CB39B75 |
SHA-512: | E9F73A13FD7F4B2C03A436871174A99D4693534EE141FD53AC7C70D9E0027CBA66A1F1EB933E5DD3B040EF8CFE3D76DFF1726107F567D085FC70F702C0AD2129 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8564 |
Entropy (8bit): | 3.702603363160761 |
Encrypted: | false |
SSDEEP: | 192:Rrl7r3GLNiscimg6YIi6avgmfjs4aSIzCpr389boIyf0P4m:RrlsNigX6Yd6avgmf44aSIDodfM |
MD5: | C3C6A07EF2EAD4E5B0A582704636712C |
SHA1: | 9D76DEACF3C72CB38FA527CC7A2B28C6CD7BD775 |
SHA-256: | 5ED4745A149D2F1E6C3EC992C29E3B77DC571FEA28EB1B1E855D84ABC953D778 |
SHA-512: | E254C2659BEFD70A2CE7E13036B0725C847F42B647C02C8A6D71256A94B9A9AF1A3D9A3873921AC70C7D6D6D546F19A1229C9F12997E052B6C9E88490B47FBDC |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4747 |
Entropy (8bit): | 4.5091373071172685 |
Encrypted: | false |
SSDEEP: | 48:cvIwSD8zsKJgtBI9thWSC8Ba8fm8M4JwWFUNFvgyq85TzUbdeYWVwqd:uITfYXwSNxJw0pbMYWVDd |
MD5: | 223336D8D50791C04692B28B4E6901B5 |
SHA1: | A48C014F322DFE1BAE4F46DB6BAF0EB32770E780 |
SHA-256: | F6CB8DEFAFDE7C89C05640128125E8BAD1AE7D836E085738E04B51E6DDCA58C5 |
SHA-512: | B18507B18D7FC41A72E91080C54DA939496A1B950DC0EA9A77A516E7D3FE3C2E75075C2375498DE4E5A02923837D72CD45888AF7E4D02378BC7717DD7037D815 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 346984 |
Entropy (8bit): | 3.5763634691253894 |
Encrypted: | false |
SSDEEP: | 3072:Fq1gVZVEeVtWKsaMQhv5kM4CUNXT0F0+1jcqPZkl9cbrgxQHOFmXUGgkANTfu5XP:o/tZ68iPZdzuIEk/ |
MD5: | E4846A9F2D06834A82CBCC97E258A379 |
SHA1: | 0431B76386A34F181D4B71661374DF9730B178B4 |
SHA-256: | AD571A388DA3F6D0E5E06B28AD8711D967FA8BAC8683AEFE6555005B08B10205 |
SHA-512: | 7FBC44DDF5C15787D3DCF4C905CB78264597C7EE3108BC43DBA9AA89C328CBD1433D0FEE2A4EA62351DB7D8D74E505F34849BBA107D34CDE9CFDA1CB90644CD1 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 5.4351279854112216 |
TrID: |
|
File name: | PAD.Console.Host.exe |
File size: | 402824 |
MD5: | 986b1583582c9066b383add3724b1a93 |
SHA1: | ddac4618e14e025ce5b1f01bce1d44f54abd391e |
SHA256: | e32a092fef4c7fc1b9a1175fbb714ba52c16f530ad9a4636b7e90d3484905e23 |
SHA512: | 07917046b9df3557179fadfabe90dcf0351172793365024396df185b44fcfb61c28dddcf87dd09733b1e65fa0a6106a16c19213195819c145628f59febecca34 |
SSDEEP: | 6144:aSj0ICwwj1hMd2UOkd/lD+XMfdnKFX739m5m:f521kdoXMfdnKFjYI |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2!............"...0.................. ... ....@.. .......................@......MH....`................................ |
File Icon |
---|
Icon Hash: | 69e6c08088c662b9 |
General | |
---|---|
Entrypoint: | 0x411f12 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA |
Time Stamp: | 0xB0A82132 [Sun Dec 2 08:09:22 2063 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | v4.0.30319 |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Signature Valid: | true |
Signature Issuer: | CN=Microsoft Code Signing PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US |
Signature Validation Error: | The operation completed successfully |
Error Number: | 0 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 658DCC2A890351DF97DC9F05146283C0 |
Thumbprint SHA-1: | ABDCA79AF9DD48A0EA702AD45260B3C03093FB4B |
Thumbprint SHA-256: | E39CC80A0DF6F2BED821D11B49717306138C1D19FD20190336BF1C4297638A79 |
Serial: | 33000001DF6BF02E92A74AB4D00000000001DF |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x11ec0 | 0x4f | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x12000 | 0x4fdf4 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x60200 | 0x2388 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x62000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x11e20 | 0x38 | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0xff18 | 0x10000 | False | 0.392715454102 | data | 6.07419741486 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
.rsrc | 0x12000 | 0x4fdf4 | 0x4fe00 | False | 0.226272129304 | data | 4.96384044067 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x62000 | 0xc | 0x200 | False | 0.044921875 | data | 0.101910425663 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
RT_ICON | 0x12200 | 0x468 | GLS_BINARY_LSB_FIRST | ||
RT_ICON | 0x12678 | 0x988 | data | ||
RT_ICON | 0x13010 | 0x10a8 | dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0 | ||
RT_ICON | 0x140c8 | 0x25a8 | dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0 | ||
RT_ICON | 0x16680 | 0x4228 | dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0 | ||
RT_ICON | 0x1a8b8 | 0x94a8 | data | ||
RT_ICON | 0x23d70 | 0x10828 | dBase III DBT, version number 0, next free block index 40 | ||
RT_ICON | 0x345a8 | 0x25228 | dBase IV DBT of \200\001.DBF, blocks size 0, block length 16384, next free block index 40, next free block 4280973550, next used block 4281039343 | ||
RT_ICON | 0x597e0 | 0x7f7e | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | ||
RT_GROUP_ICON | 0x61770 | 0x84 | data | ||
RT_VERSION | 0x61804 | 0x3f0 | SysEx File - OctavePlateau | ||
RT_MANIFEST | 0x61c04 | 0x1ea | XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Description | Data |
---|---|
Translation | 0x0000 0x04b0 |
LegalCopyright | Copyright (C) Microsoft Corporation. All rights reserved. |
Assembly Version | 2.6.158.21069 |
InternalName | PAD.Console.Host.exe |
FileVersion | 2.6.158.21069 |
CompanyName | Microsoft |
Comments | PAD.Console.Host |
ProductName | Power Automate Desktop |
ProductVersion | 2.6.00158.21069 |
FileDescription | Power Automate Desktop |
OriginalFilename | PAD.Console.Host.exe |
Network Behavior |
---|
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 18, 2021 15:35:13.449748039 CET | 53 | 53784 | 8.8.8.8 | 192.168.2.5 |
Mar 18, 2021 15:35:13.554727077 CET | 65307 | 53 | 192.168.2.5 | 8.8.8.8 |
Mar 18, 2021 15:35:13.604279041 CET | 53 | 65307 | 8.8.8.8 | 192.168.2.5 |
Mar 18, 2021 15:35:14.167216063 CET | 64344 | 53 | 192.168.2.5 | 8.8.8.8 |
Mar 18, 2021 15:35:14.221322060 CET | 53 | 64344 | 8.8.8.8 | 192.168.2.5 |
Mar 18, 2021 15:35:14.293314934 CET | 62060 | 53 | 192.168.2.5 | 8.8.8.8 |
Mar 18, 2021 15:35:14.345887899 CET | 53 | 62060 | 8.8.8.8 | 192.168.2.5 |
Mar 18, 2021 15:35:14.415211916 CET | 61805 | 53 | 192.168.2.5 | 8.8.8.8 |
Mar 18, 2021 15:35:14.488044977 CET | 53 | 61805 | 8.8.8.8 | 192.168.2.5 |
Mar 18, 2021 15:35:15.380436897 CET | 54795 | 53 | 192.168.2.5 | 8.8.8.8 |
Mar 18, 2021 15:35:15.434096098 CET | 53 | 54795 | 8.8.8.8 | 192.168.2.5 |
Mar 18, 2021 15:35:16.355431080 CET | 49557 | 53 | 192.168.2.5 | 8.8.8.8 |
Mar 18, 2021 15:35:16.407566071 CET | 53 | 49557 | 8.8.8.8 | 192.168.2.5 |
Mar 18, 2021 15:35:17.372389078 CET | 61733 | 53 | 192.168.2.5 | 8.8.8.8 |
Mar 18, 2021 15:35:17.421873093 CET | 53 | 61733 | 8.8.8.8 | 192.168.2.5 |
Mar 18, 2021 15:35:17.485935926 CET | 65447 | 53 | 192.168.2.5 | 8.8.8.8 |
Mar 18, 2021 15:35:17.545881987 CET | 53 | 65447 | 8.8.8.8 | 192.168.2.5 |
Mar 18, 2021 15:35:18.417500019 CET | 52441 | 53 | 192.168.2.5 | 8.8.8.8 |
Mar 18, 2021 15:35:18.468183041 CET | 53 | 52441 | 8.8.8.8 | 192.168.2.5 |
Mar 18, 2021 15:35:19.561724901 CET | 62176 | 53 | 192.168.2.5 | 8.8.8.8 |
Mar 18, 2021 15:35:19.619771957 CET | 53 | 62176 | 8.8.8.8 | 192.168.2.5 |
Mar 18, 2021 15:35:20.544275045 CET | 59596 | 53 | 192.168.2.5 | 8.8.8.8 |
Mar 18, 2021 15:35:20.605056047 CET | 53 | 59596 | 8.8.8.8 | 192.168.2.5 |
Mar 18, 2021 15:35:21.518605947 CET | 65296 | 53 | 192.168.2.5 | 8.8.8.8 |
Mar 18, 2021 15:35:21.571640968 CET | 53 | 65296 | 8.8.8.8 | 192.168.2.5 |
Mar 18, 2021 15:35:22.765125990 CET | 63183 | 53 | 192.168.2.5 | 8.8.8.8 |
Mar 18, 2021 15:35:22.815016031 CET | 53 | 63183 | 8.8.8.8 | 192.168.2.5 |
Mar 18, 2021 15:35:28.103554010 CET | 60151 | 53 | 192.168.2.5 | 8.8.8.8 |
Mar 18, 2021 15:35:28.161474943 CET | 53 | 60151 | 8.8.8.8 | 192.168.2.5 |
Mar 18, 2021 15:35:37.870836020 CET | 56969 | 53 | 192.168.2.5 | 8.8.8.8 |
Mar 18, 2021 15:35:37.920301914 CET | 53 | 56969 | 8.8.8.8 | 192.168.2.5 |
Mar 18, 2021 15:35:39.223443985 CET | 55161 | 53 | 192.168.2.5 | 8.8.8.8 |
Mar 18, 2021 15:35:39.285598993 CET | 53 | 55161 | 8.8.8.8 | 192.168.2.5 |
Mar 18, 2021 15:35:39.907850981 CET | 54757 | 53 | 192.168.2.5 | 8.8.8.8 |
Mar 18, 2021 15:35:39.957206011 CET | 53 | 54757 | 8.8.8.8 | 192.168.2.5 |
Mar 18, 2021 15:35:49.203974009 CET | 49992 | 53 | 192.168.2.5 | 8.8.8.8 |
Mar 18, 2021 15:35:49.253549099 CET | 53 | 49992 | 8.8.8.8 | 192.168.2.5 |
Mar 18, 2021 15:36:09.802470922 CET | 60075 | 53 | 192.168.2.5 | 8.8.8.8 |
Mar 18, 2021 15:36:09.860512972 CET | 53 | 60075 | 8.8.8.8 | 192.168.2.5 |
Mar 18, 2021 15:36:13.619652987 CET | 55016 | 53 | 192.168.2.5 | 8.8.8.8 |
Mar 18, 2021 15:36:13.670550108 CET | 53 | 55016 | 8.8.8.8 | 192.168.2.5 |
Mar 18, 2021 15:36:22.463787079 CET | 64345 | 53 | 192.168.2.5 | 8.8.8.8 |
Mar 18, 2021 15:36:22.527530909 CET | 53 | 64345 | 8.8.8.8 | 192.168.2.5 |
Mar 18, 2021 15:36:38.225544930 CET | 57128 | 53 | 192.168.2.5 | 8.8.8.8 |
Mar 18, 2021 15:36:38.286155939 CET | 53 | 57128 | 8.8.8.8 | 192.168.2.5 |
Mar 18, 2021 15:36:51.017592907 CET | 54791 | 53 | 192.168.2.5 | 8.8.8.8 |
Mar 18, 2021 15:36:51.070549011 CET | 53 | 54791 | 8.8.8.8 | 192.168.2.5 |
Mar 18, 2021 15:36:53.209806919 CET | 50463 | 53 | 192.168.2.5 | 8.8.8.8 |
Mar 18, 2021 15:36:53.282887936 CET | 53 | 50463 | 8.8.8.8 | 192.168.2.5 |
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
High Level Behavior Distribution |
---|
back
Click to dive into process behavior distribution
Behavior |
---|
Click to jump to process
System Behavior |
---|
Start time: | 15:35:20 |
Start date: | 18/03/2021 |
Path: | C:\Users\user\Desktop\PAD.Console.Host.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x19532170000 |
File size: | 402824 bytes |
MD5 hash: | 986B1583582C9066B383ADD3724B1A93 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Reputation: | low |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Windows UI Activities
LPC Port Activities
Start time: | 15:35:22 |
Start date: | 18/03/2021 |
Path: | C:\Windows\System32\WerFault.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7a1750000 |
File size: | 494488 bytes |
MD5 hash: | 2AFFE478D86272288BBEF5A00BBEF6A0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Reputation: | moderate |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
Process Token Activities
Object Security Activities
LPC Port Activities
Disassembly |
---|
Code Analysis |
---|
Executed Functions |
---|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Non-executed Functions |
---|