Windows
Analysis Report
dBvNa2pTbj
Overview
General Information
Detection
Score: | 92 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- dBvNa2pTbj.exe (PID: 6272 cmdline:
"C:\Users\ user\Deskt op\dBvNa2p Tbj.exe" MD5: 628E04A5C298A35BD396B74A42D237FE)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_DiscordTokenStealer | Yara detected Discord Token Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security |
Click to jump to signature section
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Virustotal: | Perma Link |
Source: | Joe Sandbox ML: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
System Summary |
---|
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_01532028 | |
Source: | Code function: | 0_2_0153251A | |
Source: | Code function: | 0_2_01533438 | |
Source: | Code function: | 0_2_015318E8 | |
Source: | Code function: | 0_2_01535AF1 | |
Source: | Code function: | 0_2_01535160 | |
Source: | Code function: | 0_2_015333FA | |
Source: | Code function: | 0_2_0153A40F | |
Source: | Code function: | 0_2_0153A420 | |
Source: | Code function: | 0_2_0153049F | |
Source: | Code function: | 0_2_01536730 | |
Source: | Code function: | 0_2_015347B8 | |
Source: | Code function: | 0_2_015367A0 | |
Source: | Code function: | 0_2_015356D0 | |
Source: | Code function: | 0_2_015348A8 | |
Source: | Code function: | 0_2_01535BFB | |
Source: | Code function: | 0_2_01532BBD | |
Source: | Code function: | 0_2_01533D70 | |
Source: | Code function: | 0_2_01534D20 | |
Source: | Code function: | 0_2_01533C59 | |
Source: | Code function: | 0_2_01535CAB | |
Source: | Code function: | 0_2_01531F91 | |
Source: | Code function: | 0_2_0B3973B8 | |
Source: | Code function: | 0_2_0B39A628 | |
Source: | Code function: | 0_2_0B3926F0 | |
Source: | Code function: | 0_2_0B398540 | |
Source: | Code function: | 0_2_0B398B79 | |
Source: | Code function: | 0_2_0B398B70 | |
Source: | Code function: | 0_2_0B39896A | |
Source: | Code function: | 0_2_0B398961 | |
Source: | Code function: | 0_2_0B398FD6 | |
Source: | Code function: | 0_2_0B398FCD | |
Source: | Code function: | 0_2_0B398DB1 | |
Source: | Code function: | 0_2_0B398DA8 | |
Source: | Code function: | 0_2_0B3973AA | |
Source: | Code function: | 0_2_0B391258 | |
Source: | Code function: | 0_2_0B391249 | |
Source: | Code function: | 0_2_0B398757 | |
Source: | Code function: | 0_2_0B39874E | |
Source: | Code function: | 0_2_0B3926E2 | |
Source: | Code function: | 0_2_0B398538 | |
Source: | Code function: | 0_2_0B397549 | |
Source: | Code function: | 0_2_0B39943A | |
Source: | Code function: | 0_2_0B399443 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Virustotal: | ||
Source: | Metadefender: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | WMI Queries: |
Source: | File created: | Jump to behavior |
Source: | Classification label: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static file information: | |||
Source: | Section loaded: | Jump to behavior |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_00AE51C6 | |
Source: | Code function: | 0_2_00AE3A43 | |
Source: | Code function: | 0_2_01531C80 |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | WMI Queries: |
Source: | WMI Queries: |
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | 121 Windows Management Instrumentation | Path Interception | Path Interception | 1 Masquerading | OS Credential Dumping | 121 Security Software Discovery | Remote Services | 1 Archive Collected Data | Exfiltration Over Other Network Medium | 11 Encrypted Channel | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Disable or Modify Tools | LSASS Memory | 141 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 1 Data from Local System | Exfiltration Over Bluetooth | 3 Ingress Tool Transfer | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | 141 Virtualization/Sandbox Evasion | Security Account Manager | 1 Remote System Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | 3 Non-Application Layer Protocol | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | 2 Obfuscated Files or Information | NTDS | 33 System Information Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | 4 Application Layer Protocol | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | 2 Software Packing | LSA Secrets | Remote System Discovery | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
Replication Through Removable Media | Launchd | Rc.common | Rc.common | 1 Timestomp | Cached Domain Credentials | System Owner/User Discovery | VNC | GUI Input Capture | Exfiltration Over C2 Channel | Multiband Communication | Jamming or Denial of Service | Abuse Accessibility Features |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
55% | Virustotal | Browse | ||
43% | Metadefender | Browse | ||
85% | ReversingLabs | Win32.Trojan.Johnnie | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe | ||
1% | Virustotal | Browse | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | URL Reputation | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
ipwho.is | 136.243.172.101 | true | false |
| unknown |
holdmy1337.ga | 188.114.96.3 | true | true |
| unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
true |
| unknown | ||
true |
| unknown | ||
true |
| unknown | ||
true |
| unknown | ||
true |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
true |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
136.243.172.101 | ipwho.is | Germany | 24940 | HETZNER-ASDE | false | |
188.114.96.3 | holdmy1337.ga | European Union | 13335 | CLOUDFLARENETUS | true |
IP |
---|
192.168.2.1 |
Joe Sandbox Version: | 35.0.0 Citrine |
Analysis ID: | 662346 |
Start date and time: 13/07/202206:19:39 | 2022-07-13 06:19:39 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 6m 48s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | dBvNa2pTbj (renamed file extension from none to exe) |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 23 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal92.troj.spyw.evad.winEXE@1/15@2/3 |
EGA Information: |
|
HDC Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, UpdateNotificationMgr.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe, UsoClient.exe, wuapihost.exe
- Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, settings-win.data.microsoft.com, ctldl.windowsupdate.com, arc.msn.com, ris.api.iris.microsoft.com, licensing.mp.microsoft.com, go.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
Time | Type | Description |
---|---|---|
06:20:53 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
136.243.172.101 | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
holdmy1337.ga | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
ipwho.is | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
HETZNER-ASDE | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
3b5074b1b5d032e5620f69f9f700ff0e | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Process: | C:\Users\user\Desktop\dBvNa2pTbj.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1219 |
Entropy (8bit): | 5.355002832885189 |
Encrypted: | false |
SSDEEP: | 24:ML9E4Ks2wKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7r1qE4jE4KYE4psXE4j:MxHKXwYHKhQnoPtHoxHhAHKzvr1qHjHs |
MD5: | 137A89138E3E0F3C8AA359C8B58C32C1 |
SHA1: | 93519C825C5108835BADED1FC17482FC0B4CE758 |
SHA-256: | 6EC38797744CF07F3EB53B93E66709475EC64185D23B4110CC0DBFD20B182CD5 |
SHA-512: | C7DE7A66A2BFE882500609FC5BA96633355A4B558B6F8FD1FEFBAB39F7A14FC49F9A1C5B12145A2480027C1A262FF964C6B1D1C5AF74D6DEEE618B4DEF02AA39 |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\dBvNa2pTbj.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1026 |
Entropy (8bit): | 4.690067217069288 |
Encrypted: | false |
SSDEEP: | 12:wSQanHEC73FqjThUbJwuUn5qPyd2whRZfZOaH5KrqXzJI/y5bjbVMmRYAPL8fx7T:wHu73FWhUNwzqq2OfX82JdHRNPLcxdl |
MD5: | 4E32787C3D6F915D3CB360878174E142 |
SHA1: | 57FF84FAEDF66015F2D79E1BE72A29D7B5643F47 |
SHA-256: | 2BCD2A46D2DCED38DE96701E6D3477D8C9F4456FFAE5135C0605C8434BA60269 |
SHA-512: | CEC75D7CCFA70705732826C202D144A8AC913E7FCFE0D9B54F6A0D1EEC3253B6DEFFB91E551586DA15F56BA4DE8030AC23EE28B16BB80D1C5F1CB6BECF9C21BE |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\dBvNa2pTbj.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1026 |
Entropy (8bit): | 4.692990330209164 |
Encrypted: | false |
SSDEEP: | 24:NCzz4hMQMxH70HULgnraTryj1S0KEX64u+O572j79DwzpnQf8A:axH70cauYS0k4u+O125wtnm8A |
MD5: | DD71B9C0322AD45992E56A9BCE43FE82 |
SHA1: | 60945B6BC3027451A2E1CFA29D263A994F50E91A |
SHA-256: | 19AC62FD471E562088365029F7B0672623511CF3E58F2EF6DE1A15C14A2E94E7 |
SHA-512: | 86EA2B42FEB542977FCF534B4708F7A07E09F4ACC413307E660B905408BC4AA9E26C50E907FA02379EA3EBFD18C532CC9DC269B6EA5994E3290082E429CAAE03 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\dBvNa2pTbj.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1026 |
Entropy (8bit): | 4.6959554225029665 |
Encrypted: | false |
SSDEEP: | 24:TifvYKkubZMu3HGRW2lJUao1nH5o4WGAZ46:rKkmZMuklJUj+GAZ46 |
MD5: | DCABA2748DFEAEF0BFBC56FD9F79315C |
SHA1: | B87FBA690A774893B22B9F611DFDCB5CDC520269 |
SHA-256: | 86DF5957E0CD2EBDFC2FF8C2F05569BA71462149042DF57ECE5E8228E3BC5DDD |
SHA-512: | 65F10692D0AE5CBAADDB03E89D6CD1D3486429906437A17C2B1157BEDB069202B1DC52A4E864AA8F90B8CBD171FD2A3E150185BF7DFF81540E209B6A8F8829F3 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\dBvNa2pTbj.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1026 |
Entropy (8bit): | 4.692990330209164 |
Encrypted: | false |
SSDEEP: | 24:NCzz4hMQMxH70HULgnraTryj1S0KEX64u+O572j79DwzpnQf8A:axH70cauYS0k4u+O125wtnm8A |
MD5: | DD71B9C0322AD45992E56A9BCE43FE82 |
SHA1: | 60945B6BC3027451A2E1CFA29D263A994F50E91A |
SHA-256: | 19AC62FD471E562088365029F7B0672623511CF3E58F2EF6DE1A15C14A2E94E7 |
SHA-512: | 86EA2B42FEB542977FCF534B4708F7A07E09F4ACC413307E660B905408BC4AA9E26C50E907FA02379EA3EBFD18C532CC9DC269B6EA5994E3290082E429CAAE03 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\dBvNa2pTbj.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1026 |
Entropy (8bit): | 4.7020597455120665 |
Encrypted: | false |
SSDEEP: | 24:Yyd0vLZv9GwBegFWbhTY2P2m1O278kZUU3ZjGaIv:YhLZugsbh0m1bYUpjG9 |
MD5: | 47F4925C44B6916FE1BEE7FBB1ACF777 |
SHA1: | D7BFAEF09A15A105540FC44D2C307778C0553CE5 |
SHA-256: | 62FB407C253C01957EB5C9ED8075E409FD399C065B6478E5080FDC8573A1AED8 |
SHA-512: | 6B4870B47569942B119533F4C519498D2E7D76FBBD36EC9CAE219BE800864CFA47FC65C98FDDA7D92C0B52F1EA381D7C3D5DC4DE204ABF04CED7F6C43004C1B8 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\dBvNa2pTbj.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1026 |
Entropy (8bit): | 4.690067217069288 |
Encrypted: | false |
SSDEEP: | 12:wSQanHEC73FqjThUbJwuUn5qPyd2whRZfZOaH5KrqXzJI/y5bjbVMmRYAPL8fx7T:wHu73FWhUNwzqq2OfX82JdHRNPLcxdl |
MD5: | 4E32787C3D6F915D3CB360878174E142 |
SHA1: | 57FF84FAEDF66015F2D79E1BE72A29D7B5643F47 |
SHA-256: | 2BCD2A46D2DCED38DE96701E6D3477D8C9F4456FFAE5135C0605C8434BA60269 |
SHA-512: | CEC75D7CCFA70705732826C202D144A8AC913E7FCFE0D9B54F6A0D1EEC3253B6DEFFB91E551586DA15F56BA4DE8030AC23EE28B16BB80D1C5F1CB6BECF9C21BE |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\dBvNa2pTbj.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1026 |
Entropy (8bit): | 4.696312162983912 |
Encrypted: | false |
SSDEEP: | 24:G1O/dOdJXH3hrdB2Swsk4go3oInr8X513aQRmy8:Gk/8ASwsk4+p13aQRmy8 |
MD5: | 83B91EFB8185C5AF5A6B60F4FE9CC2D2 |
SHA1: | 0EB7AE1817790DFC5225A02B74A272C84FEE4240 |
SHA-256: | 8CA340B024C5A3134DE6C89C30C866FF4BCE5175C9E1A2F52075C0199BA1AE1E |
SHA-512: | F8445B5F18C9F48EFB98B6A310CD757314DA5173FD3490357672B51FED3FF72FF5095E0D17C829D96DE873FC70358D25B7D6369D3458E3AD9BF8D81A5158E46A |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\dBvNa2pTbj.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1026 |
Entropy (8bit): | 4.7020597455120665 |
Encrypted: | false |
SSDEEP: | 24:Yyd0vLZv9GwBegFWbhTY2P2m1O278kZUU3ZjGaIv:YhLZugsbh0m1bYUpjG9 |
MD5: | 47F4925C44B6916FE1BEE7FBB1ACF777 |
SHA1: | D7BFAEF09A15A105540FC44D2C307778C0553CE5 |
SHA-256: | 62FB407C253C01957EB5C9ED8075E409FD399C065B6478E5080FDC8573A1AED8 |
SHA-512: | 6B4870B47569942B119533F4C519498D2E7D76FBBD36EC9CAE219BE800864CFA47FC65C98FDDA7D92C0B52F1EA381D7C3D5DC4DE204ABF04CED7F6C43004C1B8 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\dBvNa2pTbj.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1026 |
Entropy (8bit): | 4.697771666106845 |
Encrypted: | false |
SSDEEP: | 24:TwdgExX6lswcsA1Wo1+js3mQmFlw2UJh6QHssg9RGVQ8:T6KiV+KmQmFwhtMp9RGVH |
MD5: | D910958AF930D9DCA27D8F529EC053D0 |
SHA1: | 321478679C760C347743149A323469AD4BFEA87D |
SHA-256: | C70010ABE33AC34A7DB2F84B5ECDEA5EF95D482B69138707C126D2C1C1B67F37 |
SHA-512: | 0BCADFF480F8F0C7E5DDC316F678564A75785640F151ACA644CABE64AD10D0D4AD6156385A4B04DF9025C6ADCDB3787123EC21F57610F1A7FBC7727A12EB8A00 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\dBvNa2pTbj.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1026 |
Entropy (8bit): | 4.697771666106845 |
Encrypted: | false |
SSDEEP: | 24:TwdgExX6lswcsA1Wo1+js3mQmFlw2UJh6QHssg9RGVQ8:T6KiV+KmQmFwhtMp9RGVH |
MD5: | D910958AF930D9DCA27D8F529EC053D0 |
SHA1: | 321478679C760C347743149A323469AD4BFEA87D |
SHA-256: | C70010ABE33AC34A7DB2F84B5ECDEA5EF95D482B69138707C126D2C1C1B67F37 |
SHA-512: | 0BCADFF480F8F0C7E5DDC316F678564A75785640F151ACA644CABE64AD10D0D4AD6156385A4B04DF9025C6ADCDB3787123EC21F57610F1A7FBC7727A12EB8A00 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\dBvNa2pTbj.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1026 |
Entropy (8bit): | 4.696312162983912 |
Encrypted: | false |
SSDEEP: | 24:G1O/dOdJXH3hrdB2Swsk4go3oInr8X513aQRmy8:Gk/8ASwsk4+p13aQRmy8 |
MD5: | 83B91EFB8185C5AF5A6B60F4FE9CC2D2 |
SHA1: | 0EB7AE1817790DFC5225A02B74A272C84FEE4240 |
SHA-256: | 8CA340B024C5A3134DE6C89C30C866FF4BCE5175C9E1A2F52075C0199BA1AE1E |
SHA-512: | F8445B5F18C9F48EFB98B6A310CD757314DA5173FD3490357672B51FED3FF72FF5095E0D17C829D96DE873FC70358D25B7D6369D3458E3AD9BF8D81A5158E46A |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\dBvNa2pTbj.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1026 |
Entropy (8bit): | 4.6959554225029665 |
Encrypted: | false |
SSDEEP: | 24:TifvYKkubZMu3HGRW2lJUao1nH5o4WGAZ46:rKkmZMuklJUj+GAZ46 |
MD5: | DCABA2748DFEAEF0BFBC56FD9F79315C |
SHA1: | B87FBA690A774893B22B9F611DFDCB5CDC520269 |
SHA-256: | 86DF5957E0CD2EBDFC2FF8C2F05569BA71462149042DF57ECE5E8228E3BC5DDD |
SHA-512: | 65F10692D0AE5CBAADDB03E89D6CD1D3486429906437A17C2B1157BEDB069202B1DC52A4E864AA8F90B8CBD171FD2A3E150185BF7DFF81540E209B6A8F8829F3 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\dBvNa2pTbj.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 388 |
Entropy (8bit): | 5.390986714334908 |
Encrypted: | false |
SSDEEP: | 6:ONRRCu1mzTgJ2vNNyvc8DoTpKWUkQMKw3NNpP4PdIUtLW2MSE1EWWYufTn:QsfzTgsFEvch/zqPdISLWSEivYYTn |
MD5: | A6B0CE1A3651955F68066B531AB1B4D6 |
SHA1: | 0272A7B8F591012702B715DA4DEF907C7E0706D6 |
SHA-256: | 128812B27DC5D33CD920227C4B95E1A38300E321D15D1089B150573921E424E9 |
SHA-512: | 60A37A42532CBE488595A879CC2FDB0D06C77BB93A60695B25D5BE7946CD197E42DA8A0B0AEE5092612CDB400B123F007099D1C9864C26C0AF38F823DD6E4646 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\dBvNa2pTbj.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 827782 |
Entropy (8bit): | 7.945649941698491 |
Encrypted: | false |
SSDEEP: | 12288:pe+N8GD7EphA9kaMfoQjfB5upQhKqTdFuIOcS4UjKWxrZvJ9C25pge4f4yyZ4ty:prN8nA9qLIK7uImmCrZvJ9B5v4Qyc9 |
MD5: | C2812A2B3889A3C553A58365DC4439E1 |
SHA1: | 723AA6892D8DF11D96FEF0CCA86F5BE659C90BE6 |
SHA-256: | B84C9E3654208FBBD0711EF9B751759A1AA5029158C61D91F5FF058FD2655128 |
SHA-512: | 45B63151854C25328F102436E7A0D8C19632D346C7B561CF544D5DDE0F1FA950A437F36A9748895FEF75AF032F6140640B00EDAB07E29556DC11E006A55F53E0 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 6.02655869721 |
TrID: |
|
File name: | dBvNa2pTbj.exe |
File size: | 429568 |
MD5: | 628e04a5c298a35bd396b74a42d237fe |
SHA1: | d90d76f790f1ad0ab95c3bd4bb4fb8dcada77691 |
SHA256: | 66a0c9b894ef78540ddf8b1909b3a227789df7bd4ddcdf5cb3aaf4098493c296 |
SHA512: | 6f1204163ac327166d59038d5b859471a45f94e99c5254cad16ef33ab9db7c48cff3da55312ddfc30b34079efcc6101a4dbd7445bf19ce05af4a94fbea490746 |
SSDEEP: | 12288:Ibf2i6btFx5Uf7moCqUSg6R43gcWc2yUWDcJIhs04Fkaatvap0+o1VhCHfZn7o50:IbP0th5LqU |
TLSH: | FA94459D726072DFC857D472DEA82DA8EA6174BB931F4203902715ADEE4D89BCF140F2 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....D............"...0..v...............@... ....@.. ....................... ............`................................ |
Icon Hash: | 00828e8e8686b000 |
Entrypoint: | 0x46e00a |
Entrypoint Section: | |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x9BB84413 [Mon Oct 14 18:48:51 2052 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [0046E000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x24dc4 | 0x57 | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x6c000 | 0x556 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x70000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x24d68 | 0x38 | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x6e000 | 0x8 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x24000 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
X99^i@ | 0x2000 | 0x20b14 | 0x20c00 | False | 1.0003801884541985 | data | 7.998809128626319 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.text | 0x24000 | 0x4739c | 0x47400 | False | 0.3114412006578947 | data | 4.3569361501714585 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x6c000 | 0x556 | 0x600 | False | 0.3977864583333333 | data | 3.906257383176619 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
0x6e000 | 0x10 | 0x200 | False | 0.044921875 | data | 0.12227588125913882 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | |
.reloc | 0x70000 | 0xc | 0x200 | False | 0.044921875 | data | 0.09800417566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
RT_VERSION | 0x6c0a0 | 0x2cc | data | ||
RT_MANIFEST | 0x6c36c | 0x1ea | XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jul 13, 2022 06:20:45.674350977 CEST | 49751 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:45.674421072 CEST | 443 | 49751 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:45.674516916 CEST | 49751 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:45.703902006 CEST | 49751 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:45.703943014 CEST | 443 | 49751 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:45.758271933 CEST | 443 | 49751 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:45.758399010 CEST | 49751 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:45.763750076 CEST | 49751 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:45.763766050 CEST | 443 | 49751 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:45.764003038 CEST | 443 | 49751 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:45.868021965 CEST | 49751 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:46.185838938 CEST | 49751 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:46.232492924 CEST | 443 | 49751 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:46.296497107 CEST | 443 | 49751 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:46.296587944 CEST | 443 | 49751 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:46.296664000 CEST | 49751 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:46.305094957 CEST | 49751 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:46.325908899 CEST | 49752 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:46.325984955 CEST | 443 | 49752 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:46.326116085 CEST | 49752 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:46.326513052 CEST | 49752 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:46.326543093 CEST | 443 | 49752 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:46.367347956 CEST | 443 | 49752 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:46.386209965 CEST | 49752 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:46.386254072 CEST | 443 | 49752 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:46.497318029 CEST | 443 | 49752 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:46.497467041 CEST | 443 | 49752 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:46.497581959 CEST | 49752 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:46.498522043 CEST | 49752 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:46.501075029 CEST | 49753 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:46.501107931 CEST | 443 | 49753 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:46.501200914 CEST | 49753 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:46.501533031 CEST | 49753 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:46.501543999 CEST | 443 | 49753 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:46.544661045 CEST | 443 | 49753 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:46.547252893 CEST | 49753 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:46.547281981 CEST | 443 | 49753 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:46.663964033 CEST | 443 | 49753 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:46.664113998 CEST | 443 | 49753 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:46.664231062 CEST | 49753 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:46.665155888 CEST | 49753 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:46.669605970 CEST | 49754 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:46.669662952 CEST | 443 | 49754 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:46.669770002 CEST | 49754 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:46.670202971 CEST | 49754 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:46.670229912 CEST | 443 | 49754 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:46.711256981 CEST | 443 | 49754 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:46.714297056 CEST | 49754 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:46.714335918 CEST | 443 | 49754 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:46.798495054 CEST | 443 | 49754 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:46.798739910 CEST | 443 | 49754 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:46.798850060 CEST | 49754 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:46.799631119 CEST | 49754 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:46.803049088 CEST | 49756 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:46.803105116 CEST | 443 | 49756 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:46.803215981 CEST | 49756 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:46.803572893 CEST | 49756 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:46.803594112 CEST | 443 | 49756 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:46.846071005 CEST | 443 | 49756 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:46.849847078 CEST | 49756 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:46.849869013 CEST | 443 | 49756 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:46.974330902 CEST | 443 | 49756 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:46.974487066 CEST | 443 | 49756 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:46.974571943 CEST | 49756 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:46.975630999 CEST | 49756 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:46.987112045 CEST | 49757 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:46.987185001 CEST | 443 | 49757 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:46.987303019 CEST | 49757 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:46.987763882 CEST | 49757 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:46.987793922 CEST | 443 | 49757 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:47.029351950 CEST | 443 | 49757 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:47.043766022 CEST | 49757 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:47.043832064 CEST | 443 | 49757 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:47.145858049 CEST | 443 | 49757 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:47.145976067 CEST | 443 | 49757 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:47.146090984 CEST | 49757 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:47.146933079 CEST | 49757 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:47.182837009 CEST | 49758 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:47.182905912 CEST | 443 | 49758 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:47.183003902 CEST | 49758 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:47.183473110 CEST | 49758 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:47.183499098 CEST | 443 | 49758 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:47.227729082 CEST | 443 | 49758 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:47.230526924 CEST | 49758 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:47.230581999 CEST | 443 | 49758 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:47.365338087 CEST | 443 | 49758 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:47.365533113 CEST | 443 | 49758 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:47.365678072 CEST | 49758 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:47.366403103 CEST | 49758 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:47.369034052 CEST | 49759 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:47.369095087 CEST | 443 | 49759 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:47.369239092 CEST | 49759 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:47.369530916 CEST | 49759 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:47.369554996 CEST | 443 | 49759 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:47.414551973 CEST | 443 | 49759 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:47.417434931 CEST | 49759 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:47.417493105 CEST | 443 | 49759 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:47.549200058 CEST | 443 | 49759 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:47.549357891 CEST | 443 | 49759 | 188.114.96.3 | 192.168.2.5 |
Jul 13, 2022 06:20:47.550031900 CEST | 49759 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:47.551134109 CEST | 49759 | 443 | 192.168.2.5 | 188.114.96.3 |
Jul 13, 2022 06:20:48.775672913 CEST | 49765 | 443 | 192.168.2.5 | 136.243.172.101 |
Jul 13, 2022 06:20:48.775712013 CEST | 443 | 49765 | 136.243.172.101 | 192.168.2.5 |
Jul 13, 2022 06:20:48.775803089 CEST | 49765 | 443 | 192.168.2.5 | 136.243.172.101 |
Jul 13, 2022 06:20:48.776513100 CEST | 49765 | 443 | 192.168.2.5 | 136.243.172.101 |
Jul 13, 2022 06:20:48.776530027 CEST | 443 | 49765 | 136.243.172.101 | 192.168.2.5 |
Jul 13, 2022 06:20:48.861736059 CEST | 443 | 49765 | 136.243.172.101 | 192.168.2.5 |
Jul 13, 2022 06:20:48.861856937 CEST | 49765 | 443 | 192.168.2.5 | 136.243.172.101 |
Jul 13, 2022 06:20:48.865031004 CEST | 49765 | 443 | 192.168.2.5 | 136.243.172.101 |
Jul 13, 2022 06:20:48.865044117 CEST | 443 | 49765 | 136.243.172.101 | 192.168.2.5 |
Jul 13, 2022 06:20:48.865276098 CEST | 443 | 49765 | 136.243.172.101 | 192.168.2.5 |
Jul 13, 2022 06:20:48.867708921 CEST | 49765 | 443 | 192.168.2.5 | 136.243.172.101 |
Jul 13, 2022 06:20:48.893956900 CEST | 443 | 49765 | 136.243.172.101 | 192.168.2.5 |
Jul 13, 2022 06:20:48.894053936 CEST | 443 | 49765 | 136.243.172.101 | 192.168.2.5 |
Jul 13, 2022 06:20:48.894200087 CEST | 49765 | 443 | 192.168.2.5 | 136.243.172.101 |
Jul 13, 2022 06:20:48.900077105 CEST | 49765 | 443 | 192.168.2.5 | 136.243.172.101 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jul 13, 2022 06:20:45.330967903 CEST | 59661 | 53 | 192.168.2.5 | 8.8.8.8 |
Jul 13, 2022 06:20:45.649893999 CEST | 53 | 59661 | 8.8.8.8 | 192.168.2.5 |
Jul 13, 2022 06:20:48.741257906 CEST | 53757 | 53 | 192.168.2.5 | 8.8.8.8 |
Jul 13, 2022 06:20:48.771157980 CEST | 53 | 53757 | 8.8.8.8 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class |
---|---|---|---|---|---|---|---|
Jul 13, 2022 06:20:45.330967903 CEST | 192.168.2.5 | 8.8.8.8 | 0x6141 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jul 13, 2022 06:20:48.741257906 CEST | 192.168.2.5 | 8.8.8.8 | 0x56c3 | Standard query (0) | A (IP address) | IN (0x0001) |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class |
---|---|---|---|---|---|---|---|---|---|
Jul 13, 2022 06:20:45.649893999 CEST | 8.8.8.8 | 192.168.2.5 | 0x6141 | No error (0) | 188.114.96.3 | A (IP address) | IN (0x0001) | ||
Jul 13, 2022 06:20:45.649893999 CEST | 8.8.8.8 | 192.168.2.5 | 0x6141 | No error (0) | 188.114.97.3 | A (IP address) | IN (0x0001) | ||
Jul 13, 2022 06:20:48.771157980 CEST | 8.8.8.8 | 192.168.2.5 | 0x56c3 | No error (0) | 136.243.172.101 | A (IP address) | IN (0x0001) |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
0 | 192.168.2.5 | 49751 | 188.114.96.3 | 443 | C:\Users\user\Desktop\dBvNa2pTbj.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
2022-07-13 04:20:46 UTC | 0 | OUT | |
2022-07-13 04:20:46 UTC | 0 | IN | |
2022-07-13 04:20:46 UTC | 0 | IN | |
2022-07-13 04:20:46 UTC | 1 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
1 | 192.168.2.5 | 49752 | 188.114.96.3 | 443 | C:\Users\user\Desktop\dBvNa2pTbj.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
2022-07-13 04:20:46 UTC | 1 | OUT | |
2022-07-13 04:20:46 UTC | 1 | IN | |
2022-07-13 04:20:46 UTC | 1 | IN | |
2022-07-13 04:20:46 UTC | 2 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
2 | 192.168.2.5 | 49753 | 188.114.96.3 | 443 | C:\Users\user\Desktop\dBvNa2pTbj.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
2022-07-13 04:20:46 UTC | 2 | OUT | |
2022-07-13 04:20:46 UTC | 2 | IN | |
2022-07-13 04:20:46 UTC | 2 | IN | |
2022-07-13 04:20:46 UTC | 3 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
3 | 192.168.2.5 | 49754 | 188.114.96.3 | 443 | C:\Users\user\Desktop\dBvNa2pTbj.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
2022-07-13 04:20:46 UTC | 3 | OUT | |
2022-07-13 04:20:46 UTC | 3 | IN | |
2022-07-13 04:20:46 UTC | 3 | IN | |
2022-07-13 04:20:46 UTC | 4 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
4 | 192.168.2.5 | 49756 | 188.114.96.3 | 443 | C:\Users\user\Desktop\dBvNa2pTbj.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
2022-07-13 04:20:46 UTC | 4 | OUT | |
2022-07-13 04:20:46 UTC | 4 | IN | |
2022-07-13 04:20:46 UTC | 4 | IN | |
2022-07-13 04:20:46 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
5 | 192.168.2.5 | 49757 | 188.114.96.3 | 443 | C:\Users\user\Desktop\dBvNa2pTbj.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
2022-07-13 04:20:47 UTC | 5 | OUT | |
2022-07-13 04:20:47 UTC | 5 | IN | |
2022-07-13 04:20:47 UTC | 6 | IN | |
2022-07-13 04:20:47 UTC | 6 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
6 | 192.168.2.5 | 49758 | 188.114.96.3 | 443 | C:\Users\user\Desktop\dBvNa2pTbj.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
2022-07-13 04:20:47 UTC | 6 | OUT | |
2022-07-13 04:20:47 UTC | 6 | IN | |
2022-07-13 04:20:47 UTC | 7 | IN | |
2022-07-13 04:20:47 UTC | 7 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
7 | 192.168.2.5 | 49759 | 188.114.96.3 | 443 | C:\Users\user\Desktop\dBvNa2pTbj.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
2022-07-13 04:20:47 UTC | 7 | OUT | |
2022-07-13 04:20:47 UTC | 7 | IN | |
2022-07-13 04:20:47 UTC | 8 | IN | |
2022-07-13 04:20:47 UTC | 8 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
8 | 192.168.2.5 | 49765 | 136.243.172.101 | 443 | C:\Users\user\Desktop\dBvNa2pTbj.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
2022-07-13 04:20:48 UTC | 8 | OUT | |
2022-07-13 04:20:48 UTC | 8 | IN | |
2022-07-13 04:20:48 UTC | 8 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 06:20:43 |
Start date: | 13/07/2022 |
Path: | C:\Users\user\Desktop\dBvNa2pTbj.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xae0000 |
File size: | 429568 bytes |
MD5 hash: | 628E04A5C298A35BD396B74A42D237FE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Yara matches: |
|
Reputation: | low |
Execution Graph
Execution Coverage: | 9.2% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 53 |
Total number of Limit Nodes: | 0 |
Graph
Function 0B398540 Relevance: 24.7, Strings: 19, Instructions: 954COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0B398538 Relevance: 18.4, Strings: 14, Instructions: 917COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01535AF1 Relevance: 6.7, Strings: 5, Instructions: 415COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01535BFB Relevance: 6.6, Strings: 5, Instructions: 337COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0B3926E2 Relevance: 1.5, Strings: 1, Instructions: 205COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0B39A628 Relevance: 1.4, Strings: 1, Instructions: 179COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0B3926F0 Relevance: 1.4, Strings: 1, Instructions: 166COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01532028 Relevance: 1.4, Strings: 1, Instructions: 157COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 015318E8 Relevance: 1.4, Strings: 1, Instructions: 104COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0B3973AA Relevance: .2, Instructions: 246COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0B3973B8 Relevance: .2, Instructions: 243COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01531F91 Relevance: .2, Instructions: 212COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 015333FA Relevance: .2, Instructions: 196COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0153251A Relevance: .2, Instructions: 186COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01533438 Relevance: .2, Instructions: 175COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0B397549 Relevance: .1, Instructions: 125COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01530E54 Relevance: 1.8, APIs: 1, Instructions: 295COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 015310B9 Relevance: 1.7, APIs: 1, Instructions: 186memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0153105D Relevance: 1.7, APIs: 1, Instructions: 181memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01531030 Relevance: 1.7, APIs: 1, Instructions: 181memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01530FE1 Relevance: 1.7, APIs: 1, Instructions: 181memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01531143 Relevance: 1.7, APIs: 1, Instructions: 180memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0153160B Relevance: 1.7, APIs: 1, Instructions: 178COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 015315D6 Relevance: 1.7, APIs: 1, Instructions: 174memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 015311D1 Relevance: 1.7, APIs: 1, Instructions: 172memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 015311FE Relevance: 1.7, APIs: 1, Instructions: 172memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01531566 Relevance: 1.7, APIs: 1, Instructions: 172memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01531518 Relevance: 1.7, APIs: 1, Instructions: 172memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 015315A8 Relevance: 1.7, APIs: 1, Instructions: 172memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01531454 Relevance: 1.7, APIs: 1, Instructions: 172memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01531481 Relevance: 1.7, APIs: 1, Instructions: 172memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0153128B Relevance: 1.7, APIs: 1, Instructions: 171COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01531503 Relevance: 1.7, APIs: 1, Instructions: 171COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01531195 Relevance: 1.7, APIs: 1, Instructions: 170COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0153141D Relevance: 1.7, APIs: 1, Instructions: 170COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 015313EF Relevance: 1.7, APIs: 1, Instructions: 169COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0B39DADD Relevance: 1.6, APIs: 1, Instructions: 89libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0B39B14C Relevance: 1.6, APIs: 1, Instructions: 89libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 015373A8 Relevance: 1.6, APIs: 1, Instructions: 74COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01539598 Relevance: 1.6, APIs: 1, Instructions: 61COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01531830 Relevance: 1.6, APIs: 1, Instructions: 60memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 015395A8 Relevance: 1.6, APIs: 1, Instructions: 56COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01531838 Relevance: 1.6, APIs: 1, Instructions: 55memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01537415 Relevance: 1.5, APIs: 1, Instructions: 34COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01537422 Relevance: 1.5, APIs: 1, Instructions: 32COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0153742F Relevance: 1.5, APIs: 1, Instructions: 30COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0153743C Relevance: 1.5, APIs: 1, Instructions: 28COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01537449 Relevance: 1.5, APIs: 1, Instructions: 26COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01537456 Relevance: 1.5, APIs: 1, Instructions: 24COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01537463 Relevance: 1.5, APIs: 1, Instructions: 22COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0143D404 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0143D4F0 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0144D044 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0144D1F4 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0143D4EB Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0143D3FF Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0144D1EF Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0144D03F Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0B398757 Relevance: 13.3, Strings: 10, Instructions: 820COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0B39874E Relevance: 13.3, Strings: 10, Instructions: 820COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0B39896A Relevance: 13.2, Strings: 10, Instructions: 730COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0B398961 Relevance: 13.2, Strings: 10, Instructions: 730COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0B398B79 Relevance: 11.9, Strings: 9, Instructions: 643COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0B398B70 Relevance: 11.9, Strings: 9, Instructions: 643COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0B398DB1 Relevance: 8.1, Strings: 6, Instructions: 551COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0B398DA8 Relevance: 8.1, Strings: 6, Instructions: 551COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01535CAB Relevance: 6.6, Strings: 5, Instructions: 308COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0B398FD6 Relevance: 4.2, Strings: 3, Instructions: 462COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0B398FCD Relevance: 4.2, Strings: 3, Instructions: 462COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0B39943A Relevance: 2.8, Strings: 2, Instructions: 286COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0B399443 Relevance: 2.8, Strings: 2, Instructions: 286COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 015367A0 Relevance: 2.8, Strings: 2, Instructions: 264COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01536730 Relevance: 1.6, Strings: 1, Instructions: 305COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01533C59 Relevance: 1.4, Strings: 1, Instructions: 197COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01533D70 Relevance: 1.4, Strings: 1, Instructions: 105COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0153049F Relevance: 1.3, Strings: 1, Instructions: 65COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0153A420 Relevance: .3, Instructions: 315COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01534D20 Relevance: .3, Instructions: 271COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0B391249 Relevance: .3, Instructions: 270COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0B391258 Relevance: .3, Instructions: 264COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01535160 Relevance: .3, Instructions: 254COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 015356D0 Relevance: .3, Instructions: 254COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0153A40F Relevance: .2, Instructions: 221COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 015347B8 Relevance: .2, Instructions: 209COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 015348A8 Relevance: .1, Instructions: 120COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01532BBD Relevance: .1, Instructions: 101COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |