Windows
Analysis Report
file.exe
Overview
General Information
Detection
Score: | 92 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
file.exe (PID: 4648 cmdline:
C:\Users\u ser\Deskto p\file.exe MD5: 30815E7574409C788E6CFB3247250EE7) powershell.exe (PID: 2828 cmdline:
"powershel l" -Comman d Add-MpPr eference - ExclusionP ath 'C:\Pr ogramData' MD5: 95000560239032BC68B4C2FDFCDEF913) conhost.exe (PID: 5312 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
INDICATOR_EXE_Packed_DotNetReactor | Detects executables packed with unregistered version of .NET Reactor | ditekSHen |
|
Timestamp: | 192.168.2.7179.43.140.22949775802852939 01/25/23-21:07:05.925109 |
SID: | 2852939 |
Source Port: | 49775 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Click to jump to signature section
Compliance |
---|
Source: | Unpacked PE file: |
Source: | Static PE information: |
Networking |
---|
Source: | Snort IDS: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
System Summary |
---|
Source: | Matched rule: |
Source: | Matched rule: |
Source: | Code function: | 0_2_0093F392 | |
Source: | Code function: | 0_2_0093F68D | |
Source: | Code function: | 0_2_00942EA9 | |
Source: | Code function: | 0_2_0093F7F7 | |
Source: | Code function: | 0_2_00942E15 | |
Source: | Code function: | 0_2_0094C412 | |
Source: | Code function: | 0_2_0093E43F | |
Source: | Code function: | 0_2_0093FA3C | |
Source: | Code function: | 0_2_0093EF69 | |
Source: | Code function: | 0_2_00007FFDC8824359 | |
Source: | Code function: | 0_2_00007FFDC8823F44 | |
Source: | Code function: | 0_2_00007FFDC88224B8 | |
Source: | Code function: | 0_2_00007FFDC88A0088 | |
Source: | Code function: | 0_2_009395A3 | |
Source: | Code function: | 0_2_0093E62E | |
Source: | Code function: | 0_2_0093EA4D |
Source: | Process Stats: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Classification label: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File opened: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Data Obfuscation |
---|
Source: | Unpacked PE file: |
Source: | Unpacked PE file: |
Source: | Code function: | 0_2_00B56CAC | |
Source: | Code function: | 0_2_00B549EF | |
Source: | Code function: | 0_2_00B590FA | |
Source: | Code function: | 0_2_00B53D74 | |
Source: | Code function: | 0_2_00B53D74 | |
Source: | Code function: | 0_2_00B5800D | |
Source: | Code function: | 0_2_00007FFDC88A4C3F | |
Source: | Code function: | 12_2_00007FFDC87A7D3A | |
Source: | Code function: | 12_2_00007FFDC87A7CDA | |
Source: | Code function: | 12_2_00007FFDC87A3248 | |
Source: | Code function: | 12_2_00007FFDC87A731A | |
Source: | Code function: | 12_2_00007FFDC87A4C0F |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | Special instruction interceptor: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Last function: | ||
Source: | Last function: | ||
Source: | Last function: |
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Anti Debugging |
---|
Source: | Open window title or class name: |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Thread register set: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | 111 Process Injection | 1 Masquerading | OS Credential Dumping | 311 Security Software Discovery | Remote Services | 1 Archive Collected Data | Exfiltration Over Other Network Medium | 1 Encrypted Channel | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 11 Disable or Modify Tools | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | 131 Virtualization/Sandbox Evasion | Security Account Manager | 131 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | 111 Process Injection | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | 2 Obfuscated Files or Information | LSA Secrets | 112 System Information Discovery | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
Replication Through Removable Media | Launchd | Rc.common | Rc.common | 22 Software Packing | Cached Domain Credentials | System Owner/User Discovery | VNC | GUI Input Capture | Exfiltration Over C2 Channel | Multiband Communication | Jamming or Denial of Service | Abuse Accessibility Features | |
External Remote Services | Scheduled Task | Startup Items | Startup Items | 1 Timestomp | DCSync | Network Sniffing | Windows Remote Management | Web Portal Capture | Exfiltration Over Alternative Protocol | Commonly Used Port | Rogue Wi-Fi Access Points | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
Joe Sandbox Version: | 36.0.0 Rainbow Opal |
Analysis ID: | 791757 |
Start date and time: | 2023-01-25 21:03:41 +01:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 9m 37s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | file.exe |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 21 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal92.evad.winEXE@4/5@0/0 |
EGA Information: | Failed |
HDC Information: |
|
HCA Information: | Failed |
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, B ackgroundTransferHost.exe, Sgr mBroker.exe, backgroundTaskHos t.exe, conhost.exe, WmiPrvSE.e xe, svchost.exe, wuapihost.exe - Excluded IPs from analysis (wh
itelisted): 80.67.82.235, 80.6 7.82.211 - Excluded domains from analysis
(whitelisted): www.bing.com, ris.api.iris.microsoft.com, cl ient.wns.windows.com, fs.micro soft.com, login.live.com, eudb .ris.api.iris.microsoft.com, c tldl.windowsupdate.com, displa ycatalog.mp.microsoft.com, img -prod-cms-rt-microsoft-com.aka maized.net, a1449.dscg2.akamai .net, arc.msn.com - Execution Graph export aborted
for target file.exe, PID 4648 because it is empty - Execution Graph export aborted
for target powershell.exe, PI D 2828 because it is empty - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtAllocateVirtualMemor y calls found. - Report size getting too big, t
oo many NtSetInformationFile c alls found. - VT rate limit hit for: file.e
xe
Time | Type | Description |
---|---|---|
21:05:26 | API Interceptor | |
21:07:04 | Task Scheduler |
Process: | C:\Users\user\Desktop\file.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 536543232 |
Entropy (8bit): | 0.062438005632173416 |
Encrypted: | false |
SSDEEP: | |
MD5: | 59E7A0AB00BB818A31E67508C92F1A95 |
SHA1: | 7F72A9A7915D33287D6654077C977D352C6B6D34 |
SHA-256: | A428F5260643308A49172D5B7C7348C3D7F52E29A6452AE4FA7202C3B4F801E2 |
SHA-512: | 8E8541454735EE660C39149A197D893783CD4E0D3C7C16DC4B93B4C2B2EF940AE98AE9CED418633E0DC0C9FD2E53300F99AAF2F5EA7C88222D706019E2056310 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 18817 |
Entropy (8bit): | 5.001217266823362 |
Encrypted: | false |
SSDEEP: | 384:ufib4GGVoGIpN6KQkj2Akjh4iUxGzCdaOdB/NXp5CvOjJEYoV4fib41:uIGV3IpNBQkj25h4iUxGzCdaOdB/NZwY |
MD5: | DB93B232EFF0785FDDC28A0D5DAE38D2 |
SHA1: | AF5AFE47557C49F165F66B2B63962D9EB28E3157 |
SHA-256: | 92939214003421B64153B215D15F89595673C709110FC6E005FF955F6684C390 |
SHA-512: | 5D161CFEE2631553AC2FA8EE407FE4CBA23C9A666BB69049C0FCCBEE99413983C678E4779426532FB4F5E622155C9EFF8DA57CD93AE4453D57301B32C19CBAA9 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 64 |
Entropy (8bit): | 0.9260988789684415 |
Encrypted: | false |
SSDEEP: | 3:Nlllulb/lj:NllUb/l |
MD5: | 13AF6BE1CB30E2FB779EA728EE0A6D67 |
SHA1: | F33581AC2C60B1F02C978D14DC220DCE57CC9562 |
SHA-256: | 168561FB18F8EBA8043FA9FC4B8A95B628F2CF5584E5A3B96C9EBAF6DD740E3F |
SHA-512: | 1159E1087BC7F7CBB233540B61F1BDECB161FF6C65AD1EFC9911E87B8E4B2E5F8C2AF56D67B33BC1F6836106D3FEA8C750CC24B9F451ACF85661E0715B829413 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:U:U |
MD5: | C4CA4238A0B923820DCC509A6F75849B |
SHA1: | 356A192B7913B04C54574D18C28D46E6395428AB |
SHA-256: | 6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B |
SHA-512: | 4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:U:U |
MD5: | C4CA4238A0B923820DCC509A6F75849B |
SHA1: | 356A192B7913B04C54574D18C28D46E6395428AB |
SHA-256: | 6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B |
SHA-512: | 4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 6.050720695954934 |
TrID: |
|
File name: | file.exe |
File size: | 2866176 |
MD5: | 30815e7574409c788e6cfb3247250ee7 |
SHA1: | 940d9d02537afa8a892df4920ffc1f9a79c1895a |
SHA256: | 89b2997d84ff0789fac1f4b9a2418ce8f74bed901c6eec51560a9f3b5c639e4b |
SHA512: | 2075b05bdf05c1e33da4c946919b81227f115089b09e4bd88a77b57b9878194b92faec5812e7dc5a4b1bbaa767cab1c02a412adb878a365a366c6ceab5621f55 |
SSDEEP: | 49152:rQZ/9ZcgVR0HptbPPlmaN/eefrGDzQtz:rE1Zc51PFN/daXE |
TLSH: | D8D5DF59FE1BD0A3F66E8434C46A85B94E20EC25A6C2522E397CFE3D527434224BD73D |
File Content Preview: | MZ.......?_kJ...5..U.y.A..nS..-.g`......Epi..._:..D....w.8..............!..L.!This program cannot be run in DOS mode....$...................................................................................................................................... |
Icon Hash: | 7186869696def800 |
Entrypoint: | 0x6961c0 |
Entrypoint Section: | .rsrc |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x924169B0 [Fri Oct 4 00:07:12 2047 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | cdd73a766273625b53bd22f0062b1110 |
Instruction |
---|
jmp 00007F6B2CAC62FCh |
je 00007F6B2CAC609Ch |
jmp 00007F6B2CAC6063h |
sub eax, 01DAE990h |
add byte ptr [eax], al |
nop |
jmp 00007F6B2CAC6064h |
sal byte ptr [ebp+75F6334Dh], 1 |
enter 334Dh, FFh |
jnbe 00007F6B2CAC604Bh |
jmp 00007F6B2CAC6139h |
jmp 00007F6B2CAC6063h |
mov ebp, ecx |
dec ebp |
add al, 00h |
add bl, ch |
add edi, dword ptr [ebx+ebx*4+2B850F56h] |
add eax, dword ptr [eax] |
add cl, ch |
or dword ptr [edx], eax |
add byte ptr [eax], al |
nop |
jmp 00007F6B2CAC6064h |
mov dword ptr [ecx+41h], esp |
shl edx, 10h |
jmp 00007F6B2CAC6065h |
xor dh, byte ptr [ebx-2FF4BA6Ah] |
jc 00007F6B2CAC601Ah |
inc ecx |
mov eax, edx |
jmp 00007F6B2CAC6064h |
dec eax |
jmp 00007F6B3570E3ADh |
jmp 00007F6B2CAC6065h |
sar word ptr [ecx+esi], 0005h |
or al, 04h |
add byte ptr [eax], al |
jc 00007F6B2CAC6054h |
dec eax |
lea edx, dword ptr [0000040Bh] |
jmp 00007F6B2CAC6064h |
and eax, 058B445Ah |
cld |
add eax, dword ptr [eax] |
add bl, ch |
add dword ptr [eax], edx |
dec esp |
lea ecx, dword ptr [000003E2h] |
jmp 00007F6B2CAC6063h |
mov al, byte ptr [03DD0531h] |
add byte ptr [eax], al |
jo 00007F6B2CAC6047h |
xor dword ptr [000003D9h], eax |
jc 00007F6B2CAC6092h |
xor dword ptr [000003C9h], eax |
jno 00007F6B2CAC6065h |
fisttp word ptr [eax+0D8D481Ah] |
rol dword ptr [ebx], 1 |
add byte ptr [eax], al |
jmp 00007F6B2CAC6063h |
rcl byte ptr [edi-15h], cl |
add esp, dword ptr [ecx-14A94F35h] |
add esp, dword ptr [edi+4Dh] |
adc dword ptr [ecx+54h], eax |
jmp 00007F6B2CAC6065h |
mov byte ptr [5541F05Eh], al |
jmp 00007F6B2CAC6064h |
and ah, byte ptr [ecx+eax*2+56h] |
jmp 00007F6B2CAC6063h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x296000 | 0x1c0 | .rsrc |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xe2000 | 0x1b259c | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.data | 0x2000 | 0xdef10 | 0x0 | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0xe2000 | 0x1b259c | 0x1b2600 | False | 0.20000281025179856 | data | 4.251156488048282 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0x296000 | 0x109200 | 0x109200 | False | 0.9997964919259783 | data | 7.9997654885259255 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
RT_CURSOR | 0xe20c8 | 0x134 | Targa image data - Map 64 x 65536 x 1 +32 "\001" | English | United States |
RT_CURSOR | 0xe2224 | 0x134 | data | English | United States |
RT_CURSOR | 0xe2380 | 0x134 | data | English | United States |
RT_CURSOR | 0xe24dc | 0x134 | data | English | United States |
RT_CURSOR | 0xe2638 | 0x134 | data | English | United States |
RT_CURSOR | 0xe2794 | 0x134 | data | English | United States |
RT_CURSOR | 0xe28f0 | 0x134 | Targa image data - RGB 64 x 65536 x 1 +32 "\001" | English | United States |
RT_BITMAP | 0xe2ba0 | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | English | United States |
RT_BITMAP | 0xe2da8 | 0x1e4 | Device independent bitmap graphic, 36 x 19 x 4, image size 380 | English | United States |
RT_BITMAP | 0xe2fc8 | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | English | United States |
RT_BITMAP | 0xe31d4 | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | English | United States |
RT_BITMAP | 0xe33dc | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | English | United States |
RT_BITMAP | 0xe35e8 | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | English | United States |
RT_BITMAP | 0xe37ec | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | English | United States |
RT_BITMAP | 0xe39f0 | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | English | United States |
RT_BITMAP | 0xe3bfc | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | English | United States |
RT_BITMAP | 0xe3e04 | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | English | United States |
RT_BITMAP | 0xe400c | 0xc0 | Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors | English | United States |
RT_BITMAP | 0xe4110 | 0xe0 | Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors | English | United States |
RT_BITMAP | 0xe4238 | 0xe0 | Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors | English | United States |
RT_BITMAP | 0xe4358 | 0xe0 | Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors | English | United States |
RT_BITMAP | 0xe4470 | 0xc0 | Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors | English | United States |
RT_BITMAP | 0xe4564 | 0xc0 | Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors | English | United States |
RT_BITMAP | 0xe4664 | 0xe0 | Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors | English | United States |
RT_BITMAP | 0xe4780 | 0xc0 | Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors | English | United States |
RT_BITMAP | 0xe4880 | 0xe0 | Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors | English | United States |
RT_BITMAP | 0xe4994 | 0xc0 | Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors | English | United States |
RT_BITMAP | 0xe4a8c | 0xc8 | Device independent bitmap graphic, 13 x 12 x 4, image size 96 | English | United States |
RT_BITMAP | 0xe4b94 | 0xc8 | Device independent bitmap graphic, 13 x 12 x 4, image size 96 | English | United States |
RT_BITMAP | 0xe4c98 | 0x4e8 | Device independent bitmap graphic, 13 x 12 x 8, image size 192 | English | United States |
RT_BITMAP | 0xe51b8 | 0xd0 | Device independent bitmap graphic, 12 x 13 x 4, image size 104 | English | United States |
RT_BITMAP | 0xe52c8 | 0xd0 | Device independent bitmap graphic, 12 x 13 x 4, image size 104 | English | United States |
RT_BITMAP | 0xe53d4 | 0xd0 | Device independent bitmap graphic, 12 x 13 x 4, image size 104 | English | United States |
RT_BITMAP | 0xe54e0 | 0xd0 | Device independent bitmap graphic, 12 x 13 x 4, image size 104 | English | United States |
RT_BITMAP | 0xe55f0 | 0xd0 | Device independent bitmap graphic, 12 x 13 x 4, image size 104 | English | United States |
RT_BITMAP | 0xe5700 | 0xd0 | Device independent bitmap graphic, 12 x 13 x 4, image size 104 | English | United States |
RT_BITMAP | 0xe5804 | 0x4e8 | Device independent bitmap graphic, 13 x 12 x 8, image size 192 | English | United States |
RT_BITMAP | 0xe5d28 | 0x4e8 | Device independent bitmap graphic, 13 x 12 x 8, image size 192 | English | United States |
RT_BITMAP | 0xe6248 | 0x4e8 | Device independent bitmap graphic, 13 x 12 x 8, image size 192 | English | United States |
RT_BITMAP | 0xe676c | 0x188 | Device independent bitmap graphic, 24 x 24 x 4, image size 288 | Swedish | Sweden |
RT_BITMAP | 0xe6934 | 0x17c | Device independent bitmap graphic, 23 x 23 x 4, image size 276, 16 important colors | Swedish | Sweden |
RT_BITMAP | 0xe6af4 | 0x188 | Device independent bitmap graphic, 24 x 24 x 4, image size 288, 16 important colors | Swedish | Sweden |
RT_BITMAP | 0xe6cbc | 0x188 | Device independent bitmap graphic, 24 x 24 x 4, image size 288, 16 important colors | Swedish | Sweden |
RT_BITMAP | 0xe6e84 | 0x188 | Device independent bitmap graphic, 24 x 24 x 4, image size 288, 16 important colors | Swedish | Sweden |
RT_BITMAP | 0xe7050 | 0xe0 | Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors | English | United States |
RT_ICON | 0xe71b8 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1024 | English | United States |
RT_ICON | 0xe7648 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2304 | English | United States |
RT_ICON | 0xe7ff8 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4096 | English | United States |
RT_ICON | 0xe90c8 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9216 | English | United States |
RT_ICON | 0xeb698 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16384 | English | United States |
RT_ICON | 0xef8e8 | 0x5488 | Device independent bitmap graphic, 72 x 144 x 32, image size 20736 | English | United States |
RT_ICON | 0xf4d98 | 0x94a8 | Device independent bitmap graphic, 96 x 192 x 32, image size 36864 | English | United States |
RT_ICON | 0xfe268 | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 65536 | English | United States |
RT_ICON | 0x10eab8 | 0x53af | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | English | United States |
RT_ICON | 0x113e90 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors | Swedish | Sweden |
RT_STRING | 0x114860 | 0x2c0 | data | ||
RT_STRING | 0x114b48 | 0x2f8 | data | ||
RT_STRING | 0x114e68 | 0x3c8 | data | ||
RT_STRING | 0x115258 | 0x510 | data | ||
RT_STRING | 0x115790 | 0x370 | data | ||
RT_STRING | 0x115b28 | 0x390 | data | ||
RT_STRING | 0x115ee0 | 0x404 | data | ||
RT_STRING | 0x11630c | 0x428 | data | ||
RT_STRING | 0x11675c | 0x34c | data | ||
RT_STRING | 0x116ad0 | 0x390 | data | ||
RT_STRING | 0x116e88 | 0x288 | data | ||
RT_STRING | 0x117138 | 0x49c | data | ||
RT_STRING | 0x1175fc | 0x3c4 | data | ||
RT_STRING | 0x1179e8 | 0x43c | data | ||
RT_STRING | 0x117e4c | 0xd8 | data | ||
RT_STRING | 0x117f4c | 0xd0 | data | ||
RT_STRING | 0x118044 | 0x120 | data | ||
RT_STRING | 0x11818c | 0x378 | data | ||
RT_STRING | 0x11852c | 0x3fc | data | ||
RT_STRING | 0x118950 | 0x3bc | data | ||
RT_STRING | 0x118d34 | 0x46c | data | ||
RT_STRING | 0x1191c8 | 0x37c | data | ||
RT_STRING | 0x11956c | 0x3a8 | data | ||
RT_STRING | 0x11993c | 0x398 | data | ||
RT_STRING | 0x119cfc | 0xcc | data | ||
RT_STRING | 0x119df0 | 0xb0 | data | ||
RT_STRING | 0x119ec8 | 0x298 | data | ||
RT_STRING | 0x11a188 | 0x46c | data | ||
RT_STRING | 0x11a61c | 0x35c | data | ||
RT_STRING | 0x11a9a0 | 0x2c0 | data | ||
RT_RCDATA | 0x11ad08 | 0x82e8 | data | English | United States |
RT_RCDATA | 0x123028 | 0x10 | data | ||
RT_RCDATA | 0x123078 | 0xc8bda | Delphi compiled form 'TformAbout' | ||
RT_RCDATA | 0x1ebc98 | 0x824a | Delphi compiled form 'TformHinter' | ||
RT_RCDATA | 0x1f3f30 | 0x2409 | Delphi compiled form 'TformHistoryItem' | ||
RT_RCDATA | 0x1f637c | 0x44f26 | Delphi compiled form 'TformMain' | ||
RT_RCDATA | 0x23b2e8 | 0x3d046 | Delphi compiled form 'TformOptions' | ||
RT_RCDATA | 0x278378 | 0x73c | Delphi compiled form 'TformProgress' | ||
RT_RCDATA | 0x278af4 | 0x15a0 | Delphi compiled form 'TformQueue' | ||
RT_RCDATA | 0x27a0d4 | 0x19580 | Delphi compiled form 'TformTask' | ||
RT_RCDATA | 0x29367c | 0x132 | Dyalog APL component file 32-bit non-journaled checksummed version -71.37 | ||
RT_GROUP_CURSOR | 0x293820 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
RT_GROUP_CURSOR | 0x29385c | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
RT_GROUP_CURSOR | 0x293898 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
RT_GROUP_CURSOR | 0x2938d4 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
RT_GROUP_CURSOR | 0x293910 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
RT_GROUP_CURSOR | 0x29394c | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
RT_GROUP_CURSOR | 0x293988 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
RT_GROUP_ICON | 0x293a08 | 0x84 | data | English | United States |
RT_GROUP_ICON | 0x293ac8 | 0x14 | data | Swedish | Sweden |
RT_VERSION | 0x293b1c | 0x3d8 | data | English | United States |
RT_MANIFEST | 0x293f34 | 0x666 | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States |
DLL | Import |
---|---|
shell32.dll | PathMakeUniqueName |
mscoree.dll | _CorExeMain |
advapi32.dll | RegOpenKeyExW |
user32.dll | TranslateMessage |
kernel32.dll | GetModuleHandleA |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States | |
Swedish | Sweden |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 21:04:40 |
Start date: | 25/01/2023 |
Path: | C:\Users\user\Desktop\file.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xb50000 |
File size: | 2866176 bytes |
MD5 hash: | 30815E7574409C788E6CFB3247250EE7 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Reputation: | low |
Target ID: | 12 |
Start time: | 21:05:22 |
Start date: | 25/01/2023 |
Path: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6f4710000 |
File size: | 447488 bytes |
MD5 hash: | 95000560239032BC68B4C2FDFCDEF913 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Reputation: | high |
Target ID: | 13 |
Start time: | 21:05:22 |
Start date: | 25/01/2023 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6edaf0000 |
File size: | 625664 bytes |
MD5 hash: | EA777DEEA782E8B4D7C7C33BBF8A4496 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |