Windows
Analysis Report
Orden de compra HO-PO-376-25.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Orden de compra HO-PO-376-25.exe (PID: 1432 cmdline:
"C:\Users\ user\Deskt op\Orden d e compra H O-PO-376-2 5.exe" MD5: DCF506612856D6B0949977F0D8A69D09) - Orden de compra HO-PO-376-25.exe (PID: 6328 cmdline:
"C:\Users\ user\Deskt op\Orden d e compra H O-PO-376-2 5.exe" MD5: DCF506612856D6B0949977F0D8A69D09)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Agent Tesla, AgentTesla | A .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel. |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
zgRAT | zgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on. | No Attribution |
{"Exfil Mode": "FTP", "Host": "ftp://ftp.gizemetiket.com.tr", "Username": "pgizemM6", "Password": "giz95Ffg"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
Click to see the 9 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
Click to see the 28 entries |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Networking |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | DNS query: | ||
Source: | DNS query: |
Source: | FTP traffic detected: |
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Windows user hook set: | Jump to behavior |
Source: | Window created: | Jump to behavior |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Process Stats: |
Source: | Code function: | 0_2_0177D344 | |
Source: | Code function: | 0_2_073ECF38 | |
Source: | Code function: | 0_2_073EECF8 | |
Source: | Code function: | 0_2_073EB640 | |
Source: | Code function: | 0_2_073E0560 | |
Source: | Code function: | 0_2_073E0550 | |
Source: | Code function: | 0_2_073E95B8 | |
Source: | Code function: | 0_2_073E9180 | |
Source: | Code function: | 0_2_073ECF28 | |
Source: | Code function: | 0_2_073EAC90 | |
Source: | Code function: | 0_2_073E99E0 | |
Source: | Code function: | 3_2_0129E0D8 | |
Source: | Code function: | 3_2_0129A210 | |
Source: | Code function: | 3_2_0129A9E0 | |
Source: | Code function: | 3_2_01294A58 | |
Source: | Code function: | 3_2_0129DC60 | |
Source: | Code function: | 3_2_01293E40 | |
Source: | Code function: | 3_2_01294188 | |
Source: | Code function: | 3_2_068F55C0 | |
Source: | Code function: | 3_2_068F65D0 | |
Source: | Code function: | 3_2_068F7D60 | |
Source: | Code function: | 3_2_068FB220 | |
Source: | Code function: | 3_2_068F2398 | |
Source: | Code function: | 3_2_068F7680 | |
Source: | Code function: | 3_2_068F5CC8 | |
Source: | Code function: | 3_2_068FE390 | |
Source: | Code function: | 3_2_068F0040 | |
Source: | Code function: | 3_2_069E1408 | |
Source: | Code function: | 3_2_069E1402 | |
Source: | Code function: | 3_2_068F0007 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Static PE information: |
Source: | Code function: | 0_2_073EC3F7 | |
Source: | Code function: | 0_2_073EC2E9 | |
Source: | Code function: | 0_2_073E8DD6 | |
Source: | Code function: | 0_2_073E8A18 | |
Source: | Code function: | 3_2_01290C7A | |
Source: | Code function: | 3_2_01290C52 | |
Source: | Code function: | 3_2_069E8764 | |
Source: | Code function: | 3_2_069EAD10 | |
Source: | Code function: | 3_2_069ED6E6 |
Source: | Static PE information: |
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | File source: |
Source: | WMI Queries: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | API coverage: |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: |
Source: | Key opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 121 Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Disable or Modify Tools | 2 OS Credential Dumping | 1 File and Directory Discovery | Remote Services | 11 Archive Collected Data | 1 Ingress Tool Transfer | 1 Exfiltration Over Alternative Protocol | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 111 Process Injection | 1 Deobfuscate/Decode Files or Information | 21 Input Capture | 24 System Information Discovery | Remote Desktop Protocol | 2 Data from Local System | 11 Encrypted Channel | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 2 Obfuscated Files or Information | 1 Credentials in Registry | 111 Security Software Discovery | SMB/Windows Admin Shares | 1 Email Collection | 2 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 22 Software Packing | NTDS | 1 Process Discovery | Distributed Component Object Model | 21 Input Capture | 23 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Timestomp | LSA Secrets | 141 Virtualization/Sandbox Evasion | SSH | 1 Clipboard Data | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 1 Application Window Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 Masquerading | DCSync | 1 System Network Configuration Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 141 Virtualization/Sandbox Evasion | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
Network Topology | Malvertising | Exploit Public-Facing Application | Command and Scripting Interpreter | At | At | 111 Process Injection | /etc/passwd and /etc/shadow | Network Sniffing | Direct Cloud VM Connections | Data Staged | Web Protocols | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Internal Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
39% | ReversingLabs | ByteCode-MSIL.Trojan.Generic | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
api.ipify.org | 172.67.74.152 | true | false | high | |
ftp.gizemetiket.com.tr | 93.89.225.40 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
93.89.225.40 | ftp.gizemetiket.com.tr | Turkey | 51557 | TR-FBSTR | true | |
172.67.74.152 | api.ipify.org | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1562617 |
Start date and time: | 2024-11-25 19:28:06 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 7m 38s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 10 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Orden de compra HO-PO-376-25.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@3/1@2/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
- Excluded domains from analysis (whitelisted): fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
- VT rate limit hit for: Orden de compra HO-PO-376-25.exe
Time | Type | Description |
---|---|---|
13:29:04 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
93.89.225.40 | Get hash | malicious | AgentTesla | Browse | ||
Get hash | malicious | AgentTesla | Browse | |||
Get hash | malicious | AgentTesla | Browse | |||
Get hash | malicious | AgentTesla | Browse | |||
Get hash | malicious | AgentTesla | Browse | |||
Get hash | malicious | AgentTesla | Browse | |||
Get hash | malicious | AgentTesla | Browse | |||
Get hash | malicious | AgentTesla | Browse | |||
Get hash | malicious | AgentTesla | Browse | |||
Get hash | malicious | AgentTesla | Browse | |||
172.67.74.152 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | RDPWrap Tool | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC, PrivateLoader, Stealc, Vidar | Browse |
| ||
Get hash | malicious | RDPWrap Tool | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
ftp.gizemetiket.com.tr | Get hash | malicious | AgentTesla | Browse |
| |
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
api.ipify.org | Get hash | malicious | AgentTesla, PureLog Stealer, zgRAT | Browse |
| |
Get hash | malicious | AgentTesla, XWorm | Browse |
| ||
Get hash | malicious | AgentTesla, XWorm | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Gabagool | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
TR-FBSTR | Get hash | malicious | AgentTesla | Browse |
| |
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | HTMLPhisher, ReCaptcha Phish | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
3b5074b1b5d032e5620f69f9f700ff0e | Get hash | malicious | Cryptbot | Browse |
| |
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Orden de compra HO-PO-376-25.exe.log
Download File
Process: | C:\Users\user\Desktop\Orden de compra HO-PO-376-25.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1216 |
Entropy (8bit): | 5.34331486778365 |
Encrypted: | false |
SSDEEP: | 24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ |
MD5: | 1330C80CAAC9A0FB172F202485E9B1E8 |
SHA1: | 86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492 |
SHA-256: | B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560 |
SHA-512: | 75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2 |
Malicious: | true |
Reputation: | high, very likely benign file |
Preview: |
File type: | |
Entropy (8bit): | 7.93132456588385 |
TrID: |
|
File name: | Orden de compra HO-PO-376-25.exe |
File size: | 718'848 bytes |
MD5: | dcf506612856d6b0949977f0d8a69d09 |
SHA1: | 34c33ed398e1d023f07b656c380176d982e3cdde |
SHA256: | 3bd34f842f57e9c8767fb1f12d573c017b26b14c99a345e01a3ec841efb8f962 |
SHA512: | c9afa0b2ad51b315b7df0b308c0ff3252dbfc4504c861d6dd2b4f2f2163403752f46193f79115ccaac9fee938cd2aa32a8dcac37fe9ca988cf23ebb4651266b5 |
SSDEEP: | 12288:QCSZK3RbeXGvFNqZIHaLfHNRXLQQb2qQW3FOhm/sspWV12xKgSQZaN+:QvZK35eXuNqaa7PQ5qchqpq2Ygq+ |
TLSH: | 9EE4125033A89F36D5BE53FA190AB24403B194576272D38C0ECAA1DF1F53B629A23F57 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....e0...............0.................. ... ....@.. .......................`............@................................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x4b0bc2 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0xFC306515 [Tue Jan 29 06:07:17 2104 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xb0b70 | 0x4f | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xb2000 | 0x628 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xb4000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0xae120 | 0x70 | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0xaebc8 | 0xaec00 | 6c5fd06157c33df28555302a62afa5cc | False | 0.9478691657725322 | data | 7.939518186580135 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0xb2000 | 0x628 | 0x800 | bca26ba9b58af48eb9b313b5f9faf979 | False | 0.33837890625 | data | 3.466311275592606 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xb4000 | 0xc | 0x200 | 8608a77e637b769322319fcef6d8e11f | False | 0.044921875 | data | 0.08153941234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0xb2090 | 0x398 | OpenPGP Public Key | 0.4217391304347826 | ||
RT_MANIFEST | 0xb2438 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 25, 2024 19:29:06.836779118 CET | 49701 | 443 | 192.168.2.7 | 172.67.74.152 |
Nov 25, 2024 19:29:06.836821079 CET | 443 | 49701 | 172.67.74.152 | 192.168.2.7 |
Nov 25, 2024 19:29:06.836889982 CET | 49701 | 443 | 192.168.2.7 | 172.67.74.152 |
Nov 25, 2024 19:29:06.844440937 CET | 49701 | 443 | 192.168.2.7 | 172.67.74.152 |
Nov 25, 2024 19:29:06.844468117 CET | 443 | 49701 | 172.67.74.152 | 192.168.2.7 |
Nov 25, 2024 19:29:08.163141966 CET | 443 | 49701 | 172.67.74.152 | 192.168.2.7 |
Nov 25, 2024 19:29:08.163223982 CET | 49701 | 443 | 192.168.2.7 | 172.67.74.152 |
Nov 25, 2024 19:29:08.168514967 CET | 49701 | 443 | 192.168.2.7 | 172.67.74.152 |
Nov 25, 2024 19:29:08.168534040 CET | 443 | 49701 | 172.67.74.152 | 192.168.2.7 |
Nov 25, 2024 19:29:08.168915033 CET | 443 | 49701 | 172.67.74.152 | 192.168.2.7 |
Nov 25, 2024 19:29:08.208978891 CET | 49701 | 443 | 192.168.2.7 | 172.67.74.152 |
Nov 25, 2024 19:29:08.254632950 CET | 49701 | 443 | 192.168.2.7 | 172.67.74.152 |
Nov 25, 2024 19:29:08.295334101 CET | 443 | 49701 | 172.67.74.152 | 192.168.2.7 |
Nov 25, 2024 19:29:08.788938999 CET | 443 | 49701 | 172.67.74.152 | 192.168.2.7 |
Nov 25, 2024 19:29:08.789002895 CET | 443 | 49701 | 172.67.74.152 | 192.168.2.7 |
Nov 25, 2024 19:29:08.789091110 CET | 49701 | 443 | 192.168.2.7 | 172.67.74.152 |
Nov 25, 2024 19:29:08.900969982 CET | 49701 | 443 | 192.168.2.7 | 172.67.74.152 |
Nov 25, 2024 19:29:10.304809093 CET | 49704 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:29:10.429229975 CET | 21 | 49704 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:29:10.429316998 CET | 49704 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:29:10.433466911 CET | 49704 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:29:10.553692102 CET | 21 | 49704 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:29:10.553762913 CET | 49704 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:30:30.854331017 CET | 49883 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:30:30.979183912 CET | 21 | 49883 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:30:30.979298115 CET | 49883 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:30:30.979613066 CET | 49883 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:30:31.102864981 CET | 21 | 49883 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:30:31.102927923 CET | 49883 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:30:40.681818962 CET | 49905 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:30:40.801848888 CET | 21 | 49905 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:30:40.802037001 CET | 49905 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:30:40.846390009 CET | 49905 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:30:40.966746092 CET | 21 | 49905 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:30:40.972793102 CET | 49905 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:06.954829931 CET | 49962 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:07.076077938 CET | 21 | 49962 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:31:07.076194048 CET | 49962 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:07.076364994 CET | 49962 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:07.199254990 CET | 21 | 49962 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:31:07.199404001 CET | 49962 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:09.759934902 CET | 49970 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:09.925776958 CET | 21 | 49970 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:31:09.925849915 CET | 49970 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:09.926017046 CET | 49970 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:09.967907906 CET | 49971 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:10.048367023 CET | 21 | 49970 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:31:10.061469078 CET | 21 | 49970 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:31:10.061516047 CET | 49970 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:10.088363886 CET | 21 | 49971 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:31:10.088452101 CET | 49971 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:10.088696957 CET | 49971 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:10.208947897 CET | 21 | 49971 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:31:10.208995104 CET | 49971 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:11.936959982 CET | 49975 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:12.061350107 CET | 21 | 49975 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:31:12.061434984 CET | 49975 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:12.061682940 CET | 49975 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:12.197397947 CET | 21 | 49975 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:31:12.197453976 CET | 49975 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:22.572218895 CET | 49985 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:22.692590952 CET | 21 | 49985 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:31:22.692679882 CET | 49985 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:22.692863941 CET | 49985 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:22.818294048 CET | 21 | 49985 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:31:22.818351984 CET | 49985 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:37.338318110 CET | 49986 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:37.459836960 CET | 21 | 49986 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:31:37.460114002 CET | 49986 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:37.460372925 CET | 49986 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:37.580677986 CET | 21 | 49986 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:31:37.581382036 CET | 49986 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:41.323884010 CET | 49987 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:41.449533939 CET | 21 | 49987 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:31:41.449949026 CET | 49987 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:41.450339079 CET | 49987 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:41.818850994 CET | 49987 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:42.059185982 CET | 21 | 49987 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:31:42.063407898 CET | 21 | 49987 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:31:42.063446999 CET | 49987 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:46.626682997 CET | 49988 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:46.747050047 CET | 21 | 49988 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:31:46.747132063 CET | 49988 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:46.747365952 CET | 49988 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:47.102092981 CET | 49988 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:47.343595028 CET | 21 | 49988 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:31:47.343630075 CET | 21 | 49988 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:31:47.343739033 CET | 49988 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:50.453918934 CET | 49989 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:50.643102884 CET | 21 | 49989 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:31:50.643186092 CET | 49989 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:50.643368959 CET | 49989 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:50.765882015 CET | 21 | 49989 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:31:50.766006947 CET | 49989 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:51.151335955 CET | 49990 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:51.274300098 CET | 21 | 49990 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:31:51.274478912 CET | 49990 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:51.274688959 CET | 49990 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:51.339345932 CET | 49991 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:51.397990942 CET | 21 | 49990 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:31:51.403373003 CET | 49990 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:51.465163946 CET | 21 | 49991 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:31:51.471369982 CET | 49991 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:51.488337994 CET | 49991 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:31:51.791937113 CET | 21 | 49991 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:31:51.792062044 CET | 49991 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:07.105329990 CET | 49992 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:07.226300001 CET | 21 | 49992 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:32:07.226787090 CET | 49992 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:07.226787090 CET | 49992 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:07.347282887 CET | 21 | 49992 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:32:07.347445011 CET | 49992 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:10.113166094 CET | 49993 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:10.234545946 CET | 21 | 49993 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:32:10.234638929 CET | 49993 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:10.234900951 CET | 49993 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:10.355129004 CET | 21 | 49993 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:32:10.355204105 CET | 49993 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:11.573450089 CET | 49994 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:11.693820000 CET | 21 | 49994 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:32:11.695467949 CET | 49994 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:11.695779085 CET | 49994 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:11.818543911 CET | 21 | 49994 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:32:11.818644047 CET | 49994 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:12.845535040 CET | 49995 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:12.965769053 CET | 21 | 49995 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:32:12.965876102 CET | 49995 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:12.966056108 CET | 49995 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:13.088831902 CET | 21 | 49995 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:32:13.088933945 CET | 49995 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:24.889220953 CET | 49996 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:25.009659052 CET | 21 | 49996 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:32:25.009747028 CET | 49996 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:25.009958029 CET | 49996 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:25.132047892 CET | 21 | 49996 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:32:25.137444019 CET | 49996 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:30.514906883 CET | 49997 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:30.637540102 CET | 21 | 49997 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:32:30.637641907 CET | 49997 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:30.637891054 CET | 49997 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:30.758336067 CET | 21 | 49997 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:32:30.758399010 CET | 49997 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:35.197869062 CET | 49998 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:35.321602106 CET | 21 | 49998 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:32:35.325603008 CET | 49998 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:35.325603008 CET | 49998 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:35.449964046 CET | 21 | 49998 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:32:35.453438044 CET | 49998 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:47.981359959 CET | 49999 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:48.101793051 CET | 21 | 49999 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:32:48.101875067 CET | 49999 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:48.102109909 CET | 49999 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:48.222408056 CET | 21 | 49999 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:32:48.222474098 CET | 49999 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:52.953871012 CET | 50000 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:53.074254990 CET | 21 | 50000 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:32:53.074506044 CET | 50000 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:53.074634075 CET | 50000 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:32:53.195122004 CET | 21 | 50000 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:32:53.199657917 CET | 50000 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:33:01.921384096 CET | 50001 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:33:02.048388004 CET | 21 | 50001 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:33:02.049491882 CET | 50001 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:33:02.049681902 CET | 50001 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:33:02.176239014 CET | 21 | 50001 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:33:02.176291943 CET | 50001 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:33:04.825342894 CET | 50002 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:33:04.946054935 CET | 21 | 50002 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:33:04.946362972 CET | 50002 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:33:04.946460962 CET | 50002 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:33:05.072299004 CET | 21 | 50002 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:33:05.074996948 CET | 21 | 50002 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:33:05.075165033 CET | 50002 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:33:05.339227915 CET | 50003 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:33:05.466182947 CET | 21 | 50003 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:33:05.466326952 CET | 50003 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:33:05.466578007 CET | 50003 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:33:05.593554974 CET | 21 | 50003 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:33:05.597445011 CET | 50003 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:33:09.323420048 CET | 50004 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:33:09.444847107 CET | 21 | 50004 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:33:09.445455074 CET | 50004 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:33:09.445601940 CET | 50004 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:33:09.568089962 CET | 21 | 50004 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:33:09.568228006 CET | 50004 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:33:11.557933092 CET | 50005 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:33:11.689610004 CET | 21 | 50005 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:33:11.689764977 CET | 50005 | 21 | 192.168.2.7 | 93.89.225.40 |
Nov 25, 2024 19:33:13.008523941 CET | 21 | 50005 | 93.89.225.40 | 192.168.2.7 |
Nov 25, 2024 19:33:13.053553104 CET | 50005 | 21 | 192.168.2.7 | 93.89.225.40 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 25, 2024 19:29:06.686902046 CET | 51329 | 53 | 192.168.2.7 | 1.1.1.1 |
Nov 25, 2024 19:29:06.829432011 CET | 53 | 51329 | 1.1.1.1 | 192.168.2.7 |
Nov 25, 2024 19:29:09.526451111 CET | 61143 | 53 | 192.168.2.7 | 1.1.1.1 |
Nov 25, 2024 19:29:10.304095984 CET | 53 | 61143 | 1.1.1.1 | 192.168.2.7 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 25, 2024 19:29:06.686902046 CET | 192.168.2.7 | 1.1.1.1 | 0x15ae | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 25, 2024 19:29:09.526451111 CET | 192.168.2.7 | 1.1.1.1 | 0x8988 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 25, 2024 19:29:06.829432011 CET | 1.1.1.1 | 192.168.2.7 | 0x15ae | No error (0) | 172.67.74.152 | A (IP address) | IN (0x0001) | false | ||
Nov 25, 2024 19:29:06.829432011 CET | 1.1.1.1 | 192.168.2.7 | 0x15ae | No error (0) | 104.26.12.205 | A (IP address) | IN (0x0001) | false | ||
Nov 25, 2024 19:29:06.829432011 CET | 1.1.1.1 | 192.168.2.7 | 0x15ae | No error (0) | 104.26.13.205 | A (IP address) | IN (0x0001) | false | ||
Nov 25, 2024 19:29:10.304095984 CET | 1.1.1.1 | 192.168.2.7 | 0x8988 | No error (0) | 93.89.225.40 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.7 | 49701 | 172.67.74.152 | 443 | 6328 | C:\Users\user\Desktop\Orden de compra HO-PO-376-25.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-25 18:29:08 UTC | 155 | OUT | |
2024-11-25 18:29:08 UTC | 399 | IN | |
2024-11-25 18:29:08 UTC | 11 | IN |
Timestamp | Source Port | Dest Port | Source IP | Dest IP | Commands |
---|---|---|---|---|---|
Nov 25, 2024 19:33:13.008523941 CET | 21 | 50005 | 93.89.225.40 | 192.168.2.7 | 220 Microsoft FTP Service |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 13:29:04 |
Start date: | 25/11/2024 |
Path: | C:\Users\user\Desktop\Orden de compra HO-PO-376-25.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xce0000 |
File size: | 718'848 bytes |
MD5 hash: | DCF506612856D6B0949977F0D8A69D09 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 3 |
Start time: | 13:29:05 |
Start date: | 25/11/2024 |
Path: | C:\Users\user\Desktop\Orden de compra HO-PO-376-25.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x850000 |
File size: | 718'848 bytes |
MD5 hash: | DCF506612856D6B0949977F0D8A69D09 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 10.5% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 4.8% |
Total number of Nodes: | 248 |
Total number of Limit Nodes: | 12 |
Graph
Function 073EECF8 Relevance: .6, Instructions: 631COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 073ECF38 Relevance: .2, Instructions: 178COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0177AD88 Relevance: 1.7, APIs: 1, Instructions: 195COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017744B4 Relevance: 1.6, APIs: 1, Instructions: 96COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0177590C Relevance: 1.6, APIs: 1, Instructions: 96COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 073EBC20 Relevance: 1.6, APIs: 1, Instructions: 69COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 073EB560 Relevance: 1.6, APIs: 1, Instructions: 67threadCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0177B770 Relevance: 1.6, APIs: 1, Instructions: 65COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0177D658 Relevance: 1.6, APIs: 1, Instructions: 65COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 073EB568 Relevance: 1.6, APIs: 1, Instructions: 63threadCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 073EBC28 Relevance: 1.6, APIs: 1, Instructions: 63COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 073EBA71 Relevance: 1.6, APIs: 1, Instructions: 56memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 073EB4B1 Relevance: 1.6, APIs: 1, Instructions: 54threadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 073EBA78 Relevance: 1.6, APIs: 1, Instructions: 53memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 073EE039 Relevance: 1.6, APIs: 1, Instructions: 50windowCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 073EB4B8 Relevance: 1.5, APIs: 1, Instructions: 49threadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0177AF78 Relevance: 1.5, APIs: 1, Instructions: 47COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 073E8710 Relevance: 1.5, APIs: 1, Instructions: 47windowCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 076F0530 Relevance: 1.3, APIs: 1, Instructions: 54COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 076F0538 Relevance: 1.3, APIs: 1, Instructions: 47COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0147D4C4 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0147D3D8 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0148D01C Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0148D1D4 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0148D006 Relevance: .1, Instructions: 62COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0147D3D3 Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0147D4BF Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0148D1CF Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0147D759 Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0147D758 Relevance: .0, Instructions: 36COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 073EB640 Relevance: 1.6, Strings: 1, Instructions: 312COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 073E99E0 Relevance: .3, Instructions: 319COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 073E95B8 Relevance: .3, Instructions: 312COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 073E9180 Relevance: .3, Instructions: 312COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 073EAC90 Relevance: .3, Instructions: 312COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 073E0550 Relevance: .3, Instructions: 271COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0177D344 Relevance: .3, Instructions: 264COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 073E0560 Relevance: .3, Instructions: 264COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 073ECF28 Relevance: .1, Instructions: 88COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 9.5% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 3 |
Total number of Limit Nodes: | 0 |
Graph
Function 068F2398 Relevance: 9.0, Strings: 6, Instructions: 1481COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068FB220 Relevance: 8.3, Strings: 6, Instructions: 764COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F7D60 Relevance: 3.0, Strings: 2, Instructions: 473COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F65D0 Relevance: .8, Instructions: 812COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F55C0 Relevance: .6, Instructions: 583COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068FACB8 Relevance: 12.9, Strings: 10, Instructions: 398COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F9138 Relevance: 5.2, Strings: 4, Instructions: 230COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068FCF30 Relevance: 4.5, Strings: 3, Instructions: 799COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F4B88 Relevance: 3.9, Strings: 3, Instructions: 186COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F9128 Relevance: 2.7, Strings: 2, Instructions: 159COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0129EA34 Relevance: 1.6, APIs: 1, Instructions: 64COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0129EA58 Relevance: 1.6, APIs: 1, Instructions: 52COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F4B78 Relevance: 1.4, Strings: 1, Instructions: 128COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068FDAB8 Relevance: 1.4, Strings: 1, Instructions: 117COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068FDAA5 Relevance: 1.4, Strings: 1, Instructions: 113COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F21FD Relevance: 1.4, Strings: 1, Instructions: 108COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F2210 Relevance: 1.4, Strings: 1, Instructions: 105COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068FC168 Relevance: .6, Instructions: 648COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068FB21B Relevance: .3, Instructions: 291COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F61C8 Relevance: .2, Instructions: 229COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F42B9 Relevance: .2, Instructions: 221COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F45D8 Relevance: .2, Instructions: 220COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F42C8 Relevance: .2, Instructions: 218COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F45F0 Relevance: .2, Instructions: 210COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068FEB08 Relevance: .2, Instructions: 202COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068FEB18 Relevance: .2, Instructions: 201COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068FFBA8 Relevance: .2, Instructions: 176COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068FF959 Relevance: .2, Instructions: 169COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068FF968 Relevance: .2, Instructions: 163COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F5440 Relevance: .1, Instructions: 126COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068FD958 Relevance: .1, Instructions: 99COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F20C0 Relevance: .1, Instructions: 96COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F20D0 Relevance: .1, Instructions: 91COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F3AB9 Relevance: .1, Instructions: 82COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F3AC8 Relevance: .1, Instructions: 78COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EDD1F8 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EDD3A8 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EDD030 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EDD005 Relevance: .1, Instructions: 71COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F6CF8 Relevance: .1, Instructions: 68COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F3078 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F3BD8 Relevance: .1, Instructions: 59COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F4218 Relevance: .1, Instructions: 55COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068FED89 Relevance: .1, Instructions: 54COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EDD1F3 Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EDD3A3 Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068FA2E9 Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F3898 Relevance: .1, Instructions: 52COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F4228 Relevance: .1, Instructions: 51COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F3890 Relevance: .1, Instructions: 51COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F3BC7 Relevance: .0, Instructions: 50COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068FED98 Relevance: .0, Instructions: 49COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068FA2F8 Relevance: .0, Instructions: 46COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F6451 Relevance: .0, Instructions: 26COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F6460 Relevance: .0, Instructions: 22COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F7680 Relevance: 13.0, Strings: 10, Instructions: 468COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068FA920 Relevance: 10.2, Strings: 8, Instructions: 229COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F7080 Relevance: 7.9, Strings: 6, Instructions: 405COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 069E5762 Relevance: 6.2, APIs: 4, Instructions: 159threadCOMMON
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 069E57A0 Relevance: 6.1, APIs: 4, Instructions: 128threadCOMMON
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F83B8 Relevance: 5.3, Strings: 4, Instructions: 282COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068FACA8 Relevance: 5.2, Strings: 4, Instructions: 178COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068F87D0 Relevance: 5.2, Strings: 4, Instructions: 168COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 068FAD34 Relevance: 5.1, Strings: 4, Instructions: 115COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|