Windows
Analysis Report
AppInstallerPythonRedirector.exe
Overview
General Information
Detection
Score: | 3 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w7x64
AppInstallerPythonRedirector.exe (PID: 2944 cmdline:
C:\Users\u ser\Deskto p\AppInsta llerPython Redirector .exe MD5: 874861E3AB75B9CB123A069A62892BB3)
- cleanup
- • Compliance
- • System Summary
- • Data Obfuscation
- • Malware Analysis System Evasion
- • Anti Debugging
- • Language, Device and Operating System Detection
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Binary or memory string: |
Source: | Code function: | 0_2_000000013FAD19D0 | |
Source: | Code function: | 0_2_000000013FAD28D0 |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Classification label: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_000000013FAD89C0 |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Code function: | 0_2_000000013FAD89C0 |
Source: | Code function: | 0_2_000000013FADCE7C |
Source: | Code function: | 0_2_000000013FADC3A0 |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Code function: | 0_2_000000013FADCE7C | |
Source: | Code function: | 0_2_000000013FADC87C | |
Source: | Code function: | 0_2_000000013FADD024 |
Source: | Code function: | 0_2_000000013FADD09C |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | 1 Native API | Path Interception | Path Interception | Direct Volume Access | OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | Exfiltration Over Other Network Medium | 1 Encrypted Channel | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | 2 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | 2 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
windowsupdatebg.s.llnwi.net | 69.164.0.0 | true | false | unknown |
Joe Sandbox Version: | 38.0.0 Ammolite |
Analysis ID: | 1335590 |
Start date and time: | 2023-11-01 17:37:49 +01:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 3m 40s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2) |
Number of analysed new started processes analysed: | 5 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample file name: | AppInstallerPythonRedirector.exe |
Detection: | CLEAN |
Classification: | clean3.winEXE@1/0@0/0 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): dllhost.exe, WM IADAP.exe, conhost.exe, svchos t.exe - Excluded IPs from analysis (wh
itelisted): 23.221.227.168, 23 .221.227.182 - Excluded domains from analysis
(whitelisted): ctldl.windowsu pdate.com, a767.dspw65.akamai. net, wu-bg-shim.trafficmanager .net, download.windowsupdate.c om.edgesuite.net - Execution Graph export aborted
for target AppInstallerPython Redirector.exe, PID 2944 becau se there are no executed funct ion - Not all processes where analyz
ed, report is missing behavior information - VT rate limit hit for: AppIns
tallerPythonRedirector.exe
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
windowsupdatebg.s.llnwi.net | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Amadey, Babadeda, Mystic Stealer, RedLine | Browse |
| ||
Get hash | malicious | RevengeRAT | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla, zgRAT | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | FormBook, NSISDropper | Browse |
| ||
Get hash | malicious | AgentTesla, zgRAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Lokibot | Browse |
| ||
Get hash | malicious | LimeRAT | Browse |
| ||
Get hash | malicious | AgentTesla, zgRAT | Browse |
| ||
Get hash | malicious | AgentTesla, zgRAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
File type: | |
Entropy (8bit): | 6.163208021191311 |
TrID: |
|
File name: | AppInstallerPythonRedirector.exe |
File size: | 278'528 bytes |
MD5: | 874861e3ab75b9cb123a069a62892bb3 |
SHA1: | eec3a3aea76f7467247f5694c8ed2e487b48af06 |
SHA256: | 26408681bda8d430af07f5338723bb10b419ae482a4c4aa6446cc536d21bac4c |
SHA512: | 0913a38fef0c03f2f4c58a0b0f3165b6a8e2ea97049f26ffd804dbca66e484daf319820eba5e91d1efa215cba95febb33a81467a9f4aa195ecd855250c0bd66c |
SSDEEP: | 3072:Jk8raZua+iV1QEZMnmBkZs7gljF1J+ZjHGW+3XhrjQIRMxGW+3XhrjQIRM7:JkyoDnMnSejLJ+ZjHGxFWxGxFW |
TLSH: | 8D44184776EC82D4D531A138BB1296A4D7697C651750E3CF33D0BB1B1E3AAE0AE346E0 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............q...q...q..W....q..W....q..W....q..W....q.......q.......q...q..(q..1....q..1.b..q...q...q..1....q..Rich.q................. |
Icon Hash: | 02021a3a3e27641a |
Entrypoint: | 0x14000cc70 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x140000000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x651DF85B [Wed Oct 4 23:42:19 2023 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 53d2582025e5b9fc285a75c2d49b91f6 |
Instruction |
---|
dec eax |
sub esp, 28h |
call 00007FB6293C3868h |
dec eax |
add esp, 28h |
jmp 00007FB6293C32AFh |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
retn 0000h |
int3 |
jmp 00007FB6293C3A86h |
int3 |
int3 |
int3 |
dec eax |
sub esp, 48h |
dec eax |
lea ecx, dword ptr [esp+20h] |
call 00007FB6293BCC3Bh |
dec eax |
lea edx, dword ptr [0000BAA7h] |
dec eax |
lea ecx, dword ptr [esp+20h] |
call 00007FB6293C39BCh |
int3 |
dec eax |
mov dword ptr [esp+10h], ebx |
dec eax |
mov dword ptr [esp+18h], esi |
push edi |
dec eax |
sub esp, 10h |
xor eax, eax |
xor ecx, ecx |
cpuid |
inc esp |
mov eax, ecx |
inc ebp |
xor ebx, ebx |
inc esp |
mov edx, edx |
inc ecx |
xor eax, 6C65746Eh |
inc ecx |
xor edx, 49656E69h |
inc esp |
mov ecx, ebx |
mov esi, eax |
xor ecx, ecx |
inc ecx |
lea eax, dword ptr [ebx+01h] |
inc ebp |
or edx, eax |
cpuid |
inc ecx |
xor ecx, 756E6547h |
mov dword ptr [esp], eax |
inc ebp |
or edx, ecx |
mov dword ptr [esp+04h], ebx |
mov edi, ecx |
mov dword ptr [esp+08h], ecx |
mov dword ptr [esp+0Ch], edx |
jne 00007FB6293C349Dh |
dec eax |
or dword ptr [0000E30Bh], FFFFFFFFh |
and eax, 0FFF3FF0h |
dec eax |
mov dword ptr [0000E2F3h], 00008000h |
cmp eax, 000106C0h |
je 00007FB6293C346Ah |
cmp eax, 00020660h |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x188e4 | 0x294 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x20000 | 0x27270 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x1e000 | 0x14dc | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x48000 | 0x25c | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x141d0 | 0x70 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x14090 | 0x140 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x12000 | 0x5e0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x100fb | 0x10200 | False | 0.4805141715116279 | data | 6.106824509353285 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x12000 | 0x8702 | 0x8800 | False | 0.3503848805147059 | data | 4.499189658620598 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x1b000 | 0x2eb0 | 0x2400 | False | 0.1283637152777778 | DOS executable (block device driver \322f\324\377\3772) | 4.604826151746903 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0x1e000 | 0x14dc | 0x1600 | False | 0.43110795454545453 | data | 4.750600296363665 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0x20000 | 0x27270 | 0x27400 | False | 0.5286748606687898 | data | 6.075728432362387 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x48000 | 0x25c | 0x400 | False | 0.4580078125 | data | 3.873262972946178 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x20730 | 0x3b55 | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | English | United States | 0.9815656066890512 |
RT_ICON | 0x24288 | 0x1628 | Device independent bitmap graphic, 64 x 128 x 8, image size 4096, 256 important colors | English | United States | 0.33568406205923834 |
RT_ICON | 0x258b0 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors | English | United States | 0.4482942430703625 |
RT_ICON | 0x26758 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors | English | United States | 0.46344765342960287 |
RT_ICON | 0x27000 | 0x6c8 | Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colors | English | United States | 0.5524193548387096 |
RT_ICON | 0x276c8 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors | English | United States | 0.4328034682080925 |
RT_ICON | 0x27c30 | 0x35cd | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | English | United States | 0.9848253829957162 |
RT_ICON | 0x2b200 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16896 | English | United States | 0.16213982050070855 |
RT_ICON | 0x2f428 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9600 | English | United States | 0.2226141078838174 |
RT_ICON | 0x319d0 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4224 | English | United States | 0.3116791744840525 |
RT_ICON | 0x32a78 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.40491803278688526 |
RT_ICON | 0x33400 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.4423758865248227 |
RT_ICON | 0x33918 | 0x3b55 | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | English | United States | 0.9815656066890512 |
RT_ICON | 0x37470 | 0x1628 | Device independent bitmap graphic, 64 x 128 x 8, image size 4096, 256 important colors | English | United States | 0.33568406205923834 |
RT_ICON | 0x38a98 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors | English | United States | 0.4482942430703625 |
RT_ICON | 0x39940 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors | English | United States | 0.46344765342960287 |
RT_ICON | 0x3a1e8 | 0x6c8 | Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colors | English | United States | 0.5524193548387096 |
RT_ICON | 0x3a8b0 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors | English | United States | 0.4328034682080925 |
RT_ICON | 0x3ae18 | 0x35cd | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | English | United States | 0.9848253829957162 |
RT_ICON | 0x3e3e8 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16896 | English | United States | 0.16213982050070855 |
RT_ICON | 0x42610 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9600 | English | United States | 0.2226141078838174 |
RT_ICON | 0x44bb8 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4224 | English | United States | 0.3116791744840525 |
RT_ICON | 0x45c60 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.40491803278688526 |
RT_ICON | 0x465e8 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.4423758865248227 |
RT_MENU | 0x46b00 | 0x4a | data | English | United States | 0.8648648648648649 |
RT_DIALOG | 0x46b60 | 0x154 | data | English | United States | 0.5558823529411765 |
RT_STRING | 0x46cb8 | 0x60 | data | English | United States | 0.7083333333333334 |
RT_ACCELERATOR | 0x46b50 | 0x10 | data | English | United States | 1.25 |
RT_GROUP_ICON | 0x33868 | 0xae | data | English | United States | 0.6379310344827587 |
RT_GROUP_ICON | 0x46a50 | 0xae | data | English | United States | 0.632183908045977 |
RT_VERSION | 0x46d18 | 0x3d4 | data | English | United States | 0.41020408163265304 |
RT_MANIFEST | 0x470f0 | 0x17d | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.5931758530183727 |
DLL | Import |
---|---|
api-ms-win-core-errorhandling-l1-1-0.dll | SetLastError, SetUnhandledExceptionFilter, GetLastError, UnhandledExceptionFilter |
api-ms-win-core-string-l1-1-0.dll | MultiByteToWideChar |
api-ms-win-core-debug-l1-1-0.dll | OutputDebugStringW, DebugBreak, IsDebuggerPresent |
api-ms-win-core-com-l1-1-0.dll | CoCreateInstance, CoInitializeEx, CoGetObjectContext, CoTaskMemFree, CoGetApartmentType, CoCreateFreeThreadedMarshaler, CoTaskMemAlloc |
api-ms-win-core-processthreads-l1-1-0.dll | GetCurrentProcessId, GetCurrentThreadId, GetCurrentProcess, TerminateProcess |
api-ms-win-core-localization-l1-2-0.dll | FormatMessageW |
api-ms-win-core-processenvironment-l1-1-0.dll | GetCommandLineW |
api-ms-win-core-console-l1-2-0.dll | FreeConsole |
api-ms-win-core-libraryloader-l1-2-0.dll | FreeLibrary, GetModuleFileNameA, GetModuleHandleW, GetModuleHandleExW, GetProcAddress |
api-ms-win-core-heap-l1-1-0.dll | HeapAlloc, GetProcessHeap, HeapFree |
SHELL32.dll | ShellExecuteW |
MSVCP140.dll | ??1?$basic_ostream@_WU?$char_traits@_W@std@@@std@@UEAA@XZ, ?clear@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z, ??0?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAA@PEAV?$basic_streambuf@_WU?$char_traits@_W@std@@@1@_N@Z, ??0?$basic_ios@_WU?$char_traits@_W@std@@@std@@IEAA@XZ, ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z, ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ, ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ, ?_Init@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@IEAAXXZ, ??0?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@IEAA@XZ, ?getloc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEBA?AVlocale@2@XZ, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD@Z, ?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W@Z, ?__ExceptionPtrCopyException@@YAXPEAXPEBX1@Z, ?__ExceptionPtrRethrow@@YAXPEBX@Z, ?__ExceptionPtrCurrentException@@YAXPEAX@Z, ?__ExceptionPtrAssign@@YAXPEAXPEBX@Z, ?wcerr@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A, _Thrd_yield, ?__ExceptionPtrCreate@@YAXPEAX@Z, ?__ExceptionPtrCopy@@YAXPEAXPEBX@Z, ?sputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAA_JPEB_W_J@Z, ?_Xlength_error@std@@YAXPEBD@Z, ??1?$basic_ios@_WU?$char_traits@_W@std@@@std@@UEAA@XZ, ?xsputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@MEAA_JPEB_W_J@Z, ?xsgetn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@MEAA_JPEA_W_J@Z, ?in@?$codecvt@_WDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEA_W3AEAPEA_W@Z, ?_Pninc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@IEAAPEA_WXZ, ?out@?$codecvt@_WDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEB_W1AEAPEB_WPEAD3AEAPEAD@Z, ??1?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@UEAA@XZ, ?__ExceptionPtrDestroy@@YAXPEAX@Z, ??1_Lockit@std@@QEAA@XZ, ??0_Lockit@std@@QEAA@H@Z, ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ, ??Bid@locale@std@@QEAA_KXZ, ?uncaught_exception@std@@YA_NXZ, ?always_noconv@codecvt_base@std@@QEBA_NXZ, ?unshift@?$codecvt@_WDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z, ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z, ?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z, ?id@?$codecvt@_WDU_Mbstatet@@@std@@2V0locale@2@A, ?_Getcat@?$codecvt@_WDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?showmanyc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@MEAA_JXZ |
VCRUNTIME140_1.dll | __CxxFrameHandler4 |
VCRUNTIME140.dll | _CxxThrowException, __current_exception_context, memset, memmove, __C_specific_handler, __std_exception_copy, __std_exception_destroy, __std_terminate, __current_exception, memcpy |
api-ms-win-crt-runtime-l1-1-0.dll | _exit, terminate, _cexit, exit, _c_exit, _seh_filter_exe, _set_app_type, _initialize_wide_environment, _register_thread_local_exe_atexit_callback, _crt_atexit, _register_onexit_function, _invalid_parameter_noinfo_noreturn, _initialize_onexit_table, _configure_wide_argv, __p___argc, _errno, _initterm_e, _initterm, __p___wargv, abort, _invalid_parameter_noinfo, _get_initial_wide_environment |
api-ms-win-crt-string-l1-1-0.dll | iswspace |
api-ms-win-crt-stdio-l1-1-0.dll | fputwc, fgetwc, fgetc, __p__commode, _set_fmode, __stdio_common_vsnprintf_s, __stdio_common_vswprintf, fclose, fwrite, fgetpos, _fseeki64, fsetpos, setvbuf, fflush, ungetc, ungetwc |
api-ms-win-crt-time-l1-1-0.dll | asctime_s, _localtime64_s, _time64 |
api-ms-win-crt-filesystem-l1-1-0.dll | _lock_file, _unlock_file |
api-ms-win-crt-heap-l1-1-0.dll | _callnewh, malloc, _set_new_mode, free |
api-ms-win-crt-math-l1-1-0.dll | __setusermatherr |
api-ms-win-crt-locale-l1-1-0.dll | _configthreadlocale |
api-ms-win-core-rtlsupport-l1-1-0.dll | RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind |
api-ms-win-core-processthreads-l1-1-1.dll | IsProcessorFeaturePresent |
api-ms-win-core-profile-l1-1-0.dll | QueryPerformanceCounter |
api-ms-win-core-sysinfo-l1-1-0.dll | GetSystemTimeAsFileTime |
api-ms-win-core-interlocked-l1-1-0.dll | InitializeSListHead, InterlockedPushEntrySList |
OLEAUT32.dll | SysFreeString, SysStringLen, SysAllocString, SetErrorInfo, GetErrorInfo |
api-ms-win-core-libraryloader-l1-2-1.dll | LoadLibraryW |
api-ms-win-core-synch-l1-1-0.dll | CreateEventW, ReleaseSRWLockExclusive, WaitForSingleObject, SetEvent, AcquireSRWLockExclusive |
api-ms-win-core-handle-l1-1-0.dll | CloseHandle |
api-ms-win-core-threadpool-l1-2-0.dll | TrySubmitThreadpoolCallback |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 1, 2023 17:38:39.223906994 CET | 8.8.8.8 | 192.168.2.22 | 0xcb71 | No error (0) | 69.164.0.0 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 17:38:34 |
Start date: | 01/11/2023 |
Path: | C:\Users\user\Desktop\AppInstallerPythonRedirector.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x13fad0000 |
File size: | 278'528 bytes |
MD5 hash: | 874861E3AB75B9CB123A069A62892BB3 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 000000013FAD89C0 Relevance: 14.2, APIs: 6, Strings: 2, Instructions: 150libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 000000013FAD43B0 Relevance: 26.4, APIs: 2, Strings: 13, Instructions: 151windowthreadCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |