Windows
Analysis Report
decrypt-main.dll.dll
Overview
General Information
Sample name: | decrypt-main.dll.dllrenamed because original name is a hash value |
Original sample name: | decrypt-main.dll.exe |
Analysis ID: | 1408464 |
MD5: | 1715ba4aa4ff4c70e66943076f3236ac |
SHA1: | f57bfbe116f915e5525c5eff36b5eb5969282171 |
SHA256: | faebf87c3ff1345bbd5910fe4633b2b49dc83fe62b400ecaa102594d5edb39f0 |
Tags: | bankerexetrojan |
Infos: | |
Detection
Score: | 56 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- loaddll64.exe (PID: 64 cmdline:
loaddll64. exe "C:\Us ers\user\D esktop\dec rypt-main. dll.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52) - conhost.exe (PID: 2016 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 4996 cmdline:
cmd.exe /C rundll32. exe "C:\Us ers\user\D esktop\dec rypt-main. dll.dll",# 1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - rundll32.exe (PID: 948 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\decr ypt-main.d ll.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633) - WerFault.exe (PID: 5208 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 9 48 -s 484 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0) - rundll32.exe (PID: 1756 cmdline:
rundll32.e xe C:\User s\user\Des ktop\decry pt-main.dl l.dll,Hack Check MD5: EF3179D498793BF4234F708D3BE28633) - WerFault.exe (PID: 1436 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 1 756 -s 200 0 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0) - rundll32.exe (PID: 5932 cmdline:
rundll32.e xe C:\User s\user\Des ktop\decry pt-main.dl l.dll,Serv iceCrtMain MD5: EF3179D498793BF4234F708D3BE28633) - rundll32.exe (PID: 4072 cmdline:
rundll32.e xe C:\User s\user\Des ktop\decry pt-main.dl l.dll,TMet hodImpleme ntationInt ercept MD5: EF3179D498793BF4234F708D3BE28633) - WerFault.exe (PID: 5608 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 4 072 -s 468 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0) - rundll32.exe (PID: 1968 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\decr ypt-main.d ll.dll",Ha ckCheck MD5: EF3179D498793BF4234F708D3BE28633) - rundll32.exe (PID: 1320 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\decr ypt-main.d ll.dll",Se rviceCrtMa in MD5: EF3179D498793BF4234F708D3BE28633) - rundll32.exe (PID: 7028 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\decr ypt-main.d ll.dll",TM ethodImple mentationI ntercept MD5: EF3179D498793BF4234F708D3BE28633) - WerFault.exe (PID: 572 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 7 028 -s 468 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0) - rundll32.exe (PID: 6040 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\decr ypt-main.d ll.dll",db kFCallWrap perAddr MD5: EF3179D498793BF4234F708D3BE28633) - rundll32.exe (PID: 5292 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\decr ypt-main.d ll.dll",__ dbk_fcall_ wrapper MD5: EF3179D498793BF4234F708D3BE28633)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior |
Source: | HTTPS traffic detected: |
Source: | Code function: | 5_2_00415080 | |
Source: | Code function: | 5_1_00415080 | |
Source: | Code function: | 6_1_00415080 | |
Source: | Code function: | 14_2_00415080 | |
Source: | Code function: | 18_2_00415080 | |
Source: | Code function: | 19_2_00415080 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Network Connect: | Jump to behavior |
Source: | JA3 fingerprint: |
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | Code function: | 5_2_00815B40 |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
Source: | Code function: | 5_2_00414B50 | |
Source: | Code function: | 5_2_00438220 | |
Source: | Code function: | 14_2_00414B50 | |
Source: | Code function: | 14_2_00438220 | |
Source: | Code function: | 18_2_00414B50 | |
Source: | Code function: | 18_2_00438220 | |
Source: | Code function: | 19_2_00414B50 | |
Source: | Code function: | 19_2_00438220 |
Source: | Code function: |
Source: | Process created: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Process created: |
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window detected: |
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: |
Source: | File opened / queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | Last function: |
Source: | Code function: | 5_2_00415080 | |
Source: | Code function: | 5_1_00415080 | |
Source: | Code function: | 6_1_00415080 | |
Source: | Code function: | 14_2_00415080 | |
Source: | Code function: | 18_2_00415080 | |
Source: | Code function: | 19_2_00415080 |
Source: | Code function: | 5_1_00417CD0 |
Source: | Thread delayed: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Network Connect: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Code function: | 5_2_00415230 | |
Source: | Code function: | 5_2_004142E0 | |
Source: | Code function: | 14_2_00415230 | |
Source: | Code function: | 14_2_004142E0 | |
Source: | Code function: | 18_2_00415230 | |
Source: | Code function: | 18_2_004142E0 | |
Source: | Code function: | 19_2_00415230 | |
Source: | Code function: | 19_2_004142E0 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 111 Process Injection | 2 Masquerading | OS Credential Dumping | 31 Security Software Discovery | Remote Services | 1 Archive Collected Data | 11 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 31 Virtualization/Sandbox Evasion | LSASS Memory | 31 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | 4 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 111 Process Injection | Security Account Manager | 2 File and Directory Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Deobfuscate/Decode Files or Information | NTDS | 22 System Information Discovery | Distributed Component Object Model | Input Capture | 14 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | Internet Connection Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Rundll32 | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 DLL Side-Loading | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
45% | ReversingLabs | Win64.Adware.RedCap |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
s3-r-w.sa-east-1.amazonaws.com | 52.95.163.36 | true | false | high | |
bucreate203920233.s3.sa-east-1.amazonaws.com | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
52.95.163.36 | s3-r-w.sa-east-1.amazonaws.com | United States | 16509 | AMAZON-02US | false |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1408464 |
Start date and time: | 2024-03-13 17:00:19 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 9m 52s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Run name: | Run with higher sleep bypass |
Number of analysed new started processes analysed: | 32 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | decrypt-main.dll.dllrenamed because original name is a hash value |
Original Sample Name: | decrypt-main.dll.exe |
Detection: | MAL |
Classification: | mal56.evad.winDLL@26/17@1/1 |
EGA Information: |
|
HCA Information: | Failed |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 20.42.65.92, 52.182.143.212
- Excluded domains from analysis (whitelisted): client.wns.windows.com, onedsblobprdeus17.eastus.cloudapp.azure.com, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target rundll32.exe, PID 4072 because it is empty
- Execution Graph export aborted for target rundll32.exe, PID 7028 because it is empty
- Execution Graph export aborted for target rundll32.exe, PID 948 because it is empty
- Not all processes where analyzed, report is missing behavior information
- Report creation exceeded maximum time and may have missing disassembly code information.
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: decrypt-main.dll.dll
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
s3-r-w.sa-east-1.amazonaws.com | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
AMAZON-02US | Get hash | malicious | Gafgyt | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Gafgyt | Browse |
| ||
Get hash | malicious | Gafgyt | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Gafgyt | Browse |
| ||
Get hash | malicious | Chaos | Browse |
| ||
Get hash | malicious | Gafgyt | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
37f463bf4616ecd445d4a1937da06e19 | Get hash | malicious | AgentTesla | Browse |
| |
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | XWorm | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_dec_2270e996a4650153f925c744fbbf6c68415b9_b4dfb63c_09e72ab3-6283-447a-8caf-2530b1926e5b\Report.wer
Download File
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.8483375234553934 |
Encrypted: | false |
SSDEEP: | 96:vmFjk6EuiCyKynsjZ4RvSCppfxPQXIDcQtZc6t1ZcEmcw3HXaXz+HbHgSQgJjy+s:u7iCynJ4097Z8jjaWwzuiFvZ24lO8J |
MD5: | B60AC78A03E76A14A229B35C584EBB11 |
SHA1: | 497663699930AA1D7848CA3BD192A217FCF17E11 |
SHA-256: | 4F006979B75F107471EDC79A8C1B009BBB36C44EF69526B3013CF7545C89CDD3 |
SHA-512: | E4B282F6A9F1BC677829DF56EAF125CD6447C963B52E3355FE4B4EDF6CD0401EF62710A122748423CA4D49DB734C10CBDEA1BB010EAB1FF72E02D9BBB6993784 |
Malicious: | false |
Preview: |
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_dec_2270e996a4650153f925c744fbbf6c68415b9_b4dfb63c_5726b548-f0b8-44b7-8e4c-0a50bf69bd56\Report.wer
Download File
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.8484596487229368 |
Encrypted: | false |
SSDEEP: | 96:KAVFlguixyKy4sjZ4RvSCppfxPQXIDcQtZc6t1ZcEmcw3HXaXz+HbHgSQgJjy+Um:XFixy4J4097Z8jjKuwzuiFvZ24lO8J |
MD5: | 79909763CBF12F206BF63ECF43B1FB11 |
SHA1: | C92CE75905489B4BFF4C237B8463988E62580BAB |
SHA-256: | 742601A0F4D65897EEBB1886D0A46C2BCA813C12B02BEC6067C725AF30C9D4EF |
SHA-512: | 6A4792CB4374BD06285D286783A09A960D34D8E478E4455B320A30BD6933CDC718700634A65120501ED0915787CC1C1A74BE56B0E29AC511E53B05AE93EA7EAA |
Malicious: | false |
Preview: |
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_dec_27d8c3fe9e4ce467db0e38d9cdded62657c28_b4dfb63c_07fe291b-769a-411f-9cce-c267542d2e67\Report.wer
Download File
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.85223844785682 |
Encrypted: | false |
SSDEEP: | 96:NbFcPui7yKyRsjZ4RvSCpxL6tQXIDcQkc6wZcEGcw3OsUZXaXz+HbHgSQgJjy+UQ:phi7yRD06UZMKFBjauwzuiFvZ24lO8W |
MD5: | 098DBCF2F81F6DBE0FED3342DCC607C2 |
SHA1: | FB669304A0FC72250BFBED5F06AE2C51A4DBD0FE |
SHA-256: | 3045B5E1D97EDD97C1F229FFC555EA6577B52BAF68A654B1B5849BF264835D35 |
SHA-512: | 9524BD7B95F9FA8D4A70019C0AA529539C89AFF51F3EE597445B70A7F1D5E1DE8099CA5647E6E067AD3F9488840AD982458105219C7F8B82F2C89B5026664A0A |
Malicious: | false |
Preview: |
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_dec_e26d2cbdf0ab1647723bb3a38bd2737c2e0af57_b4dfb63c_b9ef1030-2491-4365-a391-35e17ec755ab\Report.wer
Download File
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 1.1056140293456171 |
Encrypted: | false |
SSDEEP: | 192:KOKizyXDI03+3h6jaun1jfNzuiFvZ24lO8J:9KiGXDj3+3ojNNzuiFvY4lO8J |
MD5: | 17AEEB550D2C297189F741778D996C72 |
SHA1: | 646F9DB8B5F3526AC0406AA3B7FB4A45447A8383 |
SHA-256: | F9345968C01B0271CB3D520A63E8ED10B175905040E732612C01A2151CB12233 |
SHA-512: | F23CCA4B3B12FDA0D2CD052672653E956E27BA3C5B35CD3B698A8C117C7B438E34C2C5D3AA9E6BDCE39520FB8F045F61B703DA6DF8921C04B29E9290036F3A57 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 58416 |
Entropy (8bit): | 1.6978597331169087 |
Encrypted: | false |
SSDEEP: | 192:ACJ7XqkUu9jgOMNMBKOtj6S5s9aer8uIKVMMEZvuT:fXNUu9kMBK0880+Myvi |
MD5: | 74F49ABF11E187DD6AD61AF8C87B299E |
SHA1: | 282F639186C50783AB5ABD564C13CC5A03E044FC |
SHA-256: | 82BAFB0F67FE74A52BEF8C0119B1151362F89C4A0A40738A89DF813118FD1C4E |
SHA-512: | D31531B01205BF4B6C1F902F6CA3013B990976431BBAB5E4792C9CEFEC6D44FAF48D29015A2D94191957F4F29B150EF7FBDFDEA7D8901E2C0C2909EB34BA8AB2 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8828 |
Entropy (8bit): | 3.693836017561133 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJIlBCui6YBB+fgmf2INmFJTprO89bBe9fZLm:R6lXJ6Qui6YnOgmf2Iu3BUfo |
MD5: | 46DE451CB5999E8EFB852980329FA17E |
SHA1: | AA56940B4D7DDC4ABEF364F0BFFF595AB931A8A6 |
SHA-256: | F63B5B49262B43745AB27D591ADAF0B908C3CD28C225AECDBA3480BD5FF1F371 |
SHA-512: | ECB448FEA6371CFC433EA35E484ED6415281CBE32888D869509BBFA359DA4C0BCD10A0BAAC34867418F5FF74DB6313A9CBC3C06D117B06DF47E6D7615B7A4198 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4902 |
Entropy (8bit): | 4.471607699568587 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsXJg771I98nWpW8VYnYm8M4JC2CU/FzHyq8vhUJptSTSAd:uIjf5I73W7V3JdHWmpoOAd |
MD5: | D29537DE1C7795CCC732F4FF62504B61 |
SHA1: | 9CCE56500279AB5376655C2795028D990C9847D0 |
SHA-256: | 9F10953F83CA135BB2A3D145B8C8A4C2C5A1D68FBB2C0550A2ED2A448041D5E9 |
SHA-512: | 4D2C79F81335090378F1ECF40F49125C569CEA4029F893251B050EB226B76727578953DD9AADBC7DB3288212AB567E0CC5AF06E766E9F1EE2921EA124E4BD951 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 163588 |
Entropy (8bit): | 1.6184346238812257 |
Encrypted: | false |
SSDEEP: | 384:ZWLOkMsWB5RXru2dNnEsMZMaICFZJYtehoJgJoCXenV4IBd5GlHyMrSY:COHsWBrS2dY4ehoJgJoCIxBnwGY |
MD5: | F832A489AE7765676B2BD98A3C134C20 |
SHA1: | A3CB6C65F2920DAA2498FB0F82767F58B1B63840 |
SHA-256: | 99570DC45147AD45D4AF6149AB0C81E5E555C92EA4EE559A585869733566B690 |
SHA-512: | 71A62E1CAF7CF4E32D0757C3AF6CB9ED0C74B9758F28CAF620418E6268D3599763B5E5E7A30B72A2045C405628314257E681AE4739020A5162639615A971397E |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 9004 |
Entropy (8bit): | 3.70717518240535 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJQGQ6Yj5Hgmf3R4l00ETprH89bh/CfMLm:R6lXJ5Q6YdHgmf3R4lHhKft |
MD5: | 22E35C2335E5C40D1529A3B7919257C4 |
SHA1: | A357F8961D2D63D11100E3F2BCE5F8F23E054A2F |
SHA-256: | A1EFF4B56D97802E31CB95A67ADC8BACA350FB7C0E5771AA738368FAD292D8B7 |
SHA-512: | CC22D4A41FA788E6C9FCDF9C4E70E5E5D7DC051B213977CFEC9A2EA33882D1C5BF7657CFE8D63B8E0DDF3CA6B42F3913F5320FE78A7309EB5DD5A9C721DA7667 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4788 |
Entropy (8bit): | 4.50536706303624 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsXJg771I98nWpW8VYZYm8M4JC2CU6Fhcyq85mcxWptSTSsd:uIjf5I73W7VJJ5sWpoOsd |
MD5: | 21AA7917931AFA014E3553A5455D49C2 |
SHA1: | AE00E3F1032701317BF4E43A0F85A4786458FEF3 |
SHA-256: | B6ADE658C07F63295A5BBFFE21518CF3702BB8DDDA72C7C581BF12135309E0AD |
SHA-512: | A134863F99CC4B301B155C680629C7B7D4BDDA99073193E7EC96220248141EC663622EF155FE2C0C7A9B75BDCBB9A510682FDABE5465160E2AD4FBE4A55CE71C |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 70812 |
Entropy (8bit): | 1.5692295042160604 |
Encrypted: | false |
SSDEEP: | 192:G8/3G5NPQQtXOM6MHlE6ss1t4hm2y56bEvw3ZfmOPFHg5PQt5b8d:D25lQQonMHlE6ss/eVmOPa5PO4 |
MD5: | C43A2CC32EBEE32B578A2A821875327C |
SHA1: | F237A11EBE05C0BEA4FC5CA42F1B62E2C1F56737 |
SHA-256: | 1E170FA9881962697DA90D3BB6570C347D60F4E323E39F8D098A90DF75A984D9 |
SHA-512: | 0F4919B6327EC5FB937D7CD891A595A07900175B2F40495D5C9A8C87C5207C2E23315A7DE8D03906459A23A03B97313062BD8AC62CD4457D68E5F2065D56843E |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8986 |
Entropy (8bit): | 3.7027868828474215 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJclaPe6YjvmHgmf3rWFvTprO89buECf36m:R6lXJuaPe6YjmHgmf3rWFBupfb |
MD5: | 1800297F9C73CA0EA1ABE0843F926951 |
SHA1: | 50DE789B56AB3CC66269F7DDA54DA277A61C92E3 |
SHA-256: | 88AB867B617604B34862CF1551B48DFCC17F96985CF883934FA497F6E97F347F |
SHA-512: | 58F4432C0C13397788A3DFEA8A8EC7F184EF9331147B2E7DD8C3C70D1F0F278706FD12C1C9839E65A3E2A729E53DDBB91DD99E43838CCBFC433A430D948E26AE |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4784 |
Entropy (8bit): | 4.482119788685306 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsXJg771I98nWpW8VYiYm8M4JC2CUKFtyq85mQexptSTSxd:uIjf5I73W7VyJy9xpoOxd |
MD5: | 1E73CDF4B2014414B98D87159C136466 |
SHA1: | BE515FF804A463832779C7B8FFE4AA53779AFEE3 |
SHA-256: | F1E02908BC88E9B32BF6DBCB240A1B14DC264CBC1C264CBE9A2382BB348BED52 |
SHA-512: | 6A69C055C3FC29045FF8D1534E2955FF4DDFAE98659F79CF2BBA316060CC064D78B5C9C12D6031E946F5F421BFDE9447C9F5D666CBF5BDF5117A7CBEB8A95EE9 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 61372 |
Entropy (8bit): | 1.6756530960994802 |
Encrypted: | false |
SSDEEP: | 192:Hq4CXqkUup/4OMdM499HSddfGduA0ENksckYHismDaHiFMEqz5OC/:KPXNUupgM69ATmDatBVOW |
MD5: | 00CAE3143F69C76F94BBF8D7DEA44FCC |
SHA1: | AE52379B006B8F8864525735DE52720165836E18 |
SHA-256: | 2F12CF8949E6CBA0A38EFDBBE61D5FF660635AC22008FFAF46AF98681202EC2A |
SHA-512: | 9816F04003CA21F1B23E6D6BA443F69FF2BBAADEC8175DF7656319AF4013852382DAC14A87D8EEC60DD3DE3FC1D525184E792CB6A898A3B1497135DB5FA7FD76 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 9006 |
Entropy (8bit): | 3.702694951219571 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJwD9u3g6YjDl+MNgmf3rWFvTprB89bbnCfnJm:R6lXJU9u3g6Yvl+MNgmf3rWFIbCfk |
MD5: | 3C2A36D680AB34330AF96A1F977469F1 |
SHA1: | 40C3E6F3845161F1BC81898FC2604D0BEA352324 |
SHA-256: | 95F7AEE090A233A67320BCC3DC40D295259557947758D0D1F426ED7583373FBF |
SHA-512: | D87E8992817FC5B2B24FD9CEBFF532B686BCEBCE07C38CD56873DDB837710423FF48623EF63FAC1EA519239757D96A2BCFABC149ACB24D7483D61E9D740A3F0F |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4784 |
Entropy (8bit): | 4.485551881260071 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsXJg771I98nWpW8VYpYm8M4JC2CUKFJ7yq85mQNptSTSQd:uIjf5I73W7V9JO+poOQd |
MD5: | 1FA5F96464C95C1B89419DD8C6DC4613 |
SHA1: | 9B0ACE800C8A3F6557C6A5C8DEAF14DFF991ABE5 |
SHA-256: | 7B9577F8C6829676AF0561636074F79A998460C809E0E5C004681F2F48BD787E |
SHA-512: | 2831545F38427D43A61DD2EC7EE4B38636FBC119A0BBE142FB0ED895519945D58720760F981C1D56071C7D56086E7DD139D21895976C0E5F4F9D87B270D09147 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.469524156333331 |
Encrypted: | false |
SSDEEP: | 6144:UzZfpi6ceLPx9skLmb0fYZWSP3aJG8nAgeiJRMMhA2zX4WABluuNMjDH5S:aZHtYZWOKnMM6bFpaj4 |
MD5: | 6ACFB84F3F9E763CC9A22DEA3DCE603C |
SHA1: | 62AED76D34EAA0E5CF43C888753E6F7EF82BEB2B |
SHA-256: | 8042A5C3B3E6FAA6EC04D1014FBC4B3A49E6095F8E68A0AE13BE9430025B3566 |
SHA-512: | A3E96F0238569F824B3CBA0A79673618E1FC8B4F0FB4E09E958833DCF0DF377EB638FE021DE3EE16A65FB6D444F0888340DDD4C393F5C2A6726EE93CA58F3EFD |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 5.979646090579889 |
TrID: |
|
File name: | decrypt-main.dll.dll |
File size: | 5'330'944 bytes |
MD5: | 1715ba4aa4ff4c70e66943076f3236ac |
SHA1: | f57bfbe116f915e5525c5eff36b5eb5969282171 |
SHA256: | faebf87c3ff1345bbd5910fe4633b2b49dc83fe62b400ecaa102594d5edb39f0 |
SHA512: | ad06e05a1cdc6a92af67c8b96ff708bb92e25e5b021478c7e7f1df13eca9223d107f1de9467d1d24efcf831602ab816d491e68d37b98883b8410642583f7ef48 |
SSDEEP: | 49152:5DEhDXc+rWZtaJ8CifXdpbnaSl+lcOFo66bJeaE3g6XGTkN6h:5WUaJri/zfTsRq |
TLSH: | 233639BB76A482A9C16EC13ED0E38F00D933B1B61733C6E7629143652E469D46F3F661 |
File Content Preview: | MZP.....................@...............................................!..L.!..This program must be run under Win64..$7....................................................................................................................................... |
Icon Hash: | 7ae282899bbab082 |
Entrypoint: | 0x8167d0 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL |
DLL Characteristics: | |
Time Stamp: | 0x65E92BED [Thu Mar 7 02:52:29 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 2 |
File Version Major: | 5 |
File Version Minor: | 2 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 2 |
Import Hash: | e015ba11e1ddaa5380318c50a8051d1f |
Instruction |
---|
push ebp |
dec eax |
sub esp, 00000180h |
dec eax |
mov ebp, esp |
dec eax |
mov dword ptr [ebp+30h], ecx |
mov dword ptr [ebp+3Ch], edx |
dec esp |
mov dword ptr [ebp+40h], eax |
nop |
dec eax |
lea ecx, dword ptr [ebp+48h] |
call 00007FDD90EB2F65h |
cmp eax, 01h |
setle cl |
dec eax |
movzx ecx, cl |
mov dword ptr [ebp+0000017Ch], ecx |
test eax, eax |
jne 00007FDD912B9FA2h |
dec eax |
lea ecx, dword ptr [ebp+48h] |
dec eax |
lea edx, dword ptr [00000051h] |
dec esp |
mov eax, dword ptr [ebp+30h] |
inc esp |
mov ecx, dword ptr [ebp+3Ch] |
dec eax |
mov eax, dword ptr [ebp+40h] |
dec eax |
mov dword ptr [esp+20h], eax |
call 00007FDD90EBD580h |
jmp 00007FDD912B9F7Ah |
nop |
nop |
call 00007FDD90EB2787h |
nop |
call 00007FDD90EB3081h |
mov eax, dword ptr [ebp+0000017Ch] |
dec eax |
lea esp, dword ptr [ebp+00000180h] |
pop ebp |
ret |
dec eax |
lea eax, dword ptr [eax+00h] |
dec eax |
lea eax, dword ptr [00000000h+eax] |
dec eax |
sub esp, 28h |
call 00007FDD90EB268Ch |
dec eax |
add esp, 28h |
ret |
add byte ptr [eax], al |
enter 0000h, 00h |
add byte ptr [eax], al |
add byte ptr [eax], al |
nop |
push 00000081h |
add byte ptr [eax], al |
jnc 00007FDD912B9F8Ch |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
adc byte ptr [ebp-7Fh], dh |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [ebx+00h], dh |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
test al, 48h |
add byte ptr [eax], 00000000h |
add byte ptr [eax], al |
add byte ptr [eax-54h], ah |
inc ecx |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x49b000 | 0xcc | .edata |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x494000 | 0x5134 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x513000 | 0x13400 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x4d4000 | 0x3e160 | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x49d000 | 0x36e34 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x495500 | 0x1308 | .idata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x49a000 | 0xf2a | .didata |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x423f70 | 0x424000 | b7f27458062548a6937770656e7e3fc1 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.data | 0x425000 | 0x62620 | 0x62800 | 9a2bac6930b172b6685b28ba442630cd | False | 0.26204344463832485 | data | 4.902591015474462 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.bss | 0x488000 | 0xbf9c | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0x494000 | 0x5134 | 0x5200 | 703a5e532c59ee1f8016d0490c2480cd | False | 0.2421875 | data | 4.251729395494642 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.didata | 0x49a000 | 0xf2a | 0x1000 | c373d4d2586c9b286933e221aadd59bc | False | 0.253662109375 | data | 3.24473098416006 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.edata | 0x49b000 | 0xcc | 0x200 | 09500bfbbf513ed005e4bb6dff2efa39 | False | 0.345703125 | data | 2.4492227742982298 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rdata | 0x49c000 | 0x44 | 0x200 | c8956fe83c39059a06fbaa227b86bb22 | False | 0.15625 | data | 1.1709274092963795 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x49d000 | 0x36e34 | 0x37000 | 099680a7bdd7617d15c3ab408e1cbd03 | False | 0.46367631392045455 | data | 6.45364680864244 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.pdata | 0x4d4000 | 0x3e160 | 0x3e200 | fb0adaccc8febc7d9f0cb5f536122620 | False | 0.4902186556841046 | data | 6.396233810440188 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0x513000 | 0x13400 | 0x13400 | bb501744d3457770d2c2e99247451795 | False | 0.24665178571428573 | data | 5.0560496894268265 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_CURSOR | 0x51432c | 0x134 | Targa image data - Map 64 x 65536 x 1 +32 "\001" | English | United States | 0.38636363636363635 |
RT_CURSOR | 0x514460 | 0x134 | data | English | United States | 0.4642857142857143 |
RT_CURSOR | 0x514594 | 0x134 | data | English | United States | 0.4805194805194805 |
RT_CURSOR | 0x5146c8 | 0x134 | data | English | United States | 0.38311688311688313 |
RT_CURSOR | 0x5147fc | 0x134 | data | English | United States | 0.36038961038961037 |
RT_CURSOR | 0x514930 | 0x134 | data | English | United States | 0.4090909090909091 |
RT_CURSOR | 0x514a64 | 0x134 | Targa image data - RGB 64 x 65536 x 1 +32 "\001" | English | United States | 0.4967532467532468 |
RT_BITMAP | 0x514b98 | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | English | United States | 0.43103448275862066 |
RT_BITMAP | 0x514d68 | 0x1e4 | Device independent bitmap graphic, 36 x 19 x 4, image size 380 | English | United States | 0.46487603305785125 |
RT_BITMAP | 0x514f4c | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | English | United States | 0.43103448275862066 |
RT_BITMAP | 0x51511c | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | English | United States | 0.39870689655172414 |
RT_BITMAP | 0x5152ec | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | English | United States | 0.4245689655172414 |
RT_BITMAP | 0x5154bc | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | English | United States | 0.5021551724137931 |
RT_BITMAP | 0x51568c | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | English | United States | 0.5064655172413793 |
RT_BITMAP | 0x51585c | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | English | United States | 0.39655172413793105 |
RT_BITMAP | 0x515a2c | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | English | United States | 0.5344827586206896 |
RT_BITMAP | 0x515bfc | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | English | United States | 0.39655172413793105 |
RT_BITMAP | 0x515dcc | 0x5c | Device independent bitmap graphic, 6 x 11 x 1, image size 44 | English | United States | 0.391304347826087 |
RT_BITMAP | 0x515e28 | 0x5c | Device independent bitmap graphic, 6 x 11 x 1, image size 44 | English | United States | 0.532608695652174 |
RT_BITMAP | 0x515e84 | 0x5c | Device independent bitmap graphic, 6 x 11 x 1, image size 44 | English | United States | 0.4782608695652174 |
RT_BITMAP | 0x515ee0 | 0x5c | Device independent bitmap graphic, 6 x 11 x 1, image size 44 | English | United States | 0.5543478260869565 |
RT_BITMAP | 0x515f3c | 0x5c | Device independent bitmap graphic, 6 x 11 x 1, image size 44 | English | United States | 0.4673913043478261 |
RT_BITMAP | 0x515f98 | 0x46e | Device independent bitmap graphic, 28 x 13 x 24, image size 1094, resolution 2834 x 2834 px/m | English | United States | 0.328042328042328 |
RT_BITMAP | 0x516408 | 0x46e | Device independent bitmap graphic, 28 x 13 x 24, image size 1094, resolution 2834 x 2834 px/m | English | United States | 0.3289241622574956 |
RT_BITMAP | 0x516878 | 0x46e | Device independent bitmap graphic, 28 x 13 x 24, image size 1094, resolution 2834 x 2834 px/m | English | United States | 0.40476190476190477 |
RT_BITMAP | 0x516ce8 | 0x46e | Device independent bitmap graphic, 28 x 13 x 24, image size 1094, resolution 2834 x 2834 px/m | English | United States | 0.09435626102292768 |
RT_BITMAP | 0x517158 | 0x46e | Device independent bitmap graphic, 28 x 13 x 24, image size 1094, resolution 2834 x 2834 px/m | English | United States | 0.23721340388007053 |
RT_BITMAP | 0x5175c8 | 0x46e | Device independent bitmap graphic, 28 x 13 x 24, image size 1094, resolution 2834 x 2834 px/m | English | United States | 0.29188712522045857 |
RT_BITMAP | 0x517a38 | 0x46e | Device independent bitmap graphic, 28 x 13 x 24, image size 1094, resolution 2834 x 2834 px/m | English | United States | 0.1675485008818342 |
RT_BITMAP | 0x517ea8 | 0x46e | Device independent bitmap graphic, 28 x 13 x 24, image size 1094, resolution 2834 x 2834 px/m | English | United States | 0.2892416225749559 |
RT_BITMAP | 0x518318 | 0x46e | Device independent bitmap graphic, 28 x 13 x 24, image size 1094, resolution 2834 x 2834 px/m | English | United States | 0.2751322751322751 |
RT_BITMAP | 0x518788 | 0x46e | Device independent bitmap graphic, 28 x 13 x 24, image size 1094, resolution 2834 x 2834 px/m | English | United States | 0.30776014109347444 |
RT_BITMAP | 0x518bf8 | 0x46e | Device independent bitmap graphic, 28 x 13 x 24, image size 1094, resolution 2834 x 2834 px/m | English | United States | 0.2777777777777778 |
RT_BITMAP | 0x519068 | 0x46e | Device independent bitmap graphic, 28 x 13 x 24, image size 1094, resolution 2834 x 2834 px/m | English | United States | 0.41887125220458554 |
RT_STRING | 0x5194d8 | 0x624 | data | 0.3333333333333333 | ||
RT_STRING | 0x519afc | 0xb3c | data | 0.2437413073713491 | ||
RT_STRING | 0x51a638 | 0x22c | data | 0.4172661870503597 | ||
RT_STRING | 0x51a864 | 0x33c | data | 0.43719806763285024 | ||
RT_STRING | 0x51aba0 | 0x488 | data | 0.32413793103448274 | ||
RT_STRING | 0x51b028 | 0x508 | data | 0.2694099378881988 | ||
RT_STRING | 0x51b530 | 0x494 | data | 0.40017064846416384 | ||
RT_STRING | 0x51b9c4 | 0x3dc | data | 0.3248987854251012 | ||
RT_STRING | 0x51bda0 | 0x358 | data | 0.4485981308411215 | ||
RT_STRING | 0x51c0f8 | 0x404 | StarOffice Gallery theme l, 1677731072 objects, 1st l | 0.41245136186770426 | ||
RT_STRING | 0x51c4fc | 0xa0 | data | 0.7125 | ||
RT_STRING | 0x51c59c | 0xe4 | data | 0.6359649122807017 | ||
RT_STRING | 0x51c680 | 0x2c4 | data | 0.4138418079096045 | ||
RT_STRING | 0x51c944 | 0x254 | data | 0.4865771812080537 | ||
RT_STRING | 0x51cb98 | 0x3d0 | data | 0.3698770491803279 | ||
RT_STRING | 0x51cf68 | 0x3b8 | data | 0.3760504201680672 | ||
RT_STRING | 0x51d320 | 0x47c | data | 0.3423344947735192 | ||
RT_STRING | 0x51d79c | 0x38c | data | 0.3634361233480176 | ||
RT_STRING | 0x51db28 | 0x2c4 | data | 0.3559322033898305 | ||
RT_STRING | 0x51ddec | 0x3f8 | data | 0.39173228346456695 | ||
RT_STRING | 0x51e1e4 | 0x524 | data | 0.3844984802431611 | ||
RT_STRING | 0x51e708 | 0x4ac | data | 0.31605351170568563 | ||
RT_STRING | 0x51ebb4 | 0x3b0 | data | 0.3707627118644068 | ||
RT_STRING | 0x51ef64 | 0x39c | data | 0.32142857142857145 | ||
RT_STRING | 0x51f300 | 0x40c | data | 0.3735521235521235 | ||
RT_STRING | 0x51f70c | 0xf4 | data | 0.5491803278688525 | ||
RT_STRING | 0x51f800 | 0xc4 | data | 0.6275510204081632 | ||
RT_STRING | 0x51f8c4 | 0x268 | data | 0.48863636363636365 | ||
RT_STRING | 0x51fb2c | 0x434 | data | 0.3308550185873606 | ||
RT_STRING | 0x51ff60 | 0x360 | data | 0.38425925925925924 | ||
RT_STRING | 0x5202c0 | 0x2ec | data | 0.37566844919786097 | ||
RT_STRING | 0x5205ac | 0x31c | data | 0.34296482412060303 | ||
RT_RCDATA | 0x5208c8 | 0x10 | data | 1.5 | ||
RT_RCDATA | 0x5208d8 | 0x7c8 | data | 0.5281124497991968 | ||
RT_RCDATA | 0x5210a0 | 0x2 | data | English | United States | 5.0 |
RT_RCDATA | 0x5210a4 | 0xc45 | Delphi compiled form 'TFJustificativa' | 0.3081821076090417 | ||
RT_RCDATA | 0x521cec | 0x2291 | Delphi compiled form 'TFReceber' | 0.15323765397220024 | ||
RT_RCDATA | 0x523f80 | 0xb75 | Delphi compiled form 'TF_Abundant' | 0.4302761677463348 | ||
RT_RCDATA | 0x524af8 | 0xcc9 | Delphi compiled form 'TF_FlatLandPianoMovers' | 0.43568591506263366 | ||
RT_RCDATA | 0x5257c4 | 0x494 | Delphi compiled form 'TLoginDialog' | 0.48976109215017066 | ||
RT_RCDATA | 0x525c58 | 0x3c4 | Delphi compiled form 'TPasswordDialog' | 0.4678423236514523 | ||
RT_GROUP_CURSOR | 0x52601c | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.25 |
RT_GROUP_CURSOR | 0x526030 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.25 |
RT_GROUP_CURSOR | 0x526044 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x526058 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x52606c | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x526080 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x526094 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_VERSION | 0x5260a8 | 0x218 | data | English | United States | 0.48134328358208955 |
DLL | Import |
---|---|
oleaut32.dll | SysFreeString, SysReAllocStringLen, SysAllocStringLen |
advapi32.dll | RegQueryValueExW, RegOpenKeyExW, RegCloseKey |
user32.dll | CharNextW, LoadStringW |
kernel32.dll | Sleep, VirtualFree, VirtualAlloc, lstrlenW, VirtualQuery, QueryPerformanceCounter, GetTickCount, GetSystemInfo, GetVersion, CompareStringW, IsValidLocale, SetThreadLocale, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, GetLocaleInfoW, WideCharToMultiByte, MultiByteToWideChar, GetACP, LoadLibraryExW, GetStartupInfoW, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetCommandLineW, FreeLibrary, GetLastError, UnhandledExceptionFilter, RtlUnwindEx, RtlUnwind, RaiseException, ExitProcess, ExitThread, SwitchToThread, GetCurrentThreadId, CreateThread, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, FindFirstFileW, FindClose, WriteFile, GetStdHandle, CloseHandle |
kernel32.dll | GetProcAddress, RaiseException, LoadLibraryA, GetLastError, TlsSetValue, TlsGetValue, TlsFree, TlsAlloc, LocalFree, LocalAlloc, FreeLibrary |
user32.dll | SetClassLongPtrW, GetClassLongPtrW, SetWindowLongPtrW, GetWindowLongPtrW, CreateWindowExW, WindowFromPoint, WaitMessage, ValidateRect, UpdateWindow, UnregisterClassW, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoW, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCaret, SetWindowRgn, SetWindowsHookExW, SetWindowTextW, SetWindowPos, SetWindowPlacement, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropW, SetParent, SetMenuItemInfoW, SetMenu, SetKeyboardState, SetForegroundWindow, SetFocus, SetCursorPos, SetCursor, SetClipboardData, SetCaretPos, SetCapture, SetActiveWindow, SendMessageA, SendMessageW, ScrollWindowEx, ScrollWindow, ScreenToClient, RemovePropW, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageW, RegisterClipboardFormatW, RegisterClassW, RedrawWindow, PostQuitMessage, PostMessageW, PeekMessageA, PeekMessageW, OpenClipboard, MsgWaitForMultipleObjectsEx, MsgWaitForMultipleObjects, MoveWindow, MessageBoxW, MessageBeep, MapWindowPoints, MapVirtualKeyW, LoadStringW, LoadKeyboardLayoutW, LoadImageW, LoadIconW, LoadCursorW, LoadBitmapW, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsIconic, IsDialogMessageA, IsDialogMessageW, IsClipboardFormatAvailable, IsChild, IsCharAlphaNumericW, IsCharAlphaW, InvalidateRect, InsertMenuItemW, InsertMenuW, HideCaret, GetWindowThreadProcessId, GetWindowTextW, GetWindowRect, GetWindowPlacement, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetScrollBarInfo, GetPropW, GetParent, GetWindow, GetMessageTime, GetMessagePos, GetMessageExtraInfo, GetMessageW, GetMenuStringW, GetMenuState, GetMenuItemInfoW, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameW, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextW, GetIconInfo, GetForegroundWindow, GetFocus, GetDoubleClickTime, GetDlgCtrlID, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameW, GetClassInfoExW, GetClassInfoW, GetCaretPos, GetCapture, GetActiveWindow, FrameRect, FindWindowExW, FindWindowW, FillRect, EnumWindows, EnumThreadWindows, EnumClipboardFormats, EnumChildWindows, EndPaint, EndMenu, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextExW, DrawTextW, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageA, DispatchMessageW, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DestroyCaret, DeleteMenu, DefWindowProcW, DefMDIChildProcW, DefFrameProcW, CreatePopupMenu, CreateMenu, CreateIcon, CreateCaret, CreateAcceleratorTableW, CountClipboardFormats, CopyImage, CopyIcon, CloseClipboard, ClientToScreen, ChildWindowFromPoint, CheckMenuItem, CharUpperBuffW, CharUpperW, CharNextW, CharLowerBuffW, CharLowerW, CallWindowProcW, CallNextHookEx, BeginPaint, AdjustWindowRectEx, ActivateKeyboardLayout |
gdi32.dll | UnrealizeObject, StretchDIBits, StretchBlt, StartPage, StartDocW, SetWindowOrgEx, SetWindowExtEx, SetWinMetaFileBits, SetViewportOrgEx, SetViewportExtEx, SetTextColor, SetStretchBltMode, SetRectRgn, SetROP2, SetPixel, SetMapMode, SetEnhMetaFileBits, SetDIBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SetAbortProc, SelectPalette, SelectObject, SelectClipRgn, SaveDC, RoundRect, RestoreDC, ResizePalette, Rectangle, RectVisible, RealizePalette, Polyline, Polygon, PolyPolyline, PolyBezierTo, PolyBezier, PlayEnhMetaFile, Pie, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsW, GetTextExtentPointW, GetTextExtentPoint32W, GetSystemPaletteEntries, GetStretchBltMode, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectW, GetNearestPaletteIndex, GetNearestColor, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileDescriptionW, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, FrameRgn, ExtTextOutW, ExtFloodFill, ExtCreatePen, ExcludeClipRect, EnumFontsW, EnumFontFamiliesExW, EndPage, EndDoc, Ellipse, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreateRectRgn, CreatePenIndirect, CreatePalette, CreateICW, CreateHalftonePalette, CreateFontIndirectW, CreateDIBitmap, CreateDIBSection, CreateDCW, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileW, Chord, BitBlt, ArcTo, Arc, AngleArc, AbortDoc |
version.dll | VerQueryValueW, GetFileVersionInfoSizeW, GetFileVersionInfoW |
kernel32.dll | lstrcmpW, WriteFile, WinExec, WideCharToMultiByte, WaitForSingleObject, WaitForMultipleObjectsEx, VirtualQueryEx, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, VerSetConditionMask, VerifyVersionInfoW, UnmapViewOfFile, TryEnterCriticalSection, TerminateProcess, SystemTimeToFileTime, SwitchToThread, SuspendThread, Sleep, SizeofResource, SetThreadPriority, SetThreadLocale, SetLastError, SetFileTime, SetFilePointer, SetFileAttributesW, SetEvent, SetErrorMode, SetEndOfFile, ResumeThread, ResetEvent, RemoveDirectoryW, ReadFile, RaiseException, QueryPerformanceFrequency, QueryPerformanceCounter, QueryDosDeviceW, IsDebuggerPresent, OpenProcess, MulDiv, MapViewOfFile, LockResource, LocalFree, LocalFileTimeToFileTime, LoadResource, LoadLibraryW, LeaveCriticalSection, IsValidLocale, InitializeCriticalSection, HeapSize, HeapFree, HeapDestroy, HeapCreate, HeapAlloc, GlobalUnlock, GlobalSize, GlobalLock, GlobalFree, GlobalFindAtomW, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomW, GetVolumeInformationW, GetVersionExW, GetVersion, GetTimeZoneInformation, GetTickCount, GetThreadPriority, GetThreadLocale, GetStdHandle, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLogicalDrives, GetLogicalDriveStringsW, GetLocaleInfoW, GetLocalTime, GetLastError, GetFullPathNameW, GetFileSize, GetFileAttributesExW, GetFileAttributesW, GetExitCodeThread, GetExitCodeProcess, GetDriveTypeW, GetDiskFreeSpaceW, GetDateFormatW, GetCurrentThreadId, GetCurrentThread, GetCurrentProcessId, GetCurrentProcess, GetCPInfoExW, GetCPInfo, GetACP, FreeResource, FreeLibrary, FormatMessageW, FindResourceW, FindNextFileW, FindFirstFileW, FindClose, FileTimeToSystemTime, FileTimeToLocalFileTime, FileTimeToDosDateTime, EnumSystemLocalesW, EnumResourceNamesW, EnumCalendarInfoW, EnterCriticalSection, DeleteFileW, DeleteCriticalSection, CreateThread, CreateFileMappingW, CreateFileW, CreateEventW, CreateDirectoryW, CompareStringW, CloseHandle |
advapi32.dll | RegUnLoadKeyW, RegSetValueExW, RegSaveKeyW, RegRestoreKeyW, RegReplaceKeyW, RegQueryValueExW, RegQueryInfoKeyW, RegOpenKeyExW, RegLoadKeyW, RegFlushKey, RegEnumValueW, RegEnumKeyExW, RegDeleteValueW, RegDeleteKeyW, RegCreateKeyExW, RegConnectRegistryW, RegCloseKey |
kernel32.dll | Sleep |
netapi32.dll | NetApiBufferFree, NetWkstaGetInfo |
oleaut32.dll | SafeArrayPtrOfIndex, SafeArrayPutElement, SafeArrayGetElement, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopyInd, VariantCopy, VariantClear, VariantInit |
oleaut32.dll | GetErrorInfo, SysFreeString |
ole32.dll | OleUninitialize, OleInitialize, CoTaskMemFree, CoTaskMemAlloc, CoCreateInstance, CoUninitialize, CoInitialize, IsEqualGUID |
comctl32.dll | InitializeFlatSB, FlatSB_SetScrollProp, FlatSB_SetScrollPos, FlatSB_SetScrollInfo, FlatSB_GetScrollPos, FlatSB_GetScrollInfo, _TrackMouseEvent, ImageList_GetImageInfo, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Copy, ImageList_LoadImageW, ImageList_GetIcon, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_SetOverlayImage, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_SetImageCount, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create, InitCommonControls |
user32.dll | EnumDisplayMonitors, GetMonitorInfoW, MonitorFromPoint, MonitorFromRect, MonitorFromWindow |
msvcrt.dll | memset, memcpy |
shell32.dll | ShellExecuteExW, ShellExecuteW, Shell_NotifyIconW |
URLMON.DLL | URLDownloadToFileW |
shell32.dll | SHGetSpecialFolderLocation, SHGetPathFromIDListW |
winspool.drv | OpenPrinterW, EnumPrintersW, DocumentPropertiesW, ClosePrinter |
winspool.drv | GetDefaultPrinterW |
kernel32.dll | MulDiv |
Name | Ordinal | Address |
---|---|---|
HackCheck | 5 | 0x816700 |
ServiceCrtMain | 4 | 0x816700 |
TMethodImplementationIntercept | 3 | 0x498cf0 |
__dbk_fcall_wrapper | 2 | 0x419ae0 |
dbkFCallWrapperAddr | 1 | 0x88e290 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 13, 2024 17:01:21.588476896 CET | 49723 | 443 | 192.168.2.6 | 52.95.163.36 |
Mar 13, 2024 17:01:21.588501930 CET | 443 | 49723 | 52.95.163.36 | 192.168.2.6 |
Mar 13, 2024 17:01:21.588551998 CET | 49723 | 443 | 192.168.2.6 | 52.95.163.36 |
Mar 13, 2024 17:01:21.602117062 CET | 49723 | 443 | 192.168.2.6 | 52.95.163.36 |
Mar 13, 2024 17:01:21.602127075 CET | 443 | 49723 | 52.95.163.36 | 192.168.2.6 |
Mar 13, 2024 17:01:22.214008093 CET | 443 | 49723 | 52.95.163.36 | 192.168.2.6 |
Mar 13, 2024 17:01:22.214097023 CET | 49723 | 443 | 192.168.2.6 | 52.95.163.36 |
Mar 13, 2024 17:01:22.338424921 CET | 49723 | 443 | 192.168.2.6 | 52.95.163.36 |
Mar 13, 2024 17:01:22.338453054 CET | 443 | 49723 | 52.95.163.36 | 192.168.2.6 |
Mar 13, 2024 17:01:22.338777065 CET | 443 | 49723 | 52.95.163.36 | 192.168.2.6 |
Mar 13, 2024 17:01:22.338825941 CET | 49723 | 443 | 192.168.2.6 | 52.95.163.36 |
Mar 13, 2024 17:01:22.356600046 CET | 49723 | 443 | 192.168.2.6 | 52.95.163.36 |
Mar 13, 2024 17:01:22.404232979 CET | 443 | 49723 | 52.95.163.36 | 192.168.2.6 |
Mar 13, 2024 17:01:22.562319040 CET | 443 | 49723 | 52.95.163.36 | 192.168.2.6 |
Mar 13, 2024 17:01:22.562382936 CET | 49723 | 443 | 192.168.2.6 | 52.95.163.36 |
Mar 13, 2024 17:01:22.562407017 CET | 443 | 49723 | 52.95.163.36 | 192.168.2.6 |
Mar 13, 2024 17:01:22.562437057 CET | 443 | 49723 | 52.95.163.36 | 192.168.2.6 |
Mar 13, 2024 17:01:22.562485933 CET | 49723 | 443 | 192.168.2.6 | 52.95.163.36 |
Mar 13, 2024 17:01:22.575414896 CET | 49723 | 443 | 192.168.2.6 | 52.95.163.36 |
Mar 13, 2024 17:01:22.575432062 CET | 443 | 49723 | 52.95.163.36 | 192.168.2.6 |
Mar 13, 2024 17:01:22.575443029 CET | 49723 | 443 | 192.168.2.6 | 52.95.163.36 |
Mar 13, 2024 17:01:22.575481892 CET | 49723 | 443 | 192.168.2.6 | 52.95.163.36 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 13, 2024 17:01:21.449564934 CET | 50556 | 53 | 192.168.2.6 | 1.1.1.1 |
Mar 13, 2024 17:01:21.575541019 CET | 53 | 50556 | 1.1.1.1 | 192.168.2.6 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Mar 13, 2024 17:01:21.449564934 CET | 192.168.2.6 | 1.1.1.1 | 0xc3fc | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Mar 13, 2024 17:01:21.575541019 CET | 1.1.1.1 | 192.168.2.6 | 0xc3fc | No error (0) | s3-r-w.sa-east-1.amazonaws.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 13, 2024 17:01:21.575541019 CET | 1.1.1.1 | 192.168.2.6 | 0xc3fc | No error (0) | 52.95.163.36 | A (IP address) | IN (0x0001) | false | ||
Mar 13, 2024 17:01:21.575541019 CET | 1.1.1.1 | 192.168.2.6 | 0xc3fc | No error (0) | 16.12.1.50 | A (IP address) | IN (0x0001) | false | ||
Mar 13, 2024 17:01:21.575541019 CET | 1.1.1.1 | 192.168.2.6 | 0xc3fc | No error (0) | 52.95.165.122 | A (IP address) | IN (0x0001) | false | ||
Mar 13, 2024 17:01:21.575541019 CET | 1.1.1.1 | 192.168.2.6 | 0xc3fc | No error (0) | 52.95.165.11 | A (IP address) | IN (0x0001) | false | ||
Mar 13, 2024 17:01:21.575541019 CET | 1.1.1.1 | 192.168.2.6 | 0xc3fc | No error (0) | 16.12.1.54 | A (IP address) | IN (0x0001) | false | ||
Mar 13, 2024 17:01:21.575541019 CET | 1.1.1.1 | 192.168.2.6 | 0xc3fc | No error (0) | 16.12.2.54 | A (IP address) | IN (0x0001) | false | ||
Mar 13, 2024 17:01:21.575541019 CET | 1.1.1.1 | 192.168.2.6 | 0xc3fc | No error (0) | 16.12.2.50 | A (IP address) | IN (0x0001) | false | ||
Mar 13, 2024 17:01:21.575541019 CET | 1.1.1.1 | 192.168.2.6 | 0xc3fc | No error (0) | 52.95.164.27 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.6 | 49723 | 52.95.163.36 | 443 | 1756 | C:\Windows\System32\rundll32.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-03-13 16:01:22 UTC | 336 | OUT | |
2024-03-13 16:01:22 UTC | 285 | IN | |
2024-03-13 16:01:22 UTC | 319 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 1 |
Start time: | 17:01:18 |
Start date: | 13/03/2024 |
Path: | C:\Windows\System32\loaddll64.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7768a0000 |
File size: | 165'888 bytes |
MD5 hash: | 763455F9DCB24DFEECC2B9D9F8D46D52 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Reputation: | moderate |
Has exited: | true |
Target ID: | 2 |
Start time: | 17:01:18 |
Start date: | 13/03/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff66e660000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 17:01:18 |
Start date: | 13/03/2024 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7d1d90000 |
File size: | 289'792 bytes |
MD5 hash: | 8A2122E8162DBEF04694B9C3E0B6CDEE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 17:01:18 |
Start date: | 13/03/2024 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7b8b10000 |
File size: | 71'680 bytes |
MD5 hash: | EF3179D498793BF4234F708D3BE28633 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 17:01:18 |
Start date: | 13/03/2024 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7b8b10000 |
File size: | 71'680 bytes |
MD5 hash: | EF3179D498793BF4234F708D3BE28633 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Reputation: | high |
Has exited: | true |
Target ID: | 10 |
Start time: | 17:01:19 |
Start date: | 13/03/2024 |
Path: | C:\Windows\System32\WerFault.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff774430000 |
File size: | 570'736 bytes |
MD5 hash: | FD27D9F6D02763BDE32511B5DF7FF7A0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 13 |
Start time: | 17:01:21 |
Start date: | 13/03/2024 |
Path: | C:\Windows\System32\WerFault.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff774430000 |
File size: | 570'736 bytes |
MD5 hash: | FD27D9F6D02763BDE32511B5DF7FF7A0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 14 |
Start time: | 17:01:21 |
Start date: | 13/03/2024 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7b8b10000 |
File size: | 71'680 bytes |
MD5 hash: | EF3179D498793BF4234F708D3BE28633 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Reputation: | high |
Has exited: | false |
Target ID: | 15 |
Start time: | 17:01:24 |
Start date: | 13/03/2024 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7b8b10000 |
File size: | 71'680 bytes |
MD5 hash: | EF3179D498793BF4234F708D3BE28633 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Reputation: | high |
Has exited: | true |
Target ID: | 17 |
Start time: | 17:01:25 |
Start date: | 13/03/2024 |
Path: | C:\Windows\System32\WerFault.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff774430000 |
File size: | 570'736 bytes |
MD5 hash: | FD27D9F6D02763BDE32511B5DF7FF7A0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 18 |
Start time: | 17:01:27 |
Start date: | 13/03/2024 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7b8b10000 |
File size: | 71'680 bytes |
MD5 hash: | EF3179D498793BF4234F708D3BE28633 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Reputation: | high |
Has exited: | false |
Target ID: | 19 |
Start time: | 17:01:27 |
Start date: | 13/03/2024 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7b8b10000 |
File size: | 71'680 bytes |
MD5 hash: | EF3179D498793BF4234F708D3BE28633 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Reputation: | high |
Has exited: | false |
Target ID: | 20 |
Start time: | 17:01:27 |
Start date: | 13/03/2024 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7b8b10000 |
File size: | 71'680 bytes |
MD5 hash: | EF3179D498793BF4234F708D3BE28633 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Reputation: | high |
Has exited: | true |
Target ID: | 21 |
Start time: | 17:01:27 |
Start date: | 13/03/2024 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7b8b10000 |
File size: | 71'680 bytes |
MD5 hash: | EF3179D498793BF4234F708D3BE28633 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Has exited: | true |
Target ID: | 23 |
Start time: | 17:01:28 |
Start date: | 13/03/2024 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7b8b10000 |
File size: | 71'680 bytes |
MD5 hash: | EF3179D498793BF4234F708D3BE28633 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Has exited: | true |
Target ID: | 25 |
Start time: | 17:01:28 |
Start date: | 13/03/2024 |
Path: | C:\Windows\System32\WerFault.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff774430000 |
File size: | 570'736 bytes |
MD5 hash: | FD27D9F6D02763BDE32511B5DF7FF7A0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Execution Graph
Execution Coverage: | 9.9% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 1.8% |
Total number of Nodes: | 1709 |
Total number of Limit Nodes: | 4 |
Graph
Function 00414B50 Relevance: 28.1, APIs: 12, Strings: 4, Instructions: 149registryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00415230 Relevance: 3.1, APIs: 2, Instructions: 58COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00415080 Relevance: 3.0, APIs: 2, Instructions: 27fileCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00815B40 Relevance: 2.5, APIs: 2, Instructions: 49sleepCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00415080 Relevance: .0, Instructions: 40COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00417CD0 Relevance: .0, Instructions: 9COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0080F6D0 Relevance: 13.6, APIs: 2, Strings: 7, Instructions: 137sleepCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00815F10 Relevance: 12.3, APIs: 2, Strings: 5, Instructions: 73sleepwindowCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00414710 Relevance: 6.1, APIs: 4, Instructions: 88COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00436960 Relevance: 6.1, APIs: 4, Instructions: 82fileCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0043EA00 Relevance: 3.0, APIs: 2, Instructions: 46windowCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00415350 Relevance: 1.6, APIs: 1, Instructions: 111COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040EDF0 Relevance: 1.6, APIs: 1, Instructions: 84COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00419340 Relevance: 1.6, APIs: 1, Instructions: 51threadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00415580 Relevance: 1.5, APIs: 1, Instructions: 44COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00436300 Relevance: 1.5, APIs: 1, Instructions: 32fileCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004142E0 Relevance: 4.6, APIs: 3, Instructions: 112COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00438220 Relevance: .9, Instructions: 894COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040D5F0 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 59libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00433D50 Relevance: 7.6, APIs: 5, Instructions: 132fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00436880 Relevance: 7.6, APIs: 5, Instructions: 68COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004145A0 Relevance: 6.1, APIs: 4, Instructions: 106threadCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00415080 Relevance: .0, Instructions: 40COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00419340 Relevance: 1.6, APIs: 1, Instructions: 51threadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00414B50 Relevance: .2, Instructions: 239COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00415350 Relevance: .2, Instructions: 174COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00407735 Relevance: .1, Instructions: 143COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00414710 Relevance: .1, Instructions: 133COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040F450 Relevance: .1, Instructions: 117COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040F1E0 Relevance: .1, Instructions: 116COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00415110 Relevance: .1, Instructions: 97COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00415230 Relevance: .1, Instructions: 91COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00415580 Relevance: .1, Instructions: 70COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00419E30 Relevance: .1, Instructions: 61COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040F140 Relevance: .1, Instructions: 54COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00407310 Relevance: .1, Instructions: 54COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00417BE0 Relevance: .1, Instructions: 54COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004100A0 Relevance: .1, Instructions: 51COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00413D10 Relevance: .0, Instructions: 38COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00414F80 Relevance: .0, Instructions: 38COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00411240 Relevance: .0, Instructions: 36COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040FCB0 Relevance: .0, Instructions: 34COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00413D70 Relevance: .0, Instructions: 31COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 008167D0 Relevance: .0, Instructions: 26COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004090F0 Relevance: .0, Instructions: 22COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040F430 Relevance: .0, Instructions: 14COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00417CD0 Relevance: .0, Instructions: 9COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Execution Graph
Execution Coverage: | 4.8% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 0% |
Total number of Nodes: | 1598 |
Total number of Limit Nodes: | 2 |
Graph
Function 00414B50 Relevance: 28.1, APIs: 12, Strings: 4, Instructions: 149registryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00415230 Relevance: 3.1, APIs: 2, Instructions: 58COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00415080 Relevance: 3.0, APIs: 2, Instructions: 27fileCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00815F10 Relevance: 12.3, APIs: 2, Strings: 5, Instructions: 73sleepwindowCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00414710 Relevance: 6.1, APIs: 4, Instructions: 88COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00436960 Relevance: 6.1, APIs: 4, Instructions: 82fileCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00415350 Relevance: 1.6, APIs: 1, Instructions: 111COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00415580 Relevance: 1.5, APIs: 1, Instructions: 44COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0080F6D0 Relevance: 13.6, APIs: 2, Strings: 7, Instructions: 137sleepCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040D5F0 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 59libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00433D50 Relevance: 7.6, APIs: 5, Instructions: 132fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00436880 Relevance: 7.6, APIs: 5, Instructions: 68COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004145A0 Relevance: 6.1, APIs: 4, Instructions: 106threadCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 008167D0 Relevance: .0, Instructions: 26COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Execution Graph
Execution Coverage: | 4.8% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 0% |
Total number of Nodes: | 1598 |
Total number of Limit Nodes: | 2 |
Graph
Function 00414B50 Relevance: 28.1, APIs: 12, Strings: 4, Instructions: 149registryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00415230 Relevance: 3.1, APIs: 2, Instructions: 58COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00415080 Relevance: 3.0, APIs: 2, Instructions: 27fileCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00815F10 Relevance: 12.3, APIs: 2, Strings: 5, Instructions: 73sleepwindowCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00414710 Relevance: 6.1, APIs: 4, Instructions: 88COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00436960 Relevance: 6.1, APIs: 4, Instructions: 82fileCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00415350 Relevance: 1.6, APIs: 1, Instructions: 111COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00415580 Relevance: 1.5, APIs: 1, Instructions: 44COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0080F6D0 Relevance: 13.6, APIs: 2, Strings: 7, Instructions: 137sleepCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040D5F0 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 59libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00433D50 Relevance: 7.6, APIs: 5, Instructions: 132fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00436880 Relevance: 7.6, APIs: 5, Instructions: 68COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004145A0 Relevance: 6.1, APIs: 4, Instructions: 106threadCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Execution Graph
Execution Coverage: | 4.8% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 0% |
Total number of Nodes: | 1598 |
Total number of Limit Nodes: | 2 |
Graph
Function 00414B50 Relevance: 28.1, APIs: 12, Strings: 4, Instructions: 149registryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00415230 Relevance: 3.1, APIs: 2, Instructions: 58COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00415080 Relevance: 3.0, APIs: 2, Instructions: 27fileCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00815F10 Relevance: 12.3, APIs: 2, Strings: 5, Instructions: 73sleepwindowCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00414710 Relevance: 6.1, APIs: 4, Instructions: 88COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00436960 Relevance: 6.1, APIs: 4, Instructions: 82fileCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00415350 Relevance: 1.6, APIs: 1, Instructions: 111COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00415580 Relevance: 1.5, APIs: 1, Instructions: 44COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0080F6D0 Relevance: 13.6, APIs: 2, Strings: 7, Instructions: 137sleepCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040D5F0 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 59libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00433D50 Relevance: 7.6, APIs: 5, Instructions: 132fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00436880 Relevance: 7.6, APIs: 5, Instructions: 68COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004145A0 Relevance: 6.1, APIs: 4, Instructions: 106threadCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 008167D0 Relevance: .0, Instructions: 26COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |