Windows
Analysis Report
SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe
Overview
General Information
Detection
Score: | 76 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe (PID: 5980 cmdline:
"C:\Users\ user\Deskt op\Securit eInfo.com. Trojan.Gen ericKD.744 44428.1733 6.1019.exe " MD5: 992A36EDCCD6FB4DB6AAD9C43329CB04) - conhost.exe (PID: 5308 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 5812 cmdline:
C:\Windows \system32\ cmd.exe /c cls MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 4824 cmdline:
C:\Windows \system32\ cmd.exe /c certutil -hashfile "C:\Users\ user\Deskt op\Securit eInfo.com. Trojan.Gen ericKD.744 44428.1733 6.1019.exe " MD5 | fi nd /i /v " md5" | fin d /i /v "c ertutil" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - certutil.exe (PID: 6392 cmdline:
certutil - hashfile " C:\Users\u ser\Deskto p\Securite Info.com.T rojan.Gene ricKD.7444 4428.17336 .1019.exe" MD5 MD5: 0DDA4F16AE041578B4E250AE12E06EB1) - find.exe (PID: 5100 cmdline:
find /i /v "md5" MD5: 15B158BC998EEF74CFDD27C44978AEA0) - find.exe (PID: 5328 cmdline:
find /i /v "certutil " MD5: 15B158BC998EEF74CFDD27C44978AEA0) - cmd.exe (PID: 7156 cmdline:
C:\Windows \system32\ cmd.exe /c start cmd /C "color b && titl e Error && echo SSL connect er ror && tim eout /t 5" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 6704 cmdline:
cmd /C "co lor b && t itle Error && echo S SL connect error && timeout /t 5" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 1476 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - timeout.exe (PID: 3636 cmdline:
timeout /t 5 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3) - WerFault.exe (PID: 5716 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 5 980 -s 110 4 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Code function: | 0_2_00E8F990 |
Source: | Binary or memory string: | memstr_1f749c83-4 |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00E63BEB |
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_00E4EDB0 |
Source: | Code function: | 0_2_00E321F0 | |
Source: | Code function: | 0_2_00E6C150 | |
Source: | Code function: | 0_2_00E4EDB0 | |
Source: | Code function: | 0_2_00E8D550 | |
Source: | Code function: | 0_2_00E51670 | |
Source: | Code function: | 0_2_00E3A610 | |
Source: | Code function: | 0_2_00E368D0 | |
Source: | Code function: | 0_2_00E358B0 | |
Source: | Code function: | 0_2_00E28060 | |
Source: | Code function: | 0_2_00E3B822 | |
Source: | Code function: | 0_2_00E4D020 | |
Source: | Code function: | 0_2_00E46020 | |
Source: | Code function: | 0_2_00E24800 | |
Source: | Code function: | 0_2_00E4B000 | |
Source: | Code function: | 0_2_00E481D6 | |
Source: | Code function: | 0_2_00E4B960 | |
Source: | Code function: | 0_2_00E52950 | |
Source: | Code function: | 0_2_00E23920 | |
Source: | Code function: | 0_2_00E53930 | |
Source: | Code function: | 0_2_00E46AD0 | |
Source: | Code function: | 0_2_00E24350 | |
Source: | Code function: | 0_2_00E4B320 | |
Source: | Code function: | 0_2_00E8CB30 | |
Source: | Code function: | 0_2_00E444A0 | |
Source: | Code function: | 0_2_00E4ACB0 | |
Source: | Code function: | 0_2_00E4BC90 | |
Source: | Code function: | 0_2_00E49D80 | |
Source: | Code function: | 0_2_00E40D00 | |
Source: | Code function: | 0_2_00E31ED0 | |
Source: | Code function: | 0_2_00E4B640 | |
Source: | Code function: | 0_2_00E4D7C0 | |
Source: | Code function: | 0_2_00E38FA0 | |
Source: | Code function: | 0_2_00E47FA0 | |
Source: | Code function: | 0_2_00E4A7B0 | |
Source: | Code function: | 0_2_00E64763 | |
Source: | Code function: | 0_2_00E82710 |
Source: | Process created: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | String found in binary or memory: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Window detected: |
Source: | Static file information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_00E50910 |
Source: | Code function: | 0_2_00E560C9 | |
Source: | Code function: | 0_2_00E37CE5 |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | Code function: | 0_2_00E514A0 |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Check user administrative privileges: | graph_0-23079 |
Source: | API coverage: |
Source: | Thread sleep count: | Jump to behavior |
Source: | Last function: | ||
Source: | Last function: |
Source: | Code function: | 0_2_00E63BEB |
Source: | Code function: | 0_2_00E50E60 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Anti Debugging |
---|
Source: | Code function: | 0_2_00E4EDB0 |
Source: | Thread information set: | Jump to behavior |
Source: | Open window title or class name: | ||
Source: | Open window title or class name: |
Source: | Code function: | 0_2_00E64AD5 |
Source: | Code function: | 0_2_00E50E60 |
Source: | Code function: | 0_2_00E50910 |
Source: | Code function: | 0_2_00E4EDB0 | |
Source: | Code function: | 0_2_00E4EDB0 | |
Source: | Code function: | 0_2_00E578C0 | |
Source: | Code function: | 0_2_00E57040 | |
Source: | Code function: | 0_2_00E52950 | |
Source: | Code function: | 0_2_00E52950 | |
Source: | Code function: | 0_2_00E59920 | |
Source: | Code function: | 0_2_00E59920 | |
Source: | Code function: | 0_2_00E59920 | |
Source: | Code function: | 0_2_00E59920 | |
Source: | Code function: | 0_2_00E53930 | |
Source: | Code function: | 0_2_00E53930 | |
Source: | Code function: | 0_2_00E53930 | |
Source: | Code function: | 0_2_00E53930 | |
Source: | Code function: | 0_2_00E53930 | |
Source: | Code function: | 0_2_00E53930 | |
Source: | Code function: | 0_2_00E53930 | |
Source: | Code function: | 0_2_00E53930 | |
Source: | Code function: | 0_2_00E53930 | |
Source: | Code function: | 0_2_00E53930 | |
Source: | Code function: | 0_2_00E53930 | |
Source: | Code function: | 0_2_00E53930 | |
Source: | Code function: | 0_2_00E53930 | |
Source: | Code function: | 0_2_00E53930 | |
Source: | Code function: | 0_2_00E53930 | |
Source: | Code function: | 0_2_00E51A10 | |
Source: | Code function: | 0_2_00E51A10 | |
Source: | Code function: | 0_2_00E56390 | |
Source: | Code function: | 0_2_00E53360 | |
Source: | Code function: | 0_2_00E57480 | |
Source: | Code function: | 0_2_00E565C7 | |
Source: | Code function: | 0_2_00E4EDA0 | |
Source: | Code function: | 0_2_00E505B0 | |
Source: | Code function: | 0_2_00E58D80 | |
Source: | Code function: | 0_2_00E58D80 | |
Source: | Code function: | 0_2_00E53550 | |
Source: | Code function: | 0_2_00E53550 | |
Source: | Code function: | 0_2_00E57D00 | |
Source: | Code function: | 0_2_00E5AE20 | |
Source: | Code function: | 0_2_00E5AE20 | |
Source: | Code function: | 0_2_00E5AE20 | |
Source: | Code function: | 0_2_00E5AE20 | |
Source: | Code function: | 0_2_00E55E00 | |
Source: | Code function: | 0_2_00E58600 | |
Source: | Code function: | 0_2_00E567C1 | |
Source: | Code function: | 0_2_00E567C1 | |
Source: | Code function: | 0_2_00E5A770 | |
Source: | Code function: | 0_2_00E5A770 | |
Source: | Code function: | 0_2_00E5A770 | |
Source: | Code function: | 0_2_00E5A770 | |
Source: | Code function: | 0_2_00E53710 | |
Source: | Code function: | 0_2_00E53710 | |
Source: | Code function: | 0_2_00E5571B | |
Source: | Code function: | 0_2_00E5571B |
Source: | Code function: | 0_2_00E4EDB0 |
Source: | Code function: | 0_2_00E64AD5 | |
Source: | Code function: | 0_2_00E6430F |
Source: | Memory protected: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Code function: | 0_2_00E53360 |
Source: | Code function: | 0_2_00E2E840 |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_00E63EAF |
Source: | Code function: | 0_2_00E64CE5 |
Source: | Code function: | 0_2_00E28060 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 2 Command and Scripting Interpreter | 1 DLL Side-Loading | 211 Process Injection | 32 Virtualization/Sandbox Evasion | OS Credential Dumping | 1 System Time Discovery | Remote Services | 11 Archive Collected Data | 22 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 2 Native API | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 11 Disable or Modify Tools | LSASS Memory | 331 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 211 Process Injection | Security Account Manager | 32 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Obfuscated Files or Information | NTDS | 1 Account Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 1 System Owner/User Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | Steganography | Cached Domain Credentials | 1 File and Directory Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | Compile After Delivery | DCSync | 13 System Information Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
42% | ReversingLabs | Win32.Trojan.Generic |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
keyauth.win | 104.26.1.5 | true | false | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | unknown | |||
false | unknown | |||
false | unknown | |||
false |
| unknown | ||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.26.1.5 | keyauth.win | United States | 13335 | CLOUDFLARENETUS | false |
IP |
---|
127.0.0.1 |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1543365 |
Start date and time: | 2024-10-27 18:42:45 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 25s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 17 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe |
Detection: | MAL |
Classification: | mal76.evad.winEXE@20/6@1/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 104.208.16.94
- Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
- Not all processes where analyzed, report is missing behavior information
- VT rate limit hit for: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe
Time | Type | Description |
---|---|---|
13:43:45 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.26.1.5 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
keyauth.win | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Xmrig | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Babuk, Djvu | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc | Browse |
| ||
Get hash | malicious | Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
bd0bf25947d4a37404f0424edf4db9ad | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Fredy Stealer | Browse |
| ||
Get hash | malicious | Fredy Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Fredy Stealer | Browse |
| ||
Get hash | malicious | Fredy Stealer | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_9ffa6a94f5231de6490ea3ae72ad68e315c65_678091f3_28510c0d-5783-4216-b77c-15c8c303aad7\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.9221590033519892 |
Encrypted: | false |
SSDEEP: | 96:q5FSSR7zsKhGQ7LVSFQXIDcQ8c6DFcE6cw32+HbHg/opAnQzOqg7TKENdUzX0i1j:io0P70ytgrjb5zuiFoZ24IO8mM |
MD5: | 070984A02152624D0A3A40445ADEA878 |
SHA1: | 7E14C058B958B6F81485F14DFB6798E624B8C2AE |
SHA-256: | 6BCA22E4A7610A2F9F3CFEC5F0E560ED5E4718CDA1AF0F5428812EEC838C9651 |
SHA-512: | AF0EB6D0E6390760146F5A2E71CE8FB1FD74630E965F5C98847959C30B8EB20AE6AC14A39A00DA5674DEFBAE6355C0941794009A5CBA0B3795BDB4B681E7BA19 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 101972 |
Entropy (8bit): | 1.7277431807950245 |
Encrypted: | false |
SSDEEP: | 384:1cYhkYdps0CqtTLpzthFqQsQr9bUGUJdr1C2vuYOZ:FSYdps0tLpz/FmC9UGe1SY6 |
MD5: | C0339E92AE29035908777C3042A150EC |
SHA1: | 5FDE3107158C2370AAD4E29D8C31FDAB8CF1A072 |
SHA-256: | 5B30365F76FD3F3F7BD0F2EDBF043FDF2B9FEA47D122197CD8D1CA71B42C822F |
SHA-512: | DCE5580D73C048F46E86D617DCB46C8039FA4E5E7741F1D947E9FA398BDEC219D9B281F806C581465F9F3CEF7B86B8123B5EB1296A6FF3D12E0E829282BB9165 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8542 |
Entropy (8bit): | 3.697013693758745 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJpHz6PN6Y2DRSUnCgmffNtIpDO89btGsfiPm:R6lXJpT6PN6YMSUnCgmfvitlfz |
MD5: | C5C7BE733421521387027CF92F9C020E |
SHA1: | 27E2B2E9F9D2FB14A2677FFE5963E4D69225C8BC |
SHA-256: | ABC2C76E191DC48B7B9AAC573B5D733923696D27ACF5DB86514D382ED3CE2215 |
SHA-512: | 9528FCAA46A8901A0B8DE7785A5DC85E540B6116F1E814D45228FA2B5B64BE1A69E5A63E7605D8E5639F51FBBAB92ED33CF0ABE70AB9625132024C2820BE7188 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4981 |
Entropy (8bit): | 4.573810169254779 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsctJg77aI9wbWpW8VYpYm8M4J3eA+lFax+q8v+A+rsG9KcQIcQd0h02d:uIjfcHI7yq7VpJdxK09Kku62d |
MD5: | E6FAF23B81946B9BD5122473970F370D |
SHA1: | 0C3864F3CE9ABC00F3A63B92BF75DDF0F0E432BD |
SHA-256: | 6A0167B30ED3F0431226BE8A4CFBC385D0F36AEDCC41B7FBA38EFCA1F76AB5C8 |
SHA-512: | 5BECD6BAA95E9FDAD34BD4A10BE28D5A8B933A4344F3F12FA3EB19E215C024224C3A38B480E2C99E1B67F24588E62C7942505F49A706AD56ED5CD007C9DEF6F4 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.465916739794386 |
Encrypted: | false |
SSDEEP: | 6144:MzZfpi6ceLPx9skLmb0fBZWSP3aJG8nAgeiJRMMhA2zX4WABluuNLjDH5S:yZHtBZWOKnMM6bFpZj4 |
MD5: | B8A875F15511F84D9259206C9838D49F |
SHA1: | 80A45111941C2CC360CBC660508EDCC5CC14E0F2 |
SHA-256: | BC562AA66C9215F84CC52034FF6D99525E107A83F0FDFEE2E6BC3531008605F1 |
SHA-512: | 4A1FBAF746CD87C246D50B04ABF5CF47A3CE9E8C129B1A84170F7B8A086BC5A2199F2252D7E7717AFF03A10C1AAA8EF0EEAB5F02B1AC9551275E385E30C7FD04 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 53 |
Entropy (8bit): | 4.689815737418786 |
Encrypted: | false |
SSDEEP: | 3:YoRTxCx+q49Vg9ND:5FCxj4M9B |
MD5: | 4E5EAA5EDD9A5CCC5BA3FBC366C81217 |
SHA1: | 0F4809FE5246C5705941577EAA1BA429A71021F0 |
SHA-256: | E97F3155C7BB79912EA1DCC882518274A59FEDC7D14E07C60B068B79A79C0E1C |
SHA-512: | F5A9B69AD75B0F52B1C857C116D2A8E003F449C51A9D91AEA078B19A25565D186B4B4DE4BD913C5E4BD68BF75CB68B68BBF7F4727F9F8D54DBA8F8541C27C754 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 6.657566619637477 |
TrID: |
|
File name: | SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe |
File size: | 1'236'992 bytes |
MD5: | 992a36edccd6fb4db6aad9c43329cb04 |
SHA1: | 5276588b19a213b10a8c25c6c08e11d4621124d5 |
SHA256: | b157d6d7519daf5b2ca2b514d6291d3df5c1971884ff429e48045bd7161ca369 |
SHA512: | 666b2936016fca2444d547698e231a938277a1e1c3096ebc8529ecdd6cf8e37a5031d1d59439918ac0eecc83b129f26eaf6bfb9f1f326f0168531d870260c676 |
SSDEEP: | 24576:gu+4D/tSdf1y6zQOC7eZXjPBKZR2xim/KDRzstB:gQtSdflppb0ZRCimiDRYf |
TLSH: | 8045AE32B681D072E1C601B1606AABF65A7D69345B6188C7B7C06E7DCA203D16F36F1F |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........I6..'e..'e..'e...e..'e..#d..'e.E&d..'e.G.e..'e.G$d..'e.G#d..'e.G"d..'e.G&d..'e..&e<.'e.@.d..'e.@.e..'e...e..'e.@%d..'eRich..' |
Icon Hash: | 0fcd1333134d1f0e |
Entrypoint: | 0x444756 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x671A2FDC [Thu Oct 24 11:30:36 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 2e393828d40d2fd8900ef58c7c62e06f |
Instruction |
---|
call 00007F8425280D8Ch |
jmp 00007F8425280629h |
retn 0000h |
push ebp |
mov ebp, esp |
and dword ptr [00506BF8h], 00000000h |
sub esp, 28h |
or dword ptr [004B9090h], 01h |
push 0000000Ah |
call dword ptr [004A10F8h] |
test eax, eax |
je 00007F8425280ABBh |
push ebx |
push esi |
push edi |
xor eax, eax |
lea edi, dword ptr [ebp-28h] |
xor ecx, ecx |
push ebx |
cpuid |
mov esi, ebx |
pop ebx |
nop |
mov dword ptr [edi], eax |
mov dword ptr [edi+04h], esi |
mov dword ptr [edi+08h], ecx |
xor ecx, ecx |
mov dword ptr [edi+0Ch], edx |
mov eax, dword ptr [ebp-28h] |
mov edi, dword ptr [ebp-24h] |
mov dword ptr [ebp-04h], eax |
xor edi, 756E6547h |
mov eax, dword ptr [ebp-1Ch] |
xor eax, 49656E69h |
mov dword ptr [ebp-18h], eax |
mov eax, dword ptr [ebp-20h] |
xor eax, 6C65746Eh |
mov dword ptr [ebp-14h], eax |
xor eax, eax |
inc eax |
push ebx |
cpuid |
mov esi, ebx |
pop ebx |
nop |
lea ebx, dword ptr [ebp-28h] |
mov dword ptr [ebx], eax |
mov eax, dword ptr [ebp-18h] |
or eax, dword ptr [ebp-14h] |
or eax, edi |
mov dword ptr [ebx+04h], esi |
mov dword ptr [ebx+08h], ecx |
mov dword ptr [ebx+0Ch], edx |
jne 00007F84252807EBh |
mov eax, dword ptr [ebp-28h] |
and eax, 0FFF3FF0h |
cmp eax, 000106C0h |
je 00007F84252807D5h |
cmp eax, 00020660h |
je 00007F84252807CEh |
cmp eax, 00020670h |
je 00007F84252807C7h |
cmp eax, 00030650h |
je 00007F84252807C0h |
cmp eax, 00030660h |
je 00007F84252807B9h |
cmp eax, 00030670h |
jne 00007F84252807B9h |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xb5ed8 | 0x208 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x108000 | 0x22c20 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x12b000 | 0x62c4 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0xb2180 | 0x38 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0xb21c0 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0xb20c0 | 0x40 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0xa1000 | 0x6b0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x9f1fc | 0x9f200 | 2786dd19dc325e6ecd53d85610130304 | False | 0.4886678858994501 | data | 6.577665712001494 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0xa1000 | 0x17c40 | 0x17e00 | bd7fa78785f58d1f0c9c77ec2c095d5f | False | 0.3919748036649215 | data | 5.635575515861512 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xb9000 | 0x4e1e8 | 0x4da00 | f8cd3a11456809df1b2f086b21b4eb35 | False | 0.5262649708132046 | data | 6.469389322836828 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x108000 | 0x22c20 | 0x22e00 | 0f61c35135555a22656b45fbc670384e | False | 0.49721382168458783 | data | 6.06443588461351 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x12b000 | 0x62c4 | 0x6400 | 5468de62e230485b93ad67b10cc7c1d0 | False | 0.7203515625 | data | 6.682852540103243 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x1081f0 | 0xa33d | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | Russian | Russia | 0.9980138313910359 |
RT_ICON | 0x112530 | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 2835 x 2835 px/m | Russian | Russia | 0.2503844788832367 |
RT_ICON | 0x122d58 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 2835 x 2835 px/m | Russian | Russia | 0.3471894189891356 |
RT_ICON | 0x126f80 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2835 x 2835 px/m | Russian | Russia | 0.3970954356846473 |
RT_ICON | 0x129528 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2835 x 2835 px/m | Russian | Russia | 0.48827392120075047 |
RT_ICON | 0x12a5d0 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/m | Russian | Russia | 0.649822695035461 |
RT_GROUP_ICON | 0x12aa38 | 0x5a | data | Russian | Russia | 0.7666666666666667 |
RT_MANIFEST | 0x12aa98 | 0x188 | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.5892857142857143 |
DLL | Import |
---|---|
MSVCP140.dll | _Thrd_detach, _Query_perf_counter, _Cnd_do_broadcast_at_thread_exit, ?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?_Throw_Cpp_error@std@@YAXH@Z, _Query_perf_frequency, ?_Getcat@?$ctype@D@std@@SAIPAPBVfacet@locale@2@PBV42@@Z, ??7ios_base@std@@QBE_NXZ, ?getloc@ios_base@std@@QBE?AVlocale@2@XZ, ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UAE@XZ, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAVios_base@1@AAV21@@Z@Z, ?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEXABVlocale@2@@Z, ?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ, ?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEPAV12@PAD_J@Z, ?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ, ?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ, ?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ, ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ, ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z, ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ, ?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z, ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QAE_N_N@Z, ?_Syserror_map@std@@YAPBDH@Z, ?id@?$ctype@D@std@@2V0locale@2@A, ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z, ?_Fiopen@std@@YAPAU_iobuf@@PBDHH@Z, ?_Xbad_function_call@std@@YAXXZ, ?_Winerror_map@std@@YAHH@Z, ?_Xbad_alloc@std@@YAXXZ, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDD@Z, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ, ?uncaught_exception@std@@YA_NXZ, ??Bid@locale@std@@QAEIXZ, ?always_noconv@codecvt_base@std@@QBE_NXZ, ?good@ios_base@std@@QBE_NXZ, ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UAE@XZ, ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UAE@XZ, ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ, ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPBD_J@Z, ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPAD_J@Z, ??1_Lockit@std@@QAE@XZ, ?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ, ?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JXZ, ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE@XZ, ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IAE@XZ, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z, ?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IBEPADXZ, ?out@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PBD1AAPBDPAD3AAPAD@Z, ?in@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PBD1AAPBDPAD3AAPAD@Z, ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXXZ, ?setg@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXPAD00@Z, ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QBE?AVlocale@2@XZ, ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ, ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PAD1AAPAD@Z, ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SAIPAPBVfacet@locale@2@PBV42@@Z, ?_Xlength_error@std@@YAXPBD@Z, ?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A, ?_Xout_of_range@std@@YAXPBD@Z, ?_Getgloballocale@locale@std@@CAPAV_Locimp@12@XZ, ??0_Lockit@std@@QAE@H@Z, ?ignore@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@_JH@Z |
ADVAPI32.dll | CryptAcquireContextA, CryptReleaseContext, CryptGetHashParam, CryptCreateHash, CryptHashData, CryptDestroyHash, CryptDestroyKey, CryptImportKey, CryptEncrypt, RegCloseKey, RegQueryValueExA, RegCreateKeyExA, RegSetValueExA, RegOpenKeyExA, LookupPrivilegeValueW, AdjustTokenPrivileges, CloseServiceHandle, OpenSCManagerW, ControlService, RegOpenKeyExW, RegGetValueW, OpenServiceW, QueryServiceStatusEx, CopySid, IsValidSid, ConvertSidToStringSidW, GetLengthSid, ConvertSidToStringSidA, GetUserNameA, OpenProcessToken, GetTokenInformation |
KERNEL32.dll | TerminateProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, SleepConditionVariableSRW, GetFileSizeEx, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, GetLocaleInfoEx, FormatMessageA, MultiByteToWideChar, GetFileInformationByHandleEx, EnterCriticalSection, AreFileApisANSI, IsProcessorFeaturePresent, GetFileAttributesExW, FindFirstFileW, FindClose, CreateFileW, CreateDirectoryW, GetCurrentDirectoryW, OpenThread, SetThreadContext, CreateProcessA, IsDebuggerPresent, LeaveCriticalSection, SetEvent, WaitForSingleObject, CreateEventA, QueryPerformanceFrequency, GetSystemDirectoryA, FreeLibrary, MoveFileExA, WaitForSingleObjectEx, GetEnvironmentVariableA, GetFileType, ReadFile, PeekNamedPipe, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, SetLastError, FormatMessageW, GetTickCount, WaitForMultipleObjects, SleepEx, WakeAllConditionVariable, VirtualProtect, GetModuleFileNameW, GetModuleHandleA, LoadLibraryW, GetProcAddress, GetModuleHandleW, GetCurrentProcess, CloseHandle, LocalFree, WriteProcessMemory, Sleep, LoadLibraryA, VirtualProtectEx, VirtualAllocEx, ReadProcessMemory, CreateRemoteThread, VirtualFreeEx, GetExitCodeProcess, GetModuleFileNameA, HeapFree, InitializeCriticalSectionEx, HeapSize, GetLastError, HeapReAlloc, CreateThread, HeapAlloc, HeapDestroy, DeleteCriticalSection, GetProcessHeap, WideCharToMultiByte, VirtualFree, GetStdHandle, GetShortPathNameW, SetConsoleMode, VirtualAlloc, Thread32Next, GetEnvironmentVariableW, GetWriteWatch, Thread32First, SuspendThread, HeapWalk, ResumeThread, OpenProcess, GetConsoleMode, GetTickCount64, Process32NextW, CreateFileA, GetCurrentThread, Process32FirstW, RaiseException, GetSystemInfo, GetThreadContext, VerSetConditionMask, GetCurrentProcessId, VerifyVersionInfoW, OutputDebugStringW |
USER32.dll | MessageBoxA, FindWindowW |
SHELL32.dll | ShellExecuteW, ShellExecuteA |
SHLWAPI.dll | PathFindFileNameW |
RPCRT4.dll | RpcStringFreeA, UuidToStringA, UuidCreate |
USERENV.dll | UnloadUserProfile |
VCRUNTIME140.dll | memmove, memcpy, wcsstr, memchr, strstr, __CxxFrameHandler3, __std_exception_destroy, strchr, _except_handler4_common, memset, strrchr, __std_terminate, __current_exception_context, __std_exception_copy, __current_exception, _CxxThrowException |
api-ms-win-crt-stdio-l1-1-0.dll | __p__commode, fflush, fclose, fputs, _close, __stdio_common_vsscanf, fgetc, __stdio_common_vswprintf, __stdio_common_vfprintf, _fileno, feof, __acrt_iob_func, _lseeki64, fseek, fwrite, ftell, fgetpos, _popen, setvbuf, ungetc, __stdio_common_vsprintf, _write, _read, fgets, fputc, _pclose, fsetpos, fread, _fseeki64, _open, _set_fmode, _get_stream_buffer_pointers, fopen |
api-ms-win-crt-filesystem-l1-1-0.dll | _unlink, rename, _access, _lock_file, _unlock_file, _stat64, _fstat64 |
api-ms-win-crt-string-l1-1-0.dll | strncpy, _strdup, strspn, strcspn, strncmp, strpbrk, strcat_s |
api-ms-win-crt-runtime-l1-1-0.dll | _beginthreadex, terminate, _resetstkoflw, _errno, system, __sys_nerr, __sys_errlist, exit, _controlfp_s, _invalid_parameter_noinfo, _invalid_parameter_noinfo_noreturn, _register_thread_local_exe_atexit_callback, _c_exit, __p___wargv, __p___argc, _exit, _initterm_e, _initterm, _get_initial_wide_environment, _initialize_wide_environment, _configure_wide_argv, abort, _set_app_type, _seh_filter_exe, _cexit, _crt_atexit, _register_onexit_function, _initialize_onexit_table |
api-ms-win-crt-heap-l1-1-0.dll | calloc, _recalloc, _callnewh, realloc, free, malloc, _set_new_mode |
api-ms-win-crt-math-l1-1-0.dll | __setusermatherr, _dsign, _fdopen, _dclass |
api-ms-win-crt-convert-l1-1-0.dll | strtoul, atoi, strtol, strtoull, strtoll, strtod, wcstombs |
api-ms-win-crt-time-l1-1-0.dll | _time64, strftime, _localtime64, _localtime64_s, _gmtime64 |
api-ms-win-crt-locale-l1-1-0.dll | _configthreadlocale, localeconv, ___lc_codepage_func |
api-ms-win-crt-environment-l1-1-0.dll | getenv |
api-ms-win-crt-utility-l1-1-0.dll | qsort, srand, rand |
bcrypt.dll | BCryptGenRandom |
Normaliz.dll | IdnToAscii, IdnToUnicode |
WLDAP32.dll | |
CRYPT32.dll | CertOpenStore, CertEnumCertificatesInStore, CertFindCertificateInStore, CertFreeCertificateContext, CryptStringToBinaryA, PFXImportCertStore, CryptDecodeObjectEx, CertAddCertificateContextToStore, CertFindExtension, CertGetNameStringA, CryptQueryObject, CertCreateCertificateChainEngine, CertFreeCertificateChainEngine, CertGetCertificateChain, CertFreeCertificateChain, CertCloseStore |
WS2_32.dll | send, WSACloseEvent, WSACreateEvent, WSAEnumNetworkEvents, WSAEventSelect, WSAResetEvent, WSAWaitForMultipleEvents, closesocket, WSASetLastError, WSAGetLastError, ntohs, WSAStartup, WSACleanup, setsockopt, WSAIoctl, htons, getsockopt, socket, __WSAFDIsSet, select, accept, bind, connect, getsockname, htonl, listen, recv, getaddrinfo, freeaddrinfo, recvfrom, sendto, getpeername, ioctlsocket, gethostname |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
Russian | Russia | |
English | United States |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 27, 2024 18:43:41.447643042 CET | 49712 | 443 | 192.168.2.6 | 104.26.1.5 |
Oct 27, 2024 18:43:41.447743893 CET | 443 | 49712 | 104.26.1.5 | 192.168.2.6 |
Oct 27, 2024 18:43:41.447946072 CET | 49712 | 443 | 192.168.2.6 | 104.26.1.5 |
Oct 27, 2024 18:43:41.458570957 CET | 49712 | 443 | 192.168.2.6 | 104.26.1.5 |
Oct 27, 2024 18:43:41.458609104 CET | 443 | 49712 | 104.26.1.5 | 192.168.2.6 |
Oct 27, 2024 18:43:42.089050055 CET | 443 | 49712 | 104.26.1.5 | 192.168.2.6 |
Oct 27, 2024 18:43:42.089118958 CET | 49712 | 443 | 192.168.2.6 | 104.26.1.5 |
Oct 27, 2024 18:43:42.098361015 CET | 49712 | 443 | 192.168.2.6 | 104.26.1.5 |
Oct 27, 2024 18:43:42.098408937 CET | 443 | 49712 | 104.26.1.5 | 192.168.2.6 |
Oct 27, 2024 18:43:42.098529100 CET | 49712 | 443 | 192.168.2.6 | 104.26.1.5 |
Oct 27, 2024 18:43:42.098546028 CET | 443 | 49712 | 104.26.1.5 | 192.168.2.6 |
Oct 27, 2024 18:43:42.098632097 CET | 49712 | 443 | 192.168.2.6 | 104.26.1.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 27, 2024 18:43:41.436001062 CET | 52226 | 53 | 192.168.2.6 | 1.1.1.1 |
Oct 27, 2024 18:43:41.444333076 CET | 53 | 52226 | 1.1.1.1 | 192.168.2.6 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Oct 27, 2024 18:43:41.436001062 CET | 192.168.2.6 | 1.1.1.1 | 0xa2f4 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Oct 27, 2024 18:43:41.444333076 CET | 1.1.1.1 | 192.168.2.6 | 0xa2f4 | No error (0) | 104.26.1.5 | A (IP address) | IN (0x0001) | false | ||
Oct 27, 2024 18:43:41.444333076 CET | 1.1.1.1 | 192.168.2.6 | 0xa2f4 | No error (0) | 172.67.72.57 | A (IP address) | IN (0x0001) | false | ||
Oct 27, 2024 18:43:41.444333076 CET | 1.1.1.1 | 192.168.2.6 | 0xa2f4 | No error (0) | 104.26.0.5 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 13:43:37 |
Start date: | 27/10/2024 |
Path: | C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe20000 |
File size: | 1'236'992 bytes |
MD5 hash: | 992A36EDCCD6FB4DB6AAD9C43329CB04 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 13:43:37 |
Start date: | 27/10/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff66e660000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 13:43:39 |
Start date: | 27/10/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1c0000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 13:43:39 |
Start date: | 27/10/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1c0000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 13:43:39 |
Start date: | 27/10/2024 |
Path: | C:\Windows\SysWOW64\certutil.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x7f0000 |
File size: | 1'277'440 bytes |
MD5 hash: | 0DDA4F16AE041578B4E250AE12E06EB1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 6 |
Start time: | 13:43:39 |
Start date: | 27/10/2024 |
Path: | C:\Windows\SysWOW64\find.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x120000 |
File size: | 14'848 bytes |
MD5 hash: | 15B158BC998EEF74CFDD27C44978AEA0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 7 |
Start time: | 13:43:39 |
Start date: | 27/10/2024 |
Path: | C:\Windows\SysWOW64\find.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x120000 |
File size: | 14'848 bytes |
MD5 hash: | 15B158BC998EEF74CFDD27C44978AEA0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 8 |
Start time: | 13:43:40 |
Start date: | 27/10/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1c0000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 9 |
Start time: | 13:43:40 |
Start date: | 27/10/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1c0000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 10 |
Start time: | 13:43:40 |
Start date: | 27/10/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff66e660000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 13 |
Start time: | 13:43:41 |
Start date: | 27/10/2024 |
Path: | C:\Windows\SysWOW64\timeout.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x690000 |
File size: | 25'088 bytes |
MD5 hash: | 976566BEEFCCA4A159ECBDB2D4B1A3E3 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 14 |
Start time: | 13:43:41 |
Start date: | 27/10/2024 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x8e0000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Execution Graph
Execution Coverage: | 6.4% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 22.8% |
Total number of Nodes: | 2000 |
Total number of Limit Nodes: | 46 |
Graph
Function 00E321F0 Relevance: 74.0, APIs: 37, Strings: 4, Instructions: 2272windowsleepthreadCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E4EDB0 Relevance: 62.1, APIs: 27, Strings: 8, Instructions: 881memorylibrarythreadCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E51670 Relevance: 21.3, APIs: 11, Strings: 1, Instructions: 264libraryloaderinjectionCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E6C150 Relevance: 18.5, APIs: 12, Instructions: 493COMMON
Control-flow Graph
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E3A610 Relevance: 9.2, APIs: 3, Strings: 2, Instructions: 428stringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E50910 Relevance: 9.0, APIs: 4, Strings: 1, Instructions: 271librarymemoryloaderCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E50E60 Relevance: 4.6, APIs: 3, Instructions: 108memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E7F5C0 Relevance: 49.2, APIs: 19, Strings: 9, Instructions: 188libraryloadernetworkCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E51000 Relevance: 33.6, APIs: 12, Strings: 7, Instructions: 304registryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E7F410 Relevance: 28.1, APIs: 12, Strings: 4, Instructions: 148librarystringloaderCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E52010 Relevance: 23.2, APIs: 12, Strings: 1, Instructions: 423stringCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E6F230 Relevance: 17.6, APIs: 9, Strings: 1, Instructions: 69synchronizationCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E3AC20 Relevance: 10.7, APIs: 4, Strings: 2, Instructions: 159processCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E22A50 Relevance: 9.2, APIs: 6, Instructions: 155COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E76DB0 Relevance: 9.1, APIs: 6, Instructions: 139COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EB0B60 Relevance: 7.0, APIs: 1, Strings: 3, Instructions: 35libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E501F0 Relevance: 6.3, APIs: 4, Instructions: 267COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E21390 Relevance: 6.1, APIs: 4, Instructions: 116COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E63330 Relevance: 6.1, APIs: 4, Instructions: 69sleepCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E51E40 Relevance: 1.6, APIs: 1, Instructions: 112COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E634D0 Relevance: 1.5, APIs: 1, Instructions: 34COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E63470 Relevance: 1.5, APIs: 1, Instructions: 31COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E50D10 Relevance: 1.3, APIs: 1, Instructions: 81COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E50F9A Relevance: 1.3, APIs: 1, Instructions: 24COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E3B822 Relevance: 67.5, APIs: 19, Strings: 19, Instructions: 1004COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2E840 Relevance: 56.4, APIs: 28, Strings: 4, Instructions: 410injectionmemorysleepCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E53930 Relevance: 31.7, APIs: 13, Strings: 4, Instructions: 1934memoryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E52950 Relevance: 26.8, APIs: 14, Strings: 1, Instructions: 555serviceCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E53360 Relevance: 26.4, APIs: 11, Strings: 4, Instructions: 163injectionthreadmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E24800 Relevance: 20.4, APIs: 6, Strings: 4, Instructions: 2880registryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E63BEB Relevance: 16.7, APIs: 11, Instructions: 200fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E8CB30 Relevance: 10.2, Strings: 8, Instructions: 222COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E64AD5 Relevance: 9.1, APIs: 6, Instructions: 70COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E53710 Relevance: 6.2, APIs: 4, Instructions: 170stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E63EAF Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 32windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E23920 Relevance: 4.2, Strings: 3, Instructions: 456COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E514A0 Relevance: 3.9, Strings: 3, Instructions: 121COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E53550 Relevance: 3.2, APIs: 2, Instructions: 160threadCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E578C0 Relevance: 2.6, Strings: 2, Instructions: 122COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E57040 Relevance: 2.6, Strings: 2, Instructions: 121COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E58600 Relevance: 2.6, Strings: 2, Instructions: 121COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E4ACB0 Relevance: 1.8, APIs: 1, Instructions: 294COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E4B960 Relevance: 1.8, APIs: 1, Instructions: 285COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E4B320 Relevance: 1.8, APIs: 1, Instructions: 282COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E4B640 Relevance: 1.8, APIs: 1, Instructions: 282COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E4B000 Relevance: 1.8, APIs: 1, Instructions: 280COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E4BC90 Relevance: 1.8, APIs: 1, Instructions: 279COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E64763 Relevance: 1.7, APIs: 1, Instructions: 242COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E4D020 Relevance: 1.6, APIs: 1, Instructions: 396COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E8F990 Relevance: 1.6, APIs: 1, Instructions: 61COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E51A10 Relevance: 1.5, APIs: 1, Instructions: 258COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E5571B Relevance: 1.5, Strings: 1, Instructions: 244COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E46020 Relevance: 1.5, APIs: 1, Instructions: 219COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E444A0 Relevance: 1.4, Strings: 1, Instructions: 192COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E58D80 Relevance: 1.4, Strings: 1, Instructions: 177COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E57480 Relevance: 1.4, Strings: 1, Instructions: 122COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E57D00 Relevance: 1.4, Strings: 1, Instructions: 122COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E56390 Relevance: 1.4, Strings: 1, Instructions: 121COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E55E00 Relevance: 1.4, Strings: 1, Instructions: 121COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E82710 Relevance: .6, Instructions: 611COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E4A7B0 Relevance: .3, Instructions: 260COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E49D80 Relevance: .2, Instructions: 195COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E4D7C0 Relevance: .2, Instructions: 170COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E565C7 Relevance: .1, Instructions: 61COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E4EDA0 Relevance: .0, Instructions: 2COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E765E0 Relevance: 28.9, APIs: 23, Instructions: 180COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E77600 Relevance: 22.6, APIs: 18, Instructions: 96COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EB0760 Relevance: 21.2, APIs: 9, Strings: 3, Instructions: 172libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E8E700 Relevance: 17.7, APIs: 9, Strings: 1, Instructions: 166fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E74180 Relevance: 15.0, APIs: 12, Instructions: 41COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E8E620 Relevance: 13.6, APIs: 9, Instructions: 89sleepCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EA6140 Relevance: 12.5, APIs: 10, Instructions: 25COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2E320 Relevance: 12.2, APIs: 8, Instructions: 158COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E4E760 Relevance: 12.2, APIs: 8, Instructions: 153COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E4E510 Relevance: 12.1, APIs: 8, Instructions: 121COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E21E50 Relevance: 10.7, APIs: 7, Instructions: 212COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E43590 Relevance: 10.7, APIs: 7, Instructions: 182COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E3DE00 Relevance: 10.6, APIs: 7, Instructions: 113COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E6EB90 Relevance: 10.6, APIs: 7, Instructions: 90COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E79EE0 Relevance: 10.0, APIs: 8, Instructions: 32COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E44960 Relevance: 9.4, APIs: 6, Instructions: 445COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E3D5EC Relevance: 9.2, APIs: 6, Instructions: 243COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E3EFA0 Relevance: 9.2, APIs: 6, Instructions: 192COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E42820 Relevance: 9.2, APIs: 6, Instructions: 152COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2DFC0 Relevance: 9.1, APIs: 6, Instructions: 137COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E49620 Relevance: 9.1, APIs: 6, Instructions: 134COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E3F840 Relevance: 9.1, APIs: 6, Instructions: 129COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E4EAB0 Relevance: 9.1, APIs: 6, Instructions: 107COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E410E0 Relevance: 9.1, APIs: 6, Instructions: 101COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E226E0 Relevance: 9.1, APIs: 6, Instructions: 88COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E41390 Relevance: 9.1, APIs: 6, Instructions: 87COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E318E0 Relevance: 7.7, APIs: 5, Instructions: 235COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2D9C0 Relevance: 7.7, APIs: 6, Instructions: 166COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E42430 Relevance: 7.7, APIs: 5, Instructions: 158COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E4A220 Relevance: 7.6, APIs: 5, Instructions: 138COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E4C050 Relevance: 7.6, APIs: 5, Instructions: 135COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E464B0 Relevance: 7.6, APIs: 5, Instructions: 128COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E3DC10 Relevance: 7.6, APIs: 5, Instructions: 87COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E929C0 Relevance: 7.6, APIs: 5, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E6F7B0 Relevance: 7.5, APIs: 5, Instructions: 31COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E6DD40 Relevance: 7.5, APIs: 6, Instructions: 26COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E30900 Relevance: 6.4, APIs: 5, Instructions: 172COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E3F280 Relevance: 6.3, APIs: 4, Instructions: 292COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EB1E50 Relevance: 6.3, APIs: 5, Instructions: 40COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E7F850 Relevance: 6.3, APIs: 5, Instructions: 33COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E315B0 Relevance: 6.3, APIs: 4, Instructions: 279COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E92EE0 Relevance: 6.2, APIs: 2, Strings: 2, Instructions: 166stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E426A0 Relevance: 6.1, APIs: 4, Instructions: 145COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E4A370 Relevance: 6.1, APIs: 4, Instructions: 139COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E228E0 Relevance: 6.1, APIs: 4, Instructions: 135COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E41260 Relevance: 6.1, APIs: 4, Instructions: 114COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E41A30 Relevance: 6.1, APIs: 4, Instructions: 114COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E421C0 Relevance: 6.1, APIs: 4, Instructions: 113COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E227E0 Relevance: 6.1, APIs: 4, Instructions: 102COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E43770 Relevance: 6.1, APIs: 4, Instructions: 94COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E2E120 Relevance: 6.1, APIs: 4, Instructions: 83COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E4E690 Relevance: 6.1, APIs: 4, Instructions: 83COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E6ED50 Relevance: 6.1, APIs: 4, Instructions: 53COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E63AEF Relevance: 6.0, APIs: 4, Instructions: 44COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E76B30 Relevance: 5.0, APIs: 4, Instructions: 49COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EB2300 Relevance: 5.0, APIs: 4, Instructions: 39COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E712B0 Relevance: 5.0, APIs: 4, Instructions: 33COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E80860 Relevance: 5.0, APIs: 4, Instructions: 31COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EB06B0 Relevance: 5.0, APIs: 4, Instructions: 27COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|