Windows
Analysis Report
SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe
Overview
General Information
Detection
Score: | 76 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe (PID: 636 cmdline:
"C:\Users\ user\Deskt op\Securit eInfo.com. Trojan.Gen ericKD.744 44428.1733 6.1019.exe " MD5: 992A36EDCCD6FB4DB6AAD9C43329CB04) - conhost.exe (PID: 2616 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 4260 cmdline:
C:\Windows \system32\ cmd.exe /c cls MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 4920 cmdline:
C:\Windows \system32\ cmd.exe /c certutil -hashfile "C:\Users\ user\Deskt op\Securit eInfo.com. Trojan.Gen ericKD.744 44428.1733 6.1019.exe " MD5 | fi nd /i /v " md5" | fin d /i /v "c ertutil" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - certutil.exe (PID: 4936 cmdline:
certutil - hashfile " C:\Users\u ser\Deskto p\Securite Info.com.T rojan.Gene ricKD.7444 4428.17336 .1019.exe" MD5 MD5: 0DDA4F16AE041578B4E250AE12E06EB1) - find.exe (PID: 5040 cmdline:
find /i /v "md5" MD5: 15B158BC998EEF74CFDD27C44978AEA0) - find.exe (PID: 7124 cmdline:
find /i /v "certutil " MD5: 15B158BC998EEF74CFDD27C44978AEA0) - cmd.exe (PID: 6724 cmdline:
C:\Windows \system32\ cmd.exe /c start cmd /C "color b && titl e Error && echo SSL connect er ror && tim eout /t 5" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 5792 cmdline:
cmd /C "co lor b && t itle Error && echo S SL connect error && timeout /t 5" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 3660 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - timeout.exe (PID: 3160 cmdline:
timeout /t 5 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3) - WerFault.exe (PID: 4648 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 6 36 -s 1128 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Code function: | 0_2_0010F990 |
Source: | Code function: | 0_2_000F4240 | |
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_000E3BEB |
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_000CEDB0 |
Source: | Code function: | 0_2_000EC150 | |
Source: | Code function: | 0_2_000B21F0 | |
Source: | Code function: | 0_2_0010D550 | |
Source: | Code function: | 0_2_000CEDB0 | |
Source: | Code function: | 0_2_000BA610 | |
Source: | Code function: | 0_2_000D1670 | |
Source: | Code function: | 0_2_000A4800 | |
Source: | Code function: | 0_2_000CB000 | |
Source: | Code function: | 0_2_000BB822 | |
Source: | Code function: | 0_2_000CD020 | |
Source: | Code function: | 0_2_000C6020 | |
Source: | Code function: | 0_2_000A8060 | |
Source: | Code function: | 0_2_000B58B0 | |
Source: | Code function: | 0_2_000B68D0 | |
Source: | Code function: | 0_2_000A3920 | |
Source: | Code function: | 0_2_000D3930 | |
Source: | Code function: | 0_2_000D2950 | |
Source: | Code function: | 0_2_000CB960 | |
Source: | Code function: | 0_2_000C81D6 | |
Source: | Code function: | 0_2_00112A40 | |
Source: | Code function: | 0_2_000C6AD0 | |
Source: | Code function: | 0_2_0010CB30 | |
Source: | Code function: | 0_2_000CB320 | |
Source: | Code function: | 0_2_000A4350 | |
Source: | Code function: | 0_2_000CBC90 | |
Source: | Code function: | 0_2_000C44A0 | |
Source: | Code function: | 0_2_000CACB0 | |
Source: | Code function: | 0_2_000C0D00 | |
Source: | Code function: | 0_2_000C9D80 | |
Source: | Code function: | 0_2_000CB640 | |
Source: | Code function: | 0_2_000B1ED0 | |
Source: | Code function: | 0_2_00102710 | |
Source: | Code function: | 0_2_000E4763 | |
Source: | Code function: | 0_2_000B8FA0 | |
Source: | Code function: | 0_2_000C7FA0 | |
Source: | Code function: | 0_2_000CA7B0 | |
Source: | Code function: | 0_2_000CD7C0 |
Source: | Process created: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | String found in binary or memory: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Window detected: |
Source: | Static file information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_000D0910 |
Source: | Code function: | 0_2_000D60C9 | |
Source: | Code function: | 0_2_000B7CE5 |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | Code function: | 0_2_000D14A0 |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Decision node followed by non-executed suspicious API: | graph_0-20736 |
Source: | API coverage: |
Source: | Thread sleep count: | Jump to behavior |
Source: | Last function: | ||
Source: | Last function: | ||
Source: | Last function: |
Source: | Code function: | 0_2_000E3BEB |
Source: | Code function: | 0_2_000D0E60 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Anti Debugging |
---|
Source: | Code function: | 0_2_000CEDB0 |
Source: | Thread information set: | Jump to behavior |
Source: | Open window title or class name: | ||
Source: | Open window title or class name: |
Source: | Code function: | 0_2_000E4AD5 |
Source: | Code function: | 0_2_000D0E60 |
Source: | Code function: | 0_2_000D0910 |
Source: | Code function: | 0_2_000CEDB0 | |
Source: | Code function: | 0_2_000CEDB0 | |
Source: | Code function: | 0_2_000D7040 | |
Source: | Code function: | 0_2_000D78C0 | |
Source: | Code function: | 0_2_000D9920 | |
Source: | Code function: | 0_2_000D9920 | |
Source: | Code function: | 0_2_000D9920 | |
Source: | Code function: | 0_2_000D9920 | |
Source: | Code function: | 0_2_000D3930 | |
Source: | Code function: | 0_2_000D3930 | |
Source: | Code function: | 0_2_000D3930 | |
Source: | Code function: | 0_2_000D3930 | |
Source: | Code function: | 0_2_000D3930 | |
Source: | Code function: | 0_2_000D3930 | |
Source: | Code function: | 0_2_000D3930 | |
Source: | Code function: | 0_2_000D3930 | |
Source: | Code function: | 0_2_000D3930 | |
Source: | Code function: | 0_2_000D3930 | |
Source: | Code function: | 0_2_000D3930 | |
Source: | Code function: | 0_2_000D3930 | |
Source: | Code function: | 0_2_000D3930 | |
Source: | Code function: | 0_2_000D3930 | |
Source: | Code function: | 0_2_000D3930 | |
Source: | Code function: | 0_2_000D2950 | |
Source: | Code function: | 0_2_000D2950 | |
Source: | Code function: | 0_2_000D1A10 | |
Source: | Code function: | 0_2_000D1A10 | |
Source: | Code function: | 0_2_000D3360 | |
Source: | Code function: | 0_2_000D6390 | |
Source: | Code function: | 0_2_000D7480 | |
Source: | Code function: | 0_2_000D7D00 | |
Source: | Code function: | 0_2_000D3550 | |
Source: | Code function: | 0_2_000D3550 | |
Source: | Code function: | 0_2_000D8D80 | |
Source: | Code function: | 0_2_000D8D80 | |
Source: | Code function: | 0_2_000CEDA0 | |
Source: | Code function: | 0_2_000D05B0 | |
Source: | Code function: | 0_2_000D65C7 | |
Source: | Code function: | 0_2_000D5E00 | |
Source: | Code function: | 0_2_000D8600 | |
Source: | Code function: | 0_2_000DAE20 | |
Source: | Code function: | 0_2_000DAE20 | |
Source: | Code function: | 0_2_000DAE20 | |
Source: | Code function: | 0_2_000DAE20 | |
Source: | Code function: | 0_2_000D3710 | |
Source: | Code function: | 0_2_000D3710 | |
Source: | Code function: | 0_2_000D5724 | |
Source: | Code function: | 0_2_000D5724 | |
Source: | Code function: | 0_2_000DA770 | |
Source: | Code function: | 0_2_000DA770 | |
Source: | Code function: | 0_2_000DA770 | |
Source: | Code function: | 0_2_000DA770 | |
Source: | Code function: | 0_2_000D67C1 | |
Source: | Code function: | 0_2_000D67C1 |
Source: | Code function: | 0_2_000CEDB0 |
Source: | Code function: | 0_2_000E4AD5 | |
Source: | Code function: | 0_2_000E430F |
Source: | Memory protected: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Code function: | 0_2_000D3360 |
Source: | Code function: | 0_2_000AE840 |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_000E3EAF |
Source: | Code function: | 0_2_000E4CE5 |
Source: | Code function: | 0_2_000A8060 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 2 Command and Scripting Interpreter | 1 DLL Side-Loading | 211 Process Injection | 32 Virtualization/Sandbox Evasion | OS Credential Dumping | 1 System Time Discovery | Remote Services | 11 Archive Collected Data | 22 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 Native API | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 11 Disable or Modify Tools | LSASS Memory | 331 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 211 Process Injection | Security Account Manager | 32 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Obfuscated Files or Information | NTDS | 1 Account Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 1 System Owner/User Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | Steganography | Cached Domain Credentials | 1 File and Directory Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | Compile After Delivery | DCSync | 13 System Information Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
42% | ReversingLabs | Win32.Trojan.Generic |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
keyauth.win | 104.26.0.5 | true | false | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | unknown | |||
false | unknown | |||
false |
| unknown | ||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.26.0.5 | keyauth.win | United States | 13335 | CLOUDFLARENETUS | false |
IP |
---|
127.0.0.1 |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1543365 |
Start date and time: | 2024-10-27 18:48:59 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 31s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Run name: | Run with higher sleep bypass |
Number of analysed new started processes analysed: | 20 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe |
Detection: | MAL |
Classification: | mal76.evad.winEXE@20/6@1/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 20.190.159.68, 20.190.159.2, 20.190.159.23, 20.190.159.64, 40.126.31.73, 20.190.159.4, 20.190.159.71, 20.190.159.75, 52.182.143.212
- Excluded domains from analysis (whitelisted): prdv4a.aadg.msidentity.com, slscr.update.microsoft.com, otelrules.azureedge.net, www.tm.v4.a.prd.aadg.akadns.net, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, blobcollector.events.data.trafficmanager.net, umwatson.events.data.microsoft.com, www.tm.lg.prod.aadmsa.trafficmanager.net
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- VT rate limit hit for: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.26.0.5 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
keyauth.win | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Blank Grabber | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Babuk, Djvu | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
bd0bf25947d4a37404f0424edf4db9ad | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Fredy Stealer | Browse |
| ||
Get hash | malicious | Fredy Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Fredy Stealer | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_9ffa6a94f5231de6490ea3ae72ad68e315c65_678091f3_076ba889-fe90-4a2b-a0ee-af4f1e04b704\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.9215035327555512 |
Encrypted: | false |
SSDEEP: | 96:IzFPYosKhGQ7LVSFQXIDcQ8c6DFcE6cw3++HbHg/opAnQzOqg7TKENdUzX0iXwjI:ilYo70ytgTjb5zuiFnZ24IO8rM |
MD5: | E810F17595B7FA8DBC09A3CF3C4747BB |
SHA1: | BB3654576D44CDB1A0400CB23D4341BD5841302F |
SHA-256: | BD41BE434ABD64EC1E54CE1326789F104C2E6197D6A979A0E2E896CDE3F95F19 |
SHA-512: | 28B08A6801B463B61DCF414189822E2377F75426188E36390F0CB1452E1B0B9BE8926AE52A46CA7EBE4912A0E8E649A70799DAC06687BD7280371FD6C4AC6CDD |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 99536 |
Entropy (8bit): | 1.768554767921618 |
Encrypted: | false |
SSDEEP: | 384:dl1TQdBpssoTcG+TBXoj29gaiPh2qCd+FGof8srWA2:5GBpssoIG+ej2HQhnhFGoksrH2 |
MD5: | 6A849AE1DB7F2A9646F5B7861969E867 |
SHA1: | 0391573EAB3AED725264B06B8595441B0A02ECCD |
SHA-256: | E1B0AF57AD6164FB63B3DE190A2737CC6E175D364DAD429307A03485CDBCF428 |
SHA-512: | F610EDA8096600F3EA87083EFAEC032B3A9E6679DFE33D122D255B5EB7AAD73CB3EE48B413B716DB7673DFB28EC005EF972F8E0A9D0424EDE1B717E3EC5DE5C5 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8544 |
Entropy (8bit): | 3.693408994187796 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJFJ6zX6YSXSUApgmffNtTpDt89bV8sfnAnm:R6lXJL6zX6YySUApgmfvcVPfd |
MD5: | 92CD3CC09CFFB68EEC98514C49E7C283 |
SHA1: | D43B5AA2BBCE0859452EF00044915EB21D1EE2BD |
SHA-256: | 162980654ACC96296D24F624C3668DE6741FF528A10B4031DEC9FD3C658F0DBD |
SHA-512: | 84A61A3C3800DDF447877AB4F891C16B18CB676D6B1592533453312CB6EB7B47DACBD4BB32CF8F67FD9577331B77DE33BA4CC8AA38A8A056A7AF10069AC1D71E |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4981 |
Entropy (8bit): | 4.5726407063925585 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsFJg77aI98PWpW8VY0a5Ym8M4J3eA+lFuwc+q8v+A+XHKcQIcQd0h0DT:uIjffI7ye7VOoJtRKUKku6Ldd |
MD5: | 173F57928115A579D0A869836636CFE4 |
SHA1: | DBFFBF5356AA4020395B72EF97B8EFE5865AC5D2 |
SHA-256: | 21AF911ED3D7C56D5006061B7C57EBB8FA3B0428A7F17CFCFE595A0AE553626A |
SHA-512: | E43731146B1A6804BFB5AC28C83BB4EC7BFBDEE9FEAD3CC9B09D3781A138F7661B3B355F3E8458CBDF386A5539C38E82B0BA34229E5B09D8272001157C9C50BE |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.3694013153930635 |
Encrypted: | false |
SSDEEP: | 6144:EFVfpi6ceLP/9skLmb0ayWWSPtaJG8nAge35OlMMhA2AX4WABlguNliL:EV1QyWWI/glMM6kF7/q |
MD5: | EDEE239CC8EF143565471B4A81C8E242 |
SHA1: | 28D1096E5FF33EFBD5741C95B51325C9D6F87118 |
SHA-256: | 91FE5BA3B4984E2B91D6B6AFB39DD2DC2CEB4F9795C729E48792E415209E06DF |
SHA-512: | 07CB1AAD5BE7F59DA650E48BF8CE2A3FDA3197E0A759196CCCA72677F9FCF17002EBFE825A2D67C657D14C16E4DC0B5A51A7549CBF15EFC75D7FE2086E3A1B1F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 53 |
Entropy (8bit): | 4.689815737418786 |
Encrypted: | false |
SSDEEP: | 3:YoRTxCx+q49Vg9ND:5FCxj4M9B |
MD5: | 4E5EAA5EDD9A5CCC5BA3FBC366C81217 |
SHA1: | 0F4809FE5246C5705941577EAA1BA429A71021F0 |
SHA-256: | E97F3155C7BB79912EA1DCC882518274A59FEDC7D14E07C60B068B79A79C0E1C |
SHA-512: | F5A9B69AD75B0F52B1C857C116D2A8E003F449C51A9D91AEA078B19A25565D186B4B4DE4BD913C5E4BD68BF75CB68B68BBF7F4727F9F8D54DBA8F8541C27C754 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 6.657566619637477 |
TrID: |
|
File name: | SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe |
File size: | 1'236'992 bytes |
MD5: | 992a36edccd6fb4db6aad9c43329cb04 |
SHA1: | 5276588b19a213b10a8c25c6c08e11d4621124d5 |
SHA256: | b157d6d7519daf5b2ca2b514d6291d3df5c1971884ff429e48045bd7161ca369 |
SHA512: | 666b2936016fca2444d547698e231a938277a1e1c3096ebc8529ecdd6cf8e37a5031d1d59439918ac0eecc83b129f26eaf6bfb9f1f326f0168531d870260c676 |
SSDEEP: | 24576:gu+4D/tSdf1y6zQOC7eZXjPBKZR2xim/KDRzstB:gQtSdflppb0ZRCimiDRYf |
TLSH: | 8045AE32B681D072E1C601B1606AABF65A7D69345B6188C7B7C06E7DCA203D16F36F1F |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........I6..'e..'e..'e...e..'e..#d..'e.E&d..'e.G.e..'e.G$d..'e.G#d..'e.G"d..'e.G&d..'e..&e<.'e.@.d..'e.@.e..'e...e..'e.@%d..'eRich..' |
Icon Hash: | 0fcd1333134d1f0e |
Entrypoint: | 0x444756 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x671A2FDC [Thu Oct 24 11:30:36 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 2e393828d40d2fd8900ef58c7c62e06f |
Instruction |
---|
call 00007FC9D47B704Ch |
jmp 00007FC9D47B68E9h |
retn 0000h |
push ebp |
mov ebp, esp |
and dword ptr [00506BF8h], 00000000h |
sub esp, 28h |
or dword ptr [004B9090h], 01h |
push 0000000Ah |
call dword ptr [004A10F8h] |
test eax, eax |
je 00007FC9D47B6D7Bh |
push ebx |
push esi |
push edi |
xor eax, eax |
lea edi, dword ptr [ebp-28h] |
xor ecx, ecx |
push ebx |
cpuid |
mov esi, ebx |
pop ebx |
nop |
mov dword ptr [edi], eax |
mov dword ptr [edi+04h], esi |
mov dword ptr [edi+08h], ecx |
xor ecx, ecx |
mov dword ptr [edi+0Ch], edx |
mov eax, dword ptr [ebp-28h] |
mov edi, dword ptr [ebp-24h] |
mov dword ptr [ebp-04h], eax |
xor edi, 756E6547h |
mov eax, dword ptr [ebp-1Ch] |
xor eax, 49656E69h |
mov dword ptr [ebp-18h], eax |
mov eax, dword ptr [ebp-20h] |
xor eax, 6C65746Eh |
mov dword ptr [ebp-14h], eax |
xor eax, eax |
inc eax |
push ebx |
cpuid |
mov esi, ebx |
pop ebx |
nop |
lea ebx, dword ptr [ebp-28h] |
mov dword ptr [ebx], eax |
mov eax, dword ptr [ebp-18h] |
or eax, dword ptr [ebp-14h] |
or eax, edi |
mov dword ptr [ebx+04h], esi |
mov dword ptr [ebx+08h], ecx |
mov dword ptr [ebx+0Ch], edx |
jne 00007FC9D47B6AABh |
mov eax, dword ptr [ebp-28h] |
and eax, 0FFF3FF0h |
cmp eax, 000106C0h |
je 00007FC9D47B6A95h |
cmp eax, 00020660h |
je 00007FC9D47B6A8Eh |
cmp eax, 00020670h |
je 00007FC9D47B6A87h |
cmp eax, 00030650h |
je 00007FC9D47B6A80h |
cmp eax, 00030660h |
je 00007FC9D47B6A79h |
cmp eax, 00030670h |
jne 00007FC9D47B6A79h |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xb5ed8 | 0x208 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x108000 | 0x22c20 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x12b000 | 0x62c4 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0xb2180 | 0x38 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0xb21c0 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0xb20c0 | 0x40 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0xa1000 | 0x6b0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x9f1fc | 0x9f200 | 2786dd19dc325e6ecd53d85610130304 | False | 0.4886678858994501 | data | 6.577665712001494 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0xa1000 | 0x17c40 | 0x17e00 | bd7fa78785f58d1f0c9c77ec2c095d5f | False | 0.3919748036649215 | data | 5.635575515861512 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xb9000 | 0x4e1e8 | 0x4da00 | f8cd3a11456809df1b2f086b21b4eb35 | False | 0.5262649708132046 | data | 6.469389322836828 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x108000 | 0x22c20 | 0x22e00 | 0f61c35135555a22656b45fbc670384e | False | 0.49721382168458783 | data | 6.06443588461351 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x12b000 | 0x62c4 | 0x6400 | 5468de62e230485b93ad67b10cc7c1d0 | False | 0.7203515625 | data | 6.682852540103243 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x1081f0 | 0xa33d | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | Russian | Russia | 0.9980138313910359 |
RT_ICON | 0x112530 | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 2835 x 2835 px/m | Russian | Russia | 0.2503844788832367 |
RT_ICON | 0x122d58 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 2835 x 2835 px/m | Russian | Russia | 0.3471894189891356 |
RT_ICON | 0x126f80 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2835 x 2835 px/m | Russian | Russia | 0.3970954356846473 |
RT_ICON | 0x129528 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2835 x 2835 px/m | Russian | Russia | 0.48827392120075047 |
RT_ICON | 0x12a5d0 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/m | Russian | Russia | 0.649822695035461 |
RT_GROUP_ICON | 0x12aa38 | 0x5a | data | Russian | Russia | 0.7666666666666667 |
RT_MANIFEST | 0x12aa98 | 0x188 | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.5892857142857143 |
DLL | Import |
---|---|
MSVCP140.dll | _Thrd_detach, _Query_perf_counter, _Cnd_do_broadcast_at_thread_exit, ?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?_Throw_Cpp_error@std@@YAXH@Z, _Query_perf_frequency, ?_Getcat@?$ctype@D@std@@SAIPAPBVfacet@locale@2@PBV42@@Z, ??7ios_base@std@@QBE_NXZ, ?getloc@ios_base@std@@QBE?AVlocale@2@XZ, ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UAE@XZ, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAVios_base@1@AAV21@@Z@Z, ?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEXABVlocale@2@@Z, ?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ, ?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEPAV12@PAD_J@Z, ?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ, ?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ, ?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ, ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ, ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z, ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ, ?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z, ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QAE_N_N@Z, ?_Syserror_map@std@@YAPBDH@Z, ?id@?$ctype@D@std@@2V0locale@2@A, ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z, ?_Fiopen@std@@YAPAU_iobuf@@PBDHH@Z, ?_Xbad_function_call@std@@YAXXZ, ?_Winerror_map@std@@YAHH@Z, ?_Xbad_alloc@std@@YAXXZ, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDD@Z, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ, ?uncaught_exception@std@@YA_NXZ, ??Bid@locale@std@@QAEIXZ, ?always_noconv@codecvt_base@std@@QBE_NXZ, ?good@ios_base@std@@QBE_NXZ, ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UAE@XZ, ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UAE@XZ, ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ, ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPBD_J@Z, ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPAD_J@Z, ??1_Lockit@std@@QAE@XZ, ?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ, ?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JXZ, ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE@XZ, ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IAE@XZ, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z, ?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IBEPADXZ, ?out@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PBD1AAPBDPAD3AAPAD@Z, ?in@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PBD1AAPBDPAD3AAPAD@Z, ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXXZ, ?setg@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXPAD00@Z, ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QBE?AVlocale@2@XZ, ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ, ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PAD1AAPAD@Z, ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SAIPAPBVfacet@locale@2@PBV42@@Z, ?_Xlength_error@std@@YAXPBD@Z, ?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A, ?_Xout_of_range@std@@YAXPBD@Z, ?_Getgloballocale@locale@std@@CAPAV_Locimp@12@XZ, ??0_Lockit@std@@QAE@H@Z, ?ignore@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@_JH@Z |
ADVAPI32.dll | CryptAcquireContextA, CryptReleaseContext, CryptGetHashParam, CryptCreateHash, CryptHashData, CryptDestroyHash, CryptDestroyKey, CryptImportKey, CryptEncrypt, RegCloseKey, RegQueryValueExA, RegCreateKeyExA, RegSetValueExA, RegOpenKeyExA, LookupPrivilegeValueW, AdjustTokenPrivileges, CloseServiceHandle, OpenSCManagerW, ControlService, RegOpenKeyExW, RegGetValueW, OpenServiceW, QueryServiceStatusEx, CopySid, IsValidSid, ConvertSidToStringSidW, GetLengthSid, ConvertSidToStringSidA, GetUserNameA, OpenProcessToken, GetTokenInformation |
KERNEL32.dll | TerminateProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, SleepConditionVariableSRW, GetFileSizeEx, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, GetLocaleInfoEx, FormatMessageA, MultiByteToWideChar, GetFileInformationByHandleEx, EnterCriticalSection, AreFileApisANSI, IsProcessorFeaturePresent, GetFileAttributesExW, FindFirstFileW, FindClose, CreateFileW, CreateDirectoryW, GetCurrentDirectoryW, OpenThread, SetThreadContext, CreateProcessA, IsDebuggerPresent, LeaveCriticalSection, SetEvent, WaitForSingleObject, CreateEventA, QueryPerformanceFrequency, GetSystemDirectoryA, FreeLibrary, MoveFileExA, WaitForSingleObjectEx, GetEnvironmentVariableA, GetFileType, ReadFile, PeekNamedPipe, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, SetLastError, FormatMessageW, GetTickCount, WaitForMultipleObjects, SleepEx, WakeAllConditionVariable, VirtualProtect, GetModuleFileNameW, GetModuleHandleA, LoadLibraryW, GetProcAddress, GetModuleHandleW, GetCurrentProcess, CloseHandle, LocalFree, WriteProcessMemory, Sleep, LoadLibraryA, VirtualProtectEx, VirtualAllocEx, ReadProcessMemory, CreateRemoteThread, VirtualFreeEx, GetExitCodeProcess, GetModuleFileNameA, HeapFree, InitializeCriticalSectionEx, HeapSize, GetLastError, HeapReAlloc, CreateThread, HeapAlloc, HeapDestroy, DeleteCriticalSection, GetProcessHeap, WideCharToMultiByte, VirtualFree, GetStdHandle, GetShortPathNameW, SetConsoleMode, VirtualAlloc, Thread32Next, GetEnvironmentVariableW, GetWriteWatch, Thread32First, SuspendThread, HeapWalk, ResumeThread, OpenProcess, GetConsoleMode, GetTickCount64, Process32NextW, CreateFileA, GetCurrentThread, Process32FirstW, RaiseException, GetSystemInfo, GetThreadContext, VerSetConditionMask, GetCurrentProcessId, VerifyVersionInfoW, OutputDebugStringW |
USER32.dll | MessageBoxA, FindWindowW |
SHELL32.dll | ShellExecuteW, ShellExecuteA |
SHLWAPI.dll | PathFindFileNameW |
RPCRT4.dll | RpcStringFreeA, UuidToStringA, UuidCreate |
USERENV.dll | UnloadUserProfile |
VCRUNTIME140.dll | memmove, memcpy, wcsstr, memchr, strstr, __CxxFrameHandler3, __std_exception_destroy, strchr, _except_handler4_common, memset, strrchr, __std_terminate, __current_exception_context, __std_exception_copy, __current_exception, _CxxThrowException |
api-ms-win-crt-stdio-l1-1-0.dll | __p__commode, fflush, fclose, fputs, _close, __stdio_common_vsscanf, fgetc, __stdio_common_vswprintf, __stdio_common_vfprintf, _fileno, feof, __acrt_iob_func, _lseeki64, fseek, fwrite, ftell, fgetpos, _popen, setvbuf, ungetc, __stdio_common_vsprintf, _write, _read, fgets, fputc, _pclose, fsetpos, fread, _fseeki64, _open, _set_fmode, _get_stream_buffer_pointers, fopen |
api-ms-win-crt-filesystem-l1-1-0.dll | _unlink, rename, _access, _lock_file, _unlock_file, _stat64, _fstat64 |
api-ms-win-crt-string-l1-1-0.dll | strncpy, _strdup, strspn, strcspn, strncmp, strpbrk, strcat_s |
api-ms-win-crt-runtime-l1-1-0.dll | _beginthreadex, terminate, _resetstkoflw, _errno, system, __sys_nerr, __sys_errlist, exit, _controlfp_s, _invalid_parameter_noinfo, _invalid_parameter_noinfo_noreturn, _register_thread_local_exe_atexit_callback, _c_exit, __p___wargv, __p___argc, _exit, _initterm_e, _initterm, _get_initial_wide_environment, _initialize_wide_environment, _configure_wide_argv, abort, _set_app_type, _seh_filter_exe, _cexit, _crt_atexit, _register_onexit_function, _initialize_onexit_table |
api-ms-win-crt-heap-l1-1-0.dll | calloc, _recalloc, _callnewh, realloc, free, malloc, _set_new_mode |
api-ms-win-crt-math-l1-1-0.dll | __setusermatherr, _dsign, _fdopen, _dclass |
api-ms-win-crt-convert-l1-1-0.dll | strtoul, atoi, strtol, strtoull, strtoll, strtod, wcstombs |
api-ms-win-crt-time-l1-1-0.dll | _time64, strftime, _localtime64, _localtime64_s, _gmtime64 |
api-ms-win-crt-locale-l1-1-0.dll | _configthreadlocale, localeconv, ___lc_codepage_func |
api-ms-win-crt-environment-l1-1-0.dll | getenv |
api-ms-win-crt-utility-l1-1-0.dll | qsort, srand, rand |
bcrypt.dll | BCryptGenRandom |
Normaliz.dll | IdnToAscii, IdnToUnicode |
WLDAP32.dll | |
CRYPT32.dll | CertOpenStore, CertEnumCertificatesInStore, CertFindCertificateInStore, CertFreeCertificateContext, CryptStringToBinaryA, PFXImportCertStore, CryptDecodeObjectEx, CertAddCertificateContextToStore, CertFindExtension, CertGetNameStringA, CryptQueryObject, CertCreateCertificateChainEngine, CertFreeCertificateChainEngine, CertGetCertificateChain, CertFreeCertificateChain, CertCloseStore |
WS2_32.dll | send, WSACloseEvent, WSACreateEvent, WSAEnumNetworkEvents, WSAEventSelect, WSAResetEvent, WSAWaitForMultipleEvents, closesocket, WSASetLastError, WSAGetLastError, ntohs, WSAStartup, WSACleanup, setsockopt, WSAIoctl, htons, getsockopt, socket, __WSAFDIsSet, select, accept, bind, connect, getsockname, htonl, listen, recv, getaddrinfo, freeaddrinfo, recvfrom, sendto, getpeername, ioctlsocket, gethostname |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
Russian | Russia | |
English | United States |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 27, 2024 18:50:02.311584949 CET | 49706 | 443 | 192.168.2.8 | 104.26.0.5 |
Oct 27, 2024 18:50:02.311625004 CET | 443 | 49706 | 104.26.0.5 | 192.168.2.8 |
Oct 27, 2024 18:50:02.311696053 CET | 49706 | 443 | 192.168.2.8 | 104.26.0.5 |
Oct 27, 2024 18:50:02.324100971 CET | 49706 | 443 | 192.168.2.8 | 104.26.0.5 |
Oct 27, 2024 18:50:02.324117899 CET | 443 | 49706 | 104.26.0.5 | 192.168.2.8 |
Oct 27, 2024 18:50:02.939691067 CET | 443 | 49706 | 104.26.0.5 | 192.168.2.8 |
Oct 27, 2024 18:50:02.939763069 CET | 49706 | 443 | 192.168.2.8 | 104.26.0.5 |
Oct 27, 2024 18:50:04.378292084 CET | 49706 | 443 | 192.168.2.8 | 104.26.0.5 |
Oct 27, 2024 18:50:04.378319979 CET | 443 | 49706 | 104.26.0.5 | 192.168.2.8 |
Oct 27, 2024 18:50:04.378451109 CET | 49706 | 443 | 192.168.2.8 | 104.26.0.5 |
Oct 27, 2024 18:50:04.378566027 CET | 443 | 49706 | 104.26.0.5 | 192.168.2.8 |
Oct 27, 2024 18:50:04.378617048 CET | 49706 | 443 | 192.168.2.8 | 104.26.0.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 27, 2024 18:50:02.300498962 CET | 50869 | 53 | 192.168.2.8 | 1.1.1.1 |
Oct 27, 2024 18:50:02.308490038 CET | 53 | 50869 | 1.1.1.1 | 192.168.2.8 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Oct 27, 2024 18:50:02.300498962 CET | 192.168.2.8 | 1.1.1.1 | 0x2c1f | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Oct 27, 2024 18:50:02.308490038 CET | 1.1.1.1 | 192.168.2.8 | 0x2c1f | No error (0) | 104.26.0.5 | A (IP address) | IN (0x0001) | false | ||
Oct 27, 2024 18:50:02.308490038 CET | 1.1.1.1 | 192.168.2.8 | 0x2c1f | No error (0) | 104.26.1.5 | A (IP address) | IN (0x0001) | false | ||
Oct 27, 2024 18:50:02.308490038 CET | 1.1.1.1 | 192.168.2.8 | 0x2c1f | No error (0) | 172.67.72.57 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 13:49:58 |
Start date: | 27/10/2024 |
Path: | C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xa0000 |
File size: | 1'236'992 bytes |
MD5 hash: | 992A36EDCCD6FB4DB6AAD9C43329CB04 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 13:49:58 |
Start date: | 27/10/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6ee680000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 13:50:01 |
Start date: | 27/10/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xa40000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 13:50:01 |
Start date: | 27/10/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xa40000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 13:50:01 |
Start date: | 27/10/2024 |
Path: | C:\Windows\SysWOW64\certutil.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x2d0000 |
File size: | 1'277'440 bytes |
MD5 hash: | 0DDA4F16AE041578B4E250AE12E06EB1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 6 |
Start time: | 13:50:01 |
Start date: | 27/10/2024 |
Path: | C:\Windows\SysWOW64\find.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x760000 |
File size: | 14'848 bytes |
MD5 hash: | 15B158BC998EEF74CFDD27C44978AEA0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 7 |
Start time: | 13:50:01 |
Start date: | 27/10/2024 |
Path: | C:\Windows\SysWOW64\find.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x760000 |
File size: | 14'848 bytes |
MD5 hash: | 15B158BC998EEF74CFDD27C44978AEA0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 8 |
Start time: | 13:50:03 |
Start date: | 27/10/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xa40000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 9 |
Start time: | 13:50:03 |
Start date: | 27/10/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xa40000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 10 |
Start time: | 13:50:03 |
Start date: | 27/10/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6ee680000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 13 |
Start time: | 13:50:04 |
Start date: | 27/10/2024 |
Path: | C:\Windows\SysWOW64\timeout.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xef0000 |
File size: | 25'088 bytes |
MD5 hash: | 976566BEEFCCA4A159ECBDB2D4B1A3E3 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 14 |
Start time: | 13:50:04 |
Start date: | 27/10/2024 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x270000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 6.3% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 29.6% |
Total number of Nodes: | 1171 |
Total number of Limit Nodes: | 51 |
Graph
Function 000B21F0 Relevance: 74.0, APIs: 37, Strings: 4, Instructions: 2272windowsleepthreadCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000CEDB0 Relevance: 62.1, APIs: 27, Strings: 8, Instructions: 881memorylibrarythreadCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D1670 Relevance: 21.3, APIs: 11, Strings: 1, Instructions: 264libraryloaderinjectionCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000EC150 Relevance: 18.5, APIs: 12, Instructions: 493COMMON
Control-flow Graph
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D0910 Relevance: 9.0, APIs: 4, Strings: 1, Instructions: 271librarymemoryloaderCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000BA610 Relevance: 7.4, APIs: 3, Strings: 1, Instructions: 428stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D0E60 Relevance: 4.6, APIs: 3, Instructions: 108memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000FF5C0 Relevance: 49.2, APIs: 19, Strings: 9, Instructions: 188libraryloadernetworkCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D1000 Relevance: 33.6, APIs: 12, Strings: 7, Instructions: 304registryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000FF410 Relevance: 28.1, APIs: 12, Strings: 4, Instructions: 148librarystringloaderCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D2010 Relevance: 23.2, APIs: 12, Strings: 1, Instructions: 423stringCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000EF230 Relevance: 17.6, APIs: 9, Strings: 1, Instructions: 69synchronizationCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000BAC20 Relevance: 10.7, APIs: 4, Strings: 2, Instructions: 159processCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000A2A50 Relevance: 9.2, APIs: 6, Instructions: 155COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000F6DB0 Relevance: 9.1, APIs: 6, Instructions: 139COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00130B60 Relevance: 7.0, APIs: 1, Strings: 3, Instructions: 35libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D01F0 Relevance: 6.3, APIs: 4, Instructions: 267COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000A1390 Relevance: 6.1, APIs: 4, Instructions: 116COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000E3330 Relevance: 6.1, APIs: 4, Instructions: 69sleepCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D1E40 Relevance: 1.6, APIs: 1, Instructions: 112COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000E34D0 Relevance: 1.5, APIs: 1, Instructions: 34COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000E3470 Relevance: 1.5, APIs: 1, Instructions: 31COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D0D10 Relevance: 1.3, APIs: 1, Instructions: 81COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D0F9A Relevance: 1.3, APIs: 1, Instructions: 24COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000BB822 Relevance: 67.5, APIs: 19, Strings: 19, Instructions: 1004COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000AE840 Relevance: 56.4, APIs: 28, Strings: 4, Instructions: 410injectionmemorysleepCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000F4240 Relevance: 52.9, APIs: 23, Strings: 7, Instructions: 389stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D3930 Relevance: 31.7, APIs: 13, Strings: 4, Instructions: 1934memoryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D2950 Relevance: 26.8, APIs: 14, Strings: 1, Instructions: 555serviceCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D3360 Relevance: 26.4, APIs: 11, Strings: 4, Instructions: 163injectionthreadmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000A4800 Relevance: 20.4, APIs: 6, Strings: 4, Instructions: 2880registryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000E3BEB Relevance: 16.7, APIs: 11, Instructions: 200fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0010CB30 Relevance: 10.2, Strings: 8, Instructions: 222COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000E4AD5 Relevance: 9.1, APIs: 6, Instructions: 70COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D3710 Relevance: 6.2, APIs: 4, Instructions: 170stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000E3EAF Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 32windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00112A40 Relevance: 5.2, APIs: 4, Instructions: 174COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000A3920 Relevance: 4.2, Strings: 3, Instructions: 456COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D14A0 Relevance: 3.9, Strings: 3, Instructions: 121COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D3550 Relevance: 3.2, APIs: 2, Instructions: 160threadCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D78C0 Relevance: 2.6, Strings: 2, Instructions: 122COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D7040 Relevance: 2.6, Strings: 2, Instructions: 121COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D8600 Relevance: 2.6, Strings: 2, Instructions: 121COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000CACB0 Relevance: 1.8, APIs: 1, Instructions: 294COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000CB960 Relevance: 1.8, APIs: 1, Instructions: 285COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000CB320 Relevance: 1.8, APIs: 1, Instructions: 282COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000CB640 Relevance: 1.8, APIs: 1, Instructions: 282COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000CB000 Relevance: 1.8, APIs: 1, Instructions: 280COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000CBC90 Relevance: 1.8, APIs: 1, Instructions: 279COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000E4763 Relevance: 1.7, APIs: 1, Instructions: 242COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000CD020 Relevance: 1.6, APIs: 1, Instructions: 396COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0010F990 Relevance: 1.6, APIs: 1, Instructions: 61COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D1A10 Relevance: 1.5, APIs: 1, Instructions: 258COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D5724 Relevance: 1.5, Strings: 1, Instructions: 239COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000C6020 Relevance: 1.5, APIs: 1, Instructions: 219COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000C44A0 Relevance: 1.4, Strings: 1, Instructions: 192COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D8D80 Relevance: 1.4, Strings: 1, Instructions: 177COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D7480 Relevance: 1.4, Strings: 1, Instructions: 122COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D7D00 Relevance: 1.4, Strings: 1, Instructions: 122COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D6390 Relevance: 1.4, Strings: 1, Instructions: 121COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D5E00 Relevance: 1.4, Strings: 1, Instructions: 121COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00102710 Relevance: .6, Instructions: 611COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000CA7B0 Relevance: .3, Instructions: 260COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000C9D80 Relevance: .2, Instructions: 195COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000CD7C0 Relevance: .2, Instructions: 170COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D65C7 Relevance: .1, Instructions: 61COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000CEDA0 Relevance: .0, Instructions: 2COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000F65E0 Relevance: 28.9, APIs: 23, Instructions: 180COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000F7600 Relevance: 22.6, APIs: 18, Instructions: 96COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00130760 Relevance: 21.2, APIs: 9, Strings: 3, Instructions: 172libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0010E700 Relevance: 17.7, APIs: 9, Strings: 1, Instructions: 166fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000F4180 Relevance: 15.0, APIs: 12, Instructions: 41COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0010E620 Relevance: 13.6, APIs: 9, Instructions: 89sleepCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00126140 Relevance: 12.5, APIs: 10, Instructions: 25COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000AE320 Relevance: 12.2, APIs: 8, Instructions: 158COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000CE760 Relevance: 12.2, APIs: 8, Instructions: 153COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000CE510 Relevance: 12.1, APIs: 8, Instructions: 121COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000C3590 Relevance: 10.7, APIs: 7, Instructions: 182COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000BDE00 Relevance: 10.6, APIs: 7, Instructions: 113COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000EEB90 Relevance: 10.6, APIs: 7, Instructions: 90COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000F9EE0 Relevance: 10.0, APIs: 8, Instructions: 32COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000C4960 Relevance: 9.4, APIs: 6, Instructions: 445COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000BD5EC Relevance: 9.2, APIs: 6, Instructions: 243COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000BEFA0 Relevance: 9.2, APIs: 6, Instructions: 192COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000C2820 Relevance: 9.2, APIs: 6, Instructions: 152COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000ADFC0 Relevance: 9.1, APIs: 6, Instructions: 137COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000C9620 Relevance: 9.1, APIs: 6, Instructions: 134COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000BF840 Relevance: 9.1, APIs: 6, Instructions: 129COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000CEAB0 Relevance: 9.1, APIs: 6, Instructions: 107COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000C10E0 Relevance: 9.1, APIs: 6, Instructions: 101COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000A26E0 Relevance: 9.1, APIs: 6, Instructions: 88COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000C1390 Relevance: 9.1, APIs: 6, Instructions: 87COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000B18E0 Relevance: 7.7, APIs: 5, Instructions: 235COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000AD9C0 Relevance: 7.7, APIs: 6, Instructions: 166COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000C2430 Relevance: 7.7, APIs: 5, Instructions: 158COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000CA220 Relevance: 7.6, APIs: 5, Instructions: 138COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000CC050 Relevance: 7.6, APIs: 5, Instructions: 135COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000C64B0 Relevance: 7.6, APIs: 5, Instructions: 128COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000BDC10 Relevance: 7.6, APIs: 5, Instructions: 87COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 001129C0 Relevance: 7.6, APIs: 5, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000EF7B0 Relevance: 7.5, APIs: 5, Instructions: 31COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000EDD40 Relevance: 7.5, APIs: 6, Instructions: 26COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000B0900 Relevance: 6.4, APIs: 5, Instructions: 172COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000BF280 Relevance: 6.3, APIs: 4, Instructions: 292COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00131E50 Relevance: 6.3, APIs: 5, Instructions: 40COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000FF850 Relevance: 6.3, APIs: 5, Instructions: 33COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000B15B0 Relevance: 6.3, APIs: 4, Instructions: 279COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00112EE0 Relevance: 6.2, APIs: 2, Strings: 2, Instructions: 166stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000C26A0 Relevance: 6.1, APIs: 4, Instructions: 145COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000CA370 Relevance: 6.1, APIs: 4, Instructions: 139COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000A28E0 Relevance: 6.1, APIs: 4, Instructions: 135COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000C1A30 Relevance: 6.1, APIs: 4, Instructions: 114COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000C1260 Relevance: 6.1, APIs: 4, Instructions: 114COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000C21C0 Relevance: 6.1, APIs: 4, Instructions: 113COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000A27E0 Relevance: 6.1, APIs: 4, Instructions: 102COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000C3770 Relevance: 6.1, APIs: 4, Instructions: 94COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000AE120 Relevance: 6.1, APIs: 4, Instructions: 83COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000CE690 Relevance: 6.1, APIs: 4, Instructions: 83COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000EED50 Relevance: 6.1, APIs: 4, Instructions: 53COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000E3AEF Relevance: 6.0, APIs: 4, Instructions: 44COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000F6B30 Relevance: 5.0, APIs: 4, Instructions: 49COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00132300 Relevance: 5.0, APIs: 4, Instructions: 39COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000F12B0 Relevance: 5.0, APIs: 4, Instructions: 33COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00100860 Relevance: 5.0, APIs: 4, Instructions: 31COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 001306B0 Relevance: 5.0, APIs: 4, Instructions: 27COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|