Windows
Analysis Report
EKSTRE_1022.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- EKSTRE_1022.exe (PID: 1896 cmdline:
"C:\Users\ user\Deskt op\EKSTRE_ 1022.exe" MD5: 3503285C5DCB5DDF134D7617366CF050) - pteropod.exe (PID: 5524 cmdline:
"C:\Users\ user\Deskt op\EKSTRE_ 1022.exe" MD5: 3503285C5DCB5DDF134D7617366CF050) - RegSvcs.exe (PID: 2748 cmdline:
"C:\Users\ user\Deskt op\EKSTRE_ 1022.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
- wscript.exe (PID: 6300 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\user\A ppData\Roa ming\Micro soft\Windo ws\Start M enu\Progra ms\Startup \pteropod. vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80) - pteropod.exe (PID: 320 cmdline:
"C:\Users\ user\AppDa ta\Local\a geless\pte ropod.exe" MD5: 3503285C5DCB5DDF134D7617366CF050) - RegSvcs.exe (PID: 736 cmdline:
"C:\Users\ user\AppDa ta\Local\a geless\pte ropod.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94) - WerFault.exe (PID: 1272 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 36 -s 12 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Agent Tesla, AgentTesla | A .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel. |
{"Exfil Mode": "SMTP", "Port": "587", "Host": "zqamcx.com", "Username": "sender@zqamcx.com", "Password": "Methodman991"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen |
| |
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
Click to see the 13 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen |
| |
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
Click to see the 10 entries |
System Summary |
---|
Source: | Author: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: |
Source: | Author: frack113: |
Source: | Author: Michael Haag: |
Data Obfuscation |
---|
Source: | Author: Joe Security: |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_002A6CA9 | |
Source: | Code function: | 0_2_002A60DD | |
Source: | Code function: | 0_2_002A63F9 | |
Source: | Code function: | 0_2_002AEB60 | |
Source: | Code function: | 0_2_002AF56F | |
Source: | Code function: | 0_2_002AF5FA | |
Source: | Code function: | 0_2_002B1B2F | |
Source: | Code function: | 0_2_002B1C8A | |
Source: | Code function: | 0_2_002B1F94 | |
Source: | Code function: | 2_2_00AB6CA9 | |
Source: | Code function: | 2_2_00AB60DD | |
Source: | Code function: | 2_2_00AB63F9 | |
Source: | Code function: | 2_2_00ABEB60 | |
Source: | Code function: | 2_2_00ABF5FA | |
Source: | Code function: | 2_2_00ABF56F | |
Source: | Code function: | 2_2_00AC1B2F | |
Source: | Code function: | 2_2_00AC1C8A | |
Source: | Code function: | 2_2_00AC1F94 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | TCP traffic: |
Source: | IP Address: |
Source: | TCP traffic: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | Code function: | 0_2_002B4EB5 |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Windows user hook set: | Jump to behavior |
Source: | Code function: | 0_2_002B6B0C |
Source: | Code function: | 0_2_002B6D07 | |
Source: | Code function: | 2_2_00AC6D07 |
Source: | Code function: | 0_2_002B6B0C |
Source: | Code function: | 0_2_002A2B37 |
Source: | Code function: | 0_2_002CF7FF | |
Source: | Code function: | 2_2_00ADF7FF |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_00263D19 | |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | memstr_a6a92aac-2 | |
Source: | String found in binary or memory: | memstr_2330edc1-9 | |
Source: | String found in binary or memory: | memstr_712420f4-1 | |
Source: | String found in binary or memory: | memstr_13915c03-7 | |
Source: | Code function: | 2_2_00A73D19 | |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | memstr_633a2f05-c | |
Source: | String found in binary or memory: | memstr_28499bdd-a | |
Source: | String found in binary or memory: | memstr_3f5ca10e-1 | |
Source: | String found in binary or memory: | memstr_3a26fbca-8 | |
Source: | String found in binary or memory: | memstr_6b161366-0 | |
Source: | String found in binary or memory: | memstr_58722d25-f | |
Source: | String found in binary or memory: | memstr_dae2da6e-0 | |
Source: | String found in binary or memory: | memstr_e655a4dc-6 |
Source: | COM Object queried: | Jump to behavior |
Source: | Process Stats: |
Source: | Code function: | 0_2_002A6606 |
Source: | Code function: | 0_2_0029ACC5 |
Source: | Code function: | 0_2_002A79D3 | |
Source: | Code function: | 2_2_00AB79D3 |
Source: | Code function: | 0_2_0028B043 | |
Source: | Code function: | 0_2_00273200 | |
Source: | Code function: | 0_2_00273B70 | |
Source: | Code function: | 0_2_0029410F | |
Source: | Code function: | 0_2_002802A4 | |
Source: | Code function: | 0_2_0026E3B0 | |
Source: | Code function: | 0_2_0029038E | |
Source: | Code function: | 0_2_0029467F | |
Source: | Code function: | 0_2_002806D9 | |
Source: | Code function: | 0_2_002CAACE | |
Source: | Code function: | 0_2_00294BEF | |
Source: | Code function: | 0_2_0028CCC1 | |
Source: | Code function: | 0_2_00266F07 | |
Source: | Code function: | 0_2_0026AF50 | |
Source: | Code function: | 0_2_0027B11F | |
Source: | Code function: | 0_2_002C31BC | |
Source: | Code function: | 0_2_0028D1B9 | |
Source: | Code function: | 0_2_0028123A | |
Source: | Code function: | 0_2_0029724D | |
Source: | Code function: | 0_2_002693F0 | |
Source: | Code function: | 0_2_002A13CA | |
Source: | Code function: | 0_2_0027F563 | |
Source: | Code function: | 0_2_002AB6CC | |
Source: | Code function: | 0_2_002696C0 | |
Source: | Code function: | 0_2_002677B0 | |
Source: | Code function: | 0_2_002CF7FF | |
Source: | Code function: | 0_2_002979C9 | |
Source: | Code function: | 0_2_0027FA57 | |
Source: | Code function: | 0_2_00269B60 | |
Source: | Code function: | 0_2_00267D19 | |
Source: | Code function: | 0_2_0027FE6F | |
Source: | Code function: | 0_2_00289ED0 | |
Source: | Code function: | 0_2_00267FA3 | |
Source: | Code function: | 0_2_01351148 | |
Source: | Code function: | 2_2_00A9B043 | |
Source: | Code function: | 2_2_00A83200 | |
Source: | Code function: | 2_2_00A83B70 | |
Source: | Code function: | 2_2_00AA410F | |
Source: | Code function: | 2_2_00A902A4 | |
Source: | Code function: | 2_2_00A7E3B0 | |
Source: | Code function: | 2_2_00AA038E | |
Source: | Code function: | 2_2_00A906D9 | |
Source: | Code function: | 2_2_00AA467F | |
Source: | Code function: | 2_2_00ADAACE | |
Source: | Code function: | 2_2_00AA4BEF | |
Source: | Code function: | 2_2_00A9CCC1 | |
Source: | Code function: | 2_2_00A76F07 | |
Source: | Code function: | 2_2_00A7AF50 | |
Source: | Code function: | 2_2_00A9D1B9 | |
Source: | Code function: | 2_2_00AD31BC | |
Source: | Code function: | 2_2_00A8B11F | |
Source: | Code function: | 2_2_00A9123A | |
Source: | Code function: | 2_2_00AA724D | |
Source: | Code function: | 2_2_00A793F0 | |
Source: | Code function: | 2_2_00AB13CA | |
Source: | Code function: | 2_2_00A8F563 | |
Source: | Code function: | 2_2_00ABB6CC | |
Source: | Code function: | 2_2_00A796C0 | |
Source: | Code function: | 2_2_00A777B0 | |
Source: | Code function: | 2_2_00ADF7FF | |
Source: | Code function: | 2_2_00AA79C9 | |
Source: | Code function: | 2_2_00A8FA57 | |
Source: | Code function: | 2_2_00A79B60 | |
Source: | Code function: | 2_2_00A77D19 | |
Source: | Code function: | 2_2_00A99ED0 | |
Source: | Code function: | 2_2_00A8FE6F | |
Source: | Code function: | 2_2_00A77FA3 | |
Source: | Code function: | 2_2_01A544F0 | |
Source: | Code function: | 3_2_013641B8 | |
Source: | Code function: | 3_2_01369B40 | |
Source: | Code function: | 3_2_01364A88 | |
Source: | Code function: | 3_2_0136CDC0 | |
Source: | Code function: | 3_2_01363E70 | |
Source: | Code function: | 3_2_0136F4B9 | |
Source: | Code function: | 5_2_0132D2B8 |
Source: | Process created: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Classification label: |
Source: | Code function: | 0_2_002ACE7A |
Source: | Code function: | 0_2_0029AB84 | |
Source: | Code function: | 0_2_0029B134 | |
Source: | Code function: | 2_2_00AAAB84 | |
Source: | Code function: | 2_2_00AAB134 |
Source: | Code function: | 0_2_002AE1FD |
Source: | Code function: | 0_2_002A6532 |
Source: | Code function: | 0_2_002BC18C |
Source: | Code function: | 0_2_0026406B |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Process created: |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window detected: |
Source: | Key opened: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_0027E01E |
Source: | Code function: | 0_2_00286B18 | |
Source: | Code function: | 2_2_00A96B18 | |
Source: | Code function: | 2_2_01A54898 | |
Source: | Code function: | 5_2_0132D660 |
Source: | File created: | Jump to dropped file |
Boot Survival |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_002C8111 | |
Source: | Code function: | 0_2_0027EB42 | |
Source: | Code function: | 2_2_00AD8111 | |
Source: | Code function: | 2_2_00A8EB42 |
Source: | Code function: | 0_2_0028123A |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: |
Source: | Thread delayed: | Jump to behavior |
Source: | Window found: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Evaded block: | graph_0-93466 | ||
Source: | Evaded block: |
Source: | Evasive API call chain: | |||
Source: | Evasive API call chain: | graph_0-94404 |
Source: | API coverage: | ||
Source: | API coverage: |
Source: | WMI Queries: |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Code function: | 0_2_002A6CA9 | |
Source: | Code function: | 0_2_002A60DD | |
Source: | Code function: | 0_2_002A63F9 | |
Source: | Code function: | 0_2_002AEB60 | |
Source: | Code function: | 0_2_002AF56F | |
Source: | Code function: | 0_2_002AF5FA | |
Source: | Code function: | 0_2_002B1B2F | |
Source: | Code function: | 0_2_002B1C8A | |
Source: | Code function: | 0_2_002B1F94 | |
Source: | Code function: | 2_2_00AB6CA9 | |
Source: | Code function: | 2_2_00AB60DD | |
Source: | Code function: | 2_2_00AB63F9 | |
Source: | Code function: | 2_2_00ABEB60 | |
Source: | Code function: | 2_2_00ABF5FA | |
Source: | Code function: | 2_2_00ABF56F | |
Source: | Code function: | 2_2_00AC1B2F | |
Source: | Code function: | 2_2_00AC1C8A | |
Source: | Code function: | 2_2_00AC1F94 |
Source: | Code function: | 0_2_0027DDC0 |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | API call chain: | graph_0-93098 | ||
Source: | API call chain: | graph_0-93576 | ||
Source: | API call chain: |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 0_2_002B6AAF |
Source: | Code function: | 0_2_00263D19 |
Source: | Code function: | 0_2_00293920 |
Source: | Code function: | 0_2_0027E01E |
Source: | Code function: | 0_2_01351038 | |
Source: | Code function: | 0_2_0134F9A8 | |
Source: | Code function: | 0_2_01350FD8 | |
Source: | Code function: | 2_2_01A54380 | |
Source: | Code function: | 2_2_01A543E0 | |
Source: | Code function: | 2_2_01A52D50 | |
Source: | Code function: | 5_2_0132D1A8 | |
Source: | Code function: | 5_2_0132BB18 | |
Source: | Code function: | 5_2_0132D148 |
Source: | Code function: | 0_2_0029A66C |
Source: | Code function: | 0_2_002881AC | |
Source: | Code function: | 0_2_00288189 | |
Source: | Code function: | 2_2_00A981AC | |
Source: | Code function: | 2_2_00A98189 |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Section unmapped: | Jump to behavior |
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Code function: | 0_2_0029B106 |
Source: | Code function: | 0_2_00263D19 |
Source: | Code function: | 0_2_002A411C |
Source: | Code function: | 0_2_002A74BB |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_0029A66C |
Source: | Code function: | 0_2_002A71FA |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: | 0_2_002865C4 |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_002B091D |
Source: | Code function: | 0_2_002DB340 |
Source: | Code function: | 0_2_00291E8E |
Source: | Code function: | 0_2_0027DDC0 |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Key opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Code function: | 0_2_002B8C4F | |
Source: | Code function: | 0_2_002B923B | |
Source: | Code function: | 2_2_00AC8C4F | |
Source: | Code function: | 2_2_00AC923B |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 111 Scripting | 2 Valid Accounts | 121 Windows Management Instrumentation | 111 Scripting | 1 Exploitation for Privilege Escalation | 11 Disable or Modify Tools | 2 OS Credential Dumping | 2 System Time Discovery | Remote Services | 11 Archive Collected Data | 1 Ingress Tool Transfer | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 3 Native API | 1 DLL Side-Loading | 1 DLL Side-Loading | 11 Deobfuscate/Decode Files or Information | 221 Input Capture | 1 Account Discovery | Remote Desktop Protocol | 2 Data from Local System | 1 Encrypted Channel | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 1 Shared Modules | 2 Valid Accounts | 2 Valid Accounts | 2 Obfuscated Files or Information | 1 Credentials in Registry | 3 File and Directory Discovery | SMB/Windows Admin Shares | 1 Email Collection | 1 Non-Standard Port | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | 2 Registry Run Keys / Startup Folder | 21 Access Token Manipulation | 1 DLL Side-Loading | NTDS | 138 System Information Discovery | Distributed Component Object Model | 221 Input Capture | 1 Non-Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | 312 Process Injection | 1 Masquerading | LSA Secrets | 351 Security Software Discovery | SSH | 3 Clipboard Data | 11 Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | 2 Registry Run Keys / Startup Folder | 2 Valid Accounts | Cached Domain Credentials | 131 Virtualization/Sandbox Evasion | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 131 Virtualization/Sandbox Evasion | DCSync | 2 Process Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 21 Access Token Manipulation | Proc Filesystem | 11 Application Window Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
Network Topology | Malvertising | Exploit Public-Facing Application | Command and Scripting Interpreter | At | At | 312 Process Injection | /etc/passwd and /etc/shadow | 1 System Owner/User Discovery | Direct Cloud VM Connections | Data Staged | Web Protocols | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Internal Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
34% | ReversingLabs | Win32.Trojan.AutoitInject | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Joe Sandbox ML | |||
34% | ReversingLabs | Win32.Trojan.AutoitInject |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
zqamcx.com | 78.110.166.82 | true | false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
78.110.166.82 | zqamcx.com | United Kingdom | 42831 | UKSERVERS-ASUKDedicatedServersHostingandCo-Location | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1559971 |
Start date and time: | 2024-11-21 08:56:06 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 9m 56s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 13 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | EKSTRE_1022.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.expl.evad.winEXE@11/10@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 52.168.117.173
- Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, login.live.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target RegSvcs.exe, PID 2748 because it is empty
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size exceeded maximum capacity and may have missing disassembly code.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
- VT rate limit hit for: EKSTRE_1022.exe
Time | Type | Description |
---|---|---|
02:57:01 | API Interceptor | |
02:57:51 | API Interceptor | |
08:57:02 | Autostart |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
78.110.166.82 | Get hash | malicious | CobaltStrike | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
zqamcx.com | Get hash | malicious | AgentTesla | Browse |
| |
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
UKSERVERS-ASUKDedicatedServersHostingandCo-Location | Get hash | malicious | AgentTesla | Browse |
| |
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_bad_module_info_dcd3242e9fa4189184df4216daa4e4c7cdf1959_85207d7d_fd9f1425-13b6-4093-b395-f2ed7ed28e50\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.5813874072684719 |
Encrypted: | false |
SSDEEP: | 96:LhFG+uTWrYZsQhMov7JYqQXIDcQ4c6fcE+cw3tZAX/d5FMT2SlPkpXmTAcf/VXTZ:Fs+uTWrYZk0WbkQzuiFKZ24IO8bq |
MD5: | 5E263E4DA37725078155632A6ED14C23 |
SHA1: | 3991C6B433F813BD5945C3C8895B6A29F7DEADF6 |
SHA-256: | 1DEE7DBA817312E73946E89362CF7285620C9910D3DBC080B4517E9D8F65C6FC |
SHA-512: | F87DB2B5C8CFF9518F0FA35D538790670D91EC4B76EBA7F06D3355B8819C5EE40AF498E0902E44981D2148559D6A14160FB267E76BD3B45D6108A57F01895131 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8214 |
Entropy (8bit): | 3.6750295840821057 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJ2a6S6YrQ6dgmfU8px/89b68sfdY+m:R6lXJr6S6Y86dgmfUT6PfG |
MD5: | 81B1E72242215D33C64CA768B3D4B0EA |
SHA1: | B93246105B32AD7E445CD9E1E7CE3F20B84C57A1 |
SHA-256: | 4E9400F34E0B56356E7F97BE9FF0B5BBEC176CD3E2314E7A72ABCF67E8245C9F |
SHA-512: | DA4D9F990D387553A592672E06E95D1E06679D9F13D14E7F023170DC33C30172739F031D7D068DE261039C11D6462381143351EB989BCFE74C364C37A78C6830 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4572 |
Entropy (8bit): | 4.436339029500459 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zscJg77aI94jWpW8VYTPYm8M4JTHFv2+q87AdUm30wd:uIjfaI7mS7VaSJ8Om30wd |
MD5: | 1D7275ADE8C2AEBD7F5D079568057575 |
SHA1: | C759710DEF1A339F6A7B90F27F5212976D4A145D |
SHA-256: | 8EC96B17AE7364B180E8102D0852A60DD6FCE9CE174CF87D6459BEDE649A67B0 |
SHA-512: | 5C2EC5703D03446EB05560DC9C5A6F8E47864191F0DC693BFB05C8AE0C2C6AFD16A1AC2BEE9DBFDD8D1B81F52A267800A03B817DAFEBE74FC6FD162CEF4ADC89 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4736 |
Entropy (8bit): | 3.2401038615027127 |
Encrypted: | false |
SSDEEP: | 96:pwpIiYkXkkXfkuguW50Qm0QO0QgIm0QXE0Qu0QZEDguXH0xszeuzSzbxGQI5BmlD:pFle+u9BnoeyOkN0D |
MD5: | 31DD840A61323B122D369F741FC12101 |
SHA1: | 23D6A276FAE29FD4FE9F6A591E2E16FA7A832118 |
SHA-256: | 6A9D5C078715985BBAA5169D17074BA9F553074CBFACD54E2081BDA42513A261 |
SHA-512: | 1333A5C9C61C66B1E9775840FDC6F4C30342F85591360CF62890A9CE768F0D055F59765AB0E227ABE25C249EF1194E4B74A9F5A4684570A7192FAB6B0D28E09D |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\EKSTRE_1022.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 145342 |
Entropy (8bit): | 7.888217487709383 |
Encrypted: | false |
SSDEEP: | 3072:gtiNpEE5lw62Qw6cCvi9bv/PGrDt3c8irSsg/EzrI4ibxiR:ret62Qwd9bn6xyrS5NjxG |
MD5: | 4DBD38C07486D1CB9D5ACA1679952827 |
SHA1: | 2DFEFDAD441A53254C57856DF0BBA932C8C81311 |
SHA-256: | 901CCD905EF1DF04220B8DA90F676CE1D55D26330202AA95F272BFBF1D33C7AC |
SHA-512: | D6093659E59F4415D94E4395561A48102749FA078F44DC4B94C8CAB8315A24F16E2A2C0EF6DDFD47FBCED148CA097A2ACF9DF04033325B3446F8F78940F2A857 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\AppData\Local\ageless\pteropod.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 145342 |
Entropy (8bit): | 7.888217487709383 |
Encrypted: | false |
SSDEEP: | 3072:gtiNpEE5lw62Qw6cCvi9bv/PGrDt3c8irSsg/EzrI4ibxiR:ret62Qwd9bn6xyrS5NjxG |
MD5: | 4DBD38C07486D1CB9D5ACA1679952827 |
SHA1: | 2DFEFDAD441A53254C57856DF0BBA932C8C81311 |
SHA-256: | 901CCD905EF1DF04220B8DA90F676CE1D55D26330202AA95F272BFBF1D33C7AC |
SHA-512: | D6093659E59F4415D94E4395561A48102749FA078F44DC4B94C8CAB8315A24F16E2A2C0EF6DDFD47FBCED148CA097A2ACF9DF04033325B3446F8F78940F2A857 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\AppData\Local\ageless\pteropod.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 145342 |
Entropy (8bit): | 7.888217487709383 |
Encrypted: | false |
SSDEEP: | 3072:gtiNpEE5lw62Qw6cCvi9bv/PGrDt3c8irSsg/EzrI4ibxiR:ret62Qwd9bn6xyrS5NjxG |
MD5: | 4DBD38C07486D1CB9D5ACA1679952827 |
SHA1: | 2DFEFDAD441A53254C57856DF0BBA932C8C81311 |
SHA-256: | 901CCD905EF1DF04220B8DA90F676CE1D55D26330202AA95F272BFBF1D33C7AC |
SHA-512: | D6093659E59F4415D94E4395561A48102749FA078F44DC4B94C8CAB8315A24F16E2A2C0EF6DDFD47FBCED148CA097A2ACF9DF04033325B3446F8F78940F2A857 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\EKSTRE_1022.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 247808 |
Entropy (8bit): | 6.515738976337021 |
Encrypted: | false |
SSDEEP: | 6144:KebiXJyuGxVrAOzRraC5BYQ8H29Pe6rn0TyFUr91rxsyOZADKPzgZpKO:KebiXJyuGxdAOzpvj8HMPe670TrhlqqZ |
MD5: | 3DDDDCEB96C78C92ED9D6B4869652A73 |
SHA1: | E34FDFC444F1D16742D08B96A0DD29951E5C2392 |
SHA-256: | 4E5599DF8F1C0A60887C9DF6A97C6B2BE8A0F7EE30CA89D6E899EDE38DB3BD73 |
SHA-512: | 89063CB1EEB167BD1D3C57B92CD88AD09C63B837CF8D7A0F450C818F86E7A2F9EEAC3C207A307DA3341B30E742431DCEA67463439A78D2A37550D9C7D6CF5A01 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\EKSTRE_1022.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1255936 |
Entropy (8bit): | 6.637056239878405 |
Encrypted: | false |
SSDEEP: | 24576:Qtb20pkaCqT5TBWgNQ7akJjJuEnxoGYgzF6A:ZVg5tQ7akJjTnth5 |
MD5: | 3503285C5DCB5DDF134D7617366CF050 |
SHA1: | 277773B0E3C13989A52CA37963F7E342FA1A0BE8 |
SHA-256: | 077DC59CC8A2B17C1C2F17F0620368FE3B252C881CDB600AEE54662D2699351C |
SHA-512: | DBC962EF078124D349AE90030462F601F6BE5410EDB2413DAE1A158DEC8793CA1454A000551CCDF8CF5D6839EBF91042579F16D3638FADE66FCB05B9D9432F46 |
Malicious: | true |
Antivirus: |
|
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pteropod.vbs
Download File
Process: | C:\Users\user\AppData\Local\ageless\pteropod.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 274 |
Entropy (8bit): | 3.390012493452078 |
Encrypted: | false |
SSDEEP: | 6:DMM8lfm3OOQdUfclo5ZsUEZ+lX1ElCLlw6E7nriIM8lfQVn:DsO+vNlzQ1Eli9EDmA2n |
MD5: | 9C916B8682DD3F696E3023287C6BF207 |
SHA1: | 8942A1637FD67C094401C6E34EACA9C3E414ABCD |
SHA-256: | F5B5DEE05F9833B2467CA536387560078B4DD1542297C79B764D5A33B95F6085 |
SHA-512: | 875A7723867D9834A0D965698C3FC2D8C72EE2B7D16A7990D0C67EAC0EAE50E4346E212C5A53537D6D2EAC2880B18D1987E37F947D8445793B386C7019A549BB |
Malicious: | true |
Preview: |
File type: | |
Entropy (8bit): | 6.637056239878405 |
TrID: |
|
File name: | EKSTRE_1022.exe |
File size: | 1'255'936 bytes |
MD5: | 3503285c5dcb5ddf134d7617366cf050 |
SHA1: | 277773b0e3c13989a52ca37963f7e342fa1a0be8 |
SHA256: | 077dc59cc8a2b17c1c2f17f0620368fe3b252c881cdb600aee54662d2699351c |
SHA512: | dbc962ef078124d349ae90030462f601f6be5410edb2413dae1a158dec8793ca1454a000551ccdf8cf5d6839ebf91042579f16d3638fade66fcb05b9d9432f46 |
SSDEEP: | 24576:Qtb20pkaCqT5TBWgNQ7akJjJuEnxoGYgzF6A:ZVg5tQ7akJjTnth5 |
TLSH: | D445BF1363DD83A5D77212737A3677556E7B7C2946B0B85B2F98383DEA30122121EA33 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d..............'.a.....H.k.....H.h.....H.i......}%......}5...............~.......k.......o.......1.......j.....Rich........... |
Icon Hash: | 98e2a3b29b9ba181 |
Entrypoint: | 0x425f74 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x673EA132 [Thu Nov 21 02:55:46 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 1 |
File Version Major: | 5 |
File Version Minor: | 1 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 1 |
Import Hash: | 3d95adbf13bbe79dc24dccb401c12091 |
Instruction |
---|
call 00007FCCC08DC88Fh |
jmp 00007FCCC08CF8A4h |
int3 |
int3 |
push edi |
push esi |
mov esi, dword ptr [esp+10h] |
mov ecx, dword ptr [esp+14h] |
mov edi, dword ptr [esp+0Ch] |
mov eax, ecx |
mov edx, ecx |
add eax, esi |
cmp edi, esi |
jbe 00007FCCC08CFA2Ah |
cmp edi, eax |
jc 00007FCCC08CFD8Eh |
bt dword ptr [004C0158h], 01h |
jnc 00007FCCC08CFA29h |
rep movsb |
jmp 00007FCCC08CFD3Ch |
cmp ecx, 00000080h |
jc 00007FCCC08CFBF4h |
mov eax, edi |
xor eax, esi |
test eax, 0000000Fh |
jne 00007FCCC08CFA30h |
bt dword ptr [004BA370h], 01h |
jc 00007FCCC08CFF00h |
bt dword ptr [004C0158h], 00000000h |
jnc 00007FCCC08CFBCDh |
test edi, 00000003h |
jne 00007FCCC08CFBDEh |
test esi, 00000003h |
jne 00007FCCC08CFBBDh |
bt edi, 02h |
jnc 00007FCCC08CFA2Fh |
mov eax, dword ptr [esi] |
sub ecx, 04h |
lea esi, dword ptr [esi+04h] |
mov dword ptr [edi], eax |
lea edi, dword ptr [edi+04h] |
bt edi, 03h |
jnc 00007FCCC08CFA33h |
movq xmm1, qword ptr [esi] |
sub ecx, 08h |
lea esi, dword ptr [esi+08h] |
movq qword ptr [edi], xmm1 |
lea edi, dword ptr [edi+08h] |
test esi, 00000007h |
je 00007FCCC08CFA85h |
bt esi, 03h |
jnc 00007FCCC08CFAD8h |
movdqa xmm1, dqword ptr [esi+00h] |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xb7004 | 0x17c | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xc4000 | 0x69980 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x12e000 | 0x6c4c | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x8d8d0 | 0x1c | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0xb2730 | 0x40 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x8d000 | 0x860 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x8b54f | 0x8b600 | f437a6545e938612764dbb0a314376fc | False | 0.5699499019058296 | data | 6.680413749210956 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x8d000 | 0x2cc42 | 0x2ce00 | 827ffd24759e8e420890ecf164be989e | False | 0.330464397632312 | data | 5.770192333189168 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xba000 | 0x9d54 | 0x6200 | e0a519f8e3a35fae0d9c2cfd5a4bacfc | False | 0.16402264030612246 | data | 2.002691099965349 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0xc4000 | 0x69980 | 0x69a00 | 3736ec2c68e523dc6bab028679e4252f | False | 0.5616424741124261 | data | 6.112357820361566 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x12e000 | 0xa474 | 0xa600 | 0bc98f8631ef0bde830a7f83bb06ff08 | False | 0.5017884036144579 | data | 5.245426654116355 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0xc4458 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 192 | English | Great Britain | 0.7466216216216216 |
RT_ICON | 0xc4580 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colors | English | Great Britain | 0.3277027027027027 |
RT_ICON | 0xc46a8 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 192 | English | Great Britain | 0.3885135135135135 |
RT_ICON | 0xc47d0 | 0x33428 | Device independent bitmap graphic, 198 x 512 x 32, image size 202752, resolution 7874 x 7874 px/m | English | Great Britain | 0.13495903981710802 |
RT_MENU | 0xf7bf8 | 0x50 | data | English | Great Britain | 0.9 |
RT_STRING | 0xf7c48 | 0x594 | data | English | Great Britain | 0.3333333333333333 |
RT_STRING | 0xf81dc | 0x68a | data | English | Great Britain | 0.2747909199522103 |
RT_STRING | 0xf8868 | 0x490 | data | English | Great Britain | 0.3715753424657534 |
RT_STRING | 0xf8cf8 | 0x5fc | data | English | Great Britain | 0.3087467362924282 |
RT_STRING | 0xf92f4 | 0x65c | data | English | Great Britain | 0.34336609336609336 |
RT_STRING | 0xf9950 | 0x466 | data | English | Great Britain | 0.3605683836589698 |
RT_STRING | 0xf9db8 | 0x158 | Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0 | English | Great Britain | 0.502906976744186 |
RT_RCDATA | 0xf9f10 | 0x33593 | data | 1.0003375760140356 | ||
RT_GROUP_ICON | 0x12d4a4 | 0x14 | data | English | Great Britain | 1.25 |
RT_GROUP_ICON | 0x12d4b8 | 0x14 | data | English | Great Britain | 1.25 |
RT_GROUP_ICON | 0x12d4cc | 0x14 | data | English | Great Britain | 1.15 |
RT_GROUP_ICON | 0x12d4e0 | 0x14 | data | English | Great Britain | 1.25 |
RT_VERSION | 0x12d4f4 | 0xdc | data | English | Great Britain | 0.6181818181818182 |
RT_MANIFEST | 0x12d5d0 | 0x3b0 | ASCII text, with CRLF line terminators | English | Great Britain | 0.5116525423728814 |
DLL | Import |
---|---|
WSOCK32.dll | __WSAFDIsSet, recv, send, setsockopt, ntohs, recvfrom, select, WSAStartup, htons, accept, listen, bind, closesocket, connect, WSACleanup, ioctlsocket, sendto, WSAGetLastError, inet_addr, gethostbyname, gethostname, socket |
VERSION.dll | GetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW |
WINMM.dll | timeGetTime, waveOutSetVolume, mciSendStringW |
COMCTL32.dll | ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_Create, InitCommonControlsEx, ImageList_ReplaceIcon |
MPR.dll | WNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W |
WININET.dll | InternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetConnectW, InternetQueryDataAvailable |
PSAPI.DLL | GetProcessMemoryInfo |
IPHLPAPI.DLL | IcmpCreateFile, IcmpCloseHandle, IcmpSendEcho |
USERENV.dll | UnloadUserProfile, DestroyEnvironmentBlock, CreateEnvironmentBlock, LoadUserProfileW |
UxTheme.dll | IsThemeActive |
KERNEL32.dll | HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetCurrentThread, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, DeleteCriticalSection, WaitForSingleObject, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, CloseHandle, GetLastError, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, RaiseException, InitializeCriticalSectionAndSpinCount, InterlockedDecrement, InterlockedIncrement, CreateThread, DuplicateHandle, EnterCriticalSection, GetCurrentProcess, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, HeapSize, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, SetFilePointer, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, HeapReAlloc, WriteConsoleW, SetEndOfFile, DeleteFileW, SetEnvironmentVariableA |
USER32.dll | SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, DrawMenuBar, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, MonitorFromRect, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, CopyImage, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, UnregisterHotKey, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, DeleteMenu, PeekMessageW, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, CharLowerBuffW, GetWindowTextW |
GDI32.dll | SetPixel, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, GetDeviceCaps, CloseFigure, LineTo, AngleArc, CreateCompatibleBitmap, CreateCompatibleDC, MoveToEx, Ellipse, PolyDraw, BeginPath, SelectObject, StretchBlt, GetDIBits, DeleteDC, GetPixel, CreateDCW, GetStockObject, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, EndPath |
COMDLG32.dll | GetSaveFileNameW, GetOpenFileNameW |
ADVAPI32.dll | GetAclInformation, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, InitiateSystemShutdownExW, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, SetSecurityDescriptorDacl, AddAce, GetAce |
SHELL32.dll | DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish |
ole32.dll | CoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket |
OLEAUT32.dll | RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, UnRegisterTypeLib, SafeArrayCreateVector, SysAllocString, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, QueryPathOfRegTypeLib, VariantCopy, VariantClear, CreateDispTypeInfo, CreateStdDispatch, DispCallFunc, VariantChangeType, SafeArrayAllocDescriptorEx, VariantInit |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | Great Britain |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 21, 2024 08:57:03.560831070 CET | 49704 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:03.680478096 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:03.680579901 CET | 49704 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:05.011286020 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:05.012209892 CET | 49704 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:05.131757021 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:05.416438103 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:05.425611019 CET | 49704 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:05.545104027 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:05.833590031 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:05.840373039 CET | 49704 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:05.960691929 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:06.258843899 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:06.258979082 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:06.258999109 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:06.259061098 CET | 49704 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:06.476489067 CET | 49704 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:06.596148968 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:06.881803989 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:06.928384066 CET | 49704 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:06.952786922 CET | 49704 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:07.072320938 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:07.357320070 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:07.358500004 CET | 49704 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:07.477993965 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:07.763276100 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:07.764559031 CET | 49704 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:07.884176970 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:08.174160957 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:08.174491882 CET | 49704 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:08.294066906 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:08.578965902 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:08.579433918 CET | 49704 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:08.699027061 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:08.991970062 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:08.996596098 CET | 49704 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:09.116219997 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:09.403477907 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:09.404191971 CET | 49704 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:09.404275894 CET | 49704 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:09.404275894 CET | 49704 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:09.404308081 CET | 49704 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:09.524144888 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:09.524159908 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:09.524173021 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:09.524184942 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:09.922570944 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:09.975276947 CET | 49704 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:09.997812033 CET | 49704 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:10.117388010 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:10.403734922 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:10.408787012 CET | 49704 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:10.409825087 CET | 49705 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:10.529495955 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:10.529619932 CET | 49705 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:11.772381067 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:11.776180029 CET | 49705 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:11.895639896 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:12.171478987 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:12.171668053 CET | 49705 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:12.292223930 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:12.571471930 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:12.572099924 CET | 49705 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:12.691683054 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:12.976449013 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:12.976494074 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:12.976511002 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:12.976586103 CET | 49705 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:12.978043079 CET | 49705 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:13.097573042 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:13.373969078 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:13.375494957 CET | 49705 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:13.495421886 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:13.773011923 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:13.773304939 CET | 49705 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:13.892796993 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:14.168838978 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:14.169188023 CET | 49705 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:14.288866043 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:14.569742918 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:14.570208073 CET | 49705 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:14.689757109 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:14.965190887 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:14.965511084 CET | 49705 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:15.085155010 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:15.368796110 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:15.369028091 CET | 49705 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:15.488761902 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:15.772895098 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:15.782433033 CET | 49705 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:15.782516003 CET | 49705 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:15.782537937 CET | 49705 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:15.782588005 CET | 49705 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:15.782633066 CET | 49705 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:15.782685995 CET | 49705 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:15.782712936 CET | 49705 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:15.782736063 CET | 49705 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:15.782763004 CET | 49705 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:15.782787085 CET | 49705 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:57:15.902450085 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:15.902483940 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:15.902498960 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:15.902513027 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:15.902537107 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:15.902569056 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:15.902632952 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:15.902647018 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:15.902672052 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:15.902683020 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:16.298868895 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:57:16.350255966 CET | 49705 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:58:43.241259098 CET | 49705 | 587 | 192.168.2.5 | 78.110.166.82 |
Nov 21, 2024 08:58:43.360843897 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:58:43.637650967 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 |
Nov 21, 2024 08:58:43.638391018 CET | 49705 | 587 | 192.168.2.5 | 78.110.166.82 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 21, 2024 08:57:03.223776102 CET | 60639 | 53 | 192.168.2.5 | 1.1.1.1 |
Nov 21, 2024 08:57:03.513932943 CET | 53 | 60639 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 21, 2024 08:57:03.223776102 CET | 192.168.2.5 | 1.1.1.1 | 0x1759 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 21, 2024 08:57:03.513932943 CET | 1.1.1.1 | 192.168.2.5 | 0x1759 | No error (0) | 78.110.166.82 | A (IP address) | IN (0x0001) | false |
Timestamp | Source Port | Dest Port | Source IP | Dest IP | Commands |
---|---|---|---|---|---|
Nov 21, 2024 08:57:05.011286020 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 | 220-cphost14.qhoster.net ESMTP Exim 4.96.2 #2 Thu, 21 Nov 2024 07:57:04 +0000 220-We do not authorize the use of this system to transport unsolicited, 220 and/or bulk e-mail. |
Nov 21, 2024 08:57:05.012209892 CET | 49704 | 587 | 192.168.2.5 | 78.110.166.82 | EHLO 473627 |
Nov 21, 2024 08:57:05.416438103 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 | 250-cphost14.qhoster.net Hello 473627 [8.46.123.75] 250-SIZE 52428800 250-8BITMIME 250-PIPELINING 250-PIPECONNECT 250-STARTTLS 250 HELP |
Nov 21, 2024 08:57:05.425611019 CET | 49704 | 587 | 192.168.2.5 | 78.110.166.82 | STARTTLS |
Nov 21, 2024 08:57:05.833590031 CET | 587 | 49704 | 78.110.166.82 | 192.168.2.5 | 220 TLS go ahead |
Nov 21, 2024 08:57:11.772381067 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 | 220-cphost14.qhoster.net ESMTP Exim 4.96.2 #2 Thu, 21 Nov 2024 07:57:11 +0000 220-We do not authorize the use of this system to transport unsolicited, 220 and/or bulk e-mail. |
Nov 21, 2024 08:57:11.776180029 CET | 49705 | 587 | 192.168.2.5 | 78.110.166.82 | EHLO 473627 |
Nov 21, 2024 08:57:12.171478987 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 | 250-cphost14.qhoster.net Hello 473627 [8.46.123.75] 250-SIZE 52428800 250-8BITMIME 250-PIPELINING 250-PIPECONNECT 250-STARTTLS 250 HELP |
Nov 21, 2024 08:57:12.171668053 CET | 49705 | 587 | 192.168.2.5 | 78.110.166.82 | STARTTLS |
Nov 21, 2024 08:57:12.571471930 CET | 587 | 49705 | 78.110.166.82 | 192.168.2.5 | 220 TLS go ahead |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 02:56:57 |
Start date: | 21/11/2024 |
Path: | C:\Users\user\Desktop\EKSTRE_1022.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x260000 |
File size: | 1'255'936 bytes |
MD5 hash: | 3503285C5DCB5DDF134D7617366CF050 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 02:56:58 |
Start date: | 21/11/2024 |
Path: | C:\Users\user\AppData\Local\ageless\pteropod.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xa70000 |
File size: | 1'255'936 bytes |
MD5 hash: | 3503285C5DCB5DDF134D7617366CF050 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Antivirus matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 3 |
Start time: | 02:57:00 |
Start date: | 21/11/2024 |
Path: | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xca0000 |
File size: | 45'984 bytes |
MD5 hash: | 9D352BC46709F0CB5EC974633A0C3C94 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | high |
Has exited: | false |
Target ID: | 4 |
Start time: | 02:57:11 |
Start date: | 21/11/2024 |
Path: | C:\Windows\System32\wscript.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7f0150000 |
File size: | 170'496 bytes |
MD5 hash: | A47CBE969EA935BDD3AB568BB126BC80 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 02:57:12 |
Start date: | 21/11/2024 |
Path: | C:\Users\user\AppData\Local\ageless\pteropod.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xa70000 |
File size: | 1'255'936 bytes |
MD5 hash: | 3503285C5DCB5DDF134D7617366CF050 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 7 |
Start time: | 02:57:14 |
Start date: | 21/11/2024 |
Path: | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x430000 |
File size: | 45'984 bytes |
MD5 hash: | 9D352BC46709F0CB5EC974633A0C3C94 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 10 |
Start time: | 02:57:16 |
Start date: | 21/11/2024 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd0000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 3.8% |
Dynamic/Decrypted Code Coverage: | 0.4% |
Signature Coverage: | 7.5% |
Total number of Nodes: | 2000 |
Total number of Limit Nodes: | 51 |
Graph
Control-flow Graph
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00263D19 Relevance: 19.4, APIs: 8, Strings: 3, Instructions: 151windowCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0027DDC0 Relevance: 10.7, APIs: 7, Instructions: 175COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00273B70 Relevance: 5.9, Strings: 4, Instructions: 903COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A6CA9 Relevance: 4.5, APIs: 3, Instructions: 25fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00273200 Relevance: 2.2, Strings: 1, Instructions: 986COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0026E8D0 Relevance: 49.8, APIs: 24, Strings: 4, Instructions: 816windowsleeptimeCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00295C78 Relevance: 47.9, APIs: 26, Strings: 1, Instructions: 626fileCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00263F53 Relevance: 19.3, APIs: 7, Strings: 4, Instructions: 53windowregistryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002ABFA4 Relevance: 18.3, APIs: 12, Instructions: 316fileCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00263742 Relevance: 15.9, APIs: 8, Strings: 1, Instructions: 151windowtimeregistryCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00263E6E Relevance: 15.8, APIs: 6, Strings: 3, Instructions: 66windowregistryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0134E448 Relevance: 10.7, APIs: 7, Instructions: 151fileCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002649FB Relevance: 10.6, APIs: 4, Strings: 2, Instructions: 73registryCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002651AF Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 88windowCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0134FEE8 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 146fileCOMMON
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0027D298 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 58registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002AC396 Relevance: 6.2, APIs: 4, Instructions: 154COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0134EB28 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 41processCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002BF8AE Relevance: 4.9, APIs: 3, Instructions: 385COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00264FFC Relevance: 4.6, APIs: 3, Instructions: 77windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0028395C Relevance: 4.6, APIs: 3, Instructions: 59memoryCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002ABB64 Relevance: 4.5, APIs: 3, Instructions: 22COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00262322 Relevance: 3.9, APIs: 3, Instructions: 159COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00263A0F Relevance: 3.1, APIs: 2, Instructions: 59COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0027F4EA Relevance: 3.0, APIs: 2, Instructions: 43COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0134EB98 Relevance: 1.7, APIs: 1, Instructions: 161COMMON
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00282957 Relevance: 1.6, APIs: 1, Instructions: 135COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0027ED18 Relevance: 1.6, APIs: 1, Instructions: 94memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002C040F Relevance: 1.6, APIs: 1, Instructions: 93COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002D9A75 Relevance: 1.6, APIs: 1, Instructions: 88COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002641A9 Relevance: 1.6, APIs: 1, Instructions: 63libraryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002D9B45 Relevance: 1.6, APIs: 1, Instructions: 62COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002639DB Relevance: 1.5, APIs: 1, Instructions: 41COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00282AAE Relevance: 1.5, APIs: 1, Instructions: 35COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00264252 Relevance: 1.5, APIs: 1, Instructions: 28COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002640A7 Relevance: 1.5, APIs: 1, Instructions: 23COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002ABCF4 Relevance: 1.5, APIs: 1, Instructions: 22COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0134E408 Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0134E3D8 Relevance: 1.5, APIs: 1, Instructions: 15COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0134FDD4 Relevance: 1.3, APIs: 1, Instructions: 21sleepCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0134FDD8 Relevance: 1.3, APIs: 1, Instructions: 18sleepCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002CF7FF Relevance: 74.1, APIs: 40, Strings: 2, Instructions: 630windowkeyboardCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002CAACE Relevance: 60.1, APIs: 33, Strings: 1, Instructions: 574windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0027EB42 Relevance: 43.9, APIs: 24, Strings: 1, Instructions: 130keyboardthreadwindowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A60DD Relevance: 31.7, APIs: 17, Strings: 1, Instructions: 174filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002AF5FA Relevance: 28.3, APIs: 13, Strings: 3, Instructions: 278timefileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002B1B2F Relevance: 28.1, APIs: 15, Strings: 1, Instructions: 118fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002B1C8A Relevance: 24.6, APIs: 13, Strings: 1, Instructions: 111fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002B091D Relevance: 22.9, APIs: 12, Strings: 1, Instructions: 185timeCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00266F07 Relevance: 22.1, Strings: 17, Instructions: 883COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A63F9 Relevance: 17.6, APIs: 9, Strings: 1, Instructions: 89fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002B6D07 Relevance: 15.1, APIs: 10, Instructions: 83clipboardmemoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A79D3 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 58shutdownCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00269B60 Relevance: 9.8, Strings: 7, Instructions: 1055COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002B8C4F Relevance: 9.1, APIs: 6, Instructions: 83networkCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A6532 Relevance: 9.1, APIs: 6, Instructions: 71processCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A13CA Relevance: 8.1, APIs: 1, Strings: 4, Instructions: 560stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002AEB60 Relevance: 7.6, APIs: 5, Instructions: 125fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002C8111 Relevance: 7.6, APIs: 5, Instructions: 69windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0027E01E Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 15libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0027B11F Relevance: 4.9, APIs: 3, Instructions: 377COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002AE1FD Relevance: 4.6, APIs: 3, Instructions: 72COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0029B134 Relevance: 4.6, APIs: 3, Instructions: 67COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A6606 Relevance: 4.6, APIs: 3, Instructions: 58fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A71FA Relevance: 4.5, APIs: 3, Instructions: 42memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002AF56F Relevance: 3.1, APIs: 2, Instructions: 52fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002ACE7A Relevance: 3.0, APIs: 2, Instructions: 30windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0029AB84 Relevance: 3.0, APIs: 2, Instructions: 22COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0028D1B9 Relevance: 2.1, APIs: 1, Instructions: 645COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002696C0 Relevance: 2.1, APIs: 1, Instructions: 573COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0029038E Relevance: 1.8, APIs: 1, Instructions: 294COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002AB6CC Relevance: 1.6, APIs: 1, Instructions: 71COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A74BB Relevance: 1.5, APIs: 1, Instructions: 24COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0029B106 Relevance: 1.5, APIs: 1, Instructions: 18COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002DB340 Relevance: 1.5, APIs: 1, Instructions: 7COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00288189 Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0026E3B0 Relevance: .5, Instructions: 540COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002693F0 Relevance: .5, Instructions: 531COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0026AF50 Relevance: .5, Instructions: 514COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002802A4 Relevance: .3, Instructions: 345COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002806D9 Relevance: .3, Instructions: 341COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0027FA57 Relevance: .3, Instructions: 323COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01351148 Relevance: .1, Instructions: 92COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01351038 Relevance: .0, Instructions: 35COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01350FD8 Relevance: .0, Instructions: 35COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0134F9A8 Relevance: .0, Instructions: 6COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002BA2A9 Relevance: 77.5, APIs: 40, Strings: 4, Instructions: 490filecommemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002CD285 Relevance: 49.8, APIs: 33, Instructions: 260COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0027B8FD Relevance: 49.5, APIs: 27, Strings: 1, Instructions: 491windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002CC6E9 Relevance: 42.4, APIs: 23, Strings: 1, Instructions: 447windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002CB6C4 Relevance: 38.9, APIs: 21, Strings: 1, Instructions: 400windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002C764F Relevance: 37.0, APIs: 18, Strings: 3, Instructions: 290windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0027A856 Relevance: 33.5, APIs: 18, Strings: 1, Instructions: 285windowtimeCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002C3639 Relevance: 26.7, APIs: 9, Strings: 6, Instructions: 477registryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002C6BC9 Relevance: 26.5, APIs: 2, Strings: 13, Instructions: 281windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0029CF50 Relevance: 26.5, APIs: 14, Strings: 1, Instructions: 273windowtimeCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002B79B0 Relevance: 25.6, APIs: 17, Instructions: 109COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002CCE58 Relevance: 24.7, APIs: 12, Strings: 2, Instructions: 205windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002CF351 Relevance: 24.7, APIs: 11, Strings: 3, Instructions: 178windowfileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002AAAF8 Relevance: 23.1, APIs: 11, Strings: 2, Instructions: 374timeCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002C716A Relevance: 23.0, APIs: 2, Strings: 11, Instructions: 244windowCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002CE4F5 Relevance: 22.9, APIs: 10, Strings: 3, Instructions: 199windowlibraryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A26BC Relevance: 22.9, APIs: 8, Strings: 5, Instructions: 137windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002AD0B8 Relevance: 22.9, APIs: 10, Strings: 3, Instructions: 101fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002CEEEB Relevance: 21.2, APIs: 11, Strings: 1, Instructions: 229windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0029A14D Relevance: 19.4, APIs: 8, Strings: 3, Instructions: 127registryshareCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A67E9 Relevance: 19.4, APIs: 10, Strings: 1, Instructions: 107windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A25B5 Relevance: 19.3, APIs: 6, Strings: 5, Instructions: 74windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A778F Relevance: 19.3, APIs: 10, Strings: 1, Instructions: 72sleepwindowtimeCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002B02EE Relevance: 18.3, APIs: 12, Instructions: 282comCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0029ED02 Relevance: 18.2, APIs: 12, Instructions: 174COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0027B73E Relevance: 18.2, APIs: 12, Instructions: 170timeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0027B40A Relevance: 18.1, APIs: 12, Instructions: 131COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A690B Relevance: 18.1, APIs: 12, Instructions: 113COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002CA1B6 Relevance: 17.6, APIs: 9, Strings: 1, Instructions: 101windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A6F02 Relevance: 17.6, APIs: 9, Strings: 1, Instructions: 72networkCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0028500E Relevance: 16.8, APIs: 11, Instructions: 257COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002BADAE Relevance: 15.9, APIs: 6, Strings: 3, Instructions: 197comCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002B8107 Relevance: 15.9, APIs: 8, Strings: 1, Instructions: 163networkfileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0029B907 Relevance: 15.8, APIs: 7, Strings: 2, Instructions: 81windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0029B9F0 Relevance: 15.8, APIs: 7, Strings: 2, Instructions: 80windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0029BAD7 Relevance: 15.8, APIs: 4, Strings: 5, Instructions: 71windowCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002BB2A9 Relevance: 15.3, APIs: 10, Instructions: 324fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0028ACB3 Relevance: 15.2, APIs: 10, Instructions: 219COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0027CB8D Relevance: 14.2, APIs: 7, Strings: 1, Instructions: 185windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002CECD4 Relevance: 14.1, APIs: 6, Strings: 2, Instructions: 149windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002B45C4 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 133networkCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002BB644 Relevance: 13.9, APIs: 9, Instructions: 432COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002CB33A Relevance: 13.7, APIs: 9, Instructions: 167COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0027EA69 Relevance: 13.6, APIs: 9, Instructions: 135COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002C9A75 Relevance: 12.4, APIs: 6, Strings: 1, Instructions: 142windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A5819 Relevance: 12.3, APIs: 2, Strings: 5, Instructions: 81windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002AA729 Relevance: 12.3, APIs: 8, Instructions: 317COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A6B49 Relevance: 12.3, APIs: 6, Strings: 1, Instructions: 46windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002C8ECC Relevance: 12.1, APIs: 8, Instructions: 95windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0027AE78 Relevance: 10.7, APIs: 7, Instructions: 218COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002C8FC8 Relevance: 10.6, APIs: 7, Instructions: 99windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A08AF Relevance: 10.6, APIs: 7, Instructions: 94memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A0986 Relevance: 10.6, APIs: 7, Instructions: 89memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002CA2C8 Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 75windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0027CCCD Relevance: 9.3, APIs: 6, Instructions: 253COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002C84DE Relevance: 9.2, APIs: 6, Instructions: 152windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A4AC2 Relevance: 9.1, APIs: 6, Instructions: 136windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0027ABF5 Relevance: 9.1, APIs: 6, Instructions: 113COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002CE397 Relevance: 9.1, APIs: 6, Instructions: 108windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A98BA Relevance: 9.1, APIs: 6, Instructions: 100fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002B9B45 Relevance: 9.1, APIs: 6, Instructions: 99COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0029AF64 Relevance: 9.1, APIs: 6, Instructions: 73processCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002CEBF6 Relevance: 9.0, APIs: 6, Instructions: 49COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0029E19B Relevance: 9.0, APIs: 6, Instructions: 48COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00287B47 Relevance: 9.0, APIs: 6, Instructions: 45threadCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A9AD5 Relevance: 9.0, APIs: 6, Instructions: 44COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A9A20 Relevance: 9.0, APIs: 6, Instructions: 33synchronizationthreadCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A5347 Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 180windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A0213 Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 120comlibraryloaderCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A5007 Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 114windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0029B80A Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 93windowCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002B43E2 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 85networkCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002C90E2 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 80windowlibraryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A9568 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 78filepipeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A9634 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 78filepipeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0029C9E0 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 67windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00287A94 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 41COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002CE32E Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 40processCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002C1945 Relevance: 7.7, APIs: 5, Instructions: 232COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002CE062 Relevance: 7.7, APIs: 5, Instructions: 187windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A1C9A Relevance: 7.7, APIs: 5, Instructions: 158COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002CCCF7 Relevance: 7.6, APIs: 5, Instructions: 129COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002B1206 Relevance: 7.6, APIs: 5, Instructions: 127COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0029DBBF Relevance: 7.6, APIs: 5, Instructions: 87windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0029BC77 Relevance: 7.6, APIs: 5, Instructions: 82windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A6318 Relevance: 7.6, APIs: 5, Instructions: 80COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002B8B95 Relevance: 7.6, APIs: 5, Instructions: 71networkCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002B8420 Relevance: 7.6, APIs: 5, Instructions: 69COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0027AF83 Relevance: 7.6, APIs: 5, Instructions: 67COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0028217F Relevance: 7.6, APIs: 5, Instructions: 61threadCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0029ABBB Relevance: 7.5, APIs: 5, Instructions: 48memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A7A58 Relevance: 7.5, APIs: 5, Instructions: 47sleepCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00299ABF Relevance: 7.5, APIs: 5, Instructions: 47stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0029AA62 Relevance: 7.5, APIs: 5, Instructions: 45memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0029AAC3 Relevance: 7.5, APIs: 5, Instructions: 45memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0027B0AB Relevance: 7.5, APIs: 5, Instructions: 29COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0029C189 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 121windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002B5180 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 96networkCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002CA0D6 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 89windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002CA88A Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 88windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002C99A5 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002CA409 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 66windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00282287 Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 24libraryloaderCOMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0028235C Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 19libraryloaderCOMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002C2205 Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 15libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002642F6 Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 15libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0026434B Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 15libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A0539 Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 15libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A0564 Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 15libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002BECC8 Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 15libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002BBADD Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 15libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002C3BDB Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 15libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00299B30 Relevance: 6.3, APIs: 4, Instructions: 306COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002BAA84 Relevance: 6.3, APIs: 4, Instructions: 268COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002991CC Relevance: 6.2, APIs: 4, Instructions: 201memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002CC4D7 Relevance: 6.1, APIs: 4, Instructions: 137COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0029C410 Relevance: 6.1, APIs: 4, Instructions: 130windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002AE698 Relevance: 6.1, APIs: 4, Instructions: 110fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002CB544 Relevance: 6.1, APIs: 4, Instructions: 108COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002CD7DE Relevance: 6.1, APIs: 4, Instructions: 105windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002C7CA5 Relevance: 6.1, APIs: 4, Instructions: 93COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002CF1D7 Relevance: 6.1, APIs: 4, Instructions: 80windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002B431C Relevance: 6.1, APIs: 4, Instructions: 78networkCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002C8A37 Relevance: 6.1, APIs: 4, Instructions: 69COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002B8A7F Relevance: 6.1, APIs: 4, Instructions: 69networkCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A0AA6 Relevance: 6.1, APIs: 3, Strings: 1, Instructions: 68stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A6713 Relevance: 6.1, APIs: 4, Instructions: 64fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0029B1CC Relevance: 6.1, APIs: 4, Instructions: 63memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0029B478 Relevance: 6.1, APIs: 4, Instructions: 58windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0027B55D Relevance: 6.1, APIs: 4, Instructions: 56COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A732B Relevance: 6.1, APIs: 4, Instructions: 55synchronizationthreadwindowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0027D17C Relevance: 6.1, APIs: 4, Instructions: 53windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002CEA6A Relevance: 6.0, APIs: 4, Instructions: 31COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0029B0CD Relevance: 6.0, APIs: 4, Instructions: 23threadCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0027B47D Relevance: 6.0, APIs: 4, Instructions: 22COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002DB29A Relevance: 6.0, APIs: 4, Instructions: 20COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002DB2AE Relevance: 6.0, APIs: 4, Instructions: 19COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0027BCC9 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 143sleepCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002CA76A Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 96windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A5157 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 87windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002C93CF Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 72windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002C9617 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 64windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002A5262 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 62windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002B4D9F Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 61networkCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0028A70C Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 59COMMONLIBRARYCODE
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002BA82C Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 52networkCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0029B781 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 51windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0029B67D Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 49windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0029B700 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 48windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0029A631 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 22windowCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002C8698 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 15windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002C86CC Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 15windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|