Windows
Analysis Report
Readouts.bat.exe
Overview
General Information
Detection
Score: | 76 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Readouts.bat.exe (PID: 6304 cmdline:
"C:\Users\ user\Deskt op\Readout s.bat.exe" MD5: 492707A5E753B9C5FAA6A9829E065775) - Readouts.bat.exe (PID: 5684 cmdline:
"C:\Users\ user\Deskt op\Readout s.bat.exe" MD5: 492707A5E753B9C5FAA6A9829E065775)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
CloudEyE, GuLoader | CloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_GuLoader_2 | Yara detected GuLoader | Joe Security | ||
JoeSecurity_GuLoader_2 | Yara detected GuLoader | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-25T07:16:38.511353+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49736 | 172.93.121.126 | 80 | TCP |
2024-11-25T07:16:49.173667+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49736 | 172.93.121.126 | 80 | TCP |
2024-11-25T07:16:59.573665+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49736 | 172.93.121.126 | 80 | TCP |
2024-11-25T07:17:09.980013+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49736 | 172.93.121.126 | 80 | TCP |
2024-11-25T07:17:20.386353+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49736 | 172.93.121.126 | 80 | TCP |
2024-11-25T07:17:30.996054+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49736 | 172.93.121.126 | 80 | TCP |
2024-11-25T07:17:41.401856+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49736 | 172.93.121.126 | 80 | TCP |
2024-11-25T07:17:52.013444+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49736 | 172.93.121.126 | 80 | TCP |
2024-11-25T07:18:02.420488+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49736 | 172.93.121.126 | 80 | TCP |
2024-11-25T07:18:12.827458+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49736 | 172.93.121.126 | 80 | TCP |
2024-11-25T07:18:23.432703+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49736 | 172.93.121.126 | 80 | TCP |
2024-11-25T07:18:34.042247+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49736 | 172.93.121.126 | 80 | TCP |
2024-11-25T07:18:44.448641+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49736 | 172.93.121.126 | 80 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_004065C7 | |
Source: | Code function: | 0_2_00405996 | |
Source: | Code function: | 0_2_00402868 |
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Code function: | 0_2_0040542B |
Source: | Code function: | 0_2_00403359 |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_00404C68 | |
Source: | Code function: | 0_2_0040698E | |
Source: | Code function: | 0_2_6FBF1B63 |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_00403359 |
Source: | Code function: | 0_2_004046EC |
Source: | Code function: | 0_2_00402104 |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | File written: | Jump to behavior |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | File source: | ||
Source: | File source: |
Source: | Code function: | 0_2_6FBF1B63 |
Source: | Code function: | 0_2_6FBF2FFE |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: |
Source: | RDTSC instruction interceptor: | ||
Source: | RDTSC instruction interceptor: |
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | Thread sleep time: | Jump to behavior |
Source: | Last function: |
Source: | Code function: | 0_2_004065C7 | |
Source: | Code function: | 0_2_00405996 | |
Source: | Code function: | 0_2_00402868 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_0-4984 | ||
Source: | API call chain: | graph_0-4976 |
Source: | Code function: | 0_2_00401E49 |
Source: | Code function: | 0_2_6FBF1B63 |
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_00403359 |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Native API | 1 DLL Side-Loading | 1 Access Token Manipulation | 1 Masquerading | OS Credential Dumping | 21 Security Software Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 11 Process Injection | 1 Virtualization/Sandbox Evasion | LSASS Memory | 1 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 1 Clipboard Data | 3 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 DLL Side-Loading | 1 Access Token Manipulation | Security Account Manager | 3 File and Directory Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 11 Process Injection | NTDS | 23 System Information Discovery | Distributed Component Object Model | Input Capture | 13 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | Internet Connection Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
13% | ReversingLabs | |||
21% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs | |||
3% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
kkaou.lamd.shop | 172.93.121.126 | true | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
true |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
172.93.121.126 | kkaou.lamd.shop | United States | 393960 | HOST4GEEKS-LLCUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1562049 |
Start date and time: | 2024-11-25 07:14:50 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 23s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Run name: | Run with higher sleep bypass |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Readouts.bat.exe |
Detection: | MAL |
Classification: | mal76.troj.evad.winEXE@3/9@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtSetInformationFile calls found.
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
172.93.121.126 | Get hash | malicious | Azorult, GuLoader | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
HOST4GEEKS-LLCUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher, Mamba2FA | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher, Mamba2FA | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\nsrC488.tmp\LangDLL.dll | Get hash | malicious | FormBook, GuLoader | Browse | ||
Get hash | malicious | Remcos, GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | FormBook, GuLoader | Browse |
Process: | C:\Users\user\Desktop\Readouts.bat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 5632 |
Entropy (8bit): | 3.81704362174321 |
Encrypted: | false |
SSDEEP: | 48:S46+/p2TKYKxbWsptIpBtWZ0iV8jAWiAJCvxft2O2B8mhofjLl:zf2uPbOBtWZBV8jAWiAJCdv2CmwL |
MD5: | 3DD80DFF583544514EEB3A5ED851A519 |
SHA1: | 56F7324D9D4230C96D1963E7B3E02B05A6CF5C24 |
SHA-256: | 86CFF5EACA76C49F924CB123D242FDCFD45AB99C4B638D3B8F4A8CFB1970AB5B |
SHA-512: | 955F4DF195B5D134449904E9020F80125CFB64D70D9482FF583451F3FCB10D15577CEAC4180F71A96452D8478F6365160AB15731F9A79A494383087C9310FD1D |
Malicious: | false |
Antivirus: |
|
Joe Sandbox View: |
|
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\Readouts.bat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 11776 |
Entropy (8bit): | 5.890541747176257 |
Encrypted: | false |
SSDEEP: | 192:X24sihno0bW+l97H4GB7QDs91kMtwtobTr4u+QHbazMNHT7dmNIEr:m8vJl97JeoxtN/r3z7YV |
MD5: | 75ED96254FBF894E42058062B4B4F0D1 |
SHA1: | 996503F1383B49021EB3427BC28D13B5BBD11977 |
SHA-256: | A632D74332B3F08F834C732A103DAFEB09A540823A2217CA7F49159755E8F1D7 |
SHA-512: | 58174896DB81D481947B8745DAFE3A02C150F3938BB4543256E8CCE1145154E016D481DF9FE68DAC6D48407C62CBE20753320EBD5FE5E84806D07CE78E0EB0C4 |
Malicious: | false |
Antivirus: |
|
Reputation: | moderate, very likely benign file |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\vaporarium\immunoassay\overniceness\Cassoon\frtr.jpg
Download File
Process: | C:\Users\user\Desktop\Readouts.bat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 165466 |
Entropy (8bit): | 6.5947581943238625 |
Encrypted: | false |
SSDEEP: | 3072:b9bANrxjToG8aMvWDtSYT8TBs9M/U2UKEVKQUsLNcY/:Sxj5AeyBN/U2L6KQfNZ |
MD5: | 152B2AA9B4B656DF132C2E5EAD37A7D5 |
SHA1: | 9C0FDBAAB3A483D4857BB8A2269CD21177BBD1D9 |
SHA-256: | 11970E0E0D67A2FD31BD5907E279F43F52A3B2547391FF843B52BF79062CA00F |
SHA-512: | 4D756CC91321FD2646D5383E3EC3F736BA2B59DD46C912D9D28CD67858A4FA9A6E2FD8312F91D1EEA4392B01830DDD1F59B40353265D0B9CA84F7DA2D62F2E10 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\vaporarium\immunoassay\overniceness\Cassoon\lukkedagenes.fli
Download File
Process: | C:\Users\user\Desktop\Readouts.bat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 321960 |
Entropy (8bit): | 1.240482616634199 |
Encrypted: | false |
SSDEEP: | 768:phtcv5KE3yqV0L8Xi1Sk4gVNBo/iZcRxZq129cB/ckCkoPtvb292Qrg/Bt2bNsQe:utkxDPfCkoGBdszPmWJqU |
MD5: | 66087BEC9068998EE8F271F0580AB3F5 |
SHA1: | 80980F5A1BD6DAF01263730273F945B031F75AE3 |
SHA-256: | 248D9672E365A5C58F1AF62BA50E7FA4BFCF518846DA63ACA19797201C9E5F44 |
SHA-512: | 046A00F3DB8C6A5C2BD71A43D13FEC6418AA0E30EA77CA12BEB082F8EDCFF9D3F31BCAD7B40A6D02722F5092215279681A96E103503063A52786314D21FE83FD |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\vaporarium\immunoassay\overniceness\Cassoon\opisthocomine.nit
Download File
Process: | C:\Users\user\Desktop\Readouts.bat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 263192 |
Entropy (8bit): | 1.2599632446975992 |
Encrypted: | false |
SSDEEP: | 768:XWXGdC9WRz+JhP7he1s7N4PjZlGpwlN8HmDEh/jTqcx1uNp9ieDc0VSLrPSsGCCu:IGdVcNN49lGp5UibEBfJv |
MD5: | 0EDAE6068FC853ECD4597C0C717729E8 |
SHA1: | 8F02F7B5B9524451D3E2FA336B898883E8707FEA |
SHA-256: | FA5E6764D56E5EBCB89C97A192ADF8F246D7E3C5683A5864C7A8714DD977210C |
SHA-512: | EF8D9006A9FC63F31F6677C6500C8C9AD13CDCF45F76AAB2EAD30CE98DD223D87782DC29869B9D3C7C0729320DF341CF25F384F0EC775A8F4EA6F5BEA101EC2D |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\vaporarium\immunoassay\overniceness\Svovlkalk101\Destructibility232.Hae
Download File
Process: | C:\Users\user\Desktop\Readouts.bat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 300215 |
Entropy (8bit): | 7.60202307149698 |
Encrypted: | false |
SSDEEP: | 6144:oVqhTWP564sPg9kuKsookY0xGDqAaToGG9h7kLPIHDm9J5/3b6DAg:oypsookJMQomdGDAg |
MD5: | 8499C7BD10DABAF8DF8745B57F612F73 |
SHA1: | 9C25FFAFDF9D6AF07EB5BD7B8A897509E65DE3F5 |
SHA-256: | 2F7D4CD8374D5F7EE7D59BF06036E3C4E1035455D95E90D04AE0DA12C3AA3F3C |
SHA-512: | 7456BEE05A7DAEF8DE41C39105955ED83CCBEB409A32F1E97CC822FB9BC4C0054020E32FFAABE7DB95CB7DD48D0DFE85A320D96461F83452D579A51903E43484 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\vaporarium\immunoassay\overniceness\Svovlkalk101\Fraggings79.Bou
Download File
Process: | C:\Users\user\Desktop\Readouts.bat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 119900 |
Entropy (8bit): | 2.6586250127926325 |
Encrypted: | false |
SSDEEP: | 1536:6jdC216hYLvIhMoEneRjeYCnZZH9yaLj6Ovo7UD9D5yv:S6LUJNI |
MD5: | F0EE2E4C32204D0D0C8D15CB8AD658FD |
SHA1: | 25ABC78C1F4D4A50C5630C44554C221E72487DF0 |
SHA-256: | B6464B7D7E39E076B3D4B51593FA7681493B367BB87C760D572179CFE01356BF |
SHA-512: | D5EAB7411129B7A16D79D5A8F2724469AA6DC6AEEFCF3B829EA6246EBCC6875D1E4254922218761D06C45A2506E2D95A0F96479788CDD63524D2066D18548484 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\vaporarium\immunoassay\overniceness\Svovlkalk101\defencives.pol
Download File
Process: | C:\Users\user\Desktop\Readouts.bat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 455315 |
Entropy (8bit): | 1.2477113828127742 |
Encrypted: | false |
SSDEEP: | 1536:o/yCFoEvvG0yx5hyNnuPwAVpwtCTuOf9aSDAUg:o/2Enyx5+uPwAnwMSADAUg |
MD5: | 761F2A757CD380F71E205335CE088495 |
SHA1: | 7E1C38708629925DF64A30EB0B722A7C44FA6150 |
SHA-256: | 56A1E386A92086888D3C0F9437CC34AACFF1AF55D59A0393EEBC220D4BC2697B |
SHA-512: | 5DB2A3E96E93E576E861F10296DB05ED890311EE2F31D930B330DCB418246C9E3C750272CCB781811B3C8BFAD940ACAB64040F72786DE4A839C7238B984E2E02 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Readouts.bat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 38 |
Entropy (8bit): | 4.006841738213845 |
Encrypted: | false |
SSDEEP: | 3:kQMicv7Wz+v:clvSz+v |
MD5: | 8674B487F44FE91156094E810B1A3128 |
SHA1: | 27F1EB1FBAFFBD6AF90FD2F084081BD4A96E9498 |
SHA-256: | 4F0B489724F53D0E8C6BFE50C9EA02251EEBDD7A96855091C2F6E8768F683E5D |
SHA-512: | 4AE1B103E5E58D5EEA6EC6DB2E4DA96557B88C32CE6860E9B2986C628DD26B95162261F33E6036388184FFA5256B45BE91BE7E8C9DA85BD5945E29F2360D19E9 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.195535478027114 |
TrID: |
|
File name: | Readouts.bat.exe |
File size: | 993'977 bytes |
MD5: | 492707a5e753b9c5faa6a9829e065775 |
SHA1: | 7a48c9ae447780551a9714b5cccde57f16094e01 |
SHA256: | 8a0a6bad685a0e4517d2f1e8f70fff1195c78470e467255dfeb1c3f7ec922514 |
SHA512: | e7ab1808dadb1a1da12ac66e6f9c631a5ca58b4575bebfba21aa6b6907153bd8e4af2904e3039a77f0a4f9bc94cd408f108c05181878270c5446862b01ffa707 |
SSDEEP: | 24576:oewAoAZIk1OYV8pC0SUGKSGnx7eq0xQUsHVSm:CAFLErOUGKSe5eq0xQhHs |
TLSH: | 3925D002EF59C787C2FA6E7449F6B7052A2DCBC998D38F02E64568D8F670F5874C8684 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....oZ.................d...*..... |
Icon Hash: | c5cdc989d5cde097 |
Entrypoint: | 0x403359 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x5A6FED2E [Tue Jan 30 03:57:34 2018 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | b34f154ec913d2d2c435cbd644e91687 |
Instruction |
---|
sub esp, 000002D4h |
push ebx |
push esi |
push edi |
push 00000020h |
pop edi |
xor ebx, ebx |
push 00008001h |
mov dword ptr [esp+14h], ebx |
mov dword ptr [esp+10h], 0040A2E0h |
mov dword ptr [esp+1Ch], ebx |
call dword ptr [004080A8h] |
call dword ptr [004080A4h] |
and eax, BFFFFFFFh |
cmp ax, 00000006h |
mov dword ptr [0042A20Ch], eax |
je 00007FF650CEAA93h |
push ebx |
call 00007FF650CEDD45h |
cmp eax, ebx |
je 00007FF650CEAA89h |
push 00000C00h |
call eax |
mov esi, 004082B0h |
push esi |
call 00007FF650CEDCBFh |
push esi |
call dword ptr [00408150h] |
lea esi, dword ptr [esi+eax+01h] |
cmp byte ptr [esi], 00000000h |
jne 00007FF650CEAA6Ch |
push 0000000Ah |
call 00007FF650CEDD18h |
push 00000008h |
call 00007FF650CEDD11h |
push 00000006h |
mov dword ptr [0042A204h], eax |
call 00007FF650CEDD05h |
cmp eax, ebx |
je 00007FF650CEAA91h |
push 0000001Eh |
call eax |
test eax, eax |
je 00007FF650CEAA89h |
or byte ptr [0042A20Fh], 00000040h |
push ebp |
call dword ptr [00408044h] |
push ebx |
call dword ptr [004082A0h] |
mov dword ptr [0042A2D8h], eax |
push ebx |
lea eax, dword ptr [esp+34h] |
push 000002B4h |
push eax |
push ebx |
push 004216A8h |
call dword ptr [00408188h] |
push 0040A2C8h |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x84fc | 0xa0 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x50000 | 0x5ab18 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x8000 | 0x2b0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x62a5 | 0x6400 | f4cff166abb4376522cf86cbd302f644 | False | 0.658984375 | data | 6.431390019180314 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x8000 | 0x138e | 0x1400 | 2914bac53cd4485c9822093463e4eea6 | False | 0.4509765625 | data | 5.146454805063938 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xa000 | 0x20318 | 0x600 | 7d0d44c89e64b001096d8f9c60b1ac1b | False | 0.4928385416666667 | data | 3.90464114821524 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x2b000 | 0x25000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x50000 | 0x5ab18 | 0x5ac00 | 8e289f0503c71e1dae735f54bd537b3d | False | 0.3740799328512397 | data | 4.762577612489826 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x504a8 | 0x42028 | Device independent bitmap graphic, 256 x 512 x 32, image size 0 | English | United States | 0.35952525372074445 |
RT_ICON | 0x924d0 | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 0 | English | United States | 0.3869188453803383 |
RT_ICON | 0xa2cf8 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 0 | English | United States | 0.5096473029045643 |
RT_ICON | 0xa52a0 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 0 | English | United States | 0.6343808630393997 |
RT_ICON | 0xa6348 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 0 | English | United States | 0.5815565031982942 |
RT_ICON | 0xa71f0 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 0 | English | United States | 0.6877049180327869 |
RT_ICON | 0xa7b78 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 0 | English | United States | 0.723826714801444 |
RT_ICON | 0xa8420 | 0x6c8 | Device independent bitmap graphic, 24 x 48 x 8, image size 0 | English | United States | 0.6359447004608295 |
RT_ICON | 0xa8ae8 | 0x668 | Device independent bitmap graphic, 48 x 96 x 4, image size 0 | English | United States | 0.2725609756097561 |
RT_ICON | 0xa9150 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 0 | English | United States | 0.4602601156069364 |
RT_ICON | 0xa96b8 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 0 | English | United States | 0.7606382978723404 |
RT_ICON | 0xa9b20 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 0 | English | United States | 0.34139784946236557 |
RT_ICON | 0xa9e08 | 0x1e8 | Device independent bitmap graphic, 24 x 48 x 4, image size 0 | English | United States | 0.39549180327868855 |
RT_ICON | 0xa9ff0 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 0 | English | United States | 0.44594594594594594 |
RT_DIALOG | 0xaa118 | 0xb8 | data | English | United States | 0.6467391304347826 |
RT_DIALOG | 0xaa1d0 | 0x144 | data | English | United States | 0.5216049382716049 |
RT_DIALOG | 0xaa318 | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0xaa418 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0xaa538 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0xaa598 | 0xca | data | English | United States | 0.5792079207920792 |
RT_VERSION | 0xaa668 | 0x21c | data | English | United States | 0.5314814814814814 |
RT_MANIFEST | 0xaa888 | 0x290 | XML 1.0 document, ASCII text, with very long lines (656), with no line terminators | English | United States | 0.5625 |
DLL | Import |
---|---|
KERNEL32.dll | SetEnvironmentVariableW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, SetCurrentDirectoryW, GetFileAttributesW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, ExitProcess, GetShortPathNameW, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, lstrcmpiW, MoveFileW, GetFullPathNameW, SetFileTime, SearchPathW, CompareFileTime, lstrcmpW, CloseHandle, ExpandEnvironmentStringsW, GlobalFree, GlobalLock, GlobalUnlock, GlobalAlloc, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, lstrlenA, MulDiv, MultiByteToWideChar, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW |
USER32.dll | GetSystemMenu, SetClassLongW, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, GetDC, SetTimer, SetWindowTextW, LoadImageW, SetForegroundWindow, ShowWindow, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, CreateDialogParamW, SendMessageTimeoutW, wsprintfW, PostQuitMessage |
GDI32.dll | SelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor |
SHELL32.dll | SHGetSpecialFolderLocation, ShellExecuteExW, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW |
ADVAPI32.dll | AdjustTokenPrivileges, RegCreateKeyExW, RegOpenKeyExW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, RegEnumValueW, RegDeleteKeyW, RegDeleteValueW, RegCloseKey, RegSetValueExW, RegQueryValueExW, RegEnumKeyW |
COMCTL32.dll | ImageList_Create, ImageList_AddMasked, ImageList_Destroy |
ole32.dll | OleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-25T07:16:38.511353+0100 | 2803270 | ETPRO MALWARE Common Downloader Header Pattern UHCa | 2 | 192.168.2.4 | 49736 | 172.93.121.126 | 80 | TCP |
2024-11-25T07:16:49.173667+0100 | 2803270 | ETPRO MALWARE Common Downloader Header Pattern UHCa | 2 | 192.168.2.4 | 49736 | 172.93.121.126 | 80 | TCP |
2024-11-25T07:16:59.573665+0100 | 2803270 | ETPRO MALWARE Common Downloader Header Pattern UHCa | 2 | 192.168.2.4 | 49736 | 172.93.121.126 | 80 | TCP |
2024-11-25T07:17:09.980013+0100 | 2803270 | ETPRO MALWARE Common Downloader Header Pattern UHCa | 2 | 192.168.2.4 | 49736 | 172.93.121.126 | 80 | TCP |
2024-11-25T07:17:20.386353+0100 | 2803270 | ETPRO MALWARE Common Downloader Header Pattern UHCa | 2 | 192.168.2.4 | 49736 | 172.93.121.126 | 80 | TCP |
2024-11-25T07:17:30.996054+0100 | 2803270 | ETPRO MALWARE Common Downloader Header Pattern UHCa | 2 | 192.168.2.4 | 49736 | 172.93.121.126 | 80 | TCP |
2024-11-25T07:17:41.401856+0100 | 2803270 | ETPRO MALWARE Common Downloader Header Pattern UHCa | 2 | 192.168.2.4 | 49736 | 172.93.121.126 | 80 | TCP |
2024-11-25T07:17:52.013444+0100 | 2803270 | ETPRO MALWARE Common Downloader Header Pattern UHCa | 2 | 192.168.2.4 | 49736 | 172.93.121.126 | 80 | TCP |
2024-11-25T07:18:02.420488+0100 | 2803270 | ETPRO MALWARE Common Downloader Header Pattern UHCa | 2 | 192.168.2.4 | 49736 | 172.93.121.126 | 80 | TCP |
2024-11-25T07:18:12.827458+0100 | 2803270 | ETPRO MALWARE Common Downloader Header Pattern UHCa | 2 | 192.168.2.4 | 49736 | 172.93.121.126 | 80 | TCP |
2024-11-25T07:18:23.432703+0100 | 2803270 | ETPRO MALWARE Common Downloader Header Pattern UHCa | 2 | 192.168.2.4 | 49736 | 172.93.121.126 | 80 | TCP |
2024-11-25T07:18:34.042247+0100 | 2803270 | ETPRO MALWARE Common Downloader Header Pattern UHCa | 2 | 192.168.2.4 | 49736 | 172.93.121.126 | 80 | TCP |
2024-11-25T07:18:44.448641+0100 | 2803270 | ETPRO MALWARE Common Downloader Header Pattern UHCa | 2 | 192.168.2.4 | 49736 | 172.93.121.126 | 80 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 25, 2024 07:16:36.756593943 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:16:37.235846043 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:16:37.235977888 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:16:37.501250029 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:16:37.620791912 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:16:38.511192083 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:16:38.511353016 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:16:38.755135059 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:16:38.755217075 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:16:48.777443886 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:16:48.898072958 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:16:49.173536062 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:16:49.173666954 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:16:59.178579092 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:16:59.298018932 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:16:59.573565006 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:16:59.573664904 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:17:09.584342957 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:17:09.703879118 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:17:09.979950905 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:17:09.980012894 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:17:19.990755081 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:17:20.110327959 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:17:20.386229992 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:17:20.386353016 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:17:20.587492943 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:17:20.587573051 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:17:30.600289106 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:17:30.719852924 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:17:30.995959997 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:17:30.996053934 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:17:41.006613016 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:17:41.126204967 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:17:41.401738882 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:17:41.401855946 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:17:41.602890968 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:17:41.602950096 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:17:51.617558002 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:17:51.737179041 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:17:52.013350010 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:17:52.013443947 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:18:02.025445938 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:18:02.144954920 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:18:02.420325041 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:18:02.420488119 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:18:12.428361893 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:18:12.547893047 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:18:12.827399969 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:18:12.827457905 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:18:13.028487921 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:18:13.028589010 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:18:23.037874937 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:18:23.157618046 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:18:23.432622910 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:18:23.432703018 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:18:23.633754969 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:18:23.633871078 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:18:33.647073984 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:18:33.766699076 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:18:34.042136908 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:18:34.042247057 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:18:44.053402901 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:18:44.172857046 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:18:44.448582888 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:18:44.448641062 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Nov 25, 2024 07:18:44.649621010 CET | 80 | 49736 | 172.93.121.126 | 192.168.2.4 |
Nov 25, 2024 07:18:44.649720907 CET | 49736 | 80 | 192.168.2.4 | 172.93.121.126 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 25, 2024 07:16:36.610707045 CET | 60856 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 25, 2024 07:16:36.750904083 CET | 53 | 60856 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 25, 2024 07:16:36.610707045 CET | 192.168.2.4 | 1.1.1.1 | 0xf929 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 25, 2024 07:16:36.750904083 CET | 1.1.1.1 | 192.168.2.4 | 0xf929 | No error (0) | 172.93.121.126 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49736 | 172.93.121.126 | 80 | 5684 | C:\Users\user\Desktop\Readouts.bat.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 25, 2024 07:16:37.501250029 CET | 166 | OUT | |
Nov 25, 2024 07:16:38.511192083 CET | 191 | IN | |
Nov 25, 2024 07:16:38.755135059 CET | 315 | IN | |
Nov 25, 2024 07:16:48.777443886 CET | 166 | OUT | |
Nov 25, 2024 07:16:49.173536062 CET | 506 | IN | |
Nov 25, 2024 07:16:59.178579092 CET | 166 | OUT | |
Nov 25, 2024 07:16:59.573565006 CET | 506 | IN | |
Nov 25, 2024 07:17:09.584342957 CET | 166 | OUT | |
Nov 25, 2024 07:17:09.979950905 CET | 506 | IN | |
Nov 25, 2024 07:17:19.990755081 CET | 166 | OUT | |
Nov 25, 2024 07:17:20.386229992 CET | 191 | IN | |
Nov 25, 2024 07:17:20.587492943 CET | 315 | IN | |
Nov 25, 2024 07:17:30.600289106 CET | 166 | OUT | |
Nov 25, 2024 07:17:30.995959997 CET | 506 | IN | |
Nov 25, 2024 07:17:41.006613016 CET | 166 | OUT | |
Nov 25, 2024 07:17:41.401738882 CET | 191 | IN | |
Nov 25, 2024 07:17:41.602890968 CET | 315 | IN | |
Nov 25, 2024 07:17:51.617558002 CET | 166 | OUT | |
Nov 25, 2024 07:17:52.013350010 CET | 506 | IN | |
Nov 25, 2024 07:18:02.025445938 CET | 166 | OUT | |
Nov 25, 2024 07:18:02.420325041 CET | 506 | IN | |
Nov 25, 2024 07:18:12.428361893 CET | 166 | OUT | |
Nov 25, 2024 07:18:12.827399969 CET | 191 | IN | |
Nov 25, 2024 07:18:13.028487921 CET | 315 | IN | |
Nov 25, 2024 07:18:23.037874937 CET | 166 | OUT | |
Nov 25, 2024 07:18:23.432622910 CET | 191 | IN | |
Nov 25, 2024 07:18:23.633754969 CET | 315 | IN | |
Nov 25, 2024 07:18:33.647073984 CET | 166 | OUT | |
Nov 25, 2024 07:18:34.042136908 CET | 506 | IN | |
Nov 25, 2024 07:18:44.053402901 CET | 166 | OUT | |
Nov 25, 2024 07:18:44.448582888 CET | 191 | IN | |
Nov 25, 2024 07:18:44.649621010 CET | 315 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 01:15:42 |
Start date: | 25/11/2024 |
Path: | C:\Users\user\Desktop\Readouts.bat.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 993'977 bytes |
MD5 hash: | 492707A5E753B9C5FAA6A9829E065775 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 4 |
Start time: | 01:16:29 |
Start date: | 25/11/2024 |
Path: | C:\Users\user\Desktop\Readouts.bat.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 993'977 bytes |
MD5 hash: | 492707A5E753B9C5FAA6A9829E065775 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 18.5% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 20.1% |
Total number of Nodes: | 1567 |
Total number of Limit Nodes: | 35 |
Graph
Function 00403359 Relevance: 86.2, APIs: 32, Strings: 17, Instructions: 410stringfilecomCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040542B Relevance: 66.8, APIs: 36, Strings: 2, Instructions: 284windowclipboardmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405996 Relevance: 17.6, APIs: 7, Strings: 3, Instructions: 148filestringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040698E Relevance: 5.4, APIs: 4, Instructions: 382COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401E49 Relevance: 3.0, APIs: 2, Instructions: 25COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403D22 Relevance: 58.1, APIs: 32, Strings: 1, Instructions: 346windowstringCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403974 Relevance: 47.5, APIs: 13, Strings: 14, Instructions: 215stringregistryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062A6 Relevance: 19.5, APIs: 7, Strings: 4, Instructions: 209stringCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040176F Relevance: 15.9, APIs: 5, Strings: 4, Instructions: 145stringtimeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004052EC Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 72stringwindowCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040264A Relevance: 10.7, APIs: 5, Strings: 1, Instructions: 153fileCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004065EE Relevance: 10.5, APIs: 3, Strings: 3, Instructions: 36libraryCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004023E4 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 64registrystringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406DC3 Relevance: 5.2, APIs: 4, Instructions: 236COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406FC4 Relevance: 5.2, APIs: 4, Instructions: 208COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406CDA Relevance: 5.2, APIs: 4, Instructions: 205COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004067DF Relevance: 5.2, APIs: 4, Instructions: 198COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406C2D Relevance: 5.2, APIs: 4, Instructions: 180COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406D4B Relevance: 5.2, APIs: 4, Instructions: 170COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406C97 Relevance: 5.2, APIs: 4, Instructions: 168COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402032 Relevance: 4.6, APIs: 3, Instructions: 73libraryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401B77 Relevance: 4.6, APIs: 2, Strings: 1, Instructions: 72memoryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6FBF2A74 Relevance: 3.2, APIs: 2, Instructions: 156fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C61 Relevance: 3.0, APIs: 2, Instructions: 47stringCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401389 Relevance: 3.0, APIs: 2, Instructions: 43windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405D7A Relevance: 3.0, APIs: 2, Instructions: 16fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405838 Relevance: 3.0, APIs: 2, Instructions: 9COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004027EF Relevance: 1.5, APIs: 1, Instructions: 28COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040230C Relevance: 1.5, APIs: 1, Instructions: 25COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E2C Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405DFD Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6FBF2997 Relevance: 1.5, APIs: 1, Instructions: 21memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404247 Relevance: 1.5, APIs: 1, Instructions: 9windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403311 Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404230 Relevance: 1.5, APIs: 1, Instructions: 6windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040421D Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404C68 Relevance: 63.5, APIs: 33, Strings: 3, Instructions: 481windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004046EC Relevance: 24.8, APIs: 10, Strings: 4, Instructions: 275stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6FBF1B63 Relevance: 20.1, APIs: 13, Instructions: 576stringlibrarymemoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402868 Relevance: 1.5, APIs: 1, Instructions: 30fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004043BA Relevance: 38.7, APIs: 19, Strings: 3, Instructions: 204windowstringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405ED0 Relevance: 21.1, APIs: 10, Strings: 2, Instructions: 130memorystringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404262 Relevance: 12.1, APIs: 8, Instructions: 68COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6FBF2398 Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 135memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404BB6 Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402DF3 Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 40timeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6FBF256D Relevance: 9.1, APIs: 6, Instructions: 109COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404AA8 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 84stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402598 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 69stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6FBF18DD Relevance: 7.7, APIs: 5, Instructions: 194COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401DB9 Relevance: 7.5, APIs: 5, Instructions: 43COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6FBF1621 Relevance: 7.5, APIs: 5, Instructions: 41memorylibraryloaderCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401D5D Relevance: 7.5, APIs: 5, Instructions: 39windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401C1F Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowtimeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405B59 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 16stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E79 Relevance: 6.0, APIs: 4, Instructions: 33COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405260 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 46windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406152 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 44registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040586D Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 24processCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405BA5 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 16stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6FBF10E1 Relevance: 5.1, APIs: 4, Instructions: 104memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405CDF Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|