Windows
Analysis Report
Qr0aoYPmZE.exe
Overview
General Information
Detection
Score: | 72 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64native
- Qr0aoYPmZE.exe (PID: 1476 cmdline:
C:\Users\u ser\Deskto p\Qr0aoYPm ZE.exe MD5: BC76BD7B332AA8F6AEDBB8E11B7BA9B6) - Sahofivizu.exe (PID: 5512 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\Sahofiv izu.exe" " C:\Users\u ser\Deskto p\Qr0aoYPm ZE.exe MD5: 7FE00CC4EA8429629AC0AC610DB51993) - WerFault.exe (PID: 5056 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 5 512 -s 236 MD5: 40A149513D721F096DDF50C04DA2F01F)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Static PE information: |
Source: | Code function: | 4_2_00405D07 | |
Source: | Code function: | 4_2_00405331 | |
Source: | Code function: | 4_2_0040263E |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Code function: | 4_2_00404EE8 |
System Summary |
---|
Source: | Joe Sandbox Cloud Basic: | Perma Link |
Source: | Static PE information: |
Source: | Process created: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Code function: | 4_2_004030FA |
Source: | Code function: | 4_2_00406128 | |
Source: | Code function: | 4_2_004046F9 | |
Source: | Code function: | 4_2_004068FF |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Classification label: |
Source: | Code function: | 4_2_00402020 |
Source: | File read: | Jump to behavior |
Source: | Code function: | 4_2_004041FC |
Source: | Code function: | 6_2_005E3A4E |
Source: | Code function: | 4_2_00405D2E |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Code function: | 6_2_004012F0 |
Source: | Code function: | 4_2_00405D07 | |
Source: | Code function: | 4_2_00405331 | |
Source: | Code function: | 4_2_0040263E |
Source: | API call chain: | graph_4-2867 | ||
Source: | API call chain: | graph_6-1815 |
Source: | Binary or memory string: |
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 4_2_00405D2E |
Source: | Process created: | Jump to behavior |
Source: | Code function: | 4_2_00405A2E |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | 1 Native API | 1 DLL Side-Loading | 11 Process Injection | 1 Virtualization/Sandbox Evasion | OS Credential Dumping | 121 Security Software Discovery | Remote Services | 1 Archive Collected Data | Exfiltration Over Other Network Medium | 1 Encrypted Channel | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | 1 System Shutdown/Reboot |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 11 Process Injection | LSASS Memory | 1 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 1 Clipboard Data | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | 1 Obfuscated Files or Information | Security Account Manager | 2 File and Directory Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | 1 Software Packing | NTDS | 4 System Information Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | Remote System Discovery | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | TR/AD.Gamarue.njjtd | ||
82% | Virustotal | Browse | ||
96% | ReversingLabs | Win32.Backdoor.Andromeda |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | HEUR/AGEN.1344339 | ||
100% | Avira | HEUR/AGEN.1358866 | ||
100% | Avira | HEUR/AGEN.1328180 | ||
100% | Avira | HEUR/AGEN.1328724 | ||
100% | Avira | HEUR/AGEN.1322941 | ||
77% | ReversingLabs | Win32.Trojan.Tiggre | ||
75% | Virustotal | Browse | ||
57% | ReversingLabs | Win32.Trojan.Generic | ||
61% | Virustotal | Browse | ||
64% | ReversingLabs | Win32.Backdoor.Andromeda | ||
74% | Virustotal | Browse | ||
78% | ReversingLabs | Win32.Trojan.Ursu | ||
76% | Virustotal | Browse | ||
67% | ReversingLabs | Win32.Trojan.Symmi | ||
67% | Virustotal | Browse |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high |
Joe Sandbox Version: | 38.0.0 Beryl |
Analysis ID: | 1317541 |
Start date and time: | 2023-10-01 15:49:22 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 6m 13s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301 |
Run name: | Potential for more IOCs and behavior |
Number of analysed new started processes analysed: | 12 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample file name: | Qr0aoYPmZE.exe |
Detection: | MAL |
Classification: | mal72.winEXE@4/12@0/0 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, RuntimeBroker.exe, backgroundTaskHost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 13.89.179.12
- Excluded domains from analysis (whitelisted): spclient.wg.spotify.com, login.live.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, onedsblobprdcus17.centralus.cloudapp.azure.com
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
Time | Type | Description |
---|---|---|
15:51:31 | API Interceptor |
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Sahofivizu.exe_99171066bc99f4afaf39e8633f36db99d51c7fd_7dc17cab_0bb4b60b-0900-464a-91a3-513535e1976c\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.7508777981557769 |
Encrypted: | false |
SSDEEP: | 96:e6FfLysnh7zxz7fwbvXIxcQvc6QcEscw3P+HbHg/8BRTf3eSOyWZAXQ65FMTPS62:tlLywAmBUWYjKqDu76XfAIO8YWVT |
MD5: | FD1D85F623E3EA07FD07518974E43FE3 |
SHA1: | 0311F5444BDE4C89E35249FB3D71F6206C518469 |
SHA-256: | E6CE3707019852C41ED963C77845C39FF3C4BE40836CB57878409828699113BE |
SHA-512: | E93891473D3A6F098A1B55C5BCDFFDA71D1FC648BC45B8067AC293D6212F90B991C8DF204F93786160BD99114642ECBD6125F25EF28D4CDAFA6634E8461A239B |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 36978 |
Entropy (8bit): | 1.8624331350750023 |
Encrypted: | false |
SSDEEP: | 96:5m8wGsVTgsi7O7MF96Gnyurqkkdkvr/kxCkjTyu6t6E8WI9bIX4ID8bDFQqBmy:7eNxOOYzkdkvj9kjTh6t1j8vF9gy |
MD5: | 2CFE0160A896034789EAADC78628205F |
SHA1: | 32889FDA3371CB84500836F2C4D63163C3F68C7A |
SHA-256: | 700377218C96200763D4BFE348DB93D3A662AE9AE82FF8F6D60AE49A9D9F5F6E |
SHA-512: | 793572AD3730F4FA0A671F08BE2A4170339F5649321F48E5D3D30C7D5A788EFC7B026BFC223AE281126AF5B51525DACC43E64B6D3149D561E69E49B8743ECBBD |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6284 |
Entropy (8bit): | 3.7212117912618896 |
Encrypted: | false |
SSDEEP: | 192:R9l7lZNigL6ZCwYG4wCwprJ89bNjsfcvm:R9lnNis6ZCwYG4wwNIfp |
MD5: | 099D2CFB2DC070EA27F8EA5426B92A80 |
SHA1: | 18F19CC397CE9E30256A3054B7FE5B928B5980F1 |
SHA-256: | 35F2EC47F82987F013A41E73FF5BDC75FA8B173396EAE67855C2353E7C2EB25F |
SHA-512: | 24EF8CE9BBB3156C901BCED0E6F64C75E64A15FE6CB679D3C388B0F54996BBA6E6DBDBCFA92E0A3E2B06E8F3D310A2DE3160C70E0877B1B9B825D33A41965E5A |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4744 |
Entropy (8bit): | 4.507983458925909 |
Encrypted: | false |
SSDEEP: | 48:cvIwwtl8zsHe702I7VFJ5WS2CfjkBs3rm8M4JoXFv4+q8NBnQABeL6d:uILf+7GySPfhJ8485eL6d |
MD5: | 11071E9837FD8DDBE4E411ECF4FA3784 |
SHA1: | DA35A38EF7406339A000054FF7B7F21E801620C0 |
SHA-256: | 9A563D2E02D81A76AEB5A17CB9B7FB23DBB15C0AFAB6173918969E73C569C855 |
SHA-512: | 4FB96D40906697BA8241862C34D2089E2D39047591130EB906B5FC2EB7F62A2C1F7C5B2F8D5A752B35219420BFED9306B4967F8136A05A43600B2578B6244962 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Qr0aoYPmZE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4608 |
Entropy (8bit): | 3.3074171093110873 |
Encrypted: | false |
SSDEEP: | 48:CXqWBMk6A7qZ2LcYKEbcqNCCC81iBtYf86SyuUH5npNpRppv5D:Cqv2cOCCC81Aw8hyBnNvv |
MD5: | 7AC02E7E2C7EC30BFC8C946D12DF26A0 |
SHA1: | 079FF9DBFC5AF1D4DC569203847F50A8B30B5056 |
SHA-256: | 71CFBE0622AEA1248EFF7CA09095493B3D47DF40E0936493B098D770551213F3 |
SHA-512: | DAC09E5CA0BDA7A9094A34F17B6606767B4A1E308148BFC1AC7E1C0AA55404C4AA50366C8F5F9BC2D225BE88D9290CCB7F55AECF71CB400528538367A2E2CA3F |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Qr0aoYPmZE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 20480 |
Entropy (8bit): | 3.1878975851833986 |
Encrypted: | false |
SSDEEP: | 192:1AFmqdxP1oynRg94DELe9vZ/wJcVuhWEx:yFL1Q9eR6hTx |
MD5: | 7FE00CC4EA8429629AC0AC610DB51993 |
SHA1: | 5B2B4BF75EF99D03D3EA3A778E0BD0B124C5E70B |
SHA-256: | 9827E20FFED86C23DD493845F03A9041977C5CF0E5DA14EDFEB7EDADFAA34508 |
SHA-512: | F1E919C53E6829447F03AAFEDFC0128CEC4F03C21CC127A26C9CB336D42DEBF94703C9939976EE9B74F629C6713CB571F178D500503BE88E8A2D770AA2843BF5 |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Qr0aoYPmZE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 131072 |
Entropy (8bit): | 7.980181192486164 |
Encrypted: | false |
SSDEEP: | 1536:gVbB3S+6LC/SQd6sTGmGEWx+JWgxhfCvWYjo/pk2X+FMCZTtkUn4rEeaMj31e5+P:KhTSQ0omUyD2X8htksIae31fX9cnheF7 |
MD5: | 0F12B3226FE28398608E4F48B3FAFCA2 |
SHA1: | 38B5BFD50DF9775C8ED379A0FA5F43979411E252 |
SHA-256: | 7637E855C4F59DDFE01C9857FBDFF59036177BC1B439B4B0A24E14BC2E3E509A |
SHA-512: | 089DBFF0BFB72F3925E67055D45D357602D999AFAF7E82238AF18A2D3C86C9B1C37672C049E14939B3E414B11875DD70EF31F72D29B3ADA68D826081B5C347AF |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Qr0aoYPmZE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 3072 |
Entropy (8bit): | 2.9848615810105574 |
Encrypted: | false |
SSDEEP: | 24:eFGSWUcWLuSDlkGPfe58//zYVVfiRHtaU4VExxSIVSPAEVlcr7:iWGLvybcMDfXtVe4PAylcr |
MD5: | 3ED0F4B16841CCF3C6D613E77BCEF3CD |
SHA1: | 751E4846DB47CCF5F94DB4CA198E96E77A7032E7 |
SHA-256: | A9B7526FE7C988F2219FA3B726DC2F771DE38C31593C3B8DAD3AC06E60135AC3 |
SHA-512: | 6D44120D28AB5CA8164423C428EDDBF488C605A56F20794BB96618E8539AA50F9A24B9FD48E58001CEB95EC7932DC96BC48CB3F9C732FA0481F76C81F91CFFCB |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Qr0aoYPmZE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 17408 |
Entropy (8bit): | 6.081723116162573 |
Encrypted: | false |
SSDEEP: | 192:MwPLlx5c4kJlbOxPDAE/mZBdZDEql+frQXYezGGK5vJgZa+HNgt/GI/x0mqESzyj:nsORXml/gDJuyt/RqyyuFX4o947Q |
MD5: | F0C82EE96B56BF20D2B1CE93F7C0F941 |
SHA1: | 432B3E4B9A1362D267630655DD44FEE58C49A2F0 |
SHA-256: | E6E1FA7A937C3CFA383C7A5CC5D1723E551A8AF62A03C7D8AF46504384D7993D |
SHA-512: | 0A342A87300C8BE6E1558A2729418A286F2770AE51960083289B25055659F27B3CC8870636660ECA67CC0C0A88D4E416B48B8ABFA0B709D434A953D6E59220D2 |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Qr0aoYPmZE.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4096 |
Entropy (8bit): | 3.080260047634796 |
Encrypted: | false |
SSDEEP: | 24:ev1GSqYDIuQyKxsq1X//oRVCR7tqU4xbaVZGy1Uua0wlqF4JNeS4G8Xq5S493Q00:qq4IBvsW/uTtx2OySuF30lN3T74 |
MD5: | 81F429115E1AFD4A95DA0A8A73E4ACD1 |
SHA1: | 520F4618A20E20E2ACC2382AF16CA244FE42B97E |
SHA-256: | 29D1AC834EDB48C1A75C90CF896EF27A53366BFECDEE7D65DDBB6621DC540200 |
SHA-512: | 350994DB9C153E5CE2DD62D3C759378E0CD091F8FBD67E6D555FF34266C4BB5097FB376DC007D89EEDF939DA05BDBFFE00EF2A9A8EA2C0048C309702D1163619 |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2359296 |
Entropy (8bit): | 4.363725119761993 |
Encrypted: | false |
SSDEEP: | 49152:32+pPRtI5e9HbrpM89jJsRagmcnYJ1z80s:6 |
MD5: | D3C734F43D0A5382AA66E2133A714E19 |
SHA1: | E23F19A351D998FD0963DAE5863A09711E39B4E2 |
SHA-256: | B73C3BCD8A5E52D2C731BABCDFD0B4819A6ACBE040A6715FDD438613D0237543 |
SHA-512: | 2C73E268FCE1BC1352331BDF5043D391065DB4D19D13B245167C19FB9E1903556A354F256729625B8389136ABCA038A7BD6F56745D5A420E89EB498089E6A4C2 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 98304 |
Entropy (8bit): | 2.7005491090744043 |
Encrypted: | false |
SSDEEP: | 768:vmQyPpn9hOy/OTBiefuYiJU6gnuVnfRnNqOB6yG2fKrTd9vaiHdefjFBBp5/9a38:eZuouQp4kuTdwiQTV8gGfurut |
MD5: | 8CB0A7071C6546B77BBBCB5303AC6D54 |
SHA1: | CE9FE59F485D000DBF3F07D289AF4578137611E3 |
SHA-256: | 48100ABE4F6E590FD42D63A57294D1D034110B9EB4278644F9FEEDE25EFC8A88 |
SHA-512: | 7BB9B2CDF681B9CDBC05764532E3441C9D634555FF6183BDF036C1164797F4A3C5E5A18F807EF031BF36E4D46DC2513FF4716F946A0A2CB317B103B6C069CB87 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.67760121359675 |
TrID: |
|
File name: | Qr0aoYPmZE.exe |
File size: | 196'227 bytes |
MD5: | bc76bd7b332aa8f6aedbb8e11b7ba9b6 |
SHA1: | c6858031315a50ec87e37966291ec69b64600efb |
SHA256: | 9535a9bb1ae8f620d7cbd7d9f5c20336b0fd2c78d1a7d892d76e4652dd8b2be7 |
SHA512: | c74a8a893d0d91ef9423c75c14e701102f01d46b4638d7e3184c95bfd4ff29f9cab71fe5de45e8e201dcdb8df77e952a18e32bfed5014b9c8155c189825f37e9 |
SSDEEP: | 3072:ugXdZt9P6D3XJ3TCM/vosUE2L/TLqtAyD2XXhtksIae31fXJHhKgzyJtdeV:ue34p/vr6yrC2sJe35ZBKg0dW |
TLSH: | 6B14024364F582BFD6820432D5B92B79D77BCD8D438A7A470B447F21BA318D3C909E8A |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..iu..i...iw..iu..i...i...id..i!..i...i...it..iRichu..i........................PE..L......K.................^......... |
Icon Hash: | 9270c4ccc6741c42 |
Entrypoint: | 0x4030fa |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
DLL Characteristics: | TERMINAL_SERVER_AWARE |
Time Stamp: | 0x4B1AE3CC [Sat Dec 5 22:50:52 2009 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 7fa974366048f9c551ef45714595665e |
Instruction |
---|
sub esp, 00000180h |
push ebx |
push ebp |
push esi |
xor ebx, ebx |
push edi |
mov dword ptr [esp+18h], ebx |
mov dword ptr [esp+10h], 00409160h |
xor esi, esi |
mov byte ptr [esp+14h], 00000020h |
call dword ptr [00407030h] |
push 00008001h |
call dword ptr [004070B0h] |
push ebx |
call dword ptr [0040727Ch] |
push 00000008h |
mov dword ptr [0042EC18h], eax |
call 00007FA89061EAC6h |
mov dword ptr [0042EB64h], eax |
push ebx |
lea eax, dword ptr [esp+34h] |
push 00000160h |
push eax |
push ebx |
push 00428F98h |
call dword ptr [00407158h] |
push 00409154h |
push 0042E360h |
call 00007FA89061E779h |
call dword ptr [004070ACh] |
mov edi, 00434000h |
push eax |
push edi |
call 00007FA89061E767h |
push ebx |
call dword ptr [0040710Ch] |
cmp byte ptr [00434000h], 00000022h |
mov dword ptr [0042EB60h], eax |
mov eax, edi |
jne 00007FA89061BEDCh |
mov byte ptr [esp+14h], 00000022h |
mov eax, 00434001h |
push dword ptr [esp+14h] |
push eax |
call 00007FA89061E25Ah |
push eax |
call dword ptr [0040721Ch] |
mov dword ptr [esp+1Ch], eax |
jmp 00007FA89061BF35h |
cmp cl, 00000020h |
jne 00007FA89061BED8h |
inc eax |
cmp byte ptr [eax], 00000020h |
je 00007FA89061BECCh |
cmp byte ptr [eax], 00000022h |
mov byte ptr [eax+eax+00h], 00000000h |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x74b0 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x37000 | 0x43f8 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x7000 | 0x28c | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x5c4c | 0x5e00 | False | 0.6697140957446809 | data | 6.440105549497952 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x7000 | 0x129c | 0x1400 | False | 0.43359375 | data | 5.046835307909969 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x9000 | 0x25c58 | 0x400 | False | 0.5849609375 | data | 4.801003752715384 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x2f000 | 0x8000 | 0x0 | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x37000 | 0x43f8 | 0x4400 | False | 0.16670496323529413 | data | 2.6375067972964095 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x37238 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9216 | English | United States | 0.09076763485477178 |
RT_ICON | 0x397e0 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4096 | English | United States | 0.14118198874296436 |
RT_ICON | 0x3a888 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.3891843971631206 |
RT_DIALOG | 0x3acf0 | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0x3adf0 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x3af10 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x3af70 | 0x30 | data | English | United States | 0.8541666666666666 |
RT_VERSION | 0x3afa0 | 0x184 | MS Windows COFF Alpha object file | English | United States | 0.5463917525773195 |
RT_MANIFEST | 0x3b128 | 0x2cc | XML 1.0 document, ASCII text, with very long lines (716), with no line terminators | English | United States | 0.5656424581005587 |
DLL | Import |
---|---|
KERNEL32.dll | CompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, GetTickCount, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, GetWindowsDirectoryA, SetFileTime, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, GetVersion, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, GetTempPathA |
USER32.dll | EndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow |
GDI32.dll | SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject |
SHELL32.dll | SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation |
ADVAPI32.dll | RegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA |
COMCTL32.dll | ImageList_AddMasked, ImageList_Destroy, ImageList_Create |
ole32.dll | CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance |
VERSION.dll | GetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 4 |
Start time: | 15:51:21 |
Start date: | 01/10/2023 |
Path: | C:\Users\user\Desktop\Qr0aoYPmZE.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 196'227 bytes |
MD5 hash: | BC76BD7B332AA8F6AEDBB8E11B7BA9B6 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 6 |
Start time: | 15:51:22 |
Start date: | 01/10/2023 |
Path: | C:\Users\user\AppData\Local\Temp\Sahofivizu.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 20'480 bytes |
MD5 hash: | 7FE00CC4EA8429629AC0AC610DB51993 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 10 |
Start time: | 15:51:28 |
Start date: | 01/10/2023 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x50000 |
File size: | 482'640 bytes |
MD5 hash: | 40A149513D721F096DDF50C04DA2F01F |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Execution Graph
Execution Coverage: | 14.4% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 22.8% |
Total number of Nodes: | 1217 |
Total number of Limit Nodes: | 24 |
Graph
Function 004030FA Relevance: 68.5, APIs: 24, Strings: 15, Instructions: 270filestringcomCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00405331 Relevance: 21.2, APIs: 9, Strings: 3, Instructions: 156filestringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00405D07 Relevance: 3.0, APIs: 2, Instructions: 14fileCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00403555 Relevance: 47.5, APIs: 15, Strings: 12, Instructions: 216stringregistrylibraryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00402E5B Relevance: 14.2, APIs: 6, Strings: 2, Instructions: 174fileCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00401734 Relevance: 14.1, APIs: 5, Strings: 3, Instructions: 147stringtimeCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00401389 Relevance: 3.0, APIs: 2, Instructions: 43windowCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004056E3 Relevance: 3.0, APIs: 2, Instructions: 16fileCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00401B06 Relevance: 2.6, APIs: 2, Instructions: 72memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040307D Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00401595 Relevance: 1.5, APIs: 1, Instructions: 18COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004030AF Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040347B Relevance: 1.3, APIs: 1, Instructions: 11COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040552A Relevance: 1.3, APIs: 1, Instructions: 10COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00404EE8 Relevance: 65.0, APIs: 36, Strings: 1, Instructions: 278windowclipboardmemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004046F9 Relevance: 63.5, APIs: 33, Strings: 3, Instructions: 478windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004041FC Relevance: 21.3, APIs: 10, Strings: 2, Instructions: 266stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00405A2E Relevance: 19.4, APIs: 8, Strings: 3, Instructions: 197stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040263E Relevance: 1.5, APIs: 1, Instructions: 29fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00406128 Relevance: .3, Instructions: 334COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004068FF Relevance: .3, Instructions: 300COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00403F06 Relevance: 40.5, APIs: 20, Strings: 3, Instructions: 204windowstringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040575A Relevance: 22.9, APIs: 11, Strings: 2, Instructions: 144filememoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00403E25 Relevance: 12.1, APIs: 8, Instructions: 61COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00404679 Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00402B3B Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 40timeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00401F51 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 73libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00402303 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 71registrystringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00401CC1 Relevance: 7.5, APIs: 5, Instructions: 39windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00404597 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 78stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00401BAD Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 76windowtimeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040526C Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 24processCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004054FF Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 16stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00401EC5 Relevance: 6.1, APIs: 4, Instructions: 54memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00401D1B Relevance: 6.0, APIs: 4, Instructions: 34COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00402BBE Relevance: 6.0, APIs: 4, Instructions: 33COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00404CFA Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 58windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004024BE Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 34filestringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00405546 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 16stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00405658 Relevance: 5.0, APIs: 4, Instructions: 30stringCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Execution Graph
Execution Coverage: | 9.4% |
Dynamic/Decrypted Code Coverage: | 86.3% |
Signature Coverage: | 3.4% |
Total number of Nodes: | 291 |
Total number of Limit Nodes: | 4 |
Graph
Callgraph
Function 004012F0 Relevance: 36.9, APIs: 15, Strings: 6, Instructions: 189windowCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00711000 Relevance: 10.5, APIs: 7, Instructions: 46fileCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 005E24FE Relevance: 5.1, APIs: 4, Instructions: 53memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 005E161E Relevance: 3.0, APIs: 2, Instructions: 20memoryCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004011F0 Relevance: 1.5, APIs: 1, Instructions: 20COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 005E25AF Relevance: 1.3, APIs: 1, Instructions: 85memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 005E26E8 Relevance: 1.3, APIs: 1, Instructions: 21memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00401636 Relevance: 16.6, APIs: 11, Instructions: 111COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 005E2FD5 Relevance: 15.8, APIs: 4, Strings: 5, Instructions: 50libraryloaderCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 005E1D0E Relevance: 14.1, APIs: 3, Strings: 5, Instructions: 100fileCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 005E34B0 Relevance: 13.7, APIs: 9, Instructions: 177COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 005E1BA3 Relevance: 12.1, APIs: 8, Instructions: 132COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 005E36FF Relevance: 9.1, APIs: 6, Instructions: 117COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 005E165A Relevance: 7.5, APIs: 5, Instructions: 38memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 005E1000 Relevance: 7.2, APIs: 1, Strings: 3, Instructions: 223libraryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |