Windows
Analysis Report
avx_Cracked.exe
Overview
General Information
Detection
Score: | 96 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- avx_Cracked.exe (PID: 7152 cmdline:
"C:\Users\ user\Deskt op\avx_Cra cked.exe" MD5: 604F557A561320764432A9A0FEAB44C0)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Mofksys | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Mofksys | Yara detected Mofksys | Joe Security | ||
JoeSecurity_Mofksys | Yara detected Mofksys | Joe Security | ||
JoeSecurity_Mofksys | Yara detected Mofksys | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Mofksys | Yara detected Mofksys | Joe Security |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Spreading |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
System Summary |
---|
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_0042805B | |
Source: | Code function: | 0_2_0042606B | |
Source: | Code function: | 0_2_0063E05B | |
Source: | Code function: | 0_2_00422000 | |
Source: | Code function: | 0_2_00426007 | |
Source: | Code function: | 0_2_0042200A | |
Source: | Code function: | 0_2_00634028 | |
Source: | Code function: | 0_2_0042200F | |
Source: | Code function: | 0_2_00422014 | |
Source: | Code function: | 0_2_00426019 | |
Source: | Code function: | 0_2_00422023 | |
Source: | Code function: | 0_2_00638009 | |
Source: | Code function: | 0_2_00642015 | |
Source: | Code function: | 0_2_00616015 | |
Source: | Code function: | 0_2_0064601C | |
Source: | Code function: | 0_2_00427171 | |
Source: | Code function: | 0_2_0042B246 | |
Source: | Code function: | 0_2_00422269 | |
Source: | Code function: | 0_2_0042527B | |
Source: | Code function: | 0_2_0042221E | |
Source: | Code function: | 0_2_0042F226 | |
Source: | Code function: | 0_2_00422225 | |
Source: | Code function: | 0_2_004252C7 | |
Source: | Code function: | 0_2_004252CC | |
Source: | Code function: | 0_2_004252D1 | |
Source: | Code function: | 0_2_0063A2CA | |
Source: | Code function: | 0_2_0042E2F7 | |
Source: | Code function: | 0_2_00422284 | |
Source: | Code function: | 0_2_00426288 | |
Source: | Code function: | 0_2_00422289 | |
Source: | Code function: | 0_2_0042234C | |
Source: | Code function: | 0_2_00422351 | |
Source: | Code function: | 0_2_00424359 | |
Source: | Code function: | 0_2_0042337B | |
Source: | Code function: | 0_2_004223C4 | |
Source: | Code function: | 0_2_004223CE | |
Source: | Code function: | 0_2_004223D3 | |
Source: | Code function: | 0_2_004293D3 | |
Source: | Code function: | 0_2_004253F8 | |
Source: | Code function: | 0_2_00425443 | |
Source: | Code function: | 0_2_00425448 | |
Source: | Code function: | 0_2_00425452 | |
Source: | Code function: | 0_2_00428452 | |
Source: | Code function: | 0_2_00425457 | |
Source: | Code function: | 0_2_0042545C | |
Source: | Code function: | 0_2_00425461 | |
Source: | Code function: | 0_2_00426422 | |
Source: | Code function: | 0_2_00426427 | |
Source: | Code function: | 0_2_00426431 | |
Source: | Code function: | 0_2_00428435 | |
Source: | Code function: | 0_2_004254EA | |
Source: | Code function: | 0_2_0042457F | |
Source: | Code function: | 0_2_0042A502 | |
Source: | Code function: | 0_2_0042951C | |
Source: | Code function: | 0_2_00429531 | |
Source: | Code function: | 0_2_00424589 | |
Source: | Code function: | 0_2_00430643 | |
Source: | Code function: | 0_2_00430655 | |
Source: | Code function: | 0_2_0043065A | |
Source: | Code function: | 0_2_0043065F | |
Source: | Code function: | 0_2_00430664 | |
Source: | Code function: | 0_2_00430669 | |
Source: | Code function: | 0_2_0043066E | |
Source: | Code function: | 0_2_00430673 | |
Source: | Code function: | 0_2_004296CB | |
Source: | Code function: | 0_2_004306CD | |
Source: | Code function: | 0_2_004296D0 | |
Source: | Code function: | 0_2_004286E6 | |
Source: | Code function: | 0_2_004246BA | |
Source: | Code function: | 0_2_004246BF | |
Source: | Code function: | 0_2_004306BE | |
Source: | Code function: | 0_2_00430740 | |
Source: | Code function: | 0_2_0042475F | |
Source: | Code function: | 0_2_0043075E | |
Source: | Code function: | 0_2_00430763 | |
Source: | Code function: | 0_2_00424769 | |
Source: | Code function: | 0_2_00430768 | |
Source: | Code function: | 0_2_0042476E | |
Source: | Code function: | 0_2_0043076D | |
Source: | Code function: | 0_2_00430772 | |
Source: | Code function: | 0_2_00424778 | |
Source: | Code function: | 0_2_0042477D | |
Source: | Code function: | 0_2_0042B7CF | |
Source: | Code function: | 0_2_0043078B | |
Source: | Code function: | 0_2_00430790 | |
Source: | Code function: | 0_2_0042A7AB | |
Source: | Code function: | 0_2_0042A7BA | |
Source: | Code function: | 0_2_00422854 | |
Source: | Code function: | 0_2_00430876 | |
Source: | Code function: | 0_2_00422875 | |
Source: | Code function: | 0_2_0043087B | |
Source: | Code function: | 0_2_0042F830 | |
Source: | Code function: | 0_2_004278C9 | |
Source: | Code function: | 0_2_004308F8 | |
Source: | Code function: | 0_2_00430880 | |
Source: | Code function: | 0_2_00430885 | |
Source: | Code function: | 0_2_0043088A | |
Source: | Code function: | 0_2_0043088F | |
Source: | Code function: | 0_2_00430899 | |
Source: | Code function: | 0_2_0043089E | |
Source: | Code function: | 0_2_004308A3 | |
Source: | Code function: | 0_2_004268A0 | |
Source: | Code function: | 0_2_004228AC | |
Source: | Code function: | 0_2_004238B3 | |
Source: | Code function: | 0_2_004308BC | |
Source: | Code function: | 0_2_00424952 | |
Source: | Code function: | 0_2_00430902 | |
Source: | Code function: | 0_2_0043092F | |
Source: | Code function: | 0_2_004259F9 | |
Source: | Code function: | 0_2_00430984 | |
Source: | Code function: | 0_2_00430989 | |
Source: | Code function: | 0_2_00425A44 | |
Source: | Code function: | 0_2_00425A4E | |
Source: | Code function: | 0_2_00430A6F | |
Source: | Code function: | 0_2_00430A74 | |
Source: | Code function: | 0_2_00430A79 | |
Source: | Code function: | 0_2_00430A7E | |
Source: | Code function: | 0_2_00425A0D | |
Source: | Code function: | 0_2_00425A12 | |
Source: | Code function: | 0_2_00425A17 | |
Source: | Code function: | 0_2_00425A21 | |
Source: | Code function: | 0_2_00425A26 | |
Source: | Code function: | 0_2_00425A2B | |
Source: | Code function: | 0_2_00425A30 | |
Source: | Code function: | 0_2_00425A35 | |
Source: | Code function: | 0_2_00425A3A | |
Source: | Code function: | 0_2_00425AC1 | |
Source: | Code function: | 0_2_00611AEB | |
Source: | Code function: | 0_2_0060BACB | |
Source: | Code function: | 0_2_00430A83 | |
Source: | Code function: | 0_2_00425A85 | |
Source: | Code function: | 0_2_00425A8F | |
Source: | Code function: | 0_2_00430A8D | |
Source: | Code function: | 0_2_0060DAAF | |
Source: | Code function: | 0_2_00428A8D | |
Source: | Code function: | 0_2_00430A92 | |
Source: | Code function: | 0_2_00430A97 | |
Source: | Code function: | 0_2_00425A94 | |
Source: | Code function: | 0_2_00425A99 | |
Source: | Code function: | 0_2_00425A9E | |
Source: | Code function: | 0_2_00430A9C | |
Source: | Code function: | 0_2_00425AA3 | |
Source: | Code function: | 0_2_00430AA1 | |
Source: | Code function: | 0_2_00430AA6 | |
Source: | Code function: | 0_2_00425AAD | |
Source: | Code function: | 0_2_00425AB2 | |
Source: | Code function: | 0_2_00430AB0 | |
Source: | Code function: | 0_2_00430AB5 | |
Source: | Code function: | 0_2_00425ABC | |
Source: | Code function: | 0_2_0042DB7A | |
Source: | Code function: | 0_2_00430B0A | |
Source: | Code function: | 0_2_00429B32 | |
Source: | Code function: | 0_2_00425B87 | |
Source: | Code function: | 0_2_00605BA7 | |
Source: | Code function: | 0_2_0042DB85 | |
Source: | Code function: | 0_2_005EDB86 | |
Source: | Code function: | 0_2_00425B98 | |
Source: | Code function: | 0_2_0042FBBE | |
Source: | Code function: | 0_2_00609C67 | |
Source: | Code function: | 0_2_00412C10 | |
Source: | Code function: | 0_2_0042CCC2 | |
Source: | Code function: | 0_2_00426CC0 | |
Source: | Code function: | 0_2_00424CC7 | |
Source: | Code function: | 0_2_00425CC4 | |
Source: | Code function: | 0_2_00425CC9 | |
Source: | Code function: | 0_2_00426CC9 | |
Source: | Code function: | 0_2_00425CCE | |
Source: | Code function: | 0_2_00426CCE | |
Source: | Code function: | 0_2_00424CD2 | |
Source: | Code function: | 0_2_00425CE3 | |
Source: | Code function: | 0_2_00422CF7 | |
Source: | Code function: | 0_2_00427CF8 | |
Source: | Code function: | 0_2_00422CFC | |
Source: | Code function: | 0_2_00430C95 | |
Source: | Code function: | 0_2_00425CBF | |
Source: | Code function: | 0_2_00425D46 | |
Source: | Code function: | 0_2_00425D4B | |
Source: | Code function: | 0_2_00422D01 | |
Source: | Code function: | 0_2_00422D0B | |
Source: | Code function: | 0_2_00423DC3 | |
Source: | Code function: | 0_2_00423DC8 | |
Source: | Code function: | 0_2_00423DCD | |
Source: | Code function: | 0_2_00423DD7 | |
Source: | Code function: | 0_2_00423DDC | |
Source: | Code function: | 0_2_00423D9F | |
Source: | Code function: | 0_2_00423DBE | |
Source: | Code function: | 0_2_00425DBC | |
Source: | Code function: | 0_2_005E3E44 | |
Source: | Code function: | 0_2_00423E5E | |
Source: | Code function: | 0_2_00423E63 | |
Source: | Code function: | 0_2_00423E6D | |
Source: | Code function: | 0_2_00423E72 | |
Source: | Code function: | 0_2_00430E0A | |
Source: | Code function: | 0_2_00425E0E | |
Source: | Code function: | 0_2_00423E18 | |
Source: | Code function: | 0_2_0042EE27 | |
Source: | Code function: | 0_2_00435EC9 | |
Source: | Code function: | 0_2_00423EEB | |
Source: | Code function: | 0_2_0042DEEE | |
Source: | Code function: | 0_2_00423E86 | |
Source: | Code function: | 0_2_00429E8E | |
Source: | Code function: | 0_2_00423E90 | |
Source: | Code function: | 0_2_00423E95 | |
Source: | Code function: | 0_2_00429EBC | |
Source: | Code function: | 0_2_00431F7D | |
Source: | Code function: | 0_2_0042AF08 | |
Source: | Code function: | 0_2_00422F3B | |
Source: | Code function: | 0_2_00423FC1 | |
Source: | Code function: | 0_2_00423FC6 | |
Source: | Code function: | 0_2_00423FCB | |
Source: | Code function: | 0_2_00621FF0 | |
Source: | Code function: | 0_2_00617FF3 | |
Source: | Code function: | 0_2_0063BFD0 | |
Source: | Code function: | 0_2_0062DFD6 | |
Source: | Code function: | 0_2_00425F8B | |
Source: | Code function: | 0_2_00423F94 | |
Source: | Code function: | 0_2_00425F9D | |
Source: | Code function: | 0_2_00423FA6 | |
Source: | Code function: | 0_2_00423FAD | |
Source: | Code function: | 0_2_00423FB7 | |
Source: | Code function: | 0_2_00625F98 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Binary or memory string: |
Source: | Classification label: |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_00693FE8 | |
Source: | Code function: | 0_2_007CB0E4 | |
Source: | Code function: | 0_2_007050B9 | |
Source: | Code function: | 0_2_006A50AD | |
Source: | Code function: | 0_2_0071D07D | |
Source: | Code function: | 0_2_0071D084 | |
Source: | Code function: | 0_2_006E5061 | |
Source: | Code function: | 0_2_006E5079 | |
Source: | Code function: | 0_2_0080D0FF | |
Source: | Code function: | 0_2_0080D16C | |
Source: | Code function: | 0_2_007AA04B | |
Source: | Code function: | 0_2_00640079 | |
Source: | Code function: | 0_2_00640092 | |
Source: | Code function: | 0_2_0064507B | |
Source: | Code function: | 0_2_006450EB | |
Source: | Code function: | 0_2_0063E081 | |
Source: | Code function: | 0_2_0063E0F7 | |
Source: | Code function: | 0_2_0063E12B | |
Source: | Code function: | 0_2_0063E159 | |
Source: | Code function: | 0_2_0063E211 | |
Source: | Code function: | 0_2_0063E223 | |
Source: | Code function: | 0_2_0063E289 | |
Source: | Code function: | 0_2_0063E29F | |
Source: | Code function: | 0_2_0063E2B5 | |
Source: | Code function: | 0_2_0063E310 | |
Source: | Code function: | 0_2_0063E377 | |
Source: | Code function: | 0_2_0063E464 | |
Source: | Code function: | 0_2_0063E47F | |
Source: | Code function: | 0_2_0063E4DA | |
Source: | Code function: | 0_2_0063E50F | |
Source: | Code function: | 0_2_0063E528 |
Source: | Static PE information: |
Boot Survival |
---|
Source: | Window searched: | Jump to behavior | ||
Source: | Window searched: | Jump to behavior | ||
Source: | Window searched: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | System information queried: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Registry key queried: | Jump to behavior | ||
Source: | Registry key queried: | Jump to behavior | ||
Source: | Registry key queried: | Jump to behavior |
Source: | Code function: | 0_2_00403A5C |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | System information queried: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Anti Debugging |
---|
Source: | Process Stats: |
Source: | Thread information set: | Jump to behavior |
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 441 Virtualization/Sandbox Evasion | OS Credential Dumping | 621 Security Software Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Software Packing | LSASS Memory | 441 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 DLL Side-Loading | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 2 Obfuscated Files or Information | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | 2 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
58% | ReversingLabs | Win32.Trojan.Barys | ||
100% | Avira | TR/Dropper.Gen | ||
100% | Joe Sandbox ML |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1442325 |
Start date and time: | 2024-05-16 01:07:05 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 53s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 4 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | avx_Cracked.exe |
Detection: | MAL |
Classification: | mal96.spre.evad.winEXE@1/1@0/0 |
EGA Information: | Failed |
HCA Information: | Failed |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target avx_Cracked.exe, PID 7152 because it is empty
- VT rate limit hit for: avx_Cracked.exe
Time | Type | Description |
---|---|---|
01:08:42 | API Interceptor |
Process: | C:\Users\user\Desktop\avx_Cracked.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 114688 |
Entropy (8bit): | 7.609759718977058 |
Encrypted: | false |
SSDEEP: | 1536:Ka3a0GZYNOWNMTOec6ppTusdwGqF5rHWjbD8Y2dRO8uOP6hxb2/drPX5eJ:Ka3afKOWcOeNp9uJHWTSHuOCh1gX5+ |
MD5: | 9EED317AD2FABE816102284C7B1F4C2F |
SHA1: | 083D9918084CD2977CCAD1643A75CC256D0D65E0 |
SHA-256: | 4FF24F854ECEF1913C7839553BCEF20EA9F4D193406E897B5116AFD95D8151A9 |
SHA-512: | 141A56A268BB848A316FEBC2F191E4012516AA8825FC14B4D88105C6031D33A3C8D02F0D187F57CAE15301168EC9E57AABA08AB955D85E97B82647ABA08673CE |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.98579369592106 |
TrID: |
|
File name: | avx_Cracked.exe |
File size: | 11'622'687 bytes |
MD5: | 604f557a561320764432a9a0feab44c0 |
SHA1: | 66f3d11b2a7e5f08152db3090068ea1a5bfa7d65 |
SHA256: | b33810de1ba7b0383c7d35006a1691a6c27480516d30bf2ec4cdd173171071a3 |
SHA512: | 7dc426154c1b0ba6116532f6f08a2058480a2d160f1d9f9db38b904161a9d91da7d3908407df0e58751d56629d248b7a9a4ed9e7b0214494233ca37490309f00 |
SSDEEP: | 196608:IuhQ3XK2lP2vIW3pThofIdQW1BwZkurErvI9pWjgaAnajMsbSEo2rGN6nzC+dMzr:jhLqP2vdlSnkurEUWjJjIfGGNmytKjxs |
TLSH: | 3BC6338926650CE4E96E423F96A39817D7B3FC291394D36B0FB8B6631F535E04C38798 |
File Content Preview: | MZ......................................................................!..L.!This program cannot be run in DOS mode....$........t..............z.......................Rich............PE..L...f2YQ.....................0......X.J...........@................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x8a0058 |
Entrypoint Section: | .boot |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
DLL Characteristics: | |
Time Stamp: | 0x51593266 [Mon Apr 1 07:08:22 2013 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | b672bf4528e2ef8904397d0b17905606 |
Instruction |
---|
call 00007F52B0F64CF0h |
push ebx |
mov ebx, esp |
push ebx |
mov esi, dword ptr [ebx+08h] |
mov edi, dword ptr [ebx+10h] |
cld |
mov dl, 80h |
mov al, byte ptr [esi] |
inc esi |
mov byte ptr [edi], al |
inc edi |
mov ebx, 00000002h |
add dl, dl |
jne 00007F52B0F64BA7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
jnc 00007F52B0F64B8Ch |
add dl, dl |
jne 00007F52B0F64BA7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
jnc 00007F52B0F64BF3h |
xor eax, eax |
add dl, dl |
jne 00007F52B0F64BA7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
jnc 00007F52B0F64C87h |
add dl, dl |
jne 00007F52B0F64BA7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
adc eax, eax |
add dl, dl |
jne 00007F52B0F64BA7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
adc eax, eax |
add dl, dl |
jne 00007F52B0F64BA7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
adc eax, eax |
add dl, dl |
jne 00007F52B0F64BA7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
adc eax, eax |
je 00007F52B0F64BAAh |
push edi |
mov eax, eax |
sub edi, eax |
mov al, byte ptr [edi] |
pop edi |
mov byte ptr [edi], al |
inc edi |
mov ebx, 00000002h |
jmp 00007F52B0F64B3Bh |
mov eax, 00000001h |
add dl, dl |
jne 00007F52B0F64BA7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
adc eax, eax |
add dl, dl |
jne 00007F52B0F64BA7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
jc 00007F52B0F64B8Ch |
sub eax, ebx |
mov ebx, 00000001h |
jne 00007F52B0F64BCAh |
mov ecx, 00000001h |
add dl, dl |
jne 00007F52B0F64BA7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
adc ecx, ecx |
add dl, dl |
jne 00007F52B0F64BA7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
jc 00007F52B0F64B8Ch |
push esi |
mov esi, edi |
sub esi, ebp |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x1f048 | 0x50 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x20000 | 0x13c4 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
0x1000 | 0x191d4 | 0x9000 | 06f1bf4b449959991cd5cad7d22f376c | False | 0.9839952256944444 | data | 7.933615943763996 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | |
0x1b000 | 0x180c | 0x1000 | dd004ed326c744a19e7a55f550e8a213 | False | 0.009033203125 | data | 0.019689899213607254 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | |
0x1d000 | 0x13f0 | 0x1000 | 1e1a38257bbbef7590868d141ee59372 | False | 0.276611328125 | data | 2.809383557330569 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | |
.idata | 0x1f000 | 0x1000 | 0x1000 | 12bc61d64335963249b58f7839803931 | False | 0.03076171875 | data | 0.23984251009498897 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x20000 | 0x2000 | 0x2000 | eb77186a112590d337e6e1776efdc349 | False | 0.1282958984375 | data | 3.042281041123453 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.themida | 0x22000 | 0x47e000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.boot | 0x4a0000 | 0x2d8000 | 0x2d8000 | a9ab5f3e4fea48d775c4475e4e904c1c | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x20100 | 0xca8 | Device independent bitmap graphic, 32 x 64 x 24, image size 3072 | 0.07901234567901234 | ||
RT_GROUP_ICON | 0x20db8 | 0x14 | data | 1.1 | ||
RT_VERSION | 0x20ddc | 0x1ec | data | English | United States | 0.5020325203252033 |
RT_MANIFEST | 0x20fd8 | 0x3e7 | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.42542542542542544 |
DLL | Import |
---|---|
kernel32.dll | GetModuleHandleA |
MSVBVM60.DLL | EVENT_SINK_GetIDsOfNames |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Target ID: | 0 |
Start time: | 01:07:49 |
Start date: | 16/05/2024 |
Path: | C:\Users\user\Desktop\avx_Cracked.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 11'622'687 bytes |
MD5 hash: | 604F557A561320764432A9A0FEAB44C0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Function 004305B1 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00412C10 Relevance: 7.2, Strings: 4, Instructions: 2188COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 005EDB86 Relevance: 4.2, Strings: 3, Instructions: 444COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00611AEB Relevance: 3.0, Strings: 2, Instructions: 458COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00621FF0 Relevance: 3.0, Strings: 2, Instructions: 450COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0063A2CA Relevance: 2.7, Strings: 2, Instructions: 246COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425CE3 Relevance: 2.5, Strings: 1, Instructions: 1272COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0064601C Relevance: 1.7, Strings: 1, Instructions: 474COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00634028 Relevance: 1.7, Strings: 1, Instructions: 467COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00642015 Relevance: 1.7, Strings: 1, Instructions: 465COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0060BACB Relevance: 1.7, Strings: 1, Instructions: 464COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0062DFD6 Relevance: 1.7, Strings: 1, Instructions: 449COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425D4B Relevance: 1.6, Strings: 1, Instructions: 374COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042A7AB Relevance: 1.6, Strings: 1, Instructions: 359COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043088F Relevance: 1.6, Strings: 1, Instructions: 346COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004253F8 Relevance: 1.6, Strings: 1, Instructions: 343COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430664 Relevance: 1.6, Strings: 1, Instructions: 316COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425448 Relevance: 1.6, Strings: 1, Instructions: 305COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430AB0 Relevance: 1.5, Strings: 1, Instructions: 295COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00422289 Relevance: 1.5, Strings: 1, Instructions: 293COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00423E18 Relevance: 1.5, Strings: 1, Instructions: 282COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042221E Relevance: 1.5, Strings: 1, Instructions: 279COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043089E Relevance: 1.5, Strings: 1, Instructions: 276COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430772 Relevance: 1.5, Strings: 1, Instructions: 267COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430AA6 Relevance: 1.5, Strings: 1, Instructions: 253COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425A3A Relevance: 1.5, Strings: 1, Instructions: 244COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425A9E Relevance: 1.5, Strings: 1, Instructions: 241COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425A0D Relevance: 1.5, Strings: 1, Instructions: 240COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042200F Relevance: 1.5, Strings: 1, Instructions: 239COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430763 Relevance: 1.5, Strings: 1, Instructions: 239COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00427171 Relevance: 1.5, Strings: 1, Instructions: 203COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425D46 Relevance: 1.4, Strings: 1, Instructions: 198COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00423DCD Relevance: 1.4, Strings: 1, Instructions: 194COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00617FF3 Relevance: .5, Instructions: 499COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0063BFD0 Relevance: .5, Instructions: 471COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0060DAAF Relevance: .5, Instructions: 461COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00638009 Relevance: .5, Instructions: 453COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0063E05B Relevance: .4, Instructions: 445COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00605BA7 Relevance: .4, Instructions: 441COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00616015 Relevance: .4, Instructions: 375COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00422D0B Relevance: .4, Instructions: 371COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00423F94 Relevance: .4, Instructions: 364COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430A92 Relevance: .4, Instructions: 359COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042457F Relevance: .3, Instructions: 348COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430A74 Relevance: .3, Instructions: 348COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004259F9 Relevance: .3, Instructions: 346COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004306BE Relevance: .3, Instructions: 342COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425457 Relevance: .3, Instructions: 339COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00426431 Relevance: .3, Instructions: 339COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00609C67 Relevance: .3, Instructions: 336COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430768 Relevance: .3, Instructions: 335COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00423DC3 Relevance: .3, Instructions: 334COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425A4E Relevance: .3, Instructions: 330COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425ABC Relevance: .3, Instructions: 322COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00422CF7 Relevance: .3, Instructions: 322COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430A97 Relevance: .3, Instructions: 320COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425A26 Relevance: .3, Instructions: 319COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425E0E Relevance: .3, Instructions: 319COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004238B3 Relevance: .3, Instructions: 318COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00427CF8 Relevance: .3, Instructions: 318COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425461 Relevance: .3, Instructions: 317COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00422D01 Relevance: .3, Instructions: 316COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004293D3 Relevance: .3, Instructions: 315COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00424952 Relevance: .3, Instructions: 314COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00428A8D Relevance: .3, Instructions: 312COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430B0A Relevance: .3, Instructions: 312COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004223D3 Relevance: .3, Instructions: 311COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004308BC Relevance: .3, Instructions: 308COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430643 Relevance: .3, Instructions: 306COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00423E5E Relevance: .3, Instructions: 306COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430669 Relevance: .3, Instructions: 305COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425A12 Relevance: .3, Instructions: 305COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004254EA Relevance: .3, Instructions: 304COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430790 Relevance: .3, Instructions: 300COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042200A Relevance: .3, Instructions: 298COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00422854 Relevance: .3, Instructions: 295COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004228AC Relevance: .3, Instructions: 295COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430655 Relevance: .3, Instructions: 294COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042AF08 Relevance: .3, Instructions: 294COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425CC4 Relevance: .3, Instructions: 293COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00431F7D Relevance: .3, Instructions: 292COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00422351 Relevance: .3, Instructions: 291COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043065F Relevance: .3, Instructions: 291COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00423EEB Relevance: .3, Instructions: 291COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042951C Relevance: .3, Instructions: 290COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425AC1 Relevance: .3, Instructions: 290COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425A94 Relevance: .3, Instructions: 290COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00422225 Relevance: .3, Instructions: 289COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004252CC Relevance: .3, Instructions: 289COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00423E72 Relevance: .3, Instructions: 287COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425A35 Relevance: .3, Instructions: 285COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430885 Relevance: .3, Instructions: 284COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430A7E Relevance: .3, Instructions: 284COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425A21 Relevance: .3, Instructions: 282COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425CC9 Relevance: .3, Instructions: 282COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004308A3 Relevance: .3, Instructions: 281COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00423DC8 Relevance: .3, Instructions: 281COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00423DBE Relevance: .3, Instructions: 281COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430A9C Relevance: .3, Instructions: 280COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004306CD Relevance: .3, Instructions: 279COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425B98 Relevance: .3, Instructions: 279COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430AB5 Relevance: .3, Instructions: 277COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00424359 Relevance: .3, Instructions: 275COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430C95 Relevance: .3, Instructions: 274COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425DBC Relevance: .3, Instructions: 274COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430740 Relevance: .3, Instructions: 272COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042B7CF Relevance: .3, Instructions: 271COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425AB2 Relevance: .3, Instructions: 271COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00426CCE Relevance: .3, Instructions: 271COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00423DDC Relevance: .3, Instructions: 271COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043088A Relevance: .3, Instructions: 270COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042EE27 Relevance: .3, Instructions: 270COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00428435 Relevance: .3, Instructions: 269COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042606B Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00429531 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00423FB7 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004296D0 Relevance: .3, Instructions: 267COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00423D9F Relevance: .3, Instructions: 266COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042DEEE Relevance: .3, Instructions: 266COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430A79 Relevance: .3, Instructions: 263COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00424769 Relevance: .3, Instructions: 262COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425A8F Relevance: .3, Instructions: 261COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00422269 Relevance: .3, Instructions: 260COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425CCE Relevance: .3, Instructions: 260COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004252C7 Relevance: .3, Instructions: 259COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425AA3 Relevance: .3, Instructions: 258COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004246BA Relevance: .3, Instructions: 257COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425A44 Relevance: .3, Instructions: 257COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043076D Relevance: .3, Instructions: 254COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430AA1 Relevance: .3, Instructions: 253COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004252D1 Relevance: .3, Instructions: 252COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043078B Relevance: .3, Instructions: 252COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430876 Relevance: .3, Instructions: 252COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425A2B Relevance: .3, Instructions: 252COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042475F Relevance: .3, Instructions: 251COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042A7BA Relevance: .3, Instructions: 251COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00422000 Relevance: .2, Instructions: 250COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042337B Relevance: .2, Instructions: 250COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425CBF Relevance: .2, Instructions: 248COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 005E3E44 Relevance: .2, Instructions: 248COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00423FC6 Relevance: .2, Instructions: 248COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043075E Relevance: .2, Instructions: 247COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004268A0 Relevance: .2, Instructions: 246COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00424589 Relevance: .2, Instructions: 245COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430899 Relevance: .2, Instructions: 245COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042545C Relevance: .2, Instructions: 244COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042476E Relevance: .2, Instructions: 243COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430880 Relevance: .2, Instructions: 242COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00423DD7 Relevance: .2, Instructions: 242COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425A85 Relevance: .2, Instructions: 241COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043087B Relevance: .2, Instructions: 240COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00424CC7 Relevance: .2, Instructions: 240COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00426CC9 Relevance: .2, Instructions: 239COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00426427 Relevance: .2, Instructions: 237COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00426CC0 Relevance: .2, Instructions: 237COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00428452 Relevance: .2, Instructions: 236COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004278C9 Relevance: .2, Instructions: 236COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00423E95 Relevance: .2, Instructions: 235COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425443 Relevance: .2, Instructions: 234COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00422CFC Relevance: .2, Instructions: 234COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425A30 Relevance: .2, Instructions: 232COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425B87 Relevance: .2, Instructions: 232COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043065A Relevance: .2, Instructions: 231COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425452 Relevance: .2, Instructions: 229COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00426422 Relevance: .2, Instructions: 229COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00422284 Relevance: .2, Instructions: 228COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042F830 Relevance: .2, Instructions: 228COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430A8D Relevance: .2, Instructions: 228COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430984 Relevance: .2, Instructions: 227COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00423FA6 Relevance: .2, Instructions: 227COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004223C4 Relevance: .2, Instructions: 225COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004223CE Relevance: .2, Instructions: 221COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00426288 Relevance: .2, Instructions: 220COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430A6F Relevance: .2, Instructions: 220COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00424778 Relevance: .2, Instructions: 217COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00423FAD Relevance: .2, Instructions: 217COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00423E63 Relevance: .2, Instructions: 216COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430673 Relevance: .2, Instructions: 215COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042DB85 Relevance: .2, Instructions: 215COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00422875 Relevance: .2, Instructions: 213COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425A17 Relevance: .2, Instructions: 212COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00423E90 Relevance: .2, Instructions: 211COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00424CD2 Relevance: .2, Instructions: 210COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042234C Relevance: .2, Instructions: 209COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004246BF Relevance: .2, Instructions: 209COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00422F3B Relevance: .2, Instructions: 209COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043092F Relevance: .2, Instructions: 207COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430E0A Relevance: .2, Instructions: 207COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430902 Relevance: .2, Instructions: 206COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00422014 Relevance: .2, Instructions: 205COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042E2F7 Relevance: .2, Instructions: 204COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043066E Relevance: .2, Instructions: 204COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00429B32 Relevance: .2, Instructions: 204COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430989 Relevance: .2, Instructions: 200COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004296CB Relevance: .2, Instructions: 196COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00422023 Relevance: .2, Instructions: 195COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00429E8E Relevance: .2, Instructions: 195COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042477D Relevance: .2, Instructions: 193COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042527B Relevance: .2, Instructions: 188COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004308F8 Relevance: .2, Instructions: 188COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425F8B Relevance: .2, Instructions: 188COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00423E6D Relevance: .2, Instructions: 185COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042FBBE Relevance: .2, Instructions: 181COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00429EBC Relevance: .2, Instructions: 178COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425F9D Relevance: .2, Instructions: 178COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425A99 Relevance: .2, Instructions: 177COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042CCC2 Relevance: .2, Instructions: 176COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004286E6 Relevance: .2, Instructions: 171COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00423FCB Relevance: .2, Instructions: 165COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042F226 Relevance: .2, Instructions: 164COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00425AAD Relevance: .2, Instructions: 160COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00423FC1 Relevance: .2, Instructions: 159COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430A83 Relevance: .2, Instructions: 158COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00423E86 Relevance: .2, Instructions: 155COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00426007 Relevance: .2, Instructions: 150COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00426019 Relevance: .1, Instructions: 146COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042A502 Relevance: .1, Instructions: 140COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00435EC9 Relevance: .1, Instructions: 115COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042805B Relevance: .1, Instructions: 100COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042DB7A Relevance: .1, Instructions: 95COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042B246 Relevance: .1, Instructions: 82COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00403A5C Relevance: .1, Instructions: 59COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00625F98 Relevance: .1, Instructions: 51COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0040F1D0 Relevance: 13.0, Strings: 10, Instructions: 460COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0040480F Relevance: 5.3, Strings: 4, Instructions: 334COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00410B60 Relevance: 5.1, Strings: 4, Instructions: 84COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|