Windows
Analysis Report
Game Laucher.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Game Laucher.exe (PID: 2748 cmdline:
"C:\Users\ user\Deskt op\Game La ucher.exe" MD5: B24F58BB4315DFA0C7EFE2CB18BED37D) - windows process.exe (PID: 5880 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\window s process. exe" MD5: B24F58BB4315DFA0C7EFE2CB18BED37D) - netsh.exe (PID: 1672 cmdline:
netsh fire wall add a llowedprog ram "C:\Us ers\user\A ppData\Loc al\Temp\wi ndows proc ess.exe" " windows pr ocess.exe" ENABLE MD5: 4E89A1A088BE715D6C946E55AB07C7DF) - conhost.exe (PID: 2788 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - taskkill.exe (PID: 4932 cmdline:
taskkill / F /IM expl orer.exe MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD) - conhost.exe (PID: 7092 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
NjRAT | RedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored. |
{"Host": "2.tcp.eu.ngrok.io", "Port": "16943", "Version": "im523", "Campaign ID": "NLQ WORK", "Install Name": "windows process.exe", "Install Dir": "TEMP"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Njrat | Yara detected Njrat | Joe Security | ||
Windows_Trojan_Njrat_30f3c220 | unknown | unknown |
| |
njrat1 | Identify njRat | Brian Wallace @botnet_hunter |
| |
JoeSecurity_Njrat | Yara detected Njrat | Joe Security | ||
JoeSecurity_Njrat | Yara detected Njrat | Joe Security | ||
Click to see the 1 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Njrat | Yara detected Njrat | Joe Security | ||
Windows_Trojan_Njrat_30f3c220 | unknown | unknown |
| |
njrat1 | Identify njRat | Brian Wallace @botnet_hunter |
| |
MALWARE_Win_NjRAT | Detects NjRAT / Bladabindi | ditekSHen |
|
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Timestamp: | 07/08/24-18:13:32.142062 |
SID: | 2825564 |
Source Port: | 49717 |
Destination Port: | 16943 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 07/08/24-18:15:49.953303 |
SID: | 2825563 |
Source Port: | 49731 |
Destination Port: | 16943 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 07/08/24-18:13:26.281099 |
SID: | 2825563 |
Source Port: | 49717 |
Destination Port: | 16943 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 07/08/24-18:13:32.142062 |
SID: | 2814860 |
Source Port: | 49717 |
Destination Port: | 16943 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 07/08/24-18:13:32.552443 |
SID: | 2825565 |
Source Port: | 49717 |
Destination Port: | 16943 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 07/08/24-18:13:26.276084 |
SID: | 2033132 |
Source Port: | 49717 |
Destination Port: | 16943 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 07/08/24-18:15:49.953303 |
SID: | 2814856 |
Source Port: | 49731 |
Destination Port: | 16943 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 07/08/24-18:15:51.939065 |
SID: | 2019214 |
Source Port: | 49731 |
Destination Port: | 16943 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 07/08/24-18:13:32.552443 |
SID: | 2019214 |
Source Port: | 49717 |
Destination Port: | 16943 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 07/08/24-18:13:26.281099 |
SID: | 2814856 |
Source Port: | 49717 |
Destination Port: | 16943 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 07/08/24-18:15:49.947605 |
SID: | 2033132 |
Source Port: | 49731 |
Destination Port: | 16943 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 07/08/24-18:15:51.939065 |
SID: | 2825565 |
Source Port: | 49731 |
Destination Port: | 16943 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: |
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | ReversingLabs: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Compliance |
---|
Source: | Unpacked PE file: |
Source: | Static PE information: |
Source: | File opened: | Jump to behavior |
Spreading |
---|
Source: | File created: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: | 2_2_00727490 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: |
Source: | URLs: |
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: | ||
Source: | ASN Name: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
E-Banking Fraud |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Operating System Destruction |
---|
Source: | Process information set: | Jump to behavior |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Process Stats: |
Source: | Code function: | 2_2_0074F650 | |
Source: | Code function: | 2_2_0074F646 | |
Source: | Code function: | 2_2_0074F6B8 | |
Source: | Code function: | 2_2_0074F710 | |
Source: | Code function: | 2_2_0074F7F0 | |
Source: | Code function: | 2_2_0074FBD0 | |
Source: | Code function: | 2_2_0074F070 | |
Source: | Code function: | 2_2_0074F028 | |
Source: | Code function: | 2_2_0074F0B0 | |
Source: | Code function: | 2_2_0074F174 | |
Source: | Code function: | 2_2_0074F17E | |
Source: | Code function: | 2_2_0074F142 | |
Source: | Code function: | 2_2_0074F13A | |
Source: | Code function: | 2_2_0074F102 | |
Source: | Code function: | 2_2_0074F10A | |
Source: | Code function: | 2_2_0074F1E0 | |
Source: | Code function: | 2_2_0074F27C | |
Source: | Code function: | 2_2_0074F25E | |
Source: | Code function: | 2_2_0074F234 | |
Source: | Code function: | 2_2_0074F23E | |
Source: | Code function: | 2_2_0074F2E0 | |
Source: | Code function: | 2_2_0074F2C2 | |
Source: | Code function: | 2_2_0074F2BA | |
Source: | Code function: | 2_2_0074F36C | |
Source: | Code function: | 2_2_0074F338 | |
Source: | Code function: | 2_2_0074F3F2 | |
Source: | Code function: | 2_2_0074F3E8 | |
Source: | Code function: | 2_2_0074F43C | |
Source: | Code function: | 2_2_0074F4EC | |
Source: | Code function: | 2_2_0074F482 | |
Source: | Code function: | 2_2_0074F48A | |
Source: | Code function: | 2_2_0074F558 | |
Source: | Code function: | 2_2_0074F54F | |
Source: | Code function: | 2_2_0074F533 | |
Source: | Code function: | 2_2_0074F5EC | |
Source: | Code function: | 2_2_0074F58C | |
Source: | Code function: | 2_2_0074F634 | |
Source: | Code function: | 2_2_0074F684 | |
Source: | Code function: | 2_2_0074F778 | |
Source: | Code function: | 2_2_0074F7CB | |
Source: | Code function: | 2_2_0074EBE4 | |
Source: | Code function: | 2_2_0074EC50 | |
Source: | Code function: | 2_2_0074EC47 | |
Source: | Code function: | 2_2_0074ECF8 | |
Source: | Code function: | 2_2_0074ECA0 | |
Source: | Code function: | 2_2_0074ED60 | |
Source: | Code function: | 2_2_0074EDD4 | |
Source: | Code function: | 2_2_0074EDDE | |
Source: | Code function: | 2_2_0074ED8C | |
Source: | Code function: | 2_2_0074EE6C | |
Source: | Code function: | 2_2_0074EE14 | |
Source: | Code function: | 2_2_0074EEFB | |
Source: | Code function: | 2_2_0074EEDF | |
Source: | Code function: | 2_2_0074EF72 | |
Source: | Code function: | 2_2_0074EF68 | |
Source: | Code function: | 2_2_0074EF04 | |
Source: | Code function: | 2_2_0074EFE8 | |
Source: | Code function: | 2_2_0074EFB4 | |
Source: | Code function: | 2_2_037E052A | |
Source: | Code function: | 2_2_037E010E | |
Source: | Code function: | 2_2_037E04EF | |
Source: | Code function: | 2_2_037E00EC |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | 2_2_03643258 |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 2_2_030ABDA2 | |
Source: | Code function: | 2_2_030ABD6B |
Source: | Code function: | 0_2_001B796C |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Source: | Static file information: |
Source: | File opened: | Jump to behavior |
Data Obfuscation |
---|
Source: | Unpacked PE file: | ||
Source: | Unpacked PE file: |
Source: | Unpacked PE file: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_00076F0F | |
Source: | Code function: | 0_2_00037528 | |
Source: | Code function: | 0_2_00066109 | |
Source: | Code function: | 0_2_0006A19E | |
Source: | Code function: | 0_2_00066331 | |
Source: | Code function: | 0_2_0005A6D0 | |
Source: | Code function: | 0_2_0005A6D0 | |
Source: | Code function: | 0_2_00052410 | |
Source: | Code function: | 0_2_00070411 | |
Source: | Code function: | 0_2_00052448 | |
Source: | Code function: | 0_2_0006644D | |
Source: | Code function: | 0_2_00064499 | |
Source: | Code function: | 0_2_00052480 | |
Source: | Code function: | 0_2_00066491 | |
Source: | Code function: | 0_2_000524B8 | |
Source: | Code function: | 0_2_00052524 | |
Source: | Code function: | 0_2_000625AD | |
Source: | Code function: | 0_2_0006854D | |
Source: | Code function: | 0_2_00050639 | |
Source: | Code function: | 0_2_0005A743 | |
Source: | Code function: | 0_2_00062828 | |
Source: | Code function: | 0_2_0005A884 | |
Source: | Code function: | 0_2_000508D0 | |
Source: | Code function: | 0_2_0005098C | |
Source: | Code function: | 0_2_00068F75 | |
Source: | Code function: | 0_2_0004CFCC | |
Source: | Code function: | 0_2_000633F8 | |
Source: | Code function: | 0_2_0006359C | |
Source: | Code function: | 0_2_0006169A | |
Source: | Code function: | 0_2_00063687 | |
Source: | Code function: | 0_2_00061744 |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Boot Survival |
---|
Source: | Registry value created or modified: | Jump to behavior |
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Last function: | ||
Source: | Last function: |
Source: | Code function: | 2_2_00727490 |
Source: | Thread delayed: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Anti Debugging |
---|
Source: | Thread information set: | Jump to behavior | ||
Source: | Thread information set: | Jump to behavior | ||
Source: | Thread information set: | Jump to behavior | ||
Source: | Thread information set: | Jump to behavior |
Source: | Open window title or class name: |
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 2_2_0074DCC0 |
Source: | Key value queried: | Jump to behavior |
Lowering of HIPS / PFW / Operating System Security Settings |
---|
Source: | Process created: |
Source: | Process created: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | 11 Replication Through Removable Media | 1 Windows Management Instrumentation | 221 Registry Run Keys / Startup Folder | 1 Access Token Manipulation | 21 Masquerading | OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 DLL Side-Loading | 11 Process Injection | 211 Disable or Modify Tools | LSASS Memory | 311 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 221 Registry Run Keys / Startup Folder | 241 Virtualization/Sandbox Evasion | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | 1 DLL Side-Loading | 1 Access Token Manipulation | NTDS | 241 Virtualization/Sandbox Evasion | Distributed Component Object Model | Input Capture | 11 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 11 Process Injection | LSA Secrets | 1 Application Window Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Deobfuscate/Decode Files or Information | Cached Domain Credentials | 1 Peripheral Device Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 3 Obfuscated Files or Information | DCSync | 3 File and Directory Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 22 Software Packing | Proc Filesystem | 14 System Information Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
Network Topology | Malvertising | Exploit Public-Facing Application | Command and Scripting Interpreter | At | At | 1 DLL Side-Loading | /etc/passwd and /etc/shadow | Network Sniffing | Direct Cloud VM Connections | Data Staged | Web Protocols | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Internal Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
53% | ReversingLabs | Win32.Packed.Enigma | ||
100% | Avira | TR/Crypt.XPACK.Gen | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | TR/Crypt.XPACK.Gen | ||
100% | Avira | TR/Crypt.XPACK.Gen | ||
100% | Avira | TR/Crypt.XPACK.Gen | ||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
53% | ReversingLabs | Win32.Backdoor.njRAT | ||
53% | ReversingLabs | Win32.Backdoor.njRAT | ||
53% | ReversingLabs | Win32.Backdoor.njRAT |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
2.tcp.eu.ngrok.io | 18.192.93.86 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
18.192.93.86 | 2.tcp.eu.ngrok.io | United States | 16509 | AMAZON-02US | true | |
18.156.13.209 | unknown | United States | 16509 | AMAZON-02US | true |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1469270 |
Start date and time: | 2024-07-08 18:12:09 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 8m 42s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 10 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Game Laucher.exe |
Detection: | MAL |
Classification: | mal100.spre.troj.adwa.evad.winEXE@9/9@2/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, SearchApp.exe
- Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: Game Laucher.exe
Time | Type | Description |
---|---|---|
12:13:48 | API Interceptor | |
18:13:25 | Autostart | |
18:13:33 | Autostart | |
18:13:41 | Autostart | |
18:13:49 | Autostart |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
18.192.93.86 | Get hash | malicious | RedLine | Browse |
| |
Get hash | malicious | RedLine | Browse |
| ||
18.156.13.209 | Get hash | malicious | RedLine | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
2.tcp.eu.ngrok.io | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | Njrat | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
AMAZON-02US | Get hash | malicious | HTMLPhisher, Tycoon2FA | Browse |
| |
Get hash | malicious | HTMLPhisher, Tycoon2FA | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | HTMLPhisher, Tycoon2FA | Browse |
| ||
Get hash | malicious | HTMLPhisher, Tycoon2FA | Browse |
| ||
Get hash | malicious | Tycoon2FA | Browse |
| ||
AMAZON-02US | Get hash | malicious | HTMLPhisher, Tycoon2FA | Browse |
| |
Get hash | malicious | HTMLPhisher, Tycoon2FA | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | HTMLPhisher, Tycoon2FA | Browse |
| ||
Get hash | malicious | HTMLPhisher, Tycoon2FA | Browse |
| ||
Get hash | malicious | Tycoon2FA | Browse |
|
Process: | C:\Users\user\Desktop\Game Laucher.exe |
File Type: | |
Category: | modified |
Size (bytes): | 641 |
Entropy (8bit): | 5.255094057343913 |
Encrypted: | false |
SSDEEP: | 12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk70U2+Eb5iv:MLF2CpI3zffup29Iz52VM2+Z |
MD5: | 898DE7911DF98E1BCA0E8A9E4EF5AB04 |
SHA1: | 9C9E968E380403E4F11EA34C3169C9CE1496F345 |
SHA-256: | C2FCB238F2C3F05B744A9E3287F474E493BF76AE73112FBDF79A296FE291891B |
SHA-512: | E9ED6D76D1B594FB7C3B03FF7B940F87B81896AFC6F65ADC0229BFDF3B4372CCB42E2C16596B5588CC360469BB77AC669A58DAF6418683DE2903EDE5F19BD015 |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Game Laucher.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1150464 |
Entropy (8bit): | 7.989590055840964 |
Encrypted: | false |
SSDEEP: | 24576:ga81+sa79EYE7uS2KzKuHcJNc4R0eB+Kt3cNmLc9dJ:ga81+sqnQd2KzK0coTeBX3cQL2J |
MD5: | B24F58BB4315DFA0C7EFE2CB18BED37D |
SHA1: | E3E00C86534EA4095F45820FC5D9D59641832058 |
SHA-256: | A71B560AFB99073078FA82E00143A8DB8B93ED79E3DC228880F696C109BDDC89 |
SHA-512: | F8B97748D0E2B8BC044A89BB1E7C035C91E0FF3F4C8DE4D439248FC6566D0EF2A5BA3536CA54D2DF3F3BCD7BE7601C225EA51A8491E79E397D68D5BB8A091892 |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Game Laucher.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 26 |
Entropy (8bit): | 3.95006375643621 |
Encrypted: | false |
SSDEEP: | 3:ggPYV:rPYV |
MD5: | 187F488E27DB4AF347237FE461A079AD |
SHA1: | 6693BA299EC1881249D59262276A0D2CB21F8E64 |
SHA-256: | 255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309 |
SHA-512: | 89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E |
Malicious: | true |
Reputation: | high, very likely benign file |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b0eb5dd3a6fc209e7aa02e6880775930.exe
Download File
Process: | C:\Users\user\AppData\Local\Temp\windows process.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1150464 |
Entropy (8bit): | 7.989590055840964 |
Encrypted: | false |
SSDEEP: | 24576:ga81+sa79EYE7uS2KzKuHcJNc4R0eB+Kt3cNmLc9dJ:ga81+sqnQd2KzK0coTeBX3cQL2J |
MD5: | B24F58BB4315DFA0C7EFE2CB18BED37D |
SHA1: | E3E00C86534EA4095F45820FC5D9D59641832058 |
SHA-256: | A71B560AFB99073078FA82E00143A8DB8B93ED79E3DC228880F696C109BDDC89 |
SHA-512: | F8B97748D0E2B8BC044A89BB1E7C035C91E0FF3F4C8DE4D439248FC6566D0EF2A5BA3536CA54D2DF3F3BCD7BE7601C225EA51A8491E79E397D68D5BB8A091892 |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b0eb5dd3a6fc209e7aa02e6880775930.exe:Zone.Identifier
Download File
Process: | C:\Users\user\AppData\Local\Temp\windows process.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 26 |
Entropy (8bit): | 3.95006375643621 |
Encrypted: | false |
SSDEEP: | 3:ggPYV:rPYV |
MD5: | 187F488E27DB4AF347237FE461A079AD |
SHA1: | 6693BA299EC1881249D59262276A0D2CB21F8E64 |
SHA-256: | 255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309 |
SHA-512: | 89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E |
Malicious: | true |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\windows process.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 58 |
Entropy (8bit): | 4.461092201874919 |
Encrypted: | false |
SSDEEP: | 3:It1KV2BBK9XK96i0x:e1KIIKs |
MD5: | F2C8846FA65E2CBFE8BF344B9C64F1E3 |
SHA1: | E36BFE32F0AEC7924D2AE308C78CE86E64A9D0A0 |
SHA-256: | 0E3D1C4FD40DF226531C4EEA100220BE69A35DDCB7CFCA495F7ED495929E4DBB |
SHA-512: | BCFD7AD4A11B2BFB00AF7FA22CA0A3130DAAF9F2E684C682333961492A1398CBAB35608D25D6FF23B32541FC1DDFEA4FB9FA6E6E9A06060067407314AA204760 |
Malicious: | true |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\windows process.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1150464 |
Entropy (8bit): | 7.989590055840964 |
Encrypted: | false |
SSDEEP: | 24576:ga81+sa79EYE7uS2KzKuHcJNc4R0eB+Kt3cNmLc9dJ:ga81+sqnQd2KzK0coTeBX3cQL2J |
MD5: | B24F58BB4315DFA0C7EFE2CB18BED37D |
SHA1: | E3E00C86534EA4095F45820FC5D9D59641832058 |
SHA-256: | A71B560AFB99073078FA82E00143A8DB8B93ED79E3DC228880F696C109BDDC89 |
SHA-512: | F8B97748D0E2B8BC044A89BB1E7C035C91E0FF3F4C8DE4D439248FC6566D0EF2A5BA3536CA54D2DF3F3BCD7BE7601C225EA51A8491E79E397D68D5BB8A091892 |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\windows process.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 26 |
Entropy (8bit): | 3.95006375643621 |
Encrypted: | false |
SSDEEP: | 3:ggPYV:rPYV |
MD5: | 187F488E27DB4AF347237FE461A079AD |
SHA1: | 6693BA299EC1881249D59262276A0D2CB21F8E64 |
SHA-256: | 255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309 |
SHA-512: | 89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E |
Malicious: | true |
Preview: |
Process: | C:\Windows\SysWOW64\netsh.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 313 |
Entropy (8bit): | 4.971939296804078 |
Encrypted: | false |
SSDEEP: | 6:/ojfKsUTGN8Ypox42k9L+DbGMKeQE+vigqAZs2E+AYeDPO+Yswyha:wjPIGNrkHk9iaeIM6ADDPOHyha |
MD5: | 689E2126A85BF55121488295EE068FA1 |
SHA1: | 09BAAA253A49D80C18326DFBCA106551EBF22DD6 |
SHA-256: | D968A966EF474068E41256321F77807A042F1965744633D37A203A705662EC25 |
SHA-512: | C3736A8FC7E6573FA1B26FE6A901C05EE85C55A4A276F8F569D9EADC9A58BEC507D1BB90DBF9EA62AE79A6783178C69304187D6B90441D82E46F5F56172B5C5C |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.989590055840964 |
TrID: |
|
File name: | Game Laucher.exe |
File size: | 1'150'464 bytes |
MD5: | b24f58bb4315dfa0c7efe2cb18bed37d |
SHA1: | e3e00c86534ea4095f45820fc5d9d59641832058 |
SHA256: | a71b560afb99073078fa82e00143a8db8b93ed79e3dc228880f696c109bddc89 |
SHA512: | f8b97748d0e2b8bc044a89bb1e7c035c91e0ff3f4c8de4d439248fc6566d0ef2a5ba3536ca54d2df3f3bcd7be7601c225ea51a8491e79e397d68d5bb8a091892 |
SSDEEP: | 24576:ga81+sa79EYE7uS2KzKuHcJNc4R0eB+Kt3cNmLc9dJ:ga81+sqnQd2KzK0coTeBX3cQL2J |
TLSH: | 0E35331E73CB1851EC54B9BF9610BC78BD8FC6287DAE1E08AFD7558321404E25F80E9A |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...H..f.....................N......$>... ........@.. ........................7...........@................................ |
Icon Hash: | 0f33f16cea4d6917 |
Entrypoint: | 0x403e24 |
Entrypoint Section: | |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x668BEF48 [Mon Jul 8 13:53:12 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 2e5467cba76f44a088d39f78c5e807b6 |
Instruction |
---|
push ebp |
mov ebp, esp |
add esp, FFFFFFF0h |
mov eax, 00401000h |
call 00007FA4886DC976h |
call far 5DE5h : 8B10C483h |
jmp 00007FA488A5413Dh |
lds ecx, edx |
imul ebx, ebp, 7E2E3C9Bh |
pop edx |
pop ss |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x29a020 | 0x210 | .data P |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x14000 | 0x4a44 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x29a000 | 0xc | .data P |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
0x2000 | 0xa000 | 0x4000 | f9cecc5c1b2a1a69d41cbebb20328d11 | False | 0.98321533203125 | data | 7.953883778943793 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | |
0xc000 | 0x6000 | 0x200 | 2c2c577491b1d8ff3874dde5a1f099ea | False | 0.0625 | data | 0.3623175539007212 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | |
0x12000 | 0x2000 | 0x200 | bfa22a756f9ec241c5b50d744e000d8b | False | 0.056640625 | data | 0.30140680731160896 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | |
.rsrc | 0x14000 | 0x6000 | 0x4c00 | 9adc5c3a4d64f80db25f34ad2ddf570e | False | 0.9642269736842105 | data | 7.885616164638959 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
0x1a000 | 0x280000 | 0x2ba00 | bcbeb41f5da92d3b3ba1c39d94f12b24 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | |
.data P | 0x29a000 | 0xe4000 | 0xe4000 | 38ea37a97940620192b3c79e57b26695 | False | 0.997179533305921 | data | 7.986419269749442 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x140e8 | 0x475d | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | 1.0008758005364278 | ||
RT_GROUP_ICON | 0x18848 | 0x14 | data | 0.9 | ||
RT_MANIFEST | 0x1885c | 0x1e7 | XML 1.0 document, ASCII text, with CRLF line terminators | 0.5338809034907598 |
DLL | Import |
---|---|
kernel32.dll | GetModuleHandleA, GetProcAddress, ExitProcess, LoadLibraryA |
user32.dll | MessageBoxA |
advapi32.dll | RegCloseKey |
oleaut32.dll | SysFreeString |
gdi32.dll | CreateFontA |
shell32.dll | ShellExecuteA |
version.dll | GetFileVersionInfoA |
mscoree.dll | _CorExeMain |
Timestamp | Protocol | SID | Message | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|---|---|---|
07/08/24-18:13:32.142062 | TCP | 2825564 | ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
07/08/24-18:15:49.953303 | TCP | 2825563 | ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) | 49731 | 16943 | 192.168.2.6 | 18.156.13.209 |
07/08/24-18:13:26.281099 | TCP | 2825563 | ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
07/08/24-18:13:32.142062 | TCP | 2814860 | ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
07/08/24-18:13:32.552443 | TCP | 2825565 | ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity Sending Screenshot (CAP) | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
07/08/24-18:13:26.276084 | TCP | 2033132 | ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
07/08/24-18:15:49.953303 | TCP | 2814856 | ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) | 49731 | 16943 | 192.168.2.6 | 18.156.13.209 |
07/08/24-18:15:51.939065 | TCP | 2019214 | ET TROJAN njrat ver 0.7d Malware CnC Callback (Capture) | 49731 | 16943 | 192.168.2.6 | 18.156.13.209 |
07/08/24-18:13:32.552443 | TCP | 2019214 | ET TROJAN njrat ver 0.7d Malware CnC Callback (Capture) | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
07/08/24-18:13:26.281099 | TCP | 2814856 | ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
07/08/24-18:15:49.947605 | TCP | 2033132 | ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) | 49731 | 16943 | 192.168.2.6 | 18.156.13.209 |
07/08/24-18:15:51.939065 | TCP | 2825565 | ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity Sending Screenshot (CAP) | 49731 | 16943 | 192.168.2.6 | 18.156.13.209 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jul 8, 2024 18:13:26.133502960 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:13:26.138665915 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:13:26.138751030 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:13:26.276083946 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:13:26.280916929 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:13:26.281099081 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:13:26.286154985 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:13:32.142061949 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:13:32.146970034 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:13:32.455060959 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:13:32.501008987 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:13:32.552443027 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:13:32.558012962 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:13:32.732079029 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:13:32.732336044 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:13:32.737212896 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:13:35.472769976 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:13:35.516582012 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:13:35.546808958 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:13:35.551842928 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:13:50.765440941 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:13:50.765952110 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:13:50.770767927 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:13:54.632209063 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:13:54.666264057 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:13:54.671606064 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:13:57.658540964 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:13:57.699090958 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:13:57.704221010 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:14:02.702924967 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:14:02.743608952 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:14:02.748678923 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:14:08.782021046 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:14:08.782320023 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:14:08.788913965 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:14:26.791515112 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:14:26.791692972 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:14:26.796799898 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:14:44.825001955 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:14:44.825357914 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:14:44.830495119 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:15:02.882661104 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:15:02.884843111 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:15:02.889997005 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:15:18.439989090 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:15:18.479739904 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:15:18.485356092 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:15:20.891350985 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:15:20.893440008 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:15:20.898462057 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:15:21.457317114 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:15:21.513179064 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:15:21.518201113 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:15:24.481426001 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:15:24.544212103 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:15:24.549083948 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:15:27.511253119 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:15:27.556701899 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:15:27.561953068 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:15:30.537621975 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:15:30.595518112 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:15:30.601322889 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:15:33.567269087 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:15:33.620892048 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:15:33.625911951 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:15:36.588613987 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:15:36.635577917 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:15:36.641448975 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:15:38.889575005 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:15:38.889795065 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:15:39.141957998 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:15:39.142009020 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:15:39.142683029 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:15:39.627569914 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:15:39.670746088 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:15:39.692205906 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:15:39.698250055 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:15:42.636113882 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:15:42.701000929 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:15:42.712647915 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:15:47.910871029 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:15:47.913347960 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:15:49.923856020 CEST | 49717 | 16943 | 192.168.2.6 | 18.192.93.86 |
Jul 8, 2024 18:15:49.928883076 CEST | 16943 | 49717 | 18.192.93.86 | 192.168.2.6 |
Jul 8, 2024 18:15:49.937984943 CEST | 49731 | 16943 | 192.168.2.6 | 18.156.13.209 |
Jul 8, 2024 18:15:49.943368912 CEST | 16943 | 49731 | 18.156.13.209 | 192.168.2.6 |
Jul 8, 2024 18:15:49.945307016 CEST | 49731 | 16943 | 192.168.2.6 | 18.156.13.209 |
Jul 8, 2024 18:15:49.947604895 CEST | 49731 | 16943 | 192.168.2.6 | 18.156.13.209 |
Jul 8, 2024 18:15:49.952650070 CEST | 16943 | 49731 | 18.156.13.209 | 192.168.2.6 |
Jul 8, 2024 18:15:49.953303099 CEST | 49731 | 16943 | 192.168.2.6 | 18.156.13.209 |
Jul 8, 2024 18:15:49.958645105 CEST | 16943 | 49731 | 18.156.13.209 | 192.168.2.6 |
Jul 8, 2024 18:15:51.872101068 CEST | 16943 | 49731 | 18.156.13.209 | 192.168.2.6 |
Jul 8, 2024 18:15:51.939064980 CEST | 49731 | 16943 | 192.168.2.6 | 18.156.13.209 |
Jul 8, 2024 18:15:51.945029974 CEST | 16943 | 49731 | 18.156.13.209 | 192.168.2.6 |
Jul 8, 2024 18:15:54.767394066 CEST | 16943 | 49731 | 18.156.13.209 | 192.168.2.6 |
Jul 8, 2024 18:15:54.806215048 CEST | 49731 | 16943 | 192.168.2.6 | 18.156.13.209 |
Jul 8, 2024 18:15:54.811647892 CEST | 16943 | 49731 | 18.156.13.209 | 192.168.2.6 |
Jul 8, 2024 18:15:56.628695011 CEST | 16943 | 49731 | 18.156.13.209 | 192.168.2.6 |
Jul 8, 2024 18:15:56.629098892 CEST | 49731 | 16943 | 192.168.2.6 | 18.156.13.209 |
Jul 8, 2024 18:15:56.640582085 CEST | 16943 | 49731 | 18.156.13.209 | 192.168.2.6 |
Jul 8, 2024 18:15:58.288058996 CEST | 16943 | 49731 | 18.156.13.209 | 192.168.2.6 |
Jul 8, 2024 18:15:58.288794994 CEST | 16943 | 49731 | 18.156.13.209 | 192.168.2.6 |
Jul 8, 2024 18:15:58.288917065 CEST | 49731 | 16943 | 192.168.2.6 | 18.156.13.209 |
Jul 8, 2024 18:15:58.320530891 CEST | 49731 | 16943 | 192.168.2.6 | 18.156.13.209 |
Jul 8, 2024 18:15:58.518594027 CEST | 16943 | 49731 | 18.156.13.209 | 192.168.2.6 |
Jul 8, 2024 18:15:58.518656969 CEST | 49731 | 16943 | 192.168.2.6 | 18.156.13.209 |
Jul 8, 2024 18:15:58.525681019 CEST | 16943 | 49731 | 18.156.13.209 | 192.168.2.6 |
Jul 8, 2024 18:16:00.817461014 CEST | 16943 | 49731 | 18.156.13.209 | 192.168.2.6 |
Jul 8, 2024 18:16:00.870003939 CEST | 49731 | 16943 | 192.168.2.6 | 18.156.13.209 |
Jul 8, 2024 18:16:00.876492023 CEST | 49731 | 16943 | 192.168.2.6 | 18.156.13.209 |
Jul 8, 2024 18:16:00.881706953 CEST | 16943 | 49731 | 18.156.13.209 | 192.168.2.6 |
Jul 8, 2024 18:16:04.850775957 CEST | 16943 | 49731 | 18.156.13.209 | 192.168.2.6 |
Jul 8, 2024 18:16:04.901065111 CEST | 49731 | 16943 | 192.168.2.6 | 18.156.13.209 |
Jul 8, 2024 18:16:04.905962944 CEST | 16943 | 49731 | 18.156.13.209 | 192.168.2.6 |
Jul 8, 2024 18:16:14.563033104 CEST | 16943 | 49731 | 18.156.13.209 | 192.168.2.6 |
Jul 8, 2024 18:16:14.563244104 CEST | 49731 | 16943 | 192.168.2.6 | 18.156.13.209 |
Jul 8, 2024 18:16:14.569116116 CEST | 16943 | 49731 | 18.156.13.209 | 192.168.2.6 |
Jul 8, 2024 18:16:32.977298975 CEST | 16943 | 49731 | 18.156.13.209 | 192.168.2.6 |
Jul 8, 2024 18:16:32.977569103 CEST | 49731 | 16943 | 192.168.2.6 | 18.156.13.209 |
Jul 8, 2024 18:16:32.980880022 CEST | 16943 | 49731 | 18.156.13.209 | 192.168.2.6 |
Jul 8, 2024 18:16:32.980959892 CEST | 49731 | 16943 | 192.168.2.6 | 18.156.13.209 |
Jul 8, 2024 18:16:32.984558105 CEST | 16943 | 49731 | 18.156.13.209 | 192.168.2.6 |
Jul 8, 2024 18:16:50.613889933 CEST | 16943 | 49731 | 18.156.13.209 | 192.168.2.6 |
Jul 8, 2024 18:16:50.614052057 CEST | 49731 | 16943 | 192.168.2.6 | 18.156.13.209 |
Jul 8, 2024 18:16:50.622395039 CEST | 16943 | 49731 | 18.156.13.209 | 192.168.2.6 |
Jul 8, 2024 18:17:08.612670898 CEST | 16943 | 49731 | 18.156.13.209 | 192.168.2.6 |
Jul 8, 2024 18:17:08.612869024 CEST | 49731 | 16943 | 192.168.2.6 | 18.156.13.209 |
Jul 8, 2024 18:17:08.618752003 CEST | 16943 | 49731 | 18.156.13.209 | 192.168.2.6 |
Jul 8, 2024 18:17:19.607773066 CEST | 16943 | 49731 | 18.156.13.209 | 192.168.2.6 |
Jul 8, 2024 18:17:19.647943974 CEST | 49731 | 16943 | 192.168.2.6 | 18.156.13.209 |
Jul 8, 2024 18:17:19.652987957 CEST | 16943 | 49731 | 18.156.13.209 | 192.168.2.6 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jul 8, 2024 18:13:26.063364029 CEST | 62654 | 53 | 192.168.2.6 | 1.1.1.1 |
Jul 8, 2024 18:13:26.076687098 CEST | 53 | 62654 | 1.1.1.1 | 192.168.2.6 |
Jul 8, 2024 18:15:49.925180912 CEST | 50217 | 53 | 192.168.2.6 | 1.1.1.1 |
Jul 8, 2024 18:15:49.936157942 CEST | 53 | 50217 | 1.1.1.1 | 192.168.2.6 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jul 8, 2024 18:13:26.063364029 CEST | 192.168.2.6 | 1.1.1.1 | 0xa020 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jul 8, 2024 18:15:49.925180912 CEST | 192.168.2.6 | 1.1.1.1 | 0x8bb8 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jul 8, 2024 18:13:26.076687098 CEST | 1.1.1.1 | 192.168.2.6 | 0xa020 | No error (0) | 18.192.93.86 | A (IP address) | IN (0x0001) | false | ||
Jul 8, 2024 18:15:49.936157942 CEST | 1.1.1.1 | 192.168.2.6 | 0x8bb8 | No error (0) | 18.156.13.209 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 12:13:09 |
Start date: | 08/07/2024 |
Path: | C:\Users\user\Desktop\Game Laucher.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x30000 |
File size: | 1'150'464 bytes |
MD5 hash: | B24F58BB4315DFA0C7EFE2CB18BED37D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 12:13:16 |
Start date: | 08/07/2024 |
Path: | C:\Users\user\AppData\Local\Temp\windows process.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x6e0000 |
File size: | 1'150'464 bytes |
MD5 hash: | B24F58BB4315DFA0C7EFE2CB18BED37D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Yara matches: |
|
Antivirus matches: |
|
Reputation: | low |
Has exited: | false |
Target ID: | 3 |
Start time: | 12:13:22 |
Start date: | 08/07/2024 |
Path: | C:\Windows\SysWOW64\netsh.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xa60000 |
File size: | 82'432 bytes |
MD5 hash: | 4E89A1A088BE715D6C946E55AB07C7DF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 12:13:22 |
Start date: | 08/07/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff66e660000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 12:13:23 |
Start date: | 08/07/2024 |
Path: | C:\Windows\SysWOW64\taskkill.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xa10000 |
File size: | 74'240 bytes |
MD5 hash: | CA313FD7E6C2A778FFD21CFB5C1C56CD |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 6 |
Start time: | 12:13:23 |
Start date: | 08/07/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff66e660000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 2.7% |
Dynamic/Decrypted Code Coverage: | 94.6% |
Signature Coverage: | 0% |
Total number of Nodes: | 37 |
Total number of Limit Nodes: | 2 |
Graph
Function 02E20310 Relevance: 7.7, Strings: 6, Instructions: 193COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02E203BD Relevance: 7.6, Strings: 6, Instructions: 135COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02E20938 Relevance: 3.0, Strings: 2, Instructions: 496COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029DA8A4 Relevance: 1.6, APIs: 1, Instructions: 90fileCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029DA99C Relevance: 1.6, APIs: 1, Instructions: 80COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029DA8C6 Relevance: 1.6, APIs: 1, Instructions: 76fileCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029DA710 Relevance: 1.6, APIs: 1, Instructions: 70COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029DAD3E Relevance: 1.6, APIs: 1, Instructions: 70fileCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029DAECE Relevance: 1.6, APIs: 1, Instructions: 67fileCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029DAE07 Relevance: 1.6, APIs: 1, Instructions: 66COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029DA2D2 Relevance: 1.6, APIs: 1, Instructions: 61COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029DAD5E Relevance: 1.6, APIs: 1, Instructions: 60fileCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029DB0E0 Relevance: 1.6, APIs: 1, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029DAEFA Relevance: 1.6, APIs: 1, Instructions: 53fileCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029DA9DE Relevance: 1.6, APIs: 1, Instructions: 52COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029DAE42 Relevance: 1.5, APIs: 1, Instructions: 48COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029DB102 Relevance: 1.5, APIs: 1, Instructions: 47COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029DA74E Relevance: 1.5, APIs: 1, Instructions: 43COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029DA2FE Relevance: 1.5, APIs: 1, Instructions: 35COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 001B7598 Relevance: 1.3, APIs: 1, Instructions: 21memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02E20007 Relevance: .2, Instructions: 187COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E05DF Relevance: .0, Instructions: 44COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02E20889 Relevance: .0, Instructions: 42COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E0606 Relevance: .0, Instructions: 27COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029D23F4 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029D23BC Relevance: .0, Instructions: 14COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 001B796C Relevance: 1.1, Instructions: 1129COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 11.8% |
Dynamic/Decrypted Code Coverage: | 91.2% |
Signature Coverage: | 11.1% |
Total number of Nodes: | 217 |
Total number of Limit Nodes: | 11 |
Graph
Function 03643258 Relevance: 13.8, Strings: 9, Instructions: 2530COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074FBD0 Relevance: 3.8, Strings: 3, Instructions: 72COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030ABD6B Relevance: 1.6, APIs: 1, Instructions: 75COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E04EF Relevance: 1.6, APIs: 1, Instructions: 64nativeCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030ABDA2 Relevance: 1.6, APIs: 1, Instructions: 52COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E00EC Relevance: 1.6, APIs: 1, Instructions: 50nativeCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E052A Relevance: 1.5, APIs: 1, Instructions: 38nativeCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E010E Relevance: 1.5, APIs: 1, Instructions: 38nativeCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074F634 Relevance: 1.5, APIs: 1, Instructions: 9nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074F646 Relevance: 1.5, APIs: 1, Instructions: 3nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00727490 Relevance: .0, Instructions: 46COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074DCC0 Relevance: .0, Instructions: 36COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074F7F0 Relevance: .0, Instructions: 19COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03640310 Relevance: 7.7, Strings: 6, Instructions: 189COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 036403BD Relevance: 7.6, Strings: 6, Instructions: 135COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03641928 Relevance: 4.1, Strings: 3, Instructions: 333COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03641999 Relevance: 4.0, Strings: 3, Instructions: 280COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 036419B7 Relevance: 4.0, Strings: 3, Instructions: 277COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 036419CA Relevance: 4.0, Strings: 3, Instructions: 276COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03640938 Relevance: 3.0, Strings: 2, Instructions: 490COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03641510 Relevance: 2.8, Strings: 2, Instructions: 283COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03645C29 Relevance: 2.7, Strings: 2, Instructions: 170COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03640509 Relevance: 2.6, Strings: 2, Instructions: 50COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03641F3F Relevance: 1.8, Strings: 1, Instructions: 567COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030AAC19 Relevance: 1.6, APIs: 1, Instructions: 96fileCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E1CE8 Relevance: 1.6, APIs: 1, Instructions: 93COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E1F76 Relevance: 1.6, APIs: 1, Instructions: 92COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E1BE0 Relevance: 1.6, APIs: 1, Instructions: 91timeCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E15D4 Relevance: 1.6, APIs: 1, Instructions: 89COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E32A8 Relevance: 1.6, APIs: 1, Instructions: 85COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030AA120 Relevance: 1.6, APIs: 1, Instructions: 84COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E1D0A Relevance: 1.6, APIs: 1, Instructions: 84COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030AAD30 Relevance: 1.6, APIs: 1, Instructions: 80COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E31D9 Relevance: 1.6, APIs: 1, Instructions: 80COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 036427B8 Relevance: 1.6, Strings: 1, Instructions: 327COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E11AE Relevance: 1.6, APIs: 1, Instructions: 77networkCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E178A Relevance: 1.6, APIs: 1, Instructions: 77fileCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030AAC5A Relevance: 1.6, APIs: 1, Instructions: 76fileCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E0007 Relevance: 1.6, APIs: 1, Instructions: 76COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E15FA Relevance: 1.6, APIs: 1, Instructions: 76COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030AB0D2 Relevance: 1.6, APIs: 1, Instructions: 73fileCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E33A7 Relevance: 1.6, APIs: 1, Instructions: 73COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E1A21 Relevance: 1.6, APIs: 1, Instructions: 72COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030ABBF3 Relevance: 1.6, APIs: 1, Instructions: 70COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E3113 Relevance: 1.6, APIs: 1, Instructions: 69COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030AA710 Relevance: 1.6, APIs: 1, Instructions: 68COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E11CE Relevance: 1.6, APIs: 1, Instructions: 67networkCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E1EBA Relevance: 1.6, APIs: 1, Instructions: 67networkCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E17AA Relevance: 1.6, APIs: 1, Instructions: 67fileCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030AB19B Relevance: 1.6, APIs: 1, Instructions: 66COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E36F5 Relevance: 1.6, APIs: 1, Instructions: 65libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030AB330 Relevance: 1.6, APIs: 1, Instructions: 64fileCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E1C1E Relevance: 1.6, APIs: 1, Instructions: 64timeCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E32E6 Relevance: 1.6, APIs: 1, Instructions: 62COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E33CA Relevance: 1.6, APIs: 1, Instructions: 62COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E0032 Relevance: 1.6, APIs: 1, Instructions: 61COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E05A4 Relevance: 1.6, APIs: 1, Instructions: 61COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030AB0F2 Relevance: 1.6, APIs: 1, Instructions: 60fileCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E0444 Relevance: 1.6, APIs: 1, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E3136 Relevance: 1.6, APIs: 1, Instructions: 58COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E1A4E Relevance: 1.6, APIs: 1, Instructions: 57COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030AA2D2 Relevance: 1.6, APIs: 1, Instructions: 56COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030AAA81 Relevance: 1.6, APIs: 1, Instructions: 55comCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E3212 Relevance: 1.6, APIs: 1, Instructions: 55COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030AA078 Relevance: 1.6, APIs: 1, Instructions: 54networkCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030ABC22 Relevance: 1.6, APIs: 1, Instructions: 53COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030AB352 Relevance: 1.6, APIs: 1, Instructions: 53fileCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030AAD72 Relevance: 1.6, APIs: 1, Instructions: 52COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030AB48C Relevance: 1.6, APIs: 1, Instructions: 52COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030AA9E4 Relevance: 1.6, APIs: 1, Instructions: 51COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E0466 Relevance: 1.5, APIs: 1, Instructions: 49COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E1EEA Relevance: 1.5, APIs: 1, Instructions: 49networkCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E0E90 Relevance: 1.5, APIs: 1, Instructions: 49windowCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030AB1D6 Relevance: 1.5, APIs: 1, Instructions: 48COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030AA172 Relevance: 1.5, APIs: 1, Instructions: 47COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E1FE6 Relevance: 1.5, APIs: 1, Instructions: 47COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E3726 Relevance: 1.5, APIs: 1, Instructions: 46libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E05D2 Relevance: 1.5, APIs: 1, Instructions: 45COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030AA74E Relevance: 1.5, APIs: 1, Instructions: 43COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03642757 Relevance: 1.5, Strings: 1, Instructions: 293COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030AA09A Relevance: 1.5, APIs: 1, Instructions: 42networkCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030AAA06 Relevance: 1.5, APIs: 1, Instructions: 40COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030AB4AE Relevance: 1.5, APIs: 1, Instructions: 39COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030AAAAE Relevance: 1.5, APIs: 1, Instructions: 39comCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030AA2FE Relevance: 1.5, APIs: 1, Instructions: 35COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 037E0EB2 Relevance: 1.5, APIs: 1, Instructions: 35windowCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0075204D Relevance: 1.5, APIs: 1, Instructions: 8COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 036428BD Relevance: 1.5, Strings: 1, Instructions: 228COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0364290D Relevance: 1.5, Strings: 1, Instructions: 217COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0364294F Relevance: 1.5, Strings: 1, Instructions: 210COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03640B03 Relevance: 1.4, Strings: 1, Instructions: 194COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 036429C3 Relevance: 1.4, Strings: 1, Instructions: 189COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03642AA5 Relevance: 1.4, Strings: 1, Instructions: 142COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03642BC0 Relevance: 1.3, Strings: 1, Instructions: 89COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03642698 Relevance: 1.3, Strings: 1, Instructions: 71COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03640E55 Relevance: 1.3, Strings: 1, Instructions: 63COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03640006 Relevance: .2, Instructions: 179COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 036405C7 Relevance: .2, Instructions: 176COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03640BA8 Relevance: .2, Instructions: 153COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03641501 Relevance: .1, Instructions: 146COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03640634 Relevance: .1, Instructions: 145COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 036451A6 Relevance: .1, Instructions: 141COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 036418E0 Relevance: .1, Instructions: 133COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03640C22 Relevance: .1, Instructions: 125COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03641238 Relevance: .1, Instructions: 115COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03641228 Relevance: .1, Instructions: 111COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03643070 Relevance: .1, Instructions: 107COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03640C8D Relevance: .1, Instructions: 100COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03DA0DD3 Relevance: .1, Instructions: 62COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03640773 Relevance: .1, Instructions: 61COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03640D40 Relevance: .1, Instructions: 61COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0661264C Relevance: .1, Instructions: 60COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03642EE0 Relevance: .1, Instructions: 59COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03DA0E0C Relevance: .1, Instructions: 59COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03642F89 Relevance: .1, Instructions: 58COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030BB7E4 Relevance: .1, Instructions: 52COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03642DD0 Relevance: .1, Instructions: 51COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 036413B8 Relevance: .0, Instructions: 48COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 036413A9 Relevance: .0, Instructions: 46COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03DA05DF Relevance: .0, Instructions: 44COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03640D98 Relevance: .0, Instructions: 42COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03640889 Relevance: .0, Instructions: 41COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03641EB0 Relevance: .0, Instructions: 35COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03641EC0 Relevance: .0, Instructions: 32COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03DA0EC8 Relevance: .0, Instructions: 31COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03DA0606 Relevance: .0, Instructions: 27COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06611F63 Relevance: .0, Instructions: 26COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 066126B7 Relevance: .0, Instructions: 26COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030BB833 Relevance: .0, Instructions: 26COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03641451 Relevance: .0, Instructions: 19COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030A23F4 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03643030 Relevance: .0, Instructions: 14COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030A23BC Relevance: .0, Instructions: 14COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03643040 Relevance: .0, Instructions: 11COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03643221 Relevance: .0, Instructions: 10COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074ECF8 Relevance: 1.6, APIs: 1, Instructions: 52nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074F17E Relevance: 1.5, APIs: 1, Instructions: 49nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074F58C Relevance: 1.5, APIs: 1, Instructions: 48nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074ECA0 Relevance: 1.5, APIs: 1, Instructions: 44nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074EC50 Relevance: 1.5, APIs: 1, Instructions: 40nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074EF04 Relevance: 1.5, APIs: 1, Instructions: 40nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074F3F2 Relevance: 1.5, APIs: 1, Instructions: 37nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074F028 Relevance: 1.5, APIs: 1, Instructions: 36nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074F5EC Relevance: 1.5, APIs: 1, Instructions: 36nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074EF72 Relevance: 1.5, APIs: 1, Instructions: 33nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074F070 Relevance: 1.5, APIs: 1, Instructions: 32nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074F0B0 Relevance: 1.5, APIs: 1, Instructions: 32nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074F1E0 Relevance: 1.5, APIs: 1, Instructions: 32nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074EFE8 Relevance: 1.5, APIs: 1, Instructions: 32nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074EDDE Relevance: 1.5, APIs: 1, Instructions: 27nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074F338 Relevance: 1.5, APIs: 1, Instructions: 26nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074F558 Relevance: 1.5, APIs: 1, Instructions: 26nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074EFB4 Relevance: 1.5, APIs: 1, Instructions: 26nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074F27C Relevance: 1.5, APIs: 1, Instructions: 21nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074ED60 Relevance: 1.5, APIs: 1, Instructions: 21nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074F23E Relevance: 1.5, APIs: 1, Instructions: 14nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074F142 Relevance: 1.5, APIs: 1, Instructions: 12nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074F10A Relevance: 1.5, APIs: 1, Instructions: 12nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074F25E Relevance: 1.5, APIs: 1, Instructions: 12nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074F2C2 Relevance: 1.5, APIs: 1, Instructions: 12nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074F174 Relevance: 1.5, APIs: 1, Instructions: 5nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074F234 Relevance: 1.5, APIs: 1, Instructions: 5nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074F3E8 Relevance: 1.5, APIs: 1, Instructions: 5nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074EDD4 Relevance: 1.5, APIs: 1, Instructions: 5nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074EF68 Relevance: 1.5, APIs: 1, Instructions: 5nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074F54F Relevance: 1.5, APIs: 1, Instructions: 4nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074EEFB Relevance: 1.5, APIs: 1, Instructions: 4nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074F13A Relevance: 1.5, APIs: 1, Instructions: 3nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074F102 Relevance: 1.5, APIs: 1, Instructions: 3nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074F2BA Relevance: 1.5, APIs: 1, Instructions: 3nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|