Windows
Analysis Report
6Pk1nTmcHN.exe
Overview
General Information
Sample name: | 6Pk1nTmcHN.exerenamed because original name is a hash value |
Original sample name: | 21f77e85724543222e6cd3089fc7c741373b4b4362d25b103490c7ce84d20cda.exe |
Analysis ID: | 1509585 |
MD5: | d0d55a8f4965a4d3f661b3ea268f578b |
SHA1: | a063be1a85bba3ffc65554d3b4c0ae1a45638451 |
SHA256: | 21f77e85724543222e6cd3089fc7c741373b4b4362d25b103490c7ce84d20cda |
Tags: | 62-192-173-45exe |
Infos: | |
Detection
Score: | 60 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- 6Pk1nTmcHN.exe (PID: 7532 cmdline:
"C:\Users\ user\Deskt op\6Pk1nTm cHN.exe" MD5: D0D55A8F4965A4D3F661B3EA268F578B) - WerFault.exe (PID: 7988 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 7 532 -s 130 4 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Code function: | 0_2_000000014005A7A0 |
Source: | Binary string: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Code function: | 0_3_0053D65A | |
Source: | Code function: | 0_3_0053D6CA | |
Source: | Code function: | 0_2_00000001400026F0 | |
Source: | Code function: | 0_2_00000001400597D0 | |
Source: | Code function: | 0_2_0000000140059900 | |
Source: | Code function: | 0_2_0000000140059C10 | |
Source: | Code function: | 0_2_00558149 | |
Source: | Code function: | 0_2_005751C0 | |
Source: | Code function: | 0_2_005745F0 | |
Source: | Code function: | 0_2_005471B0 | |
Source: | Code function: | 0_2_00557A50 | |
Source: | Code function: | 0_2_00574740 | |
Source: | Code function: | 0_2_00574360 | |
Source: | Code function: | 0_2_00574FF0 | |
Source: | Code function: | 0_2_0055F3A0 |
Source: | Code function: | 0_2_0000000140029200 |
Source: | Code function: | 0_2_0000000140030ED0 |
Source: | Code function: | 0_2_000000014006F0E0 | |
Source: | Code function: | 0_2_0000000140099110 | |
Source: | Code function: | 0_2_000000014000C200 | |
Source: | Code function: | 0_2_0000000140048230 | |
Source: | Code function: | 0_2_00000001400263B0 | |
Source: | Code function: | 0_2_000000014005F3E0 | |
Source: | Code function: | 0_2_0000000140091420 | |
Source: | Code function: | 0_2_0000000140014470 | |
Source: | Code function: | 0_2_000000014000B5C0 | |
Source: | Code function: | 0_2_0000000140089608 | |
Source: | Code function: | 0_2_0000000140001670 | |
Source: | Code function: | 0_2_0000000140014699 | |
Source: | Code function: | 0_2_0000000140008700 | |
Source: | Code function: | 0_2_000000014009A738 | |
Source: | Code function: | 0_2_0000000140099790 | |
Source: | Code function: | 0_2_000000014005A7A0 | |
Source: | Code function: | 0_2_00000001400367A0 | |
Source: | Code function: | 0_2_00000001400597D0 | |
Source: | Code function: | 0_2_00000001400897F0 | |
Source: | Code function: | 0_2_000000014001D7F0 | |
Source: | Code function: | 0_2_0000000140076810 | |
Source: | Code function: | 0_2_0000000140015860 | |
Source: | Code function: | 0_2_000000014000F8D0 | |
Source: | Code function: | 0_2_000000014002D940 | |
Source: | Code function: | 0_2_00000001400429D0 | |
Source: | Code function: | 0_2_00000001400899DC | |
Source: | Code function: | 0_2_000000014008BA28 | |
Source: | Code function: | 0_2_000000014008AA44 | |
Source: | Code function: | 0_2_0000000140040A50 | |
Source: | Code function: | 0_2_0000000140048AC0 | |
Source: | Code function: | 0_2_0000000140018AF0 | |
Source: | Code function: | 0_2_0000000140032B00 | |
Source: | Code function: | 0_2_000000014000CB80 | |
Source: | Code function: | 0_2_0000000140089BC4 | |
Source: | Code function: | 0_2_0000000140097BEC | |
Source: | Code function: | 0_2_0000000140098C60 | |
Source: | Code function: | 0_2_000000014002FD10 | |
Source: | Code function: | 0_2_0000000140089DB0 | |
Source: | Code function: | 0_2_000000014008BDF4 | |
Source: | Code function: | 0_2_000000014005EE20 | |
Source: | Code function: | 0_2_0000000140092E14 | |
Source: | Code function: | 0_2_0000000140094E30 | |
Source: | Code function: | 0_2_0000000140030ED0 | |
Source: | Code function: | 0_2_00000001400A3F0C | |
Source: | Code function: | 0_2_0000000140072F20 | |
Source: | Code function: | 0_2_0000000140042F80 | |
Source: | Code function: | 0_2_0000000140089F98 | |
Source: | Code function: | 0_2_000000014000AFE0 | |
Source: | Code function: | 0_2_00572812 | |
Source: | Code function: | 0_2_0055B4E0 | |
Source: | Code function: | 0_2_00571490 | |
Source: | Code function: | 0_2_00564550 | |
Source: | Code function: | 0_2_00545D60 | |
Source: | Code function: | 0_2_00549500 | |
Source: | Code function: | 0_2_0055A100 | |
Source: | Code function: | 0_2_00559120 | |
Source: | Code function: | 0_2_005499D0 | |
Source: | Code function: | 0_2_005555C0 | |
Source: | Code function: | 0_2_0056B5E0 | |
Source: | Code function: | 0_2_005655E0 | |
Source: | Code function: | 0_2_00554DB0 | |
Source: | Code function: | 0_2_00570210 | |
Source: | Code function: | 0_2_00567220 | |
Source: | Code function: | 0_2_0055BED0 | |
Source: | Code function: | 0_2_005466C0 | |
Source: | Code function: | 0_2_005666E0 | |
Source: | Code function: | 0_2_005516A0 | |
Source: | Code function: | 0_2_005542A0 | |
Source: | Code function: | 0_2_005682A0 | |
Source: | Code function: | 0_2_00571F40 | |
Source: | Code function: | 0_2_00572F60 | |
Source: | Code function: | 0_2_0054A730 | |
Source: | Code function: | 0_2_0056FBC0 | |
Source: | Code function: | 0_2_0055CBE0 | |
Source: | Code function: | 0_2_00562BB0 | |
Source: | Code function: | 0_2_005613A3 |
Source: | Code function: |
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Binary string: |
Source: | Classification label: |
Source: | Code function: | 0_2_000000014005A7A0 |
Source: | Code function: | 0_2_0000000140030ED0 |
Source: | Code function: | 0_2_0055F3A0 |
Source: | Code function: | 0_2_0000000140048AC0 |
Source: | Code function: | 0_2_0000000140030ED0 |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_0000000140048AC0 |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Code function: | 0_2_000000014005A7A0 |
Source: | Code function: | 0_2_00564D00 |
Source: | Check user administrative privileges: | graph_0-51771 |
Source: | API coverage: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 0_2_000000014005A7A0 |
Source: | Code function: | 0_2_0054CCE0 |
Source: | Code function: | 0_2_0000000140088100 |
Source: | Code function: | 0_2_0000000140015860 |
Source: | Code function: | 0_2_0000000140088100 | |
Source: | Code function: | 0_2_0000000140079AD8 |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Thread register set: | Jump to behavior | ||
Source: | Thread register set: | Jump to behavior |
Source: | Thread register set: | Jump to behavior |
Source: | Code function: | 0_2_0000000140079FFC |
Source: | Code function: | 0_2_00564D00 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: | 0_2_0000000140030ED0 |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Service Execution | 14 Windows Service | 14 Windows Service | 1 Virtualization/Sandbox Evasion | OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | 22 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 Native API | 1 DLL Side-Loading | 21 Process Injection | 21 Process Injection | LSASS Memory | 41 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | 1 Image File Execution Options Injection | 1 DLL Side-Loading | 1 Deobfuscate/Decode Files or Information | Security Account Manager | 1 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | 1 Image File Execution Options Injection | 1 Obfuscated Files or Information | NTDS | 2 Process Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 1 Account Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | Steganography | Cached Domain Credentials | 1 System Owner/User Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | Compile After Delivery | DCSync | 1 System Network Configuration Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | Indicator Removal from Tools | Proc Filesystem | 3 System Information Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
16% | ReversingLabs | Win64.Trojan.Generic |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
weblineinfo.com | 62.192.173.45 | true | false | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
62.192.173.45 | weblineinfo.com | Lithuania | 25780 | HUGESERVER-NETWORKSUS | false |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1509585 |
Start date and time: | 2024-09-11 20:21:12 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 48s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 8 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 6Pk1nTmcHN.exerenamed because original name is a hash value |
Original Sample Name: | 21f77e85724543222e6cd3089fc7c741373b4b4362d25b103490c7ce84d20cda.exe |
Detection: | MAL |
Classification: | mal60.evad.winEXE@2/5@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 20.42.73.29
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing disassembly code.
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: 6Pk1nTmcHN.exe
Time | Type | Description |
---|---|---|
14:23:04 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
62.192.173.45 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
weblineinfo.com | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
HUGESERVER-NETWORKSUS | Get hash | malicious | XenoRAT | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | AsyncRAT, VenomRAT | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Mirai, Moobot | Browse |
| ||
Get hash | malicious | AsyncRAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC, Glupteba, LummaC Stealer, SmokeLoader, Socks5Systemz, Stealc | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_6Pk1nTmcHN.exe_391e34d76b9d88a1aa9c20e1d1785e9c3c5c724c_505b6263_39bf154d-cf05-4a47-bf62-278d1182160b\Report.wer
Download File
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.9441706309359755 |
Encrypted: | false |
SSDEEP: | 192:C1LWCicAnq6dQy0FfeciIYj4vOzuiF+Z24lO82w0:rCWnqYQ5FfeciIYjRzuiF+Y4lO82w0 |
MD5: | 0BD45F07EAD2B34BC5BFD41CD9A073E5 |
SHA1: | F21C3216F90C97AE5946BE872AF14A9157C9C408 |
SHA-256: | A546BBD8F1643F34F3E3B141E1220D62182208D25A446D35AA5F977B7B0009CB |
SHA-512: | 263A78863132F2676832B0439CD8DCF0D5ED0813F35CA98138BBFC358BCB7CD6C1CD9350839DA1F40262687D44DC440C411F8BED7E5B9B1A985D02476085A3BF |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 135962 |
Entropy (8bit): | 1.445783875494318 |
Encrypted: | false |
SSDEEP: | 192:gAbXe4MKndg8gOK33yxtztf3Oo+j5TRKZl381D+Dty4sEzSDVLmPTvO:DbFn+83K3ixd1y1KZl3++D8Am6LO |
MD5: | 160067CDDB801D424A4B041CDDD13E1D |
SHA1: | EAB7206EA70C59F6C5E9580E0C24D290C2E71C0E |
SHA-256: | 5526583B80842EAD03C5F35596AC26891D73C13E7F2F699E667CF1F0C3C6E43B |
SHA-512: | ACC0F00DB10078C9A2823CDEEE913B1F26942FA0F60D388439E12C1CDA786D7C160797D5B01E6DDEAB1197FF868C0713172FF53E5CEAF4ADD9CA8B5862B9B7AB |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8790 |
Entropy (8bit): | 3.705096949442672 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJqX7W6Y9fQPgmf6Hc+yprM89bh5sfJrm:R6lXJqrW6Y1QPgmf6Hc++hifI |
MD5: | 8DAAFD6E480D619A51F9EFB7E2E88A97 |
SHA1: | 692C426B12C8D6A66AF8BAF65A7E87E46868F7D2 |
SHA-256: | 547306A36A0C7BFF8EA4E50C10A152841C49B7B067C4ABC49E686CBE5BAE1FD3 |
SHA-512: | 0670E56A34947A0937CB226A65F7AE8255BECA89F26F71B10715B7CFB5B577D41D2A2DAC11ACC7D8D3038559D39483BCB147281133FE89B20F7563DFC221A4AD |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4717 |
Entropy (8bit): | 4.466429905670633 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zseJg771I9g3rWpW8VYvYm8M4JASHFWMyq85qZgLUIaWK0d:uIjfUI7j3a7V7JAgJ+UIaWK0d |
MD5: | 4CA07DD3D4600112735C90BFDF98AEC6 |
SHA1: | E073C4026BBCEB886BDC7D0CC3A4FE3312FC1554 |
SHA-256: | C9C90BFC8A3ECD19CA2A1061BBF2BABF3170B7793EC71776F049C5B3C0371323 |
SHA-512: | 699D5F3BAB34DAFC5F5D7418F5BFF231BF12EABFAE7A89A0FAF573BDBE42FEDFB4B0E135CA96C8860D33568342C10C688BBFDD6A7FD33EBA986948F550E003F3 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.466059481422838 |
Encrypted: | false |
SSDEEP: | 6144:DIXfpi67eLPU9skLmb0b4/WSPKaJG8nAgejZMMhA2gX4WABl0uNPdwBCswSbt:UXD94/WlLZMM6YFHt+t |
MD5: | 837A4F303B02936073530B0D8C6E90DA |
SHA1: | C91812599701F39900D1E18E1C38EE89E9B44B83 |
SHA-256: | CBD27781FE440BBC33E7A88B459FB0BFDCDFE22F1A6D74A7F98B0B6BEF6FC808 |
SHA-512: | 5F06E2A176DDB07A97E55EDCD9A85F599468DD1F2AAC9F5D4828F0C3B71134B2188AAC980C837237995A24BFE20D82270C41A261ADBC066C77B622269C1678A8 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 6.9455237392770535 |
TrID: |
|
File name: | 6Pk1nTmcHN.exe |
File size: | 1'461'248 bytes |
MD5: | d0d55a8f4965a4d3f661b3ea268f578b |
SHA1: | a063be1a85bba3ffc65554d3b4c0ae1a45638451 |
SHA256: | 21f77e85724543222e6cd3089fc7c741373b4b4362d25b103490c7ce84d20cda |
SHA512: | 3f63e14ba2b4dfee860ca307a9e5b18cc7119cda03a474f8820cdfd1ac15d003a7f3e6d95af26e08f2d367c7f9b38f64028a234fadb6b54b5c5d5582a45a3a07 |
SSDEEP: | 24576:tCAMa2xF/U2MtmHZD+4of1c2OhTP4KOqh0lhSMXlCTgnbGJkdV4KN7zc01Octq:VMa2xFs2MgHo4of1cPhbLeKgnbGJIV4w |
TLSH: | E065BE1A7BAC00F8D1BEC0B88D67591AEA72785543219BDF57E0DE161F63AE05E3E700 |
File Content Preview: | MZ......................@...................................8...........!..L.!This program cannot be run in DOS mode....$........i.;..oh..oh..oh.zli..oh.zjix.oh.zki..oh...h..oh..ki..oh..li..oh.|ji..oh..ji..oh.p.h..oh..oh..oh.zni..oh..nhX.oh..fi..oh..oi..o |
Icon Hash: | cc8d0d191e1e107c |
Entrypoint: | 0x14005e280 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x140000000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, GUARD_CF |
Time Stamp: | 0x65BBAE0A [Thu Feb 1 14:43:22 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 30c7d68b242fb27be994b0b3521d918b |
Signature Valid: | |
Signature Issuer: | |
Signature Validation Error: | |
Error Number: | |
Not Before, Not After | |
Subject Chain | |
Version: | |
Thumbprint MD5: | |
Thumbprint SHA-1: | |
Thumbprint SHA-256: | |
Serial: |
Instruction |
---|
dec eax |
sub esp, 28h |
call 00007F277CBCD9C8h |
dec eax |
add esp, 28h |
jmp 00007F277CBB1A93h |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
dec eax |
mov dword ptr [esp+10h], ebx |
dec eax |
mov dword ptr [esp+08h], ecx |
push edi |
dec eax |
sub esp, 20h |
dec eax |
mov edi, dword ptr [esp+30h] |
dec eax |
lea edx, dword ptr [0008B7E5h] |
dec eax |
mov ecx, edi |
call 00007F277CBB3032h |
dec eax |
lea eax, dword ptr [0008B856h] |
dec eax |
mov dword ptr [edi], eax |
dec eax |
lea ecx, dword ptr [edi+28h] |
xor eax, eax |
dec eax |
mov dword ptr [edi+28h], eax |
dec eax |
mov dword ptr [edi+30h], eax |
call 00007F277CBB59D1h |
dec eax |
lea ecx, dword ptr [edi+28h] |
call 00007F277CBB59D4h |
dec eax |
mov ebx, dword ptr [esp+38h] |
dec eax |
mov eax, edi |
dec eax |
add esp, 20h |
pop edi |
ret |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
dec eax |
mov dword ptr [esp+08h], ecx |
dec eax |
sub esp, 68h |
dec eax |
mov eax, dword ptr [esp+70h] |
dec eax |
mov ecx, dword ptr [eax+38h] |
dec eax |
test ecx, ecx |
je 00007F277CBB1C65h |
dec eax |
mov eax, dword ptr [ecx] |
dec eax |
mov eax, dword ptr [eax+10h] |
call dword ptr [000553ACh] |
nop |
dec eax |
add esp, 68h |
ret |
call 00007F277CBB49C6h |
nop |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
mov dword ptr [esp+10h], edx |
dec eax |
mov dword ptr [esp+00h], ecx |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x101750 | 0xe4 | .rdata |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x101834 | 0x8c | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x119000 | 0x530cc | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x10e000 | 0x8538 | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x127448 | 0x2978 | .rsrc |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x16d000 | 0x14c0 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0xe9dd4 | 0x8c | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0xea000 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0xd4ae0 | 0x140 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0xb3000 | 0x6c0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x1014bc | 0x40 | .rdata |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0xb145c | 0xb1600 | 1eaabf70aff8e3cc929bbdbf2e5aad9d | False | 0.46967219432699087 | data | 6.381906257673845 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0xb3000 | 0x50028 | 0x50200 | ff07adedf636d6bc3ffbc263edcd3727 | False | 0.40760591361154447 | data | 5.894067518653125 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x104000 | 0x91f8 | 0x5e00 | 91ca1c15198d6861a02e90789db46d34 | False | 0.14261968085106383 | DOS executable (block device driver) | 4.538365175655119 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0x10e000 | 0x8538 | 0x8600 | d733668419143445c8b94be87defbb16 | False | 0.49577308768656714 | data | 5.949404504623925 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.didat | 0x117000 | 0x50 | 0x200 | 701067eceeac6e2ef2c50b8ee0c87575 | False | 0.080078125 | data | 0.68918657910872 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
_RDATA | 0x118000 | 0x1f4 | 0x200 | 0683c4b4834a30f99b0319cb260168db | False | 0.53515625 | data | 4.234704000558715 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0x119000 | 0x530cc | 0x53200 | 4a91685c811c0b0ca3dacd69b1653b02 | False | 0.9509163533834587 | data | 7.921776188107435 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x16d000 | 0x14c0 | 0x1600 | fe11f6a0fd50e632ba0e66abf1859a99 | False | 0.3915127840909091 | data | 5.329570431313898 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x119328 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 192 | English | United States | 0.3108108108108108 |
RT_ICON | 0x119450 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 320, 256 important colors | English | United States | 0.8648843930635838 |
RT_ICON | 0x1199b8 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 640 | English | United States | 0.25806451612903225 |
RT_ICON | 0x119ca0 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 1152, 256 important colors | English | United States | 0.7454873646209387 |
RT_ICON | 0x11a548 | 0xb6d0 | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | English | United States | 0.999423076923077 |
RT_ICON | 0x125c18 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.7659574468085106 |
RT_ICON | 0x126080 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.7971311475409836 |
RT_ICON | 0x126a08 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4224 | English | United States | 0.7448405253283302 |
RT_ICON | 0x127ab0 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9600 | English | United States | 0.6373443983402489 |
RT_ICON | 0x12a058 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16896 | English | United States | 0.5634152102031176 |
RT_GROUP_ICON | 0x12e280 | 0x92 | data | English | United States | 0.6917808219178082 |
RT_VERSION | 0x12e314 | 0x374 | data | English | United States | 0.4592760180995475 |
RT_ANICURSOR | 0x12e688 | 0x3d74a | data | 0.9980295723059566 | ||
RT_MANIFEST | 0x16bdd4 | 0x2f6 | XML 1.0 document, ASCII text, with very long lines (719) | English | United States | 0.5158311345646438 |
DLL | Import |
---|---|
RPCRT4.dll | NdrClientCall3, NdrServerCall2, RpcStringBindingComposeW, RpcServerUnregisterIf, RpcServerRegisterIfEx, RpcServerUseProtseqEpW, I_RpcBindingInqLocalClientPID, RpcStringFreeW, RpcBindingFromStringBindingW, NdrServerCallAll |
SHELL32.dll | SHGetFolderPathW |
ntdll.dll | NtSystemDebugControl, VerSetConditionMask, RtlPcToFileHeader, RtlCaptureContext, NtClose, NtOpenKey, NtQueryKey, RtlNtStatusToDosError, NtDeleteKey, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlUnwindEx, RtlUnwind |
KERNEL32.dll | GetProcessHeap, HeapFree, SetLastError, GetModuleHandleExW, GetCurrentThreadId, Sleep, LocalFree, SetFilePointerEx, UnlockFileEx, LockFileEx, GetFileSizeEx, ReadFile, CompareStringW, GetCurrentThread, WriteFile, InitializeCriticalSectionEx, FlushFileBuffers, GetFileInformationByHandle, GetFullPathNameW, OutputDebugStringA, FileTimeToSystemTime, GetCurrentProcessId, TlsAlloc, TlsGetValue, TlsSetValue, FreeLibrary, GetSystemInfo, QueryPerformanceFrequency, QueryPerformanceCounter, ExpandEnvironmentStringsW, GetFileAttributesW, LoadLibraryExW, GetWindowsDirectoryW, GetSystemDirectoryW, HeapAlloc, VirtualProtect, HeapReAlloc, GlobalMemoryStatusEx, GetExitCodeThread, TlsFree, MoveFileExW, FindClose, CreateDirectoryW, FindFirstFileExW, FindNextFileW, QueryDosDeviceW, GetEnvironmentVariableW, ReleaseSRWLockExclusive, SetFileInformationByHandle, GetDiskFreeSpaceExW, K32GetMappedFileNameW, FindFirstVolumeW, FindNextVolumeW, GetVolumePathNamesForVolumeNameW, FindVolumeClose, VirtualQuery, GetSystemTimes, GetTickCount64, RaiseException, SleepConditionVariableSRW, GetCommandLineA, GetStdHandle, FreeLibraryAndExitThread, ExitThread, CreateThread, InitializeCriticalSectionAndSpinCount, InterlockedPushEntrySList, GetStartupInfoW, IsDebuggerPresent, InitializeSListHead, IsProcessorFeaturePresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, GetModuleFileNameW, SetConsoleCtrlHandler, SetDllDirectoryW, WaitForSingleObject, GetProcessId, GetNamedPipeServerProcessId, GetFileTime, MultiByteToWideChar, ContinueDebugEvent, DebugActiveProcessStop, GetFileAttributesExW, GetSystemTimeAsFileTime, ReadProcessMemory, OpenThread, DebugBreakProcess, SetEvent, WaitForDebugEvent, DebugSetProcessKillOnExit, DebugActiveProcess, WideCharToMultiByte, VirtualQueryEx, GetThreadContext, K32GetProcessImageFileNameW, K32GetModuleBaseNameW, K32EnumProcessModules, WaitForMultipleObjects, CreateEventW, LeaveCriticalSection, EnterCriticalSection, DeleteCriticalSection, InitializeCriticalSection, DeleteFileW, VerifyVersionInfoW, K32GetPerformanceInfo, DeviceIoControl, CreateFileW, GetLastError, CloseHandle, OpenProcess, GetProcAddress, GetModuleHandleW, GetCurrentProcess, TerminateProcess, GetCommandLineW, ExitProcess, GetFileType, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetConsoleOutputCP, GetConsoleMode, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, ReadConsoleW, HeapSize, WriteConsoleW, AcquireSRWLockExclusive, TryAcquireSRWLockExclusive, GetLocaleInfoEx, LCMapStringEx, EncodePointer, DecodePointer, WakeAllConditionVariable, WakeConditionVariable, GetCPInfo, LoadLibraryExA, GetStringTypeW, WaitForSingleObjectEx, FormatMessageA |
USER32.dll | RegisterClassExW, GetClassInfoExW |
ADVAPI32.dll | CryptReleaseContext, CryptGenRandom, CryptAcquireContextW, RegDeleteTreeW, RegQueryInfoKeyW, RegDeleteValueW, RegSetValueExW, RegCreateKeyExW, RegQueryValueExW, RegOpenKeyExW, StartServiceW, QueryServiceStatus, RevertToSelf, ImpersonateSelf, OpenThreadToken, AdjustTokenPrivileges, LookupPrivilegeValueW, RegCloseKey, CloseServiceHandle, ControlService, ChangeServiceConfigW, CreateServiceW, DeleteService, OpenServiceW, OpenSCManagerW, StartServiceCtrlDispatcherW, ChangeServiceConfig2W, QueryServiceConfig2W, RegisterServiceCtrlHandlerExW, SetServiceStatus, SetThreadToken |
Name | Ordinal | Address |
---|---|---|
asw_process_storage_allocate_connector | 1 | 0x14005cbe0 |
asw_process_storage_deallocate_connector | 2 | 0x14005cc10 |
on_avast_dll_unload | 3 | 0x140056660 |
onexit_register_connector_avast_2 | 4 | 0x14005c9e0 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Sep 11, 2024 20:22:20.168585062 CEST | 49730 | 443 | 192.168.2.4 | 62.192.173.45 |
Sep 11, 2024 20:22:20.168622971 CEST | 443 | 49730 | 62.192.173.45 | 192.168.2.4 |
Sep 11, 2024 20:22:20.168690920 CEST | 49730 | 443 | 192.168.2.4 | 62.192.173.45 |
Sep 11, 2024 20:22:20.181600094 CEST | 49730 | 443 | 192.168.2.4 | 62.192.173.45 |
Sep 11, 2024 20:22:20.181617022 CEST | 443 | 49730 | 62.192.173.45 | 192.168.2.4 |
Sep 11, 2024 20:22:52.234149933 CEST | 49730 | 443 | 192.168.2.4 | 62.192.173.45 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Sep 11, 2024 20:22:20.124002934 CEST | 61915 | 53 | 192.168.2.4 | 1.1.1.1 |
Sep 11, 2024 20:22:20.160938978 CEST | 53 | 61915 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Sep 11, 2024 20:22:20.124002934 CEST | 192.168.2.4 | 1.1.1.1 | 0x62a7 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Sep 11, 2024 20:22:20.160938978 CEST | 1.1.1.1 | 192.168.2.4 | 0x62a7 | No error (0) | 62.192.173.45 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 14:22:16 |
Start date: | 11/09/2024 |
Path: | C:\Users\user\Desktop\6Pk1nTmcHN.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x140000000 |
File size: | 1'461'248 bytes |
MD5 hash: | D0D55A8F4965A4D3F661B3EA268F578B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 6 |
Start time: | 14:22:52 |
Start date: | 11/09/2024 |
Path: | C:\Windows\System32\WerFault.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7754b0000 |
File size: | 570'736 bytes |
MD5 hash: | FD27D9F6D02763BDE32511B5DF7FF7A0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 2.1% |
Dynamic/Decrypted Code Coverage: | 99.2% |
Signature Coverage: | 29.9% |
Total number of Nodes: | 923 |
Total number of Limit Nodes: | 35 |
Graph
Function 00564D00 Relevance: 10.8, APIs: 7, Instructions: 282COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0055F3A0 Relevance: 7.2, APIs: 3, Strings: 1, Instructions: 215threadprocessCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005471B0 Relevance: .1, Instructions: 140COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00574360 Relevance: .1, Instructions: 138COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005745F0 Relevance: .1, Instructions: 82COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005751C0 Relevance: .1, Instructions: 71COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00557A50 Relevance: .1, Instructions: 69COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00574FF0 Relevance: .1, Instructions: 68COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00574740 Relevance: .1, Instructions: 61COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0053D65A Relevance: .0, Instructions: 43COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0053D6CA Relevance: .0, Instructions: 37COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00558149 Relevance: .0, Instructions: 20COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00558C60 Relevance: 1.7, APIs: 1, Instructions: 188COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014009A1B0 Relevance: 1.5, APIs: 1, Instructions: 36memoryCOMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0056B4E0 Relevance: 1.5, APIs: 1, Instructions: 35memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140030ED0 Relevance: 148.2, APIs: 49, Strings: 35, Instructions: 1153servicelibraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140015860 Relevance: 132.8, APIs: 40, Strings: 35, Instructions: 1543threadCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140001670 Relevance: 79.6, APIs: 22, Strings: 23, Instructions: 863libraryloaderfileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014002D940 Relevance: 75.3, APIs: 13, Strings: 29, Instructions: 1787COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140048AC0 Relevance: 70.5, APIs: 28, Strings: 12, Instructions: 536servicesleepregistryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014002FD10 Relevance: 53.2, APIs: 16, Strings: 14, Instructions: 719COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140014470 Relevance: 33.7, APIs: 11, Strings: 8, Instructions: 411COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140076810 Relevance: 27.5, APIs: 11, Strings: 4, Instructions: 1204COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014005A7A0 Relevance: 26.5, APIs: 11, Strings: 3, Instructions: 2029encryptiontimeregistryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400026F0 Relevance: 24.8, APIs: 7, Strings: 7, Instructions: 279filenativeCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400A3F0C Relevance: 24.0, APIs: 9, Strings: 4, Instructions: 1203COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140032B00 Relevance: 19.9, APIs: 10, Strings: 1, Instructions: 623COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140072F20 Relevance: 16.3, APIs: 8, Strings: 1, Instructions: 590COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140048230 Relevance: 16.1, APIs: 6, Strings: 3, Instructions: 377registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014006F0E0 Relevance: 12.8, APIs: 5, Strings: 2, Instructions: 517COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140042F80 Relevance: 12.4, APIs: 6, Strings: 1, Instructions: 124fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140059C10 Relevance: 12.4, APIs: 6, Strings: 1, Instructions: 120registrynativeCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140059900 Relevance: 12.3, APIs: 5, Strings: 2, Instructions: 94nativeregistryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140088100 Relevance: 9.1, APIs: 6, Instructions: 83COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001D7F0 Relevance: 7.4, APIs: 2, Strings: 2, Instructions: 447COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140018AF0 Relevance: 7.4, APIs: 2, Strings: 2, Instructions: 446COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140091420 Relevance: 7.3, APIs: 3, Strings: 1, Instructions: 329COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140079FFC Relevance: 6.0, APIs: 4, Instructions: 39timethreadCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00549500 Relevance: 5.4, Strings: 4, Instructions: 380COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005516A0 Relevance: 4.5, Strings: 3, Instructions: 795COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00567220 Relevance: 4.4, Strings: 3, Instructions: 626COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140094E30 Relevance: 4.1, Strings: 3, Instructions: 352COMMONLIBRARYCODE
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0056B5E0 Relevance: 3.0, Strings: 2, Instructions: 550COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0055CBE0 Relevance: 1.9, Strings: 1, Instructions: 623COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0055B4E0 Relevance: 1.8, Strings: 1, Instructions: 571COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00545D60 Relevance: 1.8, Strings: 1, Instructions: 524COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005613A3 Relevance: 1.7, Strings: 1, Instructions: 437COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00564550 Relevance: 1.7, Strings: 1, Instructions: 427COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005666E0 Relevance: 1.6, Strings: 1, Instructions: 328COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00571490 Relevance: 1.6, Strings: 1, Instructions: 327COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005466C0 Relevance: 1.0, Instructions: 996COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005555C0 Relevance: .9, Instructions: 926COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00562BB0 Relevance: .8, Instructions: 821COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00572F60 Relevance: .6, Instructions: 591COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00572812 Relevance: .6, Instructions: 559COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0056FBC0 Relevance: .5, Instructions: 543COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00571F40 Relevance: .5, Instructions: 514COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00559120 Relevance: .5, Instructions: 494COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005499D0 Relevance: .5, Instructions: 489COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00570210 Relevance: .5, Instructions: 473COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00554DB0 Relevance: .5, Instructions: 471COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140008700 Relevance: .4, Instructions: 431COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005542A0 Relevance: .4, Instructions: 417COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005682A0 Relevance: .4, Instructions: 407COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005655E0 Relevance: .4, Instructions: 398COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014005EE20 Relevance: .4, Instructions: 377COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014000C200 Relevance: .4, Instructions: 368COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014008BDF4 Relevance: .3, Instructions: 339COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0055BED0 Relevance: .3, Instructions: 333COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014008BA28 Relevance: .3, Instructions: 317COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054A730 Relevance: .3, Instructions: 275COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014008AA44 Relevance: .2, Instructions: 250COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400263B0 Relevance: .2, Instructions: 241COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014000F8D0 Relevance: .2, Instructions: 240COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140099790 Relevance: .2, Instructions: 198COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0055A100 Relevance: .2, Instructions: 157COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400897F0 Relevance: .1, Instructions: 138COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140089BC4 Relevance: .1, Instructions: 138COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400899DC Relevance: .1, Instructions: 137COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140089DB0 Relevance: .1, Instructions: 137COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140089608 Relevance: .1, Instructions: 137COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140097BEC Relevance: .1, Instructions: 126COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140047400 Relevance: 28.1, APIs: 12, Strings: 4, Instructions: 94threadCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014005E560 Relevance: 26.5, APIs: 8, Strings: 7, Instructions: 202libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140047C40 Relevance: 23.0, APIs: 5, Strings: 8, Instructions: 227registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400288D0 Relevance: 23.0, APIs: 10, Strings: 3, Instructions: 208COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140057E90 Relevance: 22.9, APIs: 7, Strings: 6, Instructions: 164COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140030CD0 Relevance: 22.8, APIs: 8, Strings: 5, Instructions: 91registrysynchronizationCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400151E0 Relevance: 19.6, APIs: 4, Strings: 7, Instructions: 345COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140010CE0 Relevance: 19.5, APIs: 8, Strings: 3, Instructions: 228COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140049500 Relevance: 19.4, APIs: 7, Strings: 4, Instructions: 100serviceCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140098690 Relevance: 18.1, APIs: 12, Instructions: 112COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400477F0 Relevance: 17.6, APIs: 7, Strings: 3, Instructions: 128COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014006A6E0 Relevance: 16.1, APIs: 7, Strings: 2, Instructions: 328COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140029730 Relevance: 16.0, APIs: 6, Strings: 3, Instructions: 273COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400183D0 Relevance: 16.0, APIs: 6, Strings: 3, Instructions: 222COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400345B0 Relevance: 15.9, APIs: 6, Strings: 3, Instructions: 189COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140029590 Relevance: 15.9, APIs: 8, Strings: 1, Instructions: 168COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140057460 Relevance: 15.9, APIs: 5, Strings: 4, Instructions: 152COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140058720 Relevance: 15.9, APIs: 1, Strings: 8, Instructions: 140COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014002C010 Relevance: 14.4, APIs: 7, Strings: 1, Instructions: 358COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140068110 Relevance: 14.3, APIs: 4, Strings: 4, Instructions: 301COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140027870 Relevance: 14.2, APIs: 1, Strings: 7, Instructions: 216COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400591A0 Relevance: 14.2, APIs: 6, Strings: 2, Instructions: 215registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140011A60 Relevance: 14.2, APIs: 1, Strings: 7, Instructions: 215COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140044100 Relevance: 12.4, APIs: 4, Strings: 3, Instructions: 138fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014009AE70 Relevance: 12.4, APIs: 5, Strings: 2, Instructions: 117libraryloaderCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140088EB0 Relevance: 11.0, APIs: 3, Strings: 3, Instructions: 475COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140070BA0 Relevance: 10.9, APIs: 5, Strings: 1, Instructions: 422COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140010BD0 Relevance: 10.8, APIs: 4, Strings: 2, Instructions: 262COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140047060 Relevance: 10.7, APIs: 2, Strings: 4, Instructions: 198COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400452B0 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 90libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140086BEC Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 88libraryloaderCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400A6B8C Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48fileCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140098808 Relevance: 9.1, APIs: 6, Instructions: 57COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140014C60 Relevance: 9.0, APIs: 3, Strings: 2, Instructions: 267COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140041A10 Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 198fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014002CFF0 Relevance: 8.9, APIs: 3, Strings: 2, Instructions: 188COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140023040 Relevance: 8.9, APIs: 2, Strings: 3, Instructions: 177COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014005E8C0 Relevance: 8.9, APIs: 3, Strings: 2, Instructions: 172COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140059E00 Relevance: 8.9, APIs: 2, Strings: 3, Instructions: 169registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014005A0A0 Relevance: 8.9, APIs: 2, Strings: 3, Instructions: 134registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400139A0 Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 120COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140059020 Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 103registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400594B0 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 97registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014003DAA0 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 44COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400988D0 Relevance: 7.6, APIs: 5, Instructions: 54COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140053BF0 Relevance: 7.2, APIs: 3, Strings: 1, Instructions: 170COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014006E6A0 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 134COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140066EC0 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 118COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400395B0 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 109COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001CA40 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 104COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400725A0 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 77COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014005ED10 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 72COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140055950 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 69COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140056580 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 43COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140059B60 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 42registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140059AC0 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 38registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140001170 Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 9libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014009BBD0 Relevance: 6.3, APIs: 4, Instructions: 305fileCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014009C514 Relevance: 6.2, APIs: 4, Instructions: 218COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140028E30 Relevance: 6.1, APIs: 2, Strings: 2, Instructions: 116COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140079580 Relevance: 6.0, APIs: 4, Instructions: 37COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014000DA40 Relevance: 5.7, APIs: 2, Strings: 1, Instructions: 425COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400259B0 Relevance: 5.6, APIs: 1, Strings: 2, Instructions: 399COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140007520 Relevance: 5.6, APIs: 2, Strings: 1, Instructions: 330COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140022270 Relevance: 5.6, APIs: 2, Strings: 1, Instructions: 329COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400115C0 Relevance: 5.6, APIs: 2, Strings: 1, Instructions: 329COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400273D0 Relevance: 5.6, APIs: 2, Strings: 1, Instructions: 328COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400079D0 Relevance: 5.6, APIs: 2, Strings: 1, Instructions: 325COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140021A00 Relevance: 5.6, APIs: 2, Strings: 1, Instructions: 322COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140006A20 Relevance: 5.6, APIs: 2, Strings: 1, Instructions: 322COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140022720 Relevance: 5.6, APIs: 2, Strings: 1, Instructions: 322COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014005CF80 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 164libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400A7C6C Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 149COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400499F0 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 111COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140004610 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 111synchronizationCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400142A0 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 109COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014009C27C Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 100fileCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014009AA78 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 58COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140013850 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 57COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014007B650 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 44COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014003C130 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 43COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140032730 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 21COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400012E0 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 9libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140001310 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 9libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|