Windows
Analysis Report
6Pk1nTmcHN.exe
Overview
General Information
Sample name: | 6Pk1nTmcHN.exerenamed because original name is a hash value |
Original sample name: | 21f77e85724543222e6cd3089fc7c741373b4b4362d25b103490c7ce84d20cda.exe |
Analysis ID: | 1509585 |
MD5: | d0d55a8f4965a4d3f661b3ea268f578b |
SHA1: | a063be1a85bba3ffc65554d3b4c0ae1a45638451 |
SHA256: | 21f77e85724543222e6cd3089fc7c741373b4b4362d25b103490c7ce84d20cda |
Tags: | 62-192-173-45exe |
Infos: | |
Detection
Score: | 60 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- 6Pk1nTmcHN.exe (PID: 2308 cmdline:
"C:\Users\ user\Deskt op\6Pk1nTm cHN.exe" MD5: D0D55A8F4965A4D3F661B3EA268F578B) - WerFault.exe (PID: 1184 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 2 308 -s 129 2 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Code function: | 0_2_000000014005A7A0 |
Source: | Binary string: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Code function: | 0_3_0053D65A | |
Source: | Code function: | 0_3_0053D6CA | |
Source: | Code function: | 0_2_00000001400026F0 | |
Source: | Code function: | 0_2_00000001400597D0 | |
Source: | Code function: | 0_2_0000000140059900 | |
Source: | Code function: | 0_2_0000000140059C10 | |
Source: | Code function: | 0_2_02317A50 | |
Source: | Code function: | 0_2_02334360 | |
Source: | Code function: | 0_2_02334740 | |
Source: | Code function: | 0_2_0231F3A0 | |
Source: | Code function: | 0_2_02334FF0 | |
Source: | Code function: | 0_2_02318149 | |
Source: | Code function: | 0_2_023071B0 | |
Source: | Code function: | 0_2_023345F0 | |
Source: | Code function: | 0_2_023351C0 |
Source: | Code function: | 0_2_0000000140029200 |
Source: | Code function: | 0_2_0000000140030ED0 |
Source: | Code function: | 0_2_000000014006F0E0 | |
Source: | Code function: | 0_2_0000000140099110 | |
Source: | Code function: | 0_2_000000014000C200 | |
Source: | Code function: | 0_2_0000000140048230 | |
Source: | Code function: | 0_2_00000001400263B0 | |
Source: | Code function: | 0_2_000000014005F3E0 | |
Source: | Code function: | 0_2_0000000140091420 | |
Source: | Code function: | 0_2_0000000140014470 | |
Source: | Code function: | 0_2_000000014000B5C0 | |
Source: | Code function: | 0_2_0000000140089608 | |
Source: | Code function: | 0_2_0000000140001670 | |
Source: | Code function: | 0_2_0000000140014699 | |
Source: | Code function: | 0_2_0000000140008700 | |
Source: | Code function: | 0_2_000000014009A738 | |
Source: | Code function: | 0_2_0000000140099790 | |
Source: | Code function: | 0_2_000000014005A7A0 | |
Source: | Code function: | 0_2_00000001400367A0 | |
Source: | Code function: | 0_2_00000001400597D0 | |
Source: | Code function: | 0_2_00000001400897F0 | |
Source: | Code function: | 0_2_000000014001D7F0 | |
Source: | Code function: | 0_2_0000000140076810 | |
Source: | Code function: | 0_2_0000000140015860 | |
Source: | Code function: | 0_2_000000014000F8D0 | |
Source: | Code function: | 0_2_000000014002D940 | |
Source: | Code function: | 0_2_00000001400429D0 | |
Source: | Code function: | 0_2_00000001400899DC | |
Source: | Code function: | 0_2_000000014008BA28 | |
Source: | Code function: | 0_2_000000014008AA44 | |
Source: | Code function: | 0_2_0000000140040A50 | |
Source: | Code function: | 0_2_0000000140048AC0 | |
Source: | Code function: | 0_2_0000000140018AF0 | |
Source: | Code function: | 0_2_0000000140032B00 | |
Source: | Code function: | 0_2_000000014000CB80 | |
Source: | Code function: | 0_2_0000000140089BC4 | |
Source: | Code function: | 0_2_0000000140097BEC | |
Source: | Code function: | 0_2_0000000140098C60 | |
Source: | Code function: | 0_2_000000014002FD10 | |
Source: | Code function: | 0_2_0000000140089DB0 | |
Source: | Code function: | 0_2_000000014008BDF4 | |
Source: | Code function: | 0_2_000000014005EE20 | |
Source: | Code function: | 0_2_0000000140092E14 | |
Source: | Code function: | 0_2_0000000140094E30 | |
Source: | Code function: | 0_2_0000000140030ED0 | |
Source: | Code function: | 0_2_00000001400A3F0C | |
Source: | Code function: | 0_2_0000000140072F20 | |
Source: | Code function: | 0_2_0000000140042F80 | |
Source: | Code function: | 0_2_0000000140089F98 | |
Source: | Code function: | 0_2_000000014000AFE0 | |
Source: | Code function: | 0_2_02327220 | |
Source: | Code function: | 0_2_02330210 | |
Source: | Code function: | 0_2_023116A0 | |
Source: | Code function: | 0_2_023142A0 | |
Source: | Code function: | 0_2_023282A0 | |
Source: | Code function: | 0_2_023266E0 | |
Source: | Code function: | 0_2_0231BED0 | |
Source: | Code function: | 0_2_023066C0 | |
Source: | Code function: | 0_2_0230A730 | |
Source: | Code function: | 0_2_02332F60 | |
Source: | Code function: | 0_2_02331F40 | |
Source: | Code function: | 0_2_02322BB0 | |
Source: | Code function: | 0_2_023213A3 | |
Source: | Code function: | 0_2_0231CBE0 | |
Source: | Code function: | 0_2_0232FBC0 | |
Source: | Code function: | 0_2_02332812 | |
Source: | Code function: | 0_2_02331490 | |
Source: | Code function: | 0_2_0231B4E0 | |
Source: | Code function: | 0_2_02319120 | |
Source: | Code function: | 0_2_02309500 | |
Source: | Code function: | 0_2_0231A100 | |
Source: | Code function: | 0_2_02305D60 | |
Source: | Code function: | 0_2_02324550 | |
Source: | Code function: | 0_2_02314DB0 | |
Source: | Code function: | 0_2_0232B5E0 | |
Source: | Code function: | 0_2_023255E0 | |
Source: | Code function: | 0_2_023099D0 | |
Source: | Code function: | 0_2_023155C0 |
Source: | Code function: |
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Binary string: |
Source: | Classification label: |
Source: | Code function: | 0_2_000000014005A7A0 |
Source: | Code function: | 0_2_0000000140030ED0 |
Source: | Code function: | 0_2_0231F3A0 |
Source: | Code function: | 0_2_0000000140048AC0 |
Source: | Code function: | 0_2_0000000140030ED0 |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_0000000140048AC0 |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Code function: | 0_2_000000014005A7A0 |
Source: | Code function: | 0_2_02324D00 |
Source: | Check user administrative privileges: | graph_0-52210 |
Source: | API coverage: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 0_2_000000014005A7A0 |
Source: | Code function: | 0_2_0230CCE0 |
Source: | Code function: | 0_2_0000000140088100 |
Source: | Code function: | 0_2_0000000140015860 |
Source: | Code function: | 0_2_0000000140088100 | |
Source: | Code function: | 0_2_0000000140079AD8 |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Thread register set: | Jump to behavior | ||
Source: | Thread register set: | Jump to behavior |
Source: | Thread register set: | Jump to behavior |
Source: | Code function: | 0_2_0000000140079FFC |
Source: | Code function: | 0_2_02324D00 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: | 0_2_0000000140030ED0 |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Service Execution | 14 Windows Service | 14 Windows Service | 1 Virtualization/Sandbox Evasion | OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | 22 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 Native API | 1 DLL Side-Loading | 21 Process Injection | 21 Process Injection | LSASS Memory | 41 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | 1 Image File Execution Options Injection | 1 DLL Side-Loading | 1 Deobfuscate/Decode Files or Information | Security Account Manager | 1 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | 1 Image File Execution Options Injection | 1 Obfuscated Files or Information | NTDS | 2 Process Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 1 Account Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | Steganography | Cached Domain Credentials | 1 System Owner/User Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | Compile After Delivery | DCSync | 1 System Network Configuration Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | Indicator Removal from Tools | Proc Filesystem | 3 System Information Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
16% | ReversingLabs | Win64.Trojan.Generic |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
weblineinfo.com | 62.192.173.45 | true | false | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
62.192.173.45 | weblineinfo.com | Lithuania | 25780 | HUGESERVER-NETWORKSUS | false |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1509585 |
Start date and time: | 2024-09-11 20:26:33 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 17s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Run name: | Run with higher sleep bypass |
Number of analysed new started processes analysed: | 8 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 6Pk1nTmcHN.exerenamed because original name is a hash value |
Original Sample Name: | 21f77e85724543222e6cd3089fc7c741373b4b4362d25b103490c7ce84d20cda.exe |
Detection: | MAL |
Classification: | mal60.evad.winEXE@2/5@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 52.182.143.212
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing disassembly code.
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: 6Pk1nTmcHN.exe
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
62.192.173.45 | Get hash | malicious | BruteRatel | Browse | ||
Get hash | malicious | BruteRatel | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
weblineinfo.com | Get hash | malicious | BruteRatel | Browse |
| |
Get hash | malicious | BruteRatel | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
HUGESERVER-NETWORKSUS | Get hash | malicious | BruteRatel | Browse |
| |
Get hash | malicious | BruteRatel | Browse |
| ||
Get hash | malicious | XenoRAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | AsyncRAT, VenomRAT | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Mirai, Moobot | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_6Pk1nTmcHN.exe_391e34d76b9d88a1aa9c20e1d1785e9c3c5c724c_505b6263_f3129ac0-c9d0-4e92-929c-882be24afc23\Report.wer
Download File
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.9442687486897229 |
Encrypted: | false |
SSDEEP: | 192:CWgoCmkcAnq2Qy0FfeciIYj4v2zuiFSZ24lO82w0:DCmInq2Q5FfeciIYj5zuiFSY4lO82w0 |
MD5: | A704680D33C2B55469E937988833680B |
SHA1: | EC08D41C16E0BA536D6F0AEAA17C5E1F02C522B0 |
SHA-256: | 4284D4F79FF4769401CE5B08950CC959788971B7044706348EF287C77B621750 |
SHA-512: | 6DF99488EA426A03C1A72D42386007A3CBCF61A1727A3BA83E3F3CDD74C94557D2D126A08FBB373C5AA16FCEC78189D6E54F174D383773433A7D68BFEDF62E68 |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 135962 |
Entropy (8bit): | 1.4462114707591813 |
Encrypted: | false |
SSDEEP: | 384:X6bFnqjJ3K3xmw7nK71U+6W+B0qdgC8Uzl:X6bFnqNK3pbhek0qdgZ8 |
MD5: | 6574B40254ED32EC8BA3AE5970A2A304 |
SHA1: | 26FB01C14CF4A85D0799311FB46E6E03C580E9CA |
SHA-256: | 6F4FC60140A346B5303D6F61510DAC3693A5D9DC4C32A12E43EACBD4DC96EBB0 |
SHA-512: | EDC6A90BC0E0E8BB20ADE8E08690422423F11A8BEA912AE9B3AC825EA5BA7B0A7960D7D3AD98989A2B951D2F8A09B6D552CDB9203E5408174E7D7FF446C91A36 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8790 |
Entropy (8bit): | 3.703100657028306 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJMXt5Vne6Y9+qPOgmf6Hc+YprM89bONcflam:R6lXJMdK6YUqPOgmf6Hc+EOGfJ |
MD5: | 953FA0AF94B710BCE49E142B4CBB56B3 |
SHA1: | 2BA5E6424FEB5BD745DF3F66E4BD2E1EEEC9A1D4 |
SHA-256: | B278EDCF2397F116213D6557C4AC563A48B32993193B54689971AAF73F13F6E8 |
SHA-512: | AC4A687B2310D18E7A43ED9DFB4209A017AB49EAADF7DEB92AF87498D71A84D5FFC429CEFB1CF40BC9827FE70D68570AD8B24B909567EDEDA7BD33B7B509700D |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4717 |
Entropy (8bit): | 4.463971182618637 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zs+NJg771I9nwayWpW8VY4Ym8M4JASHFUmyq85qZg2UIaWKGd:uIjf+nI70wW7VMJAKJK2UIaWKGd |
MD5: | A823F268BDEBE9D56851C635534FA045 |
SHA1: | E468AA61073D6597EAAB5D498F51B321FA95640E |
SHA-256: | CEBE97C00228F5E98C5EE2B9997FEBE9D7CBD353939412324B4E769B8E0D7E22 |
SHA-512: | C2E846609E6A5BAE74079F5A496C68FBABC5BCDAFF26208324A768DBE316F3E71410F49C2ACB4E2E653AF484170F75E6097C264ACF6AEA0810F37DE766AF3BB9 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.46605234047467 |
Encrypted: | false |
SSDEEP: | 6144:aIXfpi67eLPU9skLmb0b4dWSPKaJG8nAgejZMMhA2gX4WABl0uNPdwBCswSbt:vXD94dWlLZMM6YFHt+t |
MD5: | 3B66E24B9E30B7C8CF680F88389E6C10 |
SHA1: | D094AED64E6F503D82C8A4C65BF60D9C0AB75CBF |
SHA-256: | 0975A274933F53C0CB4A330D0EB2E84ED813B25688A0E8E7679596E8E80E88FA |
SHA-512: | 41C7337152D7F13961F412DF1236F071AE341F3B5E2DB462AE075F7A3359BC6332A5A0206833880CB9E018FA97B567A7ED7ED62E621E045C0EC415AF8AFA1588 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 6.9455237392770535 |
TrID: |
|
File name: | 6Pk1nTmcHN.exe |
File size: | 1'461'248 bytes |
MD5: | d0d55a8f4965a4d3f661b3ea268f578b |
SHA1: | a063be1a85bba3ffc65554d3b4c0ae1a45638451 |
SHA256: | 21f77e85724543222e6cd3089fc7c741373b4b4362d25b103490c7ce84d20cda |
SHA512: | 3f63e14ba2b4dfee860ca307a9e5b18cc7119cda03a474f8820cdfd1ac15d003a7f3e6d95af26e08f2d367c7f9b38f64028a234fadb6b54b5c5d5582a45a3a07 |
SSDEEP: | 24576:tCAMa2xF/U2MtmHZD+4of1c2OhTP4KOqh0lhSMXlCTgnbGJkdV4KN7zc01Octq:VMa2xFs2MgHo4of1cPhbLeKgnbGJIV4w |
TLSH: | E065BE1A7BAC00F8D1BEC0B88D67591AEA72785543219BDF57E0DE161F63AE05E3E700 |
File Content Preview: | MZ......................@...................................8...........!..L.!This program cannot be run in DOS mode....$........i.;..oh..oh..oh.zli..oh.zjix.oh.zki..oh...h..oh..ki..oh..li..oh.|ji..oh..ji..oh.p.h..oh..oh..oh.zni..oh..nhX.oh..fi..oh..oi..o |
Icon Hash: | cc8d0d191e1e107c |
Entrypoint: | 0x14005e280 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x140000000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, GUARD_CF |
Time Stamp: | 0x65BBAE0A [Thu Feb 1 14:43:22 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 30c7d68b242fb27be994b0b3521d918b |
Signature Valid: | |
Signature Issuer: | |
Signature Validation Error: | |
Error Number: | |
Not Before, Not After | |
Subject Chain | |
Version: | |
Thumbprint MD5: | |
Thumbprint SHA-1: | |
Thumbprint SHA-256: | |
Serial: |
Instruction |
---|
dec eax |
sub esp, 28h |
call 00007F3891024528h |
dec eax |
add esp, 28h |
jmp 00007F38910085F3h |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
dec eax |
mov dword ptr [esp+10h], ebx |
dec eax |
mov dword ptr [esp+08h], ecx |
push edi |
dec eax |
sub esp, 20h |
dec eax |
mov edi, dword ptr [esp+30h] |
dec eax |
lea edx, dword ptr [0008B7E5h] |
dec eax |
mov ecx, edi |
call 00007F3891009B92h |
dec eax |
lea eax, dword ptr [0008B856h] |
dec eax |
mov dword ptr [edi], eax |
dec eax |
lea ecx, dword ptr [edi+28h] |
xor eax, eax |
dec eax |
mov dword ptr [edi+28h], eax |
dec eax |
mov dword ptr [edi+30h], eax |
call 00007F389100C531h |
dec eax |
lea ecx, dword ptr [edi+28h] |
call 00007F389100C534h |
dec eax |
mov ebx, dword ptr [esp+38h] |
dec eax |
mov eax, edi |
dec eax |
add esp, 20h |
pop edi |
ret |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
dec eax |
mov dword ptr [esp+08h], ecx |
dec eax |
sub esp, 68h |
dec eax |
mov eax, dword ptr [esp+70h] |
dec eax |
mov ecx, dword ptr [eax+38h] |
dec eax |
test ecx, ecx |
je 00007F38910087C5h |
dec eax |
mov eax, dword ptr [ecx] |
dec eax |
mov eax, dword ptr [eax+10h] |
call dword ptr [000553ACh] |
nop |
dec eax |
add esp, 68h |
ret |
call 00007F389100B526h |
nop |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
mov dword ptr [esp+10h], edx |
dec eax |
mov dword ptr [esp+00h], ecx |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x101750 | 0xe4 | .rdata |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x101834 | 0x8c | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x119000 | 0x530cc | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x10e000 | 0x8538 | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x127448 | 0x2978 | .rsrc |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x16d000 | 0x14c0 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0xe9dd4 | 0x8c | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0xea000 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0xd4ae0 | 0x140 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0xb3000 | 0x6c0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x1014bc | 0x40 | .rdata |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0xb145c | 0xb1600 | 1eaabf70aff8e3cc929bbdbf2e5aad9d | False | 0.46967219432699087 | data | 6.381906257673845 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0xb3000 | 0x50028 | 0x50200 | ff07adedf636d6bc3ffbc263edcd3727 | False | 0.40760591361154447 | data | 5.894067518653125 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x104000 | 0x91f8 | 0x5e00 | 91ca1c15198d6861a02e90789db46d34 | False | 0.14261968085106383 | DOS executable (block device driver) | 4.538365175655119 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0x10e000 | 0x8538 | 0x8600 | d733668419143445c8b94be87defbb16 | False | 0.49577308768656714 | data | 5.949404504623925 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.didat | 0x117000 | 0x50 | 0x200 | 701067eceeac6e2ef2c50b8ee0c87575 | False | 0.080078125 | data | 0.68918657910872 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
_RDATA | 0x118000 | 0x1f4 | 0x200 | 0683c4b4834a30f99b0319cb260168db | False | 0.53515625 | data | 4.234704000558715 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0x119000 | 0x530cc | 0x53200 | 4a91685c811c0b0ca3dacd69b1653b02 | False | 0.9509163533834587 | data | 7.921776188107435 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x16d000 | 0x14c0 | 0x1600 | fe11f6a0fd50e632ba0e66abf1859a99 | False | 0.3915127840909091 | data | 5.329570431313898 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x119328 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 192 | English | United States | 0.3108108108108108 |
RT_ICON | 0x119450 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 320, 256 important colors | English | United States | 0.8648843930635838 |
RT_ICON | 0x1199b8 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 640 | English | United States | 0.25806451612903225 |
RT_ICON | 0x119ca0 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 1152, 256 important colors | English | United States | 0.7454873646209387 |
RT_ICON | 0x11a548 | 0xb6d0 | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | English | United States | 0.999423076923077 |
RT_ICON | 0x125c18 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.7659574468085106 |
RT_ICON | 0x126080 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.7971311475409836 |
RT_ICON | 0x126a08 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4224 | English | United States | 0.7448405253283302 |
RT_ICON | 0x127ab0 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9600 | English | United States | 0.6373443983402489 |
RT_ICON | 0x12a058 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16896 | English | United States | 0.5634152102031176 |
RT_GROUP_ICON | 0x12e280 | 0x92 | data | English | United States | 0.6917808219178082 |
RT_VERSION | 0x12e314 | 0x374 | data | English | United States | 0.4592760180995475 |
RT_ANICURSOR | 0x12e688 | 0x3d74a | data | 0.9980295723059566 | ||
RT_MANIFEST | 0x16bdd4 | 0x2f6 | XML 1.0 document, ASCII text, with very long lines (719) | English | United States | 0.5158311345646438 |
DLL | Import |
---|---|
RPCRT4.dll | NdrClientCall3, NdrServerCall2, RpcStringBindingComposeW, RpcServerUnregisterIf, RpcServerRegisterIfEx, RpcServerUseProtseqEpW, I_RpcBindingInqLocalClientPID, RpcStringFreeW, RpcBindingFromStringBindingW, NdrServerCallAll |
SHELL32.dll | SHGetFolderPathW |
ntdll.dll | NtSystemDebugControl, VerSetConditionMask, RtlPcToFileHeader, RtlCaptureContext, NtClose, NtOpenKey, NtQueryKey, RtlNtStatusToDosError, NtDeleteKey, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlUnwindEx, RtlUnwind |
KERNEL32.dll | GetProcessHeap, HeapFree, SetLastError, GetModuleHandleExW, GetCurrentThreadId, Sleep, LocalFree, SetFilePointerEx, UnlockFileEx, LockFileEx, GetFileSizeEx, ReadFile, CompareStringW, GetCurrentThread, WriteFile, InitializeCriticalSectionEx, FlushFileBuffers, GetFileInformationByHandle, GetFullPathNameW, OutputDebugStringA, FileTimeToSystemTime, GetCurrentProcessId, TlsAlloc, TlsGetValue, TlsSetValue, FreeLibrary, GetSystemInfo, QueryPerformanceFrequency, QueryPerformanceCounter, ExpandEnvironmentStringsW, GetFileAttributesW, LoadLibraryExW, GetWindowsDirectoryW, GetSystemDirectoryW, HeapAlloc, VirtualProtect, HeapReAlloc, GlobalMemoryStatusEx, GetExitCodeThread, TlsFree, MoveFileExW, FindClose, CreateDirectoryW, FindFirstFileExW, FindNextFileW, QueryDosDeviceW, GetEnvironmentVariableW, ReleaseSRWLockExclusive, SetFileInformationByHandle, GetDiskFreeSpaceExW, K32GetMappedFileNameW, FindFirstVolumeW, FindNextVolumeW, GetVolumePathNamesForVolumeNameW, FindVolumeClose, VirtualQuery, GetSystemTimes, GetTickCount64, RaiseException, SleepConditionVariableSRW, GetCommandLineA, GetStdHandle, FreeLibraryAndExitThread, ExitThread, CreateThread, InitializeCriticalSectionAndSpinCount, InterlockedPushEntrySList, GetStartupInfoW, IsDebuggerPresent, InitializeSListHead, IsProcessorFeaturePresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, GetModuleFileNameW, SetConsoleCtrlHandler, SetDllDirectoryW, WaitForSingleObject, GetProcessId, GetNamedPipeServerProcessId, GetFileTime, MultiByteToWideChar, ContinueDebugEvent, DebugActiveProcessStop, GetFileAttributesExW, GetSystemTimeAsFileTime, ReadProcessMemory, OpenThread, DebugBreakProcess, SetEvent, WaitForDebugEvent, DebugSetProcessKillOnExit, DebugActiveProcess, WideCharToMultiByte, VirtualQueryEx, GetThreadContext, K32GetProcessImageFileNameW, K32GetModuleBaseNameW, K32EnumProcessModules, WaitForMultipleObjects, CreateEventW, LeaveCriticalSection, EnterCriticalSection, DeleteCriticalSection, InitializeCriticalSection, DeleteFileW, VerifyVersionInfoW, K32GetPerformanceInfo, DeviceIoControl, CreateFileW, GetLastError, CloseHandle, OpenProcess, GetProcAddress, GetModuleHandleW, GetCurrentProcess, TerminateProcess, GetCommandLineW, ExitProcess, GetFileType, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetConsoleOutputCP, GetConsoleMode, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, ReadConsoleW, HeapSize, WriteConsoleW, AcquireSRWLockExclusive, TryAcquireSRWLockExclusive, GetLocaleInfoEx, LCMapStringEx, EncodePointer, DecodePointer, WakeAllConditionVariable, WakeConditionVariable, GetCPInfo, LoadLibraryExA, GetStringTypeW, WaitForSingleObjectEx, FormatMessageA |
USER32.dll | RegisterClassExW, GetClassInfoExW |
ADVAPI32.dll | CryptReleaseContext, CryptGenRandom, CryptAcquireContextW, RegDeleteTreeW, RegQueryInfoKeyW, RegDeleteValueW, RegSetValueExW, RegCreateKeyExW, RegQueryValueExW, RegOpenKeyExW, StartServiceW, QueryServiceStatus, RevertToSelf, ImpersonateSelf, OpenThreadToken, AdjustTokenPrivileges, LookupPrivilegeValueW, RegCloseKey, CloseServiceHandle, ControlService, ChangeServiceConfigW, CreateServiceW, DeleteService, OpenServiceW, OpenSCManagerW, StartServiceCtrlDispatcherW, ChangeServiceConfig2W, QueryServiceConfig2W, RegisterServiceCtrlHandlerExW, SetServiceStatus, SetThreadToken |
Name | Ordinal | Address |
---|---|---|
asw_process_storage_allocate_connector | 1 | 0x14005cbe0 |
asw_process_storage_deallocate_connector | 2 | 0x14005cc10 |
on_avast_dll_unload | 3 | 0x140056660 |
onexit_register_connector_avast_2 | 4 | 0x14005c9e0 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Sep 11, 2024 20:27:30.357014894 CEST | 49730 | 443 | 192.168.2.4 | 62.192.173.45 |
Sep 11, 2024 20:27:30.357105017 CEST | 443 | 49730 | 62.192.173.45 | 192.168.2.4 |
Sep 11, 2024 20:27:30.357225895 CEST | 49730 | 443 | 192.168.2.4 | 62.192.173.45 |
Sep 11, 2024 20:27:30.365940094 CEST | 49730 | 443 | 192.168.2.4 | 62.192.173.45 |
Sep 11, 2024 20:27:30.365974903 CEST | 443 | 49730 | 62.192.173.45 | 192.168.2.4 |
Sep 11, 2024 20:28:02.483127117 CEST | 49730 | 443 | 192.168.2.4 | 62.192.173.45 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Sep 11, 2024 20:27:30.177025080 CEST | 54675 | 53 | 192.168.2.4 | 1.1.1.1 |
Sep 11, 2024 20:27:30.351072073 CEST | 53 | 54675 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Sep 11, 2024 20:27:30.177025080 CEST | 192.168.2.4 | 1.1.1.1 | 0x9bbb | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Sep 11, 2024 20:27:30.351072073 CEST | 1.1.1.1 | 192.168.2.4 | 0x9bbb | No error (0) | 62.192.173.45 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 14:27:25 |
Start date: | 11/09/2024 |
Path: | C:\Users\user\Desktop\6Pk1nTmcHN.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x140000000 |
File size: | 1'461'248 bytes |
MD5 hash: | D0D55A8F4965A4D3F661B3EA268F578B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 6 |
Start time: | 14:28:01 |
Start date: | 11/09/2024 |
Path: | C:\Windows\System32\WerFault.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7f81a0000 |
File size: | 570'736 bytes |
MD5 hash: | FD27D9F6D02763BDE32511B5DF7FF7A0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 2.1% |
Dynamic/Decrypted Code Coverage: | 99.2% |
Signature Coverage: | 29.9% |
Total number of Nodes: | 923 |
Total number of Limit Nodes: | 36 |
Graph
Function 02324D00 Relevance: 10.8, APIs: 7, Instructions: 282COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0231F3A0 Relevance: 7.2, APIs: 3, Strings: 1, Instructions: 215threadprocessCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 023071B0 Relevance: .1, Instructions: 140COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02334360 Relevance: .1, Instructions: 138COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 023345F0 Relevance: .1, Instructions: 82COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 023351C0 Relevance: .1, Instructions: 71COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02317A50 Relevance: .1, Instructions: 69COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02334FF0 Relevance: .1, Instructions: 68COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02334740 Relevance: .1, Instructions: 61COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0053D65A Relevance: .0, Instructions: 43COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0053D6CA Relevance: .0, Instructions: 37COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02318149 Relevance: .0, Instructions: 20COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02318C60 Relevance: 1.7, APIs: 1, Instructions: 188COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014009A1B0 Relevance: 1.5, APIs: 1, Instructions: 36memoryCOMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0232B4E0 Relevance: 1.5, APIs: 1, Instructions: 35memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140030ED0 Relevance: 148.2, APIs: 49, Strings: 35, Instructions: 1153servicelibraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140015860 Relevance: 132.8, APIs: 40, Strings: 35, Instructions: 1543threadCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140001670 Relevance: 79.6, APIs: 22, Strings: 23, Instructions: 863libraryloaderfileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014002D940 Relevance: 75.3, APIs: 13, Strings: 29, Instructions: 1787COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140048AC0 Relevance: 70.5, APIs: 28, Strings: 12, Instructions: 536servicesleepregistryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014002FD10 Relevance: 53.2, APIs: 16, Strings: 14, Instructions: 719COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140014470 Relevance: 33.7, APIs: 11, Strings: 8, Instructions: 411COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140076810 Relevance: 27.5, APIs: 11, Strings: 4, Instructions: 1204COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014005A7A0 Relevance: 26.5, APIs: 11, Strings: 3, Instructions: 2029encryptiontimeregistryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400026F0 Relevance: 24.8, APIs: 7, Strings: 7, Instructions: 279filenativeCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400A3F0C Relevance: 24.0, APIs: 9, Strings: 4, Instructions: 1203COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140032B00 Relevance: 19.9, APIs: 10, Strings: 1, Instructions: 623COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140072F20 Relevance: 16.3, APIs: 8, Strings: 1, Instructions: 590COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140048230 Relevance: 16.1, APIs: 6, Strings: 3, Instructions: 377registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014006F0E0 Relevance: 12.8, APIs: 5, Strings: 2, Instructions: 517COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140042F80 Relevance: 12.4, APIs: 6, Strings: 1, Instructions: 124fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140059C10 Relevance: 12.4, APIs: 6, Strings: 1, Instructions: 120registrynativeCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140059900 Relevance: 12.3, APIs: 5, Strings: 2, Instructions: 94nativeregistryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140088100 Relevance: 9.1, APIs: 6, Instructions: 83COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001D7F0 Relevance: 7.4, APIs: 2, Strings: 2, Instructions: 447COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140018AF0 Relevance: 7.4, APIs: 2, Strings: 2, Instructions: 446COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140091420 Relevance: 7.3, APIs: 3, Strings: 1, Instructions: 329COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140079FFC Relevance: 6.0, APIs: 4, Instructions: 39timethreadCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02309500 Relevance: 5.4, Strings: 4, Instructions: 380COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 023116A0 Relevance: 4.5, Strings: 3, Instructions: 795COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02327220 Relevance: 4.4, Strings: 3, Instructions: 626COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140094E30 Relevance: 4.1, Strings: 3, Instructions: 352COMMONLIBRARYCODE
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0232B5E0 Relevance: 3.0, Strings: 2, Instructions: 550COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0231CBE0 Relevance: 1.9, Strings: 1, Instructions: 623COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0231B4E0 Relevance: 1.8, Strings: 1, Instructions: 571COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02305D60 Relevance: 1.8, Strings: 1, Instructions: 524COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 023213A3 Relevance: 1.7, Strings: 1, Instructions: 437COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02324550 Relevance: 1.7, Strings: 1, Instructions: 427COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 023266E0 Relevance: 1.6, Strings: 1, Instructions: 328COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02331490 Relevance: 1.6, Strings: 1, Instructions: 327COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 023066C0 Relevance: 1.0, Instructions: 996COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 023155C0 Relevance: .9, Instructions: 926COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02322BB0 Relevance: .8, Instructions: 821COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02332F60 Relevance: .6, Instructions: 591COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02332812 Relevance: .6, Instructions: 559COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0232FBC0 Relevance: .5, Instructions: 543COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02331F40 Relevance: .5, Instructions: 514COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02319120 Relevance: .5, Instructions: 494COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 023099D0 Relevance: .5, Instructions: 489COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02330210 Relevance: .5, Instructions: 473COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02314DB0 Relevance: .5, Instructions: 471COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140008700 Relevance: .4, Instructions: 431COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 023142A0 Relevance: .4, Instructions: 417COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 023282A0 Relevance: .4, Instructions: 407COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 023255E0 Relevance: .4, Instructions: 398COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014005EE20 Relevance: .4, Instructions: 377COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014000C200 Relevance: .4, Instructions: 368COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014008BDF4 Relevance: .3, Instructions: 339COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0231BED0 Relevance: .3, Instructions: 333COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014008BA28 Relevance: .3, Instructions: 317COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0230A730 Relevance: .3, Instructions: 275COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014008AA44 Relevance: .2, Instructions: 250COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400263B0 Relevance: .2, Instructions: 241COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014000F8D0 Relevance: .2, Instructions: 240COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140099790 Relevance: .2, Instructions: 198COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0231A100 Relevance: .2, Instructions: 157COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400897F0 Relevance: .1, Instructions: 138COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140089BC4 Relevance: .1, Instructions: 138COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400899DC Relevance: .1, Instructions: 137COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140089DB0 Relevance: .1, Instructions: 137COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140089608 Relevance: .1, Instructions: 137COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140097BEC Relevance: .1, Instructions: 126COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140047400 Relevance: 28.1, APIs: 12, Strings: 4, Instructions: 94threadCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014005E560 Relevance: 26.5, APIs: 8, Strings: 7, Instructions: 202libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140047C40 Relevance: 23.0, APIs: 5, Strings: 8, Instructions: 227registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400288D0 Relevance: 23.0, APIs: 10, Strings: 3, Instructions: 208COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140057E90 Relevance: 22.9, APIs: 7, Strings: 6, Instructions: 164COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140030CD0 Relevance: 22.8, APIs: 8, Strings: 5, Instructions: 91registrysynchronizationCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400151E0 Relevance: 19.6, APIs: 4, Strings: 7, Instructions: 345COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140010CE0 Relevance: 19.5, APIs: 8, Strings: 3, Instructions: 228COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140049500 Relevance: 19.4, APIs: 7, Strings: 4, Instructions: 100serviceCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140098690 Relevance: 18.1, APIs: 12, Instructions: 112COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400477F0 Relevance: 17.6, APIs: 7, Strings: 3, Instructions: 128COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014006A6E0 Relevance: 16.1, APIs: 7, Strings: 2, Instructions: 328COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140029730 Relevance: 16.0, APIs: 6, Strings: 3, Instructions: 273COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400183D0 Relevance: 16.0, APIs: 6, Strings: 3, Instructions: 222COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400345B0 Relevance: 15.9, APIs: 6, Strings: 3, Instructions: 189COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140029590 Relevance: 15.9, APIs: 8, Strings: 1, Instructions: 168COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140057460 Relevance: 15.9, APIs: 5, Strings: 4, Instructions: 152COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140058720 Relevance: 15.9, APIs: 1, Strings: 8, Instructions: 140COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014002C010 Relevance: 14.4, APIs: 7, Strings: 1, Instructions: 358COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140068110 Relevance: 14.3, APIs: 4, Strings: 4, Instructions: 301COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140027870 Relevance: 14.2, APIs: 1, Strings: 7, Instructions: 216COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400591A0 Relevance: 14.2, APIs: 6, Strings: 2, Instructions: 215registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140011A60 Relevance: 14.2, APIs: 1, Strings: 7, Instructions: 215COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140044100 Relevance: 12.4, APIs: 4, Strings: 3, Instructions: 138fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014009AE70 Relevance: 12.4, APIs: 5, Strings: 2, Instructions: 117libraryloaderCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140088EB0 Relevance: 11.0, APIs: 3, Strings: 3, Instructions: 475COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140070BA0 Relevance: 10.9, APIs: 5, Strings: 1, Instructions: 422COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140010BD0 Relevance: 10.8, APIs: 4, Strings: 2, Instructions: 262COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140047060 Relevance: 10.7, APIs: 2, Strings: 4, Instructions: 198COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400452B0 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 90libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140086BEC Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 88libraryloaderCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400A6B8C Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48fileCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140098808 Relevance: 9.1, APIs: 6, Instructions: 57COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140014C60 Relevance: 9.0, APIs: 3, Strings: 2, Instructions: 267COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014009C514 Relevance: 9.0, APIs: 4, Strings: 1, Instructions: 218COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140041A10 Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 198fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014002CFF0 Relevance: 8.9, APIs: 3, Strings: 2, Instructions: 188COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140023040 Relevance: 8.9, APIs: 2, Strings: 3, Instructions: 177COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014005E8C0 Relevance: 8.9, APIs: 3, Strings: 2, Instructions: 172COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140059E00 Relevance: 8.9, APIs: 2, Strings: 3, Instructions: 169registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014005A0A0 Relevance: 8.9, APIs: 2, Strings: 3, Instructions: 134registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400139A0 Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 120COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140059020 Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 103registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400594B0 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 97registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014003DAA0 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 44COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400988D0 Relevance: 7.6, APIs: 5, Instructions: 54COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140053BF0 Relevance: 7.2, APIs: 3, Strings: 1, Instructions: 170COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014006E6A0 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 134COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140066EC0 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 118COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400395B0 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 109COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001CA40 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 104COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014009C27C Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 100fileCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400725A0 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 77COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014005ED10 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 72COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140055950 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 69COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140056580 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 43COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140059B60 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 42registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140059AC0 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 38registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140001170 Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 9libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014009BBD0 Relevance: 6.3, APIs: 4, Instructions: 305fileCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140028E30 Relevance: 6.1, APIs: 2, Strings: 2, Instructions: 116COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140079580 Relevance: 6.0, APIs: 4, Instructions: 37COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014000DA40 Relevance: 5.7, APIs: 2, Strings: 1, Instructions: 425COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400259B0 Relevance: 5.6, APIs: 1, Strings: 2, Instructions: 399COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140007520 Relevance: 5.6, APIs: 2, Strings: 1, Instructions: 330COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140022270 Relevance: 5.6, APIs: 2, Strings: 1, Instructions: 329COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400115C0 Relevance: 5.6, APIs: 2, Strings: 1, Instructions: 329COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400273D0 Relevance: 5.6, APIs: 2, Strings: 1, Instructions: 328COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400079D0 Relevance: 5.6, APIs: 2, Strings: 1, Instructions: 325COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140021A00 Relevance: 5.6, APIs: 2, Strings: 1, Instructions: 322COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140006A20 Relevance: 5.6, APIs: 2, Strings: 1, Instructions: 322COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140022720 Relevance: 5.6, APIs: 2, Strings: 1, Instructions: 322COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014005CF80 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 164libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400A7C6C Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 149COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400499F0 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 111COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140004610 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 111synchronizationCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400142A0 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 109COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014009C160 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 77fileCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014009C05C Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 74fileCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014009AA78 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 58COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140013850 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 57COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014007B650 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 44COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014003C130 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 43COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140032730 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 21COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400012E0 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 9libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140001310 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 9libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|