Windows
Analysis Report
Simple2.exe
Overview
General Information
Detection
Score: | 68 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Simple2.exe (PID: 1520 cmdline:
"C:\Users\ user\Deskt op\Simple2 .exe" MD5: ED207427A25863F5524D616525943DD5) - conhost.exe (PID: 6392 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_00007FF6D5CA3A40 |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | DNS query: | ||
Source: | DNS query: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Code function: | 0_2_00007FF6D5CA1AC0 | |
Source: | Code function: | 0_2_00007FF6D5CA4CB0 | |
Source: | Code function: | 0_2_00007FF6D5CA41F0 | |
Source: | Code function: | 0_2_00007FF6D5CA5540 | |
Source: | Code function: | 0_2_00007FF6D5CA4570 |
Source: | Classification label: |
Source: | Code function: | 0_2_00007FF6D5CA37A0 |
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | ReversingLabs: |
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_00007FF6D5CA5540 |
Source: | Thread sleep time: | Jump to behavior |
Source: | Last function: |
Source: | File Volume queried: | Jump to behavior |
Source: | Code function: | 0_2_00007FF6D5CA5540 |
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_00007FF6D5CABB0C |
Source: | Code function: | 0_2_00007FF6D5CABB0C | |
Source: | Code function: | 0_2_00007FF6D5CABCB0 | |
Source: | Code function: | 0_2_00007FF6D5CAB780 |
Source: | Code function: | 0_2_00007FF6D5CA3E70 |
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior |
Source: | Code function: | 0_2_00007FF6D5CABD1C |
Source: | Code function: | 0_2_00007FF6D5CA5540 |
Stealing of Sensitive Information |
---|
Source: | Code function: | 0_2_00007FF6D5CA4CB0 | |
Source: | Code function: | 0_2_00007FF6D5CA4CB0 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 Process Injection | 1 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 1 Network Share Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Process Injection | 1 Credentials In Files | 2 System Time Discovery | Remote Desktop Protocol | 1 Data from Local System | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 DLL Side-Loading | Security Account Manager | 11 Security Software Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | 1 Virtualization/Sandbox Evasion | Distributed Component Object Model | Input Capture | 3 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | 1 Process Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | Steganography | Cached Domain Credentials | 2 System Network Configuration Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | Compile After Delivery | DCSync | 25 System Information Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
54% | ReversingLabs | Win64.Trojan.Generic | ||
100% | Avira | TR/AVI.Agent.pvpsx |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
api.ipify.org | 104.26.12.205 | true | false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
185.237.165.97 | unknown | France | 52195 | AP-MEDIA-ASPL | false | |
104.26.12.205 | api.ipify.org | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1569894 |
Start date and time: | 2024-12-06 11:14:18 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 10s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Run name: | Run with higher sleep bypass |
Number of analysed new started processes analysed: | 5 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Simple2.exe |
Detection: | MAL |
Classification: | mal68.spyw.winEXE@2/1@1/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtReadVirtualMemory calls found.
- Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: Simple2.exe
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
185.237.165.97 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
104.26.12.205 | Get hash | malicious | Targeted Ransomware | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | RDPWrap Tool | Browse |
| ||
Get hash | malicious | RDPWrap Tool | Browse |
| ||
Get hash | malicious | RDPWrap Tool | Browse |
| ||
Get hash | malicious | RDPWrap Tool | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
api.ipify.org | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | EvilProxy, HTMLPhisher | Browse |
| ||
Get hash | malicious | EvilProxy, HTMLPhisher | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Amadey, Credential Flusher, LummaC Stealer, Stealc, Vidar | Browse |
| ||
Get hash | malicious | NetSupport RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Discord Rat | Browse |
| ||
AP-MEDIA-ASPL | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai, Moobot | Browse |
| ||
Get hash | malicious | PureLog Stealer, RedLine | Browse |
| ||
Get hash | malicious | Socks5Systemz | Browse |
| ||
Get hash | malicious | Socks5Systemz | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai, Moobot | Browse |
|
Process: | C:\Users\user\Desktop\Simple2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 990 |
Entropy (8bit): | 4.935198616893804 |
Encrypted: | false |
SSDEEP: | 24:8E5Kk89K5K889KM89LYeb89KDWD89MLFpLK+89r9H+3VS:8EUksKU8sKMsLDbsKDWDsgFdK+sF+3Y |
MD5: | E157EC9E6FCE9A0736A2CE51D2EA6C8F |
SHA1: | 60BC99F049D030E39C0BF24F98CA229103BC738A |
SHA-256: | 19A2D767BDC19B9BEEF8CE463D8E47D18EB3DDBFE7851F6BDD1F7F9592D69181 |
SHA-512: | 01208467C11D95407D9F36716CE10B915D3AE854A9E56BD3EFB68641034E637EFAA7E10648638686173D16C5FAD4090286127FFC732D9BAFE45210A6D65AACE0 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 5.944817639384687 |
TrID: |
|
File name: | Simple2.exe |
File size: | 79'872 bytes |
MD5: | ed207427a25863f5524d616525943dd5 |
SHA1: | 6b7aa5224f76b8e09d3a8eefdb299e16b37c887f |
SHA256: | 418b88c4cd03e7da38287324094b5af3843835d63e06fd44c0fb06903d7575b6 |
SHA512: | ee55d29e1a8aab196406767b84812fa428c064af8cb692b4e01a5b69ebf95462cd965e42a0d7c6ed95542e130da8fec9c25188aab84a353492f07977264ceac9 |
SSDEEP: | 1536:SsN2HJVypWjCoZQcAkX8Uet4WTjs/U9w:rN2HDypWjCMekXBet4WPwMw |
TLSH: | 81734B47279904ECD2BBE37CD29A5A02D376BC05132697CF039191362FA67D0AE7EB11 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........A..v/..v/..v/......v/...+..v/...,..v/...*..v/......v/......v/..v.."v/...&..v/......v/...-..v/.Rich.v/.........PE..d...h..f... |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x14000b768 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x140000000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x66F2E668 [Tue Sep 24 16:18:48 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 066fb96ba163200488bf8cbd9705163e |
Instruction |
---|
dec eax |
sub esp, 28h |
call 00007FB1A4C350B0h |
dec eax |
add esp, 28h |
jmp 00007FB1A4C34977h |
int3 |
int3 |
retn 0000h |
int3 |
inc eax |
push ebx |
dec eax |
sub esp, 20h |
dec eax |
mov ebx, ecx |
xor ecx, ecx |
call dword ptr [0000194Fh] |
dec eax |
mov ecx, ebx |
call dword ptr [0000193Eh] |
call dword ptr [00001948h] |
dec eax |
mov ecx, eax |
mov edx, C0000409h |
dec eax |
add esp, 20h |
pop ebx |
dec eax |
jmp dword ptr [0000193Ch] |
dec eax |
mov dword ptr [esp+08h], ecx |
dec eax |
sub esp, 38h |
mov ecx, 00000017h |
call dword ptr [00001930h] |
test eax, eax |
je 00007FB1A4C34B09h |
mov ecx, 00000002h |
int 29h |
dec eax |
lea ecx, dword ptr [000090A6h] |
call 00007FB1A4C34BAEh |
dec eax |
mov eax, dword ptr [esp+38h] |
dec eax |
mov dword ptr [0000918Dh], eax |
dec eax |
lea eax, dword ptr [esp+38h] |
dec eax |
add eax, 08h |
dec eax |
mov dword ptr [0000911Dh], eax |
dec eax |
mov eax, dword ptr [00009176h] |
dec eax |
mov dword ptr [00008FE7h], eax |
dec eax |
mov eax, dword ptr [esp+40h] |
dec eax |
mov dword ptr [000090EBh], eax |
mov dword ptr [00008FC1h], C0000409h |
mov dword ptr [00008FBBh], 00000001h |
mov dword ptr [00008FC5h], 00000001h |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x10dbc | 0x154 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x16000 | 0x1e0 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x15000 | 0x948 | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x17000 | 0x10c | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0xe7c0 | 0x70 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0xe680 | 0x140 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0xd000 | 0x630 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0xba07 | 0xbc00 | 9b0eebbbfa76824e01521c9aec7dfe57 | False | 0.4793675199468085 | zlib compressed data | 6.10415307318274 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0xd000 | 0x6128 | 0x6200 | f96793aa05943a27e75f5c0f81ce41a1 | False | 0.3508450255102041 | data | 4.9758094084428075 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x14000 | 0xda0 | 0x800 | a1584494173fef381407b0a55fe58cdf | False | 0.197265625 | DOS executable (block device driver) | 3.6123807981210243 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0x15000 | 0x948 | 0xa00 | 56d1a1fb2414222ac35eeeae290fd52e | False | 0.46796875 | data | 4.4815576012306435 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0x16000 | 0x1e0 | 0x200 | c970c10a1e848ee974b87923ecbe6a2f | False | 0.525390625 | data | 4.706155132693063 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x17000 | 0x10c | 0x200 | 229d40605aa4496585f934aa5d939a3a | False | 0.421875 | data | 3.2433320779278194 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_MANIFEST | 0x16060 | 0x17d | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.5931758530183727 |
DLL | Import |
---|---|
KERNEL32.dll | GetFileAttributesW, GetLocaleInfoA, OpenProcess, GetTimeZoneInformation, GetLastError, CloseHandle, K32GetModuleBaseNameA, GetSystemInfo, K32EnumProcesses, GlobalMemoryStatusEx, GetConsoleWindow, K32EnumProcessModules, GetDiskFreeSpaceExA, FindClose, InitializeSListHead, GetSystemTimeAsFileTime, GetEnvironmentVariableW, FindNextFileW, FindFirstFileW, GetLogicalDrives, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetModuleHandleW, QueryPerformanceCounter, GetCurrentProcessId, RtlLookupFunctionEntry, GetModuleFileNameA, GetCurrentThreadId, RtlCaptureContext |
USER32.dll | ShowWindow |
ADVAPI32.dll | RegGetValueA, RegCloseKey, RegOpenKeyExA |
MSVCP140.dll | ?id@?$codecvt@_WDU_Mbstatet@@@std@@2V0locale@2@A, ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ, ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?sputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAA_JPEB_W_J@Z, ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z, ?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD@Z, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z, ?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W@Z, ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ, ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z, ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z, ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z, ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAPEAD0PEAH001@Z, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ, ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z, ??4?$_Yarn@D@std@@QEAAAEAV01@PEBD@Z, ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ, ?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z, ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z, ?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z, ?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z, ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEAD_J@Z, ?seekg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@_JH@Z, ?tellg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA?AV?$fpos@U_Mbstatet@@@2@XZ, ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?good@ios_base@std@@QEBA_NXZ, ??7ios_base@std@@QEBA_NXZ, ??1?$codecvt@_WDU_Mbstatet@@@std@@MEAA@XZ, ??0?$codecvt@_WDU_Mbstatet@@@std@@QEAA@_K@Z, ?out@?$codecvt@_WDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEB_W1AEAPEB_WPEAD3AEAPEAD@Z, ?in@?$codecvt@_WDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEA_W3AEAPEA_W@Z, ?always_noconv@codecvt_base@std@@QEBA_NXZ, ?_Addfac@_Locimp@locale@std@@AEAAXPEAVfacet@23@_K@Z, ?_Decref@facet@locale@std@@UEAAPEAV_Facet_base@3@XZ, ?_Incref@facet@locale@std@@UEAAXXZ, ??Bid@locale@std@@QEAA_KXZ, ?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z, ?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A, ?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A, ?uncaught_exception@std@@YA_NXZ, ?_Init@locale@std@@CAPEAV_Locimp@12@_N@Z, ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ, ?_New_Locimp@_Locimp@locale@std@@CAPEAV123@AEBV123@@Z, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ??0_Lockit@std@@QEAA@H@Z, ??1_Lockit@std@@QEAA@XZ, ?_Xlength_error@std@@YAXPEBD@Z |
IPHLPAPI.DLL | GetAdaptersInfo |
NETAPI32.dll | NetApiBufferFree, NetUserEnum, NetGetJoinInformation |
WINHTTP.dll | WinHttpQueryDataAvailable, WinHttpConnect, WinHttpSendRequest, WinHttpCloseHandle, WinHttpOpenRequest, WinHttpReadData, WinHttpQueryHeaders, WinHttpOpen, WinHttpReceiveResponse |
VCRUNTIME140_1.dll | __CxxFrameHandler4 |
VCRUNTIME140.dll | __C_specific_handler, _CxxThrowException, memset, __current_exception, __std_terminate, __std_exception_copy, memcpy, memcmp, memchr, memmove, __current_exception_context, __std_exception_destroy |
api-ms-win-crt-stdio-l1-1-0.dll | fread, fsetpos, ungetc, _fseeki64, _get_stream_buffer_pointers, setvbuf, fgetpos, fwrite, fflush, __p__commode, fputc, fgetc, fclose, _set_fmode |
api-ms-win-crt-heap-l1-1-0.dll | free, malloc, _set_new_mode, _callnewh |
api-ms-win-crt-string-l1-1-0.dll | isalnum |
api-ms-win-crt-filesystem-l1-1-0.dll | _lock_file, _unlock_file |
api-ms-win-crt-runtime-l1-1-0.dll | _get_initial_narrow_environment, _initterm, _initterm_e, _cexit, _exit, __p___argc, __p___argv, _c_exit, _register_thread_local_exe_atexit_callback, _crt_atexit, _register_onexit_function, _seh_filter_exe, _initialize_onexit_table, _initialize_narrow_environment, _configure_narrow_argv, _set_app_type, exit, terminate, _invalid_parameter_noinfo_noreturn |
api-ms-win-crt-math-l1-1-0.dll | __setusermatherr |
api-ms-win-crt-locale-l1-1-0.dll | _configthreadlocale |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 6, 2024 11:15:10.013108969 CET | 49704 | 80 | 192.168.2.5 | 104.26.12.205 |
Dec 6, 2024 11:15:10.132997036 CET | 80 | 49704 | 104.26.12.205 | 192.168.2.5 |
Dec 6, 2024 11:15:10.133088112 CET | 49704 | 80 | 192.168.2.5 | 104.26.12.205 |
Dec 6, 2024 11:15:10.133362055 CET | 49704 | 80 | 192.168.2.5 | 104.26.12.205 |
Dec 6, 2024 11:15:10.253019094 CET | 80 | 49704 | 104.26.12.205 | 192.168.2.5 |
Dec 6, 2024 11:15:11.248678923 CET | 80 | 49704 | 104.26.12.205 | 192.168.2.5 |
Dec 6, 2024 11:15:11.295167923 CET | 49704 | 80 | 192.168.2.5 | 104.26.12.205 |
Dec 6, 2024 11:15:11.902643919 CET | 49705 | 80 | 192.168.2.5 | 185.237.165.97 |
Dec 6, 2024 11:15:12.022711992 CET | 80 | 49705 | 185.237.165.97 | 192.168.2.5 |
Dec 6, 2024 11:15:12.022876024 CET | 49705 | 80 | 192.168.2.5 | 185.237.165.97 |
Dec 6, 2024 11:15:12.023067951 CET | 49705 | 80 | 192.168.2.5 | 185.237.165.97 |
Dec 6, 2024 11:15:12.023189068 CET | 49705 | 80 | 192.168.2.5 | 185.237.165.97 |
Dec 6, 2024 11:15:12.143224001 CET | 80 | 49705 | 185.237.165.97 | 192.168.2.5 |
Dec 6, 2024 11:15:12.143285990 CET | 49705 | 80 | 192.168.2.5 | 185.237.165.97 |
Dec 6, 2024 11:15:12.143379927 CET | 80 | 49705 | 185.237.165.97 | 192.168.2.5 |
Dec 6, 2024 11:15:12.143388033 CET | 80 | 49705 | 185.237.165.97 | 192.168.2.5 |
Dec 6, 2024 11:15:12.143399000 CET | 80 | 49705 | 185.237.165.97 | 192.168.2.5 |
Dec 6, 2024 11:15:12.143428087 CET | 80 | 49705 | 185.237.165.97 | 192.168.2.5 |
Dec 6, 2024 11:15:12.143451929 CET | 49705 | 80 | 192.168.2.5 | 185.237.165.97 |
Dec 6, 2024 11:15:12.143469095 CET | 80 | 49705 | 185.237.165.97 | 192.168.2.5 |
Dec 6, 2024 11:15:12.143484116 CET | 49705 | 80 | 192.168.2.5 | 185.237.165.97 |
Dec 6, 2024 11:15:12.143500090 CET | 49705 | 80 | 192.168.2.5 | 185.237.165.97 |
Dec 6, 2024 11:15:12.143527985 CET | 49705 | 80 | 192.168.2.5 | 185.237.165.97 |
Dec 6, 2024 11:15:12.143681049 CET | 80 | 49705 | 185.237.165.97 | 192.168.2.5 |
Dec 6, 2024 11:15:12.143692970 CET | 80 | 49705 | 185.237.165.97 | 192.168.2.5 |
Dec 6, 2024 11:15:12.143752098 CET | 49705 | 80 | 192.168.2.5 | 185.237.165.97 |
Dec 6, 2024 11:15:12.143807888 CET | 80 | 49705 | 185.237.165.97 | 192.168.2.5 |
Dec 6, 2024 11:15:12.143819094 CET | 80 | 49705 | 185.237.165.97 | 192.168.2.5 |
Dec 6, 2024 11:15:12.143873930 CET | 49705 | 80 | 192.168.2.5 | 185.237.165.97 |
Dec 6, 2024 11:15:12.263375044 CET | 80 | 49705 | 185.237.165.97 | 192.168.2.5 |
Dec 6, 2024 11:15:12.263405085 CET | 80 | 49705 | 185.237.165.97 | 192.168.2.5 |
Dec 6, 2024 11:15:12.263427973 CET | 80 | 49705 | 185.237.165.97 | 192.168.2.5 |
Dec 6, 2024 11:15:12.263437033 CET | 80 | 49705 | 185.237.165.97 | 192.168.2.5 |
Dec 6, 2024 11:15:12.263459921 CET | 80 | 49705 | 185.237.165.97 | 192.168.2.5 |
Dec 6, 2024 11:15:12.263478041 CET | 80 | 49705 | 185.237.165.97 | 192.168.2.5 |
Dec 6, 2024 11:15:12.263560057 CET | 49705 | 80 | 192.168.2.5 | 185.237.165.97 |
Dec 6, 2024 11:15:12.304400921 CET | 80 | 49705 | 185.237.165.97 | 192.168.2.5 |
Dec 6, 2024 11:15:12.304590940 CET | 49705 | 80 | 192.168.2.5 | 185.237.165.97 |
Dec 6, 2024 11:15:12.424523115 CET | 80 | 49705 | 185.237.165.97 | 192.168.2.5 |
Dec 6, 2024 11:15:12.424634933 CET | 49705 | 80 | 192.168.2.5 | 185.237.165.97 |
Dec 6, 2024 11:15:12.468523979 CET | 80 | 49705 | 185.237.165.97 | 192.168.2.5 |
Dec 6, 2024 11:15:12.588423014 CET | 80 | 49705 | 185.237.165.97 | 192.168.2.5 |
Dec 6, 2024 11:15:12.588629007 CET | 49705 | 80 | 192.168.2.5 | 185.237.165.97 |
Dec 6, 2024 11:15:12.796613932 CET | 80 | 49705 | 185.237.165.97 | 192.168.2.5 |
Dec 6, 2024 11:15:12.796741009 CET | 49705 | 80 | 192.168.2.5 | 185.237.165.97 |
Dec 6, 2024 11:15:13.048511028 CET | 80 | 49705 | 185.237.165.97 | 192.168.2.5 |
Dec 6, 2024 11:15:13.048595905 CET | 49705 | 80 | 192.168.2.5 | 185.237.165.97 |
Dec 6, 2024 11:15:13.296626091 CET | 80 | 49705 | 185.237.165.97 | 192.168.2.5 |
Dec 6, 2024 11:15:13.296710968 CET | 49705 | 80 | 192.168.2.5 | 185.237.165.97 |
Dec 6, 2024 11:15:13.548397064 CET | 80 | 49705 | 185.237.165.97 | 192.168.2.5 |
Dec 6, 2024 11:15:13.548537970 CET | 49705 | 80 | 192.168.2.5 | 185.237.165.97 |
Dec 6, 2024 11:15:13.792480946 CET | 80 | 49705 | 185.237.165.97 | 192.168.2.5 |
Dec 6, 2024 11:15:13.792666912 CET | 49705 | 80 | 192.168.2.5 | 185.237.165.97 |
Dec 6, 2024 11:15:14.040472031 CET | 80 | 49705 | 185.237.165.97 | 192.168.2.5 |
Dec 6, 2024 11:15:14.040672064 CET | 49705 | 80 | 192.168.2.5 | 185.237.165.97 |
Dec 6, 2024 11:15:14.171266079 CET | 80 | 49705 | 185.237.165.97 | 192.168.2.5 |
Dec 6, 2024 11:15:41.356002092 CET | 49704 | 80 | 192.168.2.5 | 104.26.12.205 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 6, 2024 11:15:09.805402040 CET | 58249 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 6, 2024 11:15:10.006465912 CET | 53 | 58249 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 6, 2024 11:15:09.805402040 CET | 192.168.2.5 | 1.1.1.1 | 0xeaf9 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 6, 2024 11:15:10.006465912 CET | 1.1.1.1 | 192.168.2.5 | 0xeaf9 | No error (0) | 104.26.12.205 | A (IP address) | IN (0x0001) | false | ||
Dec 6, 2024 11:15:10.006465912 CET | 1.1.1.1 | 192.168.2.5 | 0xeaf9 | No error (0) | 172.67.74.152 | A (IP address) | IN (0x0001) | false | ||
Dec 6, 2024 11:15:10.006465912 CET | 1.1.1.1 | 192.168.2.5 | 0xeaf9 | No error (0) | 104.26.13.205 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49704 | 104.26.12.205 | 80 | 1520 | C:\Users\user\Desktop\Simple2.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Dec 6, 2024 11:15:10.133362055 CET | 88 | OUT | |
Dec 6, 2024 11:15:11.248678923 CET | 430 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49705 | 185.237.165.97 | 80 | 1520 | C:\Users\user\Desktop\Simple2.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Dec 6, 2024 11:15:12.023067951 CET | 185 | OUT | |
Dec 6, 2024 11:15:12.023189068 CET | 11124 | OUT | |
Dec 6, 2024 11:15:12.143285990 CET | 1236 | OUT | |
Dec 6, 2024 11:15:12.143451929 CET | 4944 | OUT | |
Dec 6, 2024 11:15:12.143484116 CET | 2472 | OUT | |
Dec 6, 2024 11:15:12.143500090 CET | 2472 | OUT | |
Dec 6, 2024 11:15:12.143527985 CET | 2472 | OUT | |
Dec 6, 2024 11:15:12.143752098 CET | 4944 | OUT | |
Dec 6, 2024 11:15:12.143873930 CET | 4944 | OUT | |
Dec 6, 2024 11:15:12.263560057 CET | 14832 | OUT | |
Dec 6, 2024 11:15:12.304590940 CET | 25956 | OUT |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 05:15:08 |
Start date: | 06/12/2024 |
Path: | C:\Users\user\Desktop\Simple2.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d5ca0000 |
File size: | 79'872 bytes |
MD5 hash: | ED207427A25863F5524D616525943DD5 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 05:15:08 |
Start date: | 06/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 30.2% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 41.2% |
Total number of Nodes: | 742 |
Total number of Limit Nodes: | 12 |
Graph
Function 00007FF6D5CA1AC0 Relevance: 185.4, APIs: 75, Strings: 30, Instructions: 1699COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6D5CA5540 Relevance: 130.4, APIs: 53, Strings: 21, Instructions: 861timeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6D5CA4CB0 Relevance: 54.7, APIs: 16, Strings: 15, Instructions: 472COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6D5CA41F0 Relevance: 49.2, APIs: 17, Strings: 11, Instructions: 185registryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6D5CA4570 Relevance: 28.2, APIs: 12, Strings: 4, Instructions: 158COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6D5CA3E70 Relevance: 23.0, APIs: 10, Strings: 3, Instructions: 211COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6D5CA37A0 Relevance: 17.7, APIs: 8, Strings: 2, Instructions: 160COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6D5CA3A40 Relevance: 12.4, APIs: 6, Strings: 1, Instructions: 129COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6D5CA1790 Relevance: 26.4, APIs: 13, Strings: 2, Instructions: 195COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6D5CA1520 Relevance: 19.4, APIs: 9, Strings: 2, Instructions: 133COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6D5CAB188 Relevance: 4.5, APIs: 3, Instructions: 21COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6D5CABD1C Relevance: 6.0, APIs: 4, Instructions: 39timethreadCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6D5CABCB0 Relevance: .0, Instructions: 2COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6D5CAC906 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 28COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|