Windows
Analysis Report
WgnsGjhA3P.exe
Overview
General Information
Sample name: | WgnsGjhA3P.exerenamed because original name is a hash value |
Original sample name: | 7766c46c93d028e2e11517cfcf797fbb.exe |
Analysis ID: | 1585664 |
MD5: | 7766c46c93d028e2e11517cfcf797fbb |
SHA1: | 147b40c5fe1e860d77c7e02a0c986cb1eaac3ceb |
SHA256: | 52e5833f1dedcc6f05d9585c6b4b52bab86c592061eddf38356492373583f8a0 |
Tags: | exeValleyRATuser-abuse_ch |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- WgnsGjhA3P.exe (PID: 6988 cmdline:
"C:\Users\ user\Deskt op\WgnsGjh A3P.exe" MD5: 7766C46C93D028E2E11517CFCF797FBB)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_GhostRat | Yara detected GhostRat | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_GhostRat | Yara detected GhostRat | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_GhostRat | Yara detected GhostRat | Joe Security | ||
JoeSecurity_GhostRat | Yara detected GhostRat | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-08T00:19:02.944402+0100 | 2052875 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 192.238.134.52 | 4433 | TCP |
2025-01-08T00:20:09.519910+0100 | 2052875 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 192.238.134.52 | 4433 | TCP |
2025-01-08T00:21:14.723449+0100 | 2052875 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 192.238.134.52 | 4433 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Code function: | 0_2_00007FF63088F410 | |
Source: | Code function: | 0_2_00007FF6308B3EF0 |
Source: | Code function: | 0_2_00007FF6308862F0 |
Networking |
---|
Source: | Suricata IDS: |
Source: | TCP traffic: |
Source: | ASN Name: |
Source: | DNS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | Code function: | 0_2_00007FF630883B00 |
Source: | DNS traffic detected: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: | Code function: | 0_2_00007FF63088ADB0 |
Source: | Code function: | 0_2_00007FF630890E20 |
Source: | Code function: | 0_2_00007FF630890E20 |
Source: | Code function: | 0_2_00007FF630890E20 |
Source: | Code function: | 0_2_00007FF63088FD10 |
Source: | Code function: | 0_2_00007FF630887250 |
Source: | Windows user hook set: | Jump to behavior |
Source: | Code function: | 0_2_00007FF63089C1B0 |
Source: | Code function: | 0_2_00007FF63088E3E9 | |
Source: | Code function: | 0_2_00007FF63088E4EE | |
Source: | Code function: | 0_2_00007FF63088E46D |
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_00007FF6308879E0 | |
Source: | Code function: | 0_2_00007FF6308862F0 | |
Source: | Code function: | 0_2_00007FF630887250 | |
Source: | Code function: | 0_2_00007FF6308A8C10 | |
Source: | Code function: | 0_2_00007FF63088F410 | |
Source: | Code function: | 0_2_00007FF63088FD10 | |
Source: | Code function: | 0_2_00007FF63089B500 | |
Source: | Code function: | 0_2_00007FF630881500 | |
Source: | Code function: | 0_2_00007FF63089AD80 | |
Source: | Code function: | 0_2_00007FF6308B1DA8 | |
Source: | Code function: | 0_2_00007FF630888040 | |
Source: | Code function: | 0_2_00007FF6308A6228 | |
Source: | Code function: | 0_2_00007FF6308AF21C | |
Source: | Code function: | 0_2_00007FF6308B714C | |
Source: | Code function: | 0_2_00007FF6308A5168 | |
Source: | Code function: | 0_2_00007FF6308AD320 | |
Source: | Code function: | 0_2_00007FF630889320 | |
Source: | Code function: | 0_2_00007FF630899250 | |
Source: | Code function: | 0_2_00007FF63088B410 | |
Source: | Code function: | 0_2_00007FF63088D410 | |
Source: | Code function: | 0_2_00007FF6308AB350 | |
Source: | Code function: | 0_2_00007FF6308A7340 | |
Source: | Code function: | 0_2_00007FF6308A536C | |
Source: | Code function: | 0_2_00007FF6308AA4F8 | |
Source: | Code function: | 0_2_00007FF6308AFD30 | |
Source: | Code function: | 0_2_00007FF6308B5D34 | |
Source: | Code function: | 0_2_00007FF6308AC51C | |
Source: | Code function: | 0_2_00007FF6308AAC80 | |
Source: | Code function: | 0_2_00007FF63088CD40 | |
Source: | Code function: | 0_2_00007FF6308A4D58 | |
Source: | Code function: | 0_2_00007FF6308B8584 | |
Source: | Code function: | 0_2_00007FF6308A5578 | |
Source: | Code function: | 0_2_00007FF63088ADB0 | |
Source: | Code function: | 0_2_00007FF6308A65AC | |
Source: | Code function: | 0_2_00007FF63089A5A0 | |
Source: | Code function: | 0_2_00007FF630892EC0 | |
Source: | Code function: | 0_2_00007FF6308B3EF0 | |
Source: | Code function: | 0_2_00007FF630882E50 | |
Source: | Code function: | 0_2_00007FF6308AF6B0 | |
Source: | Code function: | 0_2_00007FF6308B2024 | |
Source: | Code function: | 0_2_00007FF6308B2744 | |
Source: | Code function: | 0_2_00007FF6308A6F3C | |
Source: | Code function: | 0_2_00007FF6308B3760 | |
Source: | Code function: | 0_2_00007FF6308A4F5C | |
Source: | Code function: | 0_2_00007FF6308A577C | |
Source: | Code function: | 0_2_00007FF6308897A0 | |
Source: | Code function: | 0_2_00007FF6308978F0 | |
Source: | Code function: | 0_2_00007FF630890900 |
Source: | Classification label: |
Source: | Code function: | 0_2_00007FF63089B500 | |
Source: | Code function: | 0_2_00007FF630889320 | |
Source: | Code function: | 0_2_00007FF63088E3E9 | |
Source: | Code function: | 0_2_00007FF63088E4EE | |
Source: | Code function: | 0_2_00007FF63088E46D |
Source: | Code function: | 0_2_00007FF6308862F0 |
Source: | Code function: | 0_2_00007FF6308879E0 |
Source: | Code function: | 0_2_00007FF6308879E0 |
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00007FF6308862F0 |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_00007FF63088E36A |
Source: | Key value created or modified: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | Evasive API call chain: | graph_0-21502 |
Source: | Stalling execution: | graph_0-21043 |
Source: | Key opened: | Jump to behavior |
Source: | Code function: | 0_2_00007FF6308862F0 |
Source: | Window / User API: | Jump to behavior |
Source: | Check user administrative privileges: | graph_0-21436 |
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | File Volume queried: | Jump to behavior |
Source: | Code function: | 0_2_00007FF63088F410 | |
Source: | Code function: | 0_2_00007FF6308B3EF0 |
Source: | Code function: | 0_2_00007FF6308862F0 |
Source: | Code function: | 0_2_00007FF6308891A0 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_00007FF63089B500 |
Source: | Code function: | 0_2_00007FF63089C70C |
Source: | Code function: | 0_2_00007FF6308862F0 |
Source: | Code function: | 0_2_00007FF6308862F0 |
Source: | Code function: | 0_2_00007FF630888690 |
Source: | Code function: | 0_2_00007FF63089BCD0 | |
Source: | Code function: | 0_2_00007FF63089B500 | |
Source: | Code function: | 0_2_00007FF6308A3A6C | |
Source: | Code function: | 0_2_00007FF63089E54C | |
Source: | Code function: | 0_2_00007FF63089E6F4 | |
Source: | Code function: | 0_2_00007FF63089E8E0 |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Code function: | 0_2_00007FF630889320 |
Source: | Code function: | 0_2_00007FF630889320 |
Source: | Code function: | 0_2_00007FF630889320 |
Source: | Code function: | 0_2_00007FF63089B500 |
Source: | Binary or memory string: |
Source: | Code function: | 0_2_00007FF6308BC8C0 |
Source: | Code function: | 0_2_00007FF6308862F0 | |
Source: | Code function: | 0_2_00007FF6308B7B08 | |
Source: | Code function: | 0_2_00007FF6308B7A38 | |
Source: | Code function: | 0_2_00007FF6308B7BA0 | |
Source: | Code function: | 0_2_00007FF6308B0D10 | |
Source: | Code function: | 0_2_00007FF6308B7DE8 | |
Source: | Code function: | 0_2_00007FF6308B76DC | |
Source: | Code function: | 0_2_00007FF6308B7FF0 | |
Source: | Code function: | 0_2_00007FF6308B7F40 | |
Source: | Code function: | 0_2_00007FF6308B8124 | |
Source: | Code function: | 0_2_00007FF6308B0838 |
Source: | Code function: | 0_2_00007FF6308862F0 |
Source: | Code function: | 0_2_00007FF6308B1DA8 |
Source: | Code function: | 0_2_00007FF63088FD10 |
Source: | Binary or memory string: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | 1 Replication Through Removable Media | 12 Native API | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 DLL Side-Loading | 121 Input Capture | 2 System Time Discovery | Remote Services | 1 Archive Collected Data | 1 Ingress Tool Transfer | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 Windows Service | 1 Access Token Manipulation | 1 Modify Registry | LSASS Memory | 11 Peripheral Device Discovery | Remote Desktop Protocol | 1 Screen Capture | 1 Encrypted Channel | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 Windows Service | 1 Virtualization/Sandbox Evasion | Security Account Manager | 2 File and Directory Discovery | SMB/Windows Admin Shares | 121 Input Capture | 1 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | 211 Process Injection | 1 Access Token Manipulation | NTDS | 26 System Information Discovery | Distributed Component Object Model | 3 Clipboard Data | 1 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 211 Process Injection | LSA Secrets | 151 Security Software Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Indicator Removal | Cached Domain Credentials | 1 Virtualization/Sandbox Evasion | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | Compile After Delivery | DCSync | 3 Process Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | Indicator Removal from Tools | Proc Filesystem | 1 Application Window Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
50% | ReversingLabs | Win64.Backdoor.GhostRAT |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
171.39.242.20.in-addr.arpa | unknown | unknown | false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
192.238.134.52 | unknown | United States | 395954 | LEASEWEB-USA-LAX-11US | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1585664 |
Start date and time: | 2025-01-08 00:18:06 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 2s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Run name: | Run with higher sleep bypass |
Number of analysed new started processes analysed: | 5 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | WgnsGjhA3P.exerenamed because original name is a hash value |
Original Sample Name: | 7766c46c93d028e2e11517cfcf797fbb.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@1/1@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 4.245.163.56, 20.242.39.171, 172.202.163.200, 13.107.246.45
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtEnumerateKey calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- VT rate limit hit for: WgnsGjhA3P.exe
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
LEASEWEB-USA-LAX-11US | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | GhostRat | Browse |
| ||
Get hash | malicious | GhostRat | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Mirai | Browse |
|
Process: | C:\Users\user\Desktop\WgnsGjhA3P.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 30 |
Entropy (8bit): | 2.6616157143988106 |
Encrypted: | false |
SSDEEP: | 3:tblM6lEjln:tbhEZn |
MD5: | AE50B29A0B8DCC411F24F1863B0EAFDE |
SHA1: | D415A55627B1ADED8E4B2CBBA402F816B0461155 |
SHA-256: | 6B4BBBCE480FBC50D39A8EC4B72CDB7D781B151921E063DD899FD9B736ADCF68 |
SHA-512: | D9A9BA42D99BE32D26667060BE1D523DCD20EAFA187A67F7919002CC6DA349FD058053C9C6F721D6FDB730EA02FBAA3013E51C0C653368BD6B3F57A4C0FCABA8 |
Malicious: | true |
Reputation: | moderate, very likely benign file |
Preview: |
File type: | |
Entropy (8bit): | 6.060388863278636 |
TrID: |
|
File name: | WgnsGjhA3P.exe |
File size: | 389'632 bytes |
MD5: | 7766c46c93d028e2e11517cfcf797fbb |
SHA1: | 147b40c5fe1e860d77c7e02a0c986cb1eaac3ceb |
SHA256: | 52e5833f1dedcc6f05d9585c6b4b52bab86c592061eddf38356492373583f8a0 |
SHA512: | 18c849a8de6220e2109c24352016d82201184738197acf4b8c37999ba36cd6b27540048095d3903212b52c44a064ab57a4f3f9f0dc48e4c042881c4d166e7a8c |
SSDEEP: | 6144:4KtL0RSVgMoEao8ItdKwzBFdYmT+xmCiRLBVmLhkM:NtwSqEao8It4wlDCxm/qx |
TLSH: | 1F848E49F79405F8E5678138C9634916EBB27C6D03A09BDF33A4866A2F237D0AD3E711 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........A...A...A.......D...............@.......@...Q(..K...Q(..S...Q(..........U.......X...A...m....)..S....)..@...RichA.......... |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x14001e13c |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x140000000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x677168BF [Sun Dec 29 15:20:31 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | d7444b6dc7c8cddb50fba5269ad57bce |
Instruction |
---|
dec eax |
sub esp, 28h |
call 00007F48CD1396B0h |
dec eax |
add esp, 28h |
jmp 00007F48CD138F07h |
int3 |
int3 |
dec eax |
sub esp, 28h |
dec ebp |
mov eax, dword ptr [ecx+38h] |
dec eax |
mov ecx, edx |
dec ecx |
mov edx, ecx |
call 00007F48CD1390A2h |
mov eax, 00000001h |
dec eax |
add esp, 28h |
ret |
int3 |
int3 |
int3 |
inc eax |
push ebx |
inc ebp |
mov ebx, dword ptr [eax] |
dec eax |
mov ebx, edx |
inc ecx |
and ebx, FFFFFFF8h |
dec esp |
mov ecx, ecx |
inc ecx |
test byte ptr [eax], 00000004h |
dec esp |
mov edx, ecx |
je 00007F48CD1390A5h |
inc ecx |
mov eax, dword ptr [eax+08h] |
dec ebp |
arpl word ptr [eax+04h], dx |
neg eax |
dec esp |
add edx, ecx |
dec eax |
arpl ax, cx |
dec esp |
and edx, ecx |
dec ecx |
arpl bx, ax |
dec edx |
mov edx, dword ptr [eax+edx] |
dec eax |
mov eax, dword ptr [ebx+10h] |
mov ecx, dword ptr [eax+08h] |
dec eax |
mov eax, dword ptr [ebx+08h] |
test byte ptr [ecx+eax+03h], 0000000Fh |
je 00007F48CD13909Dh |
movzx eax, byte ptr [ecx+eax+03h] |
and eax, FFFFFFF0h |
dec esp |
add ecx, eax |
dec esp |
xor ecx, edx |
dec ecx |
mov ecx, ecx |
pop ebx |
jmp 00007F48CD1390AAh |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
nop word ptr [eax+eax+00000000h] |
dec eax |
cmp ecx, dword ptr [00036E59h] |
jne 00007F48CD1390A2h |
dec eax |
rol ecx, 10h |
test cx, FFFFh |
jne 00007F48CD139093h |
ret |
dec eax |
ror ecx, 10h |
jmp 00007F48CD1397ABh |
int3 |
int3 |
dec eax |
mov dword ptr [esp+00h], ebx |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x523b0 | 0x104 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x60000 | 0x3420 | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x64000 | 0xc80 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x4c7b0 | 0x38 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x4c980 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x4c670 | 0x140 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x3f000 | 0x918 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x3dbf0 | 0x3dc00 | d3f6189e43bbd290b28f7518c02b76a1 | False | 0.5461593813259109 | data | 6.462564110280856 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x3f000 | 0x1519e | 0x15200 | 6edb872335ad42db6aa2ce85a47a3af5 | False | 0.4149986131656805 | data | 4.932101759530432 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x55000 | 0xaa6c | 0x7c00 | b1cb403515f9a2e2bde815147bd596cd | False | 0.10622479838709678 | DOS executable (block device driver \377\3) | 1.5580115815014906 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0x60000 | 0x3420 | 0x3600 | 20b7b9769859dd90801ea597a1d992be | False | 0.4626736111111111 | data | 5.517914471579984 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x64000 | 0xc80 | 0xe00 | 316f5780e4a2c74c1946985bacab1ae4 | False | 0.4916294642857143 | data | 5.228910762857474 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
DLL | Import |
---|---|
KERNEL32.dll | QueryDosDeviceW, WriteProcessMemory, GetCommandLineW, GetCurrentProcess, WriteFile, OutputDebugStringA, GetModuleFileNameW, GetProcessId, CreateMutexW, GetLocaleInfoW, LocalAlloc, CreateFileW, GetVersionExW, K32GetProcessImageFileNameW, GetSystemDirectoryW, ResumeThread, GetModuleHandleA, OpenProcess, GetVersion, GetLogicalDriveStringsW, CreateToolhelp32Snapshot, MultiByteToWideChar, Process32NextW, GetDiskFreeSpaceExW, GetSystemDirectoryA, LoadLibraryA, lstrcatW, GlobalAlloc, Process32FirstW, GlobalFree, GetSystemInfo, LoadLibraryW, GetLocalTime, VirtualProtectEx, GetThreadContext, GetProcAddress, VirtualAllocEx, LocalFree, ExitProcess, GetCurrentProcessId, GlobalMemoryStatusEx, CreateProcessW, GetModuleHandleW, FreeLibrary, GetConsoleWindow, lstrcpyW, CreateRemoteThread, CreateProcessA, SetThreadContext, GetModuleFileNameA, GetTickCount, lstrcmpW, GetDriveTypeW, GetExitCodeProcess, SetFilePointer, ReleaseMutex, GlobalSize, DeleteFileW, GlobalLock, GetFileSize, GlobalUnlock, FindFirstFileW, ExpandEnvironmentStringsW, FindClose, GetFileAttributesW, TerminateThread, VirtualProtect, IsBadReadPtr, CreateThread, IsDebuggerPresent, SetUnhandledExceptionFilter, WriteConsoleW, GetCurrentThreadId, GetConsoleMode, GetConsoleOutputCP, FlushFileBuffers, SetFilePointerEx, SetStdHandle, SetEnvironmentVariableW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetOEMCP, GetACP, IsValidCodePage, FindNextFileW, FindFirstFileExW, GetTimeZoneInformation, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, LCMapStringW, CompareStringW, FlsFree, FlsSetValue, GetStartupInfoW, CreateWaitableTimerW, SetWaitableTimer, TryEnterCriticalSection, WideCharToMultiByte, ResetEvent, CreateEventW, lstrlenW, CancelIo, GetNativeSystemInfo, SetLastError, lstrcmpiW, CreateEventA, CloseHandle, SetEvent, Sleep, HeapFree, WaitForSingleObject, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, EnterCriticalSection, HeapCreate, GetProcessHeap, DeleteCriticalSection, HeapDestroy, DecodePointer, HeapAlloc, HeapReAlloc, GetLastError, HeapSize, InitializeCriticalSectionEx, VirtualAlloc, VirtualFree, FlsGetValue, FlsAlloc, GetFileType, GetCommandLineA, GetStdHandle, VirtualQuery, GetModuleHandleExW, FreeLibraryAndExitThread, ExitThread, LoadLibraryExW, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, RtlPcToFileHeader, RtlUnwindEx, lstrcpyA, CreateFileA, GetSystemDefaultLangID, DeviceIoControl, TerminateProcess, InitializeSListHead, GetSystemTimeAsFileTime, QueryPerformanceCounter, IsProcessorFeaturePresent, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, SleepConditionVariableSRW, WakeAllConditionVariable, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, GetCPInfo, LCMapStringEx, EncodePointer, CompareStringEx, GetStringTypeW, RaiseException, OutputDebugStringW, SwitchToThread |
USER32.dll | MsgWaitForMultipleObjects, GetWindowTextW, wsprintfW, GetForegroundWindow, GetLastInputInfo, GetClipboardData, CloseClipboard, OpenClipboard, GetKeyState, ReleaseDC, GetDesktopWindow, SetClipboardData, ExitWindowsEx, EmptyClipboard, GetSystemMetrics, GetDC, GetInputState, PostThreadMessageA, TranslateMessage, DispatchMessageW, PeekMessageW, ShowWindow |
GDI32.dll | CreateCompatibleBitmap, SelectObject, CreateDIBSection, SetDIBColorTable, CreateCompatibleDC, StretchBlt, GetDIBits, GetDeviceCaps, GetObjectW, SetStretchBltMode, DeleteObject, DeleteDC |
ADVAPI32.dll | OpenProcessToken, RegQueryValueExW, AllocateAndInitializeSid, FreeSid, CheckTokenMembership, ClearEventLogW, CloseEventLog, OpenEventLogW, LookupPrivilegeValueW, AdjustTokenPrivileges, GetCurrentHwProfileW, RegCloseKey, RegQueryInfoKeyW, GetSidSubAuthorityCount, GetSidSubAuthority, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCreateKeyW, RegDeleteValueW, LookupAccountSidW, GetTokenInformation |
SHELL32.dll | SHGetFolderPathW |
ole32.dll | CreateStreamOnHGlobal, GetHGlobalFromStream, CoInitialize, CoUninitialize, CoCreateInstance |
OLEAUT32.dll | SysFreeString |
WS2_32.dll | WSASetLastError, WSAEventSelect, WSAResetEvent, WSAWaitForMultipleEvents, WSAEnumNetworkEvents, WSAGetLastError, WSACleanup, WSAIoctl, closesocket, WSACreateEvent, select, WSAStartup, send, socket, connect, recv, htons, setsockopt, inet_ntoa, WSACloseEvent, gethostbyname, gethostname, shutdown |
WINMM.dll | timeGetTime |
gdiplus.dll | GdipCreateBitmapFromStream, GdipBitmapUnlockBits, GdipCloneImage, GdipAlloc, GdiplusShutdown, GdipDrawImageI, GdipCreateBitmapFromScan0, GdipCreateBitmapFromHBITMAP, GdipGetImageWidth, GdipGetImagePalette, GdipDeleteGraphics, GdipGetImageEncodersSize, GdipGetImageGraphicsContext, GdipFree, GdipGetImagePixelFormat, GdipDisposeImage, GdipSaveImageToStream, GdipBitmapLockBits, GdipGetImagePaletteSize, GdiplusStartup, GdipGetImageHeight, GdipGetImageEncoders |
dxgi.dll | CreateDXGIFactory |
DINPUT8.dll | DirectInput8Create |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-08T00:19:02.944402+0100 | 2052875 | ET MALWARE Anonymous RAT CnC Checkin | 1 | 192.168.2.4 | 49730 | 192.238.134.52 | 4433 | TCP |
2025-01-08T00:20:09.519910+0100 | 2052875 | ET MALWARE Anonymous RAT CnC Checkin | 1 | 192.168.2.4 | 49730 | 192.238.134.52 | 4433 | TCP |
2025-01-08T00:21:14.723449+0100 | 2052875 | ET MALWARE Anonymous RAT CnC Checkin | 1 | 192.168.2.4 | 49730 | 192.238.134.52 | 4433 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 8, 2025 00:19:01.754209042 CET | 49730 | 4433 | 192.168.2.4 | 192.238.134.52 |
Jan 8, 2025 00:19:01.760711908 CET | 4433 | 49730 | 192.238.134.52 | 192.168.2.4 |
Jan 8, 2025 00:19:01.760890961 CET | 49730 | 4433 | 192.168.2.4 | 192.238.134.52 |
Jan 8, 2025 00:19:02.516408920 CET | 49730 | 4433 | 192.168.2.4 | 192.238.134.52 |
Jan 8, 2025 00:19:02.521799088 CET | 4433 | 49730 | 192.238.134.52 | 192.168.2.4 |
Jan 8, 2025 00:19:02.521821976 CET | 4433 | 49730 | 192.238.134.52 | 192.168.2.4 |
Jan 8, 2025 00:19:02.521872044 CET | 4433 | 49730 | 192.238.134.52 | 192.168.2.4 |
Jan 8, 2025 00:19:02.521924019 CET | 4433 | 49730 | 192.238.134.52 | 192.168.2.4 |
Jan 8, 2025 00:19:02.839272976 CET | 4433 | 49730 | 192.238.134.52 | 192.168.2.4 |
Jan 8, 2025 00:19:02.894110918 CET | 49730 | 4433 | 192.168.2.4 | 192.238.134.52 |
Jan 8, 2025 00:19:02.938110113 CET | 49730 | 4433 | 192.168.2.4 | 192.238.134.52 |
Jan 8, 2025 00:19:02.944330931 CET | 4433 | 49730 | 192.238.134.52 | 192.168.2.4 |
Jan 8, 2025 00:19:02.944343090 CET | 4433 | 49730 | 192.238.134.52 | 192.168.2.4 |
Jan 8, 2025 00:19:02.944351912 CET | 4433 | 49730 | 192.238.134.52 | 192.168.2.4 |
Jan 8, 2025 00:19:02.944401979 CET | 49730 | 4433 | 192.168.2.4 | 192.238.134.52 |
Jan 8, 2025 00:19:02.946050882 CET | 4433 | 49730 | 192.238.134.52 | 192.168.2.4 |
Jan 8, 2025 00:19:02.950473070 CET | 4433 | 49730 | 192.238.134.52 | 192.168.2.4 |
Jan 8, 2025 00:19:19.426230907 CET | 49730 | 4433 | 192.168.2.4 | 192.238.134.52 |
Jan 8, 2025 00:19:19.432627916 CET | 4433 | 49730 | 192.238.134.52 | 192.168.2.4 |
Jan 8, 2025 00:19:19.747056961 CET | 4433 | 49730 | 192.238.134.52 | 192.168.2.4 |
Jan 8, 2025 00:19:19.800528049 CET | 49730 | 4433 | 192.168.2.4 | 192.238.134.52 |
Jan 8, 2025 00:19:27.589776993 CET | 49185 | 53 | 192.168.2.4 | 162.159.36.2 |
Jan 8, 2025 00:19:27.594640017 CET | 53 | 49185 | 162.159.36.2 | 192.168.2.4 |
Jan 8, 2025 00:19:27.594711065 CET | 49185 | 53 | 192.168.2.4 | 162.159.36.2 |
Jan 8, 2025 00:19:27.599500895 CET | 53 | 49185 | 162.159.36.2 | 192.168.2.4 |
Jan 8, 2025 00:19:28.039550066 CET | 49185 | 53 | 192.168.2.4 | 162.159.36.2 |
Jan 8, 2025 00:19:28.044572115 CET | 53 | 49185 | 162.159.36.2 | 192.168.2.4 |
Jan 8, 2025 00:19:28.044629097 CET | 49185 | 53 | 192.168.2.4 | 162.159.36.2 |
Jan 8, 2025 00:19:36.222687960 CET | 49730 | 4433 | 192.168.2.4 | 192.238.134.52 |
Jan 8, 2025 00:19:36.229800940 CET | 4433 | 49730 | 192.238.134.52 | 192.168.2.4 |
Jan 8, 2025 00:19:36.544368029 CET | 4433 | 49730 | 192.238.134.52 | 192.168.2.4 |
Jan 8, 2025 00:19:36.597546101 CET | 49730 | 4433 | 192.168.2.4 | 192.238.134.52 |
Jan 8, 2025 00:19:52.472701073 CET | 49730 | 4433 | 192.168.2.4 | 192.238.134.52 |
Jan 8, 2025 00:19:52.477730036 CET | 4433 | 49730 | 192.238.134.52 | 192.168.2.4 |
Jan 8, 2025 00:19:52.791897058 CET | 4433 | 49730 | 192.238.134.52 | 192.168.2.4 |
Jan 8, 2025 00:19:52.832012892 CET | 49730 | 4433 | 192.168.2.4 | 192.238.134.52 |
Jan 8, 2025 00:20:09.519910097 CET | 49730 | 4433 | 192.168.2.4 | 192.238.134.52 |
Jan 8, 2025 00:20:09.525630951 CET | 4433 | 49730 | 192.238.134.52 | 192.168.2.4 |
Jan 8, 2025 00:20:09.839143038 CET | 4433 | 49730 | 192.238.134.52 | 192.168.2.4 |
Jan 8, 2025 00:20:09.894650936 CET | 49730 | 4433 | 192.168.2.4 | 192.238.134.52 |
Jan 8, 2025 00:20:25.488699913 CET | 49730 | 4433 | 192.168.2.4 | 192.238.134.52 |
Jan 8, 2025 00:20:25.495203018 CET | 4433 | 49730 | 192.238.134.52 | 192.168.2.4 |
Jan 8, 2025 00:20:25.809870958 CET | 4433 | 49730 | 192.238.134.52 | 192.168.2.4 |
Jan 8, 2025 00:20:25.863569975 CET | 49730 | 4433 | 192.168.2.4 | 192.238.134.52 |
Jan 8, 2025 00:20:41.691937923 CET | 49730 | 4433 | 192.168.2.4 | 192.238.134.52 |
Jan 8, 2025 00:20:41.696821928 CET | 4433 | 49730 | 192.238.134.52 | 192.168.2.4 |
Jan 8, 2025 00:20:42.011234045 CET | 4433 | 49730 | 192.238.134.52 | 192.168.2.4 |
Jan 8, 2025 00:20:42.066787004 CET | 49730 | 4433 | 192.168.2.4 | 192.238.134.52 |
Jan 8, 2025 00:20:57.988953114 CET | 49730 | 4433 | 192.168.2.4 | 192.238.134.52 |
Jan 8, 2025 00:20:57.993860960 CET | 4433 | 49730 | 192.238.134.52 | 192.168.2.4 |
Jan 8, 2025 00:20:58.308326006 CET | 4433 | 49730 | 192.238.134.52 | 192.168.2.4 |
Jan 8, 2025 00:20:58.348289967 CET | 49730 | 4433 | 192.168.2.4 | 192.238.134.52 |
Jan 8, 2025 00:21:14.723448992 CET | 49730 | 4433 | 192.168.2.4 | 192.238.134.52 |
Jan 8, 2025 00:21:14.729775906 CET | 4433 | 49730 | 192.238.134.52 | 192.168.2.4 |
Jan 8, 2025 00:21:15.043353081 CET | 4433 | 49730 | 192.238.134.52 | 192.168.2.4 |
Jan 8, 2025 00:21:15.098267078 CET | 49730 | 4433 | 192.168.2.4 | 192.238.134.52 |
Jan 8, 2025 00:21:30.770328999 CET | 49730 | 4433 | 192.168.2.4 | 192.238.134.52 |
Jan 8, 2025 00:21:30.775257111 CET | 4433 | 49730 | 192.238.134.52 | 192.168.2.4 |
Jan 8, 2025 00:21:31.121126890 CET | 4433 | 49730 | 192.238.134.52 | 192.168.2.4 |
Jan 8, 2025 00:21:31.160897017 CET | 49730 | 4433 | 192.168.2.4 | 192.238.134.52 |
Jan 8, 2025 00:21:46.473824024 CET | 49730 | 4433 | 192.168.2.4 | 192.238.134.52 |
Jan 8, 2025 00:21:46.557847977 CET | 4433 | 49730 | 192.238.134.52 | 192.168.2.4 |
Jan 8, 2025 00:21:46.872154951 CET | 4433 | 49730 | 192.238.134.52 | 192.168.2.4 |
Jan 8, 2025 00:21:46.926728964 CET | 49730 | 4433 | 192.168.2.4 | 192.238.134.52 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 8, 2025 00:19:27.589283943 CET | 53 | 53995 | 162.159.36.2 | 192.168.2.4 |
Jan 8, 2025 00:19:28.051831007 CET | 50221 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 8, 2025 00:19:28.058994055 CET | 53 | 50221 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 8, 2025 00:19:28.051831007 CET | 192.168.2.4 | 1.1.1.1 | 0x2c64 | Standard query (0) | PTR (Pointer record) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 8, 2025 00:19:28.058994055 CET | 1.1.1.1 | 192.168.2.4 | 0x2c64 | Name error (3) | none | none | PTR (Pointer record) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 18:18:54 |
Start date: | 07/01/2025 |
Path: | C:\Users\user\Desktop\WgnsGjhA3P.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff630880000 |
File size: | 389'632 bytes |
MD5 hash: | 7766C46C93D028E2E11517CFCF797FBB |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 7.5% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 38.4% |
Total number of Nodes: | 1032 |
Total number of Limit Nodes: | 40 |
Graph
Function 00007FF6308862F0 Relevance: 193.3, APIs: 81, Strings: 29, Instructions: 845registrystringprocessCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF63089B500 Relevance: 103.7, APIs: 41, Strings: 18, Instructions: 406registrylibrarysleepCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF63088F410 Relevance: 81.0, APIs: 35, Strings: 11, Instructions: 532registryprocessfileCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF63089AD80 Relevance: 75.8, APIs: 27, Strings: 16, Instructions: 529stringregistryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF63088FD10 Relevance: 56.3, APIs: 27, Strings: 5, Instructions: 326windowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF630887250 Relevance: 54.7, APIs: 26, Strings: 5, Instructions: 457COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308879E0 Relevance: 31.7, APIs: 16, Strings: 2, Instructions: 216stringregistrycomCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF630888690 Relevance: 17.6, APIs: 9, Strings: 1, Instructions: 149memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF63089BCD0 Relevance: 15.0, APIs: 10, Instructions: 33threadsleepsynchronizationCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308B1DA8 Relevance: 14.3, APIs: 6, Strings: 2, Instructions: 334timeCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308B2024 Relevance: 10.6, APIs: 4, Strings: 2, Instructions: 143timeCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308891A0 Relevance: 10.5, APIs: 4, Strings: 2, Instructions: 29libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF63089C1B0 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 71fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF630883B00 Relevance: 4.7, APIs: 3, Instructions: 151timenetworkCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF630888900 Relevance: 45.7, APIs: 22, Strings: 4, Instructions: 225memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308902A0 Relevance: 45.3, APIs: 30, Instructions: 260memorywindowCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF63088C340 Relevance: 33.5, APIs: 18, Strings: 1, Instructions: 297windowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF630883820 Relevance: 28.2, APIs: 15, Strings: 1, Instructions: 157networkstringtimeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF630888AD0 Relevance: 26.4, APIs: 14, Strings: 1, Instructions: 101memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF63089BDD0 Relevance: 21.2, APIs: 10, Strings: 2, Instructions: 223memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF63088D9C0 Relevance: 15.9, APIs: 6, Strings: 3, Instructions: 137registryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF63089C2E0 Relevance: 15.9, APIs: 8, Strings: 1, Instructions: 128fileCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF63088C7B0 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 143windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF630888CD0 Relevance: 9.1, APIs: 6, Instructions: 67registrystringCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF630888E00 Relevance: 9.0, APIs: 3, Strings: 2, Instructions: 239COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF630883E30 Relevance: 6.1, APIs: 4, Instructions: 120threadnetworkCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF63089DE98 Relevance: 3.0, APIs: 2, Instructions: 22COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308AE6BC Relevance: 3.0, APIs: 2, Instructions: 19memoryCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308AEDD0 Relevance: 1.3, APIs: 1, Instructions: 29memoryCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF630889320 Relevance: 68.5, APIs: 29, Strings: 10, Instructions: 221libraryloaderinjectionCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF63088ADB0 Relevance: 63.3, APIs: 30, Strings: 6, Instructions: 286stringclipboardfileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF63088D410 Relevance: 33.6, APIs: 15, Strings: 4, Instructions: 385stringtimeCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308897A0 Relevance: 29.9, APIs: 11, Strings: 6, Instructions: 118libraryloaderfileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF630890E20 Relevance: 27.3, APIs: 18, Instructions: 322clipboardsleepmemoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF63088CD40 Relevance: 26.7, APIs: 7, Strings: 8, Instructions: 406threadinjectionprocessCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF63088E3E9 Relevance: 26.3, APIs: 14, Strings: 1, Instructions: 64shutdownCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF63089A5A0 Relevance: 25.8, APIs: 17, Instructions: 347memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF63088E46D Relevance: 24.6, APIs: 13, Strings: 1, Instructions: 62shutdownCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF63088E4EE Relevance: 24.6, APIs: 13, Strings: 1, Instructions: 61shutdownCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308B8584 Relevance: 24.0, APIs: 9, Strings: 4, Instructions: 1226COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF63088B410 Relevance: 23.0, APIs: 11, Strings: 2, Instructions: 232memorytimeCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF630890900 Relevance: 19.4, APIs: 10, Strings: 1, Instructions: 129registrystringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308B76DC Relevance: 10.7, APIs: 5, Strings: 1, Instructions: 227COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308B8124 Relevance: 10.7, APIs: 7, Instructions: 172COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF63088E36A Relevance: 10.5, APIs: 3, Strings: 3, Instructions: 31COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308A3A6C Relevance: 9.1, APIs: 6, Instructions: 83COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF63089C70C Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 42COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308B0D10 Relevance: 3.5, APIs: 1, Strings: 1, Instructions: 37COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308B3760 Relevance: 3.2, APIs: 2, Instructions: 227COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308B7A38 Relevance: 1.6, APIs: 1, Instructions: 61COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308B7B08 Relevance: 1.5, APIs: 1, Instructions: 41COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308B0838 Relevance: 1.5, APIs: 1, Instructions: 32COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF630899250 Relevance: .7, Instructions: 678COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308978F0 Relevance: .4, Instructions: 369COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308A6F3C Relevance: .3, Instructions: 327COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308B714C Relevance: .3, Instructions: 271COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308A6228 Relevance: .2, Instructions: 247COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308AFD30 Relevance: .2, Instructions: 198COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF630892EC0 Relevance: .2, Instructions: 188COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308A536C Relevance: .1, Instructions: 146COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308A4F5C Relevance: .1, Instructions: 146COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308A577C Relevance: .1, Instructions: 146COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308A5168 Relevance: .1, Instructions: 145COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308A4D58 Relevance: .1, Instructions: 145COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308A5578 Relevance: .1, Instructions: 145COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308AC51C Relevance: .1, Instructions: 126COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308BC8C0 Relevance: .0, Instructions: 32COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF63089E6F4 Relevance: .0, Instructions: 2COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF630884C50 Relevance: 33.2, APIs: 22, Instructions: 199windowthreadnetworkCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308906A0 Relevance: 21.1, APIs: 8, Strings: 4, Instructions: 140stringprocessCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF630884270 Relevance: 21.1, APIs: 14, Instructions: 119networkstringCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308846A0 Relevance: 17.7, APIs: 9, Strings: 1, Instructions: 171networktimeCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF630885A80 Relevance: 16.7, APIs: 11, Instructions: 154networkCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF630890BC0 Relevance: 15.8, APIs: 7, Strings: 2, Instructions: 52registrystringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308A45E0 Relevance: 14.5, APIs: 3, Strings: 5, Instructions: 475COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF630884080 Relevance: 13.6, APIs: 9, Instructions: 111timenetworkCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF630885D10 Relevance: 13.6, APIs: 9, Instructions: 93timenetworkCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308A0C08 Relevance: 12.6, APIs: 4, Strings: 3, Instructions: 310COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308B08B4 Relevance: 12.4, APIs: 5, Strings: 2, Instructions: 117libraryloaderCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF63088E01F Relevance: 12.3, APIs: 6, Strings: 1, Instructions: 94filestringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF630884A90 Relevance: 12.1, APIs: 8, Instructions: 104networkCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308A9480 Relevance: 11.0, APIs: 3, Strings: 3, Instructions: 494COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF630884470 Relevance: 10.6, APIs: 7, Instructions: 143threadnetworktimeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF63088B9E0 Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 140COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF630891D30 Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 133COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308A352C Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 88libraryloaderCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF630890CA0 Relevance: 10.6, APIs: 4, Strings: 2, Instructions: 82processstringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308AEA70 Relevance: 10.6, APIs: 7, Instructions: 62COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308BCC80 Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF63088ACF0 Relevance: 10.5, APIs: 7, Instructions: 40filesynchronizationstringCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF63088EF25 Relevance: 10.5, APIs: 4, Strings: 2, Instructions: 34registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF630889220 Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 26processCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308A10D8 Relevance: 9.1, APIs: 2, Strings: 3, Instructions: 320COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF630885300 Relevance: 9.1, APIs: 6, Instructions: 63synchronizationtimeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308AEBE8 Relevance: 9.1, APIs: 6, Instructions: 57COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308ABC90 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 27libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF63088EFA3 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 23registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308BC6BC Relevance: 7.6, APIs: 5, Instructions: 56COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308AECB0 Relevance: 7.6, APIs: 5, Instructions: 54COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF630885640 Relevance: 7.5, APIs: 5, Instructions: 26synchronizationsleepCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308A184C Relevance: 7.2, APIs: 2, Strings: 2, Instructions: 190COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF63089FA80 Relevance: 7.2, APIs: 3, Strings: 1, Instructions: 154COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308A1DCC Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 146COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308A15DC Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 146COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF63089E760 Relevance: 6.0, APIs: 4, Instructions: 39timethreadCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF630883FF0 Relevance: 6.0, APIs: 4, Instructions: 22synchronizationsleepCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF630891840 Relevance: 5.5, APIs: 2, Strings: 1, Instructions: 202COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308A2004 Relevance: 5.4, APIs: 1, Strings: 2, Instructions: 163COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF63088DC4D Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 130COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308B1CC4 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 121COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308A269C Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 120COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308ABF84 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 111COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308BAE54 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 100fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6308A0050 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 44COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|