Score: | 84 |
Range: | 0 - 100 |
Confidence: | 100% |
AV Detection |
|
---|
Source: |
Avira: |
Source: |
Virustotal: |
Perma Link |
Source: |
Binary string: |
||
Source: |
Binary string: |
System Summary |
|
---|
Source: |
Static PE information: |
||
Source: |
Static PE information: |
||
Source: |
Static PE information: |
Source: |
Code function: |
0_2_00007FF78F3D6868 | |
Source: |
Code function: |
0_2_00007FF78F3E081C | |
Source: |
Code function: |
0_2_00007FF78F3CD818 | |
Source: |
Code function: |
0_2_00007FF78F39A834 | |
Source: |
Code function: |
0_2_00007FF78F3BBF20 | |
Source: |
Code function: |
0_2_00007FF78F39D7A0 | |
Source: |
Code function: |
0_2_00007FF78F3997A8 | |
Source: |
Code function: |
0_2_00007FF78F3CBFA8 | |
Source: |
Code function: |
0_2_00007FF78F390FC0 | |
Source: |
Code function: |
0_2_00007FF78F3CAFC8 | |
Source: |
Code function: |
0_2_00007FF78F3D2E7C | |
Source: |
Code function: |
0_2_00007FF78F38B690 | |
Source: |
Code function: |
0_2_00007FF78F38DEA8 | |
Source: |
Code function: |
0_2_00007FF78F39B6AC | |
Source: |
Code function: |
0_2_00007FF78F3BA6D4 | |
Source: |
Code function: |
0_2_00007FF78F3D5D54 | |
Source: |
Code function: |
0_2_00007FF78F3C5DE8 | |
Source: |
Code function: |
0_2_00007FF78F3CADC4 | |
Source: |
Code function: |
0_2_00007FF78F3BAC64 | |
Source: |
Code function: |
0_2_00007FF78F392448 | |
Source: |
Code function: |
0_2_00007FF78F3CDCDC | |
Source: |
Code function: |
0_2_00007FF78F3CB3D8 | |
Source: |
Code function: |
0_2_00007FF78F3CD414 | |
Source: |
Code function: |
0_2_00007FF78F3CABB8 | |
Source: |
Code function: |
0_2_00007FF78F3C8220 | |
Source: |
Code function: |
0_2_00007FF78F3A1218 | |
Source: |
Code function: |
0_2_00007FF78F3BAA38 | |
Source: |
Code function: |
0_2_00007FF78F3C62F4 | |
Source: |
Code function: |
0_2_00007FF78F3D61E8 | |
Source: |
Code function: |
0_2_00007FF78F399204 | |
Source: |
Code function: |
0_2_00007FF78F3CA9B4 | |
Source: |
Code function: |
0_2_00007FF78F3CB1D4 |
Source: |
Classification label: |
Source: |
Key opened: |
Jump to behavior |
Source: |
Virustotal: |
Source: |
String found in binary or memory: |
Source: |
Section loaded: |
Jump to behavior | ||
Source: |
Section loaded: |
Jump to behavior | ||
Source: |
Section loaded: |
Jump to behavior | ||
Source: |
Section loaded: |
Jump to behavior | ||
Source: |
Section loaded: |
Jump to behavior |
Source: |
Static PE information: |
Source: |
Static file information: |
Source: |
Static PE information: |
Source: |
Binary string: |
||
Source: |
Binary string: |
Data Obfuscation |
|
---|
Source: |
Unpacked PE file: |
Source: |
Static PE information: |
Source: |
Static PE information: |
Source: |
Static PE information: |
||
Source: |
Static PE information: |
||
Source: |
Static PE information: |
||
Source: |
Static PE information: |
||
Source: |
Static PE information: |
||
Source: |
Static PE information: |
||
Source: |
Static PE information: |
Source: |
Static PE information: |
Boot Survival |
|
---|
Source: |
Window searched: |
Jump to behavior | ||
Source: |
Window searched: |
Jump to behavior | ||
Source: |
Window searched: |
Jump to behavior | ||
Source: |
Window searched: |
Jump to behavior | ||
Source: |
Window searched: |
Jump to behavior |
Malware Analysis System Evasion |
|
---|
Source: |
Special instruction interceptor: |
Source: |
Registry key queried: |
Jump to behavior | ||
Source: |
Registry key queried: |
Jump to behavior | ||
Source: |
Registry key queried: |
Jump to behavior |
Source: |
API coverage: |
Source: |
System information queried: |
Jump to behavior |
Source: |
Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: |
System information queried: |
Jump to behavior |
Anti Debugging |
|
---|
Source: |
Open window title or class name: |
||
Source: |
Open window title or class name: |
||
Source: |
Open window title or class name: |
||
Source: |
Open window title or class name: |
||
Source: |
Open window title or class name: |
||
Source: |
Open window title or class name: |
Source: |
Process queried: |
Jump to behavior | ||
Source: |
Process queried: |
Jump to behavior | ||
Source: |
Process queried: |
Jump to behavior |
Source: |
Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: |
Code function: |
0_2_00007FF78F3D1160 |
HIPS / PFW / Operating System Protection Evasion |
|
---|
Source: |
NtQuerySystemInformation: |
Jump to behavior | ||
Source: |
NtQueryInformationProcess: |
Jump to behavior | ||
Source: |
NtQuerySystemInformation: |
Jump to behavior | ||
Source: |
NtQueryInformationProcess: |
Jump to behavior |