Analysis Report acrotray.exe
Overview
General Information
Detection
Score: | 3 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
No yara matches |
---|
Sigma Overview |
---|
No Sigma rule has matched |
---|
Signature Overview |
---|
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Code function: | 0_2_015FE3FF | |
Source: | Code function: | 0_2_015E3B85 | |
Source: | Code function: | 0_2_015F2D90 | |
Source: | Code function: | 0_2_013205D0 | |
Source: | Code function: | 0_2_0160DF51 | |
Source: | Code function: | 0_2_0160F783 | |
Source: | Code function: | 0_2_0160F663 | |
Source: | Code function: | 0_2_015E9EBF |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_015CD6ED |
Source: | API coverage: |
Source: | Code function: | 0_2_015E60A1 |
Source: | Code function: | 0_2_014715D0 |
Source: | Code function: | 0_2_015FD2FF | |
Source: | Code function: | 0_2_01606564 | |
Source: | Code function: | 0_2_016065A8 |
Source: | Code function: | 0_2_015E60A1 | |
Source: | Code function: | 0_2_015CCD44 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: | 0_2_0160194D | |
Source: | Code function: | 0_2_0160B3FF | |
Source: | Code function: | 0_2_0160BBA6 | |
Source: | Code function: | 0_2_0160BD7B | |
Source: | Code function: | 0_2_01601F06 | |
Source: | Code function: | 0_2_0160B78D | |
Source: | Code function: | 0_2_0160B6F2 | |
Source: | Code function: | 0_2_0160B6A7 |
Source: | Code function: | 0_2_015E13B2 |
Source: | Code function: | 0_2_01606102 |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | Process Injection1 | Process Injection1 | OS Credential Dumping | System Time Discovery2 | Remote Services | Archive Collected Data1 | Exfiltration Over Other Network Medium | Encrypted Channel1 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Obfuscated Files or Information1 | LSASS Memory | Security Software Discovery2 | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Process Discovery1 | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Binary Padding | NTDS | System Information Discovery12 | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse | ||
0% | Metadefender | Browse | ||
0% | ReversingLabs |
No Antivirus matches |
---|
No Antivirus matches |
---|
No Antivirus matches |
---|
No Antivirus matches |
---|
No contacted domains info |
---|
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high |
No contacted IP infos |
---|
General Information |
---|
Joe Sandbox Version: | 32.0.0 Black Diamond |
Analysis ID: | 416537 |
Start date: | 18.05.2021 |
Start time: | 17:24:01 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 5m 25s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | acrotray.exe |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 14 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean3.winEXE@1/0@0/0 |
EGA Information: |
|
HDC Information: | Failed |
HCA Information: | Failed |
Cookbook Comments: |
|
Time | Type | Description |
---|---|---|
17:24:48 | API Interceptor |
No context |
---|
No context |
---|
No context |
---|
No context |
---|
No context |
---|
No created / dropped files found |
---|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 6.543918593540032 |
TrID: |
|
File name: | acrotray.exe |
File size: | 5237432 |
MD5: | 0efd56703e827aa5a659757894edba29 |
SHA1: | 961fc525a5f20787db5fd142142731f20b0aab89 |
SHA256: | ffec24790b71877c472fd59cb117935e894ea1de0ea1d9811a3d551e8339ddc5 |
SHA512: | 9fc352d50d696c06d6152d234602bdb258c38c09133c51dfbcbd2cc96a1b7fad24be224490aa04939aabcb0f4714a6d8056c43bc1b7b3f0e2839872877192604 |
SSDEEP: | 98304:7p1b6LZnQMQqwF6ozbwInnsAY25FzvMEL5Up8oOvuwg8KX:7Pb6LZn9gwE1jMfp8oOvuw8X |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............y.Z.y.Z.y.Z...[.y.Z...[.y.Z...[.y.Z...[.y.Z...[.x.Z.%.Z.y.Z...[.y.Z...[.y.Z...[.y.Z.y.Z.z.ZW..[oy.ZW..Z.y.Z.y{Z.y.ZW..[.y. |
File Icon |
---|
Icon Hash: | 52784ccccc6c7212 |
General | |
---|---|
Entrypoint: | 0x6bd6d0 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | 32BIT_MACHINE, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | GUARD_CF, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT |
Time Stamp: | 0x608804EF [Tue Apr 27 12:34:55 2021 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | fb9ac20eb92c6f6df3332aefc61ccf20 |
Signature Valid: | true |
Signature Issuer: | CN=DigiCert EV Code Signing CA (SHA2), OU=www.digicert.com, O=DigiCert Inc, C=US |
Signature Validation Error: | The operation completed successfully |
Error Number: | 0 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 1ED822CC08BA08413C4A60023E0D590C |
Thumbprint SHA-1: | 5DA6AD39FC524D0D2BEC6741DFDBF67DF5AF3ECA |
Thumbprint SHA-256: | B184F0677143FFA39C7DABF083FB0B613015CEA696DFDEBA11D5CAFD4CF8B8D8 |
Serial: | 011F39A2261A993DD15176DA6FE4FBEA |
Instruction |
---|
call 00007F7E18846C7Bh |
jmp 00007F7E1884668Dh |
mov ecx, dword ptr [ebp-0Ch] |
mov dword ptr fs:[00000000h], ecx |
pop ecx |
pop edi |
pop edi |
pop esi |
pop ebx |
mov esp, ebp |
pop ebp |
push ecx |
ret |
mov ecx, dword ptr [ebp-10h] |
xor ecx, ebp |
call 00007F7E188452DFh |
jmp 00007F7E188467F0h |
mov ecx, dword ptr [ebp-14h] |
xor ecx, ebp |
call 00007F7E188452CEh |
jmp 00007F7E188467DFh |
push eax |
push dword ptr fs:[00000000h] |
lea eax, dword ptr [esp+0Ch] |
sub esp, dword ptr [esp+0Ch] |
push ebx |
push esi |
push edi |
mov dword ptr [eax], ebp |
mov ebp, eax |
mov eax, dword ptr [008B4BE4h] |
xor eax, ebp |
push eax |
push dword ptr [ebp-04h] |
mov dword ptr [ebp-04h], FFFFFFFFh |
lea eax, dword ptr [ebp-0Ch] |
mov dword ptr fs:[00000000h], eax |
ret |
push eax |
push dword ptr fs:[00000000h] |
lea eax, dword ptr [esp+0Ch] |
sub esp, dword ptr [esp+0Ch] |
push ebx |
push esi |
push edi |
mov dword ptr [eax], ebp |
mov ebp, eax |
mov eax, dword ptr [008B4BE4h] |
xor eax, ebp |
push eax |
mov dword ptr [ebp-10h], eax |
push dword ptr [ebp-04h] |
mov dword ptr [ebp-04h], FFFFFFFFh |
lea eax, dword ptr [ebp-0Ch] |
mov dword ptr fs:[00000000h], eax |
ret |
push eax |
push dword ptr fs:[00000000h] |
lea eax, dword ptr [esp+0Ch] |
sub esp, dword ptr [esp+0Ch] |
push ebx |
push esi |
push edi |
mov dword ptr [eax], ebp |
mov ebp, eax |
mov eax, dword ptr [008B4BE4h] |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x4ae92c | 0x1b8 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x4c7000 | 0x2630 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x4fce00 | 0x1cb8 | .reloc |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x4ca000 | 0x3bd34 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x45d310 | 0x54 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x45d40c | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x45d368 | 0x40 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x35f000 | 0xb84 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x35d4ca | 0x35d600 | unknown | unknown | unknown | unknown | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
.rdata | 0x35f000 | 0x15398c | 0x153a00 | False | 0.296027471706 | data | 5.53628818198 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x4b3000 | 0x13324 | 0xd400 | False | 0.207068101415 | data | 5.08019243413 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.rsrc | 0x4c7000 | 0x2630 | 0x2800 | False | 0.2740234375 | data | 3.3791928479 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x4ca000 | 0x3bd34 | 0x3be00 | False | 0.482752152923 | data | 6.5955535729 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
RT_ICON | 0x4c7908 | 0x2e8 | data | English | United States |
RT_ICON | 0x4c7bf0 | 0x130 | data | English | United States |
RT_ICON | 0x4c7d20 | 0x128 | GLS_BINARY_LSB_FIRST | English | United States |
RT_ICON | 0x4c7e78 | 0x128 | GLS_BINARY_LSB_FIRST | English | United States |
RT_ICON | 0x4c7fb8 | 0x2e8 | data | English | United States |
RT_ICON | 0x4c82b8 | 0x2e8 | data | English | United States |
RT_ICON | 0x4c85b8 | 0x2e8 | data | English | United States |
RT_ICON | 0x4c88b8 | 0x2e8 | data | English | United States |
RT_MENU | 0x4c7540 | 0xec | data | English | United States |
RT_DIALOG | 0x4c7630 | 0x2d6 | data | English | United States |
RT_STRING | 0x4c8fa8 | 0x32 | data | English | United States |
RT_STRING | 0x4c8fe0 | 0x32 | data | English | United States |
RT_STRING | 0x4c9018 | 0xb6 | data | English | United States |
RT_STRING | 0x4c90d0 | 0xf6 | data | English | United States |
RT_STRING | 0x4c91c8 | 0x112 | data | English | United States |
RT_STRING | 0x4c92e0 | 0x50 | data | English | United States |
RT_GROUP_ICON | 0x4c7fa0 | 0x14 | data | English | United States |
RT_GROUP_ICON | 0x4c7e48 | 0x30 | data | English | United States |
RT_GROUP_ICON | 0x4c82a0 | 0x14 | data | English | United States |
RT_GROUP_ICON | 0x4c85a0 | 0x14 | data | English | United States |
RT_GROUP_ICON | 0x4c88a0 | 0x14 | data | English | United States |
RT_GROUP_ICON | 0x4c8ba0 | 0x14 | data | English | United States |
RT_VERSION | 0x4c8bb8 | 0x3ec | data | English | United States |
RT_MANIFEST | 0x4c9330 | 0x2fa | XML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators | English | United States |
DLL | Import |
---|---|
VERSION.dll | GetFileVersionInfoA, VerQueryValueA, GetFileVersionInfoSizeA |
WINHTTP.dll | WinHttpOpenRequest, WinHttpAddRequestHeaders, WinHttpSendRequest, WinHttpSetTimeouts, WinHttpReceiveResponse, WinHttpCrackUrl, WinHttpOpen, WinHttpCloseHandle, WinHttpConnect, WinHttpReadData, WinHttpQueryDataAvailable, WinHttpSetCredentials, WinHttpSetOption, WinHttpQueryHeaders, WinHttpGetProxyForUrl, WinHttpGetIEProxyConfigForCurrentUser, WinHttpQueryAuthSchemes |
WININET.dll | InternetSetOptionW |
KERNEL32.dll | GetFileInformationByHandle, GetFileType, PeekNamedPipe, GetTimeZoneInformation, HeapQueryInformation, GetCommandLineA, GetCommandLineW, VirtualAlloc, VirtualQuery, SetStdHandle, ExitProcess, GlobalFree, GlobalAlloc, GetShortPathNameW, GetFileAttributesA, GetUserDefaultLCID, FindResourceW, SizeofResource, LockResource, LoadResource, LoadLibraryA, GetSystemInfo, GetModuleFileNameA, HeapSize, HeapReAlloc, MulDiv, IsBadWritePtr, DecodePointer, FileTimeToSystemTime, LoadLibraryW, GetProcAddress, GetModuleHandleW, GetModuleHandleA, GetModuleFileNameW, GetDriveTypeW, MoveFileExW, FreeLibraryAndExitThread, ExitThread, CreateThread, InterlockedFlushSList, InterlockedPushEntrySList, RtlUnwind, GetProcessAffinityMask, OutputDebugStringW, FreeLibrary, LCMapStringW, GetCPInfo, GetStringTypeW, GetNativeSystemInfo, GetVersionExW, GetComputerNameExW, GetWindowsDirectoryW, GetSystemDirectoryW, CreateProcessW, GetCurrentProcess, DeviceIoControl, SetLastError, RaiseException, OutputDebugStringA, GetTimeFormatW, GetDateFormatW, GetLocalTime, SetFileAttributesW, GetFileAttributesW, FindClose, DeleteFileW, ReadDirectoryChangesW, WaitForMultipleObjects, CreateEventW, ResetEvent, SetEvent, GetOverlappedResult, FindNextFileW, FindFirstFileW, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, GetCurrentProcessId, GetCurrentThreadId, CreateMutexW, WaitForSingleObject, ReleaseMutex, GetProcessHeap, HeapFree, HeapAlloc, FormatMessageW, LocalFree, lstrcpyA, WideCharToMultiByte, GetTempPathW, GetFileSizeEx, MultiByteToWideChar, GetCurrentDirectoryW, SetCurrentDirectoryW, lstrlenW, GetTickCount, Sleep, OpenMutexW, SetNamedPipeHandleState, GetLastError, CloseHandle, WriteFile, ReadFile, GetVolumeInformationW, CreateFileW, GetStdHandle, IsValidLocale, EnumSystemLocalesW, GetConsoleCP, GetConsoleMode, SetFilePointerEx, ReadConsoleW, FindFirstFileExW, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, SetEnvironmentVariableW, WriteConsoleW, CreateTimerQueue, SignalObjectAndWait, GetThreadPriority, GetLogicalProcessorInformation, CreateTimerQueueTimer, UnregisterWaitEx, QueryDepthSList, InterlockedPopEntrySList, ReleaseSemaphore, VirtualFree, GetModuleHandleExW, QueueUserWorkItem, ChangeTimerQueueTimer, DeleteTimerQueueTimer, GetNumaHighestNodeNumber, FreeEnvironmentStringsW, GetThreadTimes, UnregisterWait, RegisterWaitForSingleObject, SetThreadAffinityMask, GlobalSize, GlobalLock, GlobalUnlock, CopyFileW, FlushFileBuffers, GetFileSize, GetFullPathNameW, LockFile, SetEndOfFile, SetFilePointer, UnlockFile, DuplicateHandle, LoadLibraryExW, lstrcmpiW, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GlobalReAlloc, GlobalHandle, LocalAlloc, LocalReAlloc, CompareStringW, lstrcmpA, GlobalGetAtomNameW, FileTimeToLocalFileTime, GetFileAttributesExW, GetFileTime, SystemTimeToTzSpecificLocalTime, SetThreadPriority, ResumeThread, GlobalAddAtomW, GlobalFlags, lstrcmpW, EncodePointer, GlobalDeleteAtom, GlobalFindAtomW, GetCurrentThread, GetLocaleInfoW, GetUserDefaultUILanguage, VirtualProtect, lstrcpyW, FindResourceExW, VerSetConditionMask, VerifyVersionInfoW, GetProfileIntW, SearchPathW, GetTempFileNameW, WaitForSingleObjectEx, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetSystemTimeAsFileTime, InitializeSListHead, TryEnterCriticalSection, QueryPerformanceFrequency, SwitchToThread |
USER32.dll | GetWindow, RealChildWindowFromPoint, SetFocus, SetScrollPos, GetScrollPos, GetDlgItem, CheckDlgButton, IsDialogMessageW, DrawTextExW, GrayStringW, TabbedTextOutW, GetWindowDC, FillRect, EnableMenuItem, SetMenuItemBitmaps, GetMenuCheckMarkDimensions, SetMenuItemInfoW, LoadBitmapW, GetMessagePos, GetMessageTime, CallWindowProcW, RegisterClassW, GetClassInfoW, IsMenu, IsChild, GetWindowPlacement, SetWindowPlacement, BeginDeferWindowPos, DeferWindowPos, EndDeferWindowPos, IsIconic, GetCapture, GetMenu, SetMenu, UpdateWindow, SetActiveWindow, RedrawWindow, ScrollWindow, SetScrollRange, GetScrollRange, ShowScrollBar, SetPropW, GetPropW, RemovePropW, MapWindowPoints, CopyRect, EqualRect, GetClassLongW, GetTopWindow, LoadIconW, SetScrollInfo, GetScrollInfo, WinHelpW, MonitorFromWindow, InflateRect, IntersectRect, GetMenuItemInfoW, CopyImage, SendDlgItemMessageA, SetRectEmpty, OffsetRect, CreateDialogIndirectParamW, EndDialog, GetNextDlgTabItem, MapDialogRect, ShowOwnedPopups, SetCursor, DeleteMenu, InvalidateRect, TrackMouseEvent, GetNextDlgGroupItem, SetCapture, ReleaseCapture, WindowFromPoint, DrawFocusRect, IsRectEmpty, DrawIconEx, GetIconInfo, SetWindowTextW, EnableScrollBar, HideCaret, InvertRect, NotifyWinEvent, CreatePopupMenu, GetMenuDefaultItem, MapVirtualKeyW, GetKeyNameTextW, SetLayeredWindowAttributes, EnumDisplayMonitors, OpenClipboard, CloseClipboard, AppendMenuW, GetDlgCtrlID, DrawStateW, SetWindowRgn, SetParent, DrawEdge, DrawFrameControl, IsZoomed, GetSystemMenu, BringWindowToTop, SetCursorPos, CopyIcon, FrameRect, DrawIcon, UnionRect, UpdateLayeredWindow, MonitorFromPoint, LoadAcceleratorsW, TranslateAcceleratorW, InsertMenuItemW, UnpackDDElParam, ReuseDDElParam, GetComboBoxInfo, PostThreadMessageW, WaitMessage, GetKeyboardLayout, IsCharLowerW, MapVirtualKeyExW, ToUnicodeEx, GetKeyboardState, CreateAcceleratorTableW, DestroyAcceleratorTable, CopyAcceleratorTableW, LockWindowUpdate, SetMenuDefaultItem, GetDoubleClickTime, ModifyMenuW, RegisterClipboardFormatW, CharUpperBuffW, IsClipboardFormatAvailable, GetUpdateRect, DrawMenuBar, DefFrameProcW, DefMDIChildProcW, TranslateMDISysAccel, SubtractRect, CreateMenu, GetWindowRgn, DestroyCursor, SetRect, GetMessageW, TranslateMessage, DispatchMessageW, DefWindowProcW, PostQuitMessage, RegisterClassExW, GetClassInfoExW, CreateWindowExW, DestroyWindow, SetWindowPos, EnableWindow, GetWindowRect, GetWindowLongW, SetWindowLongW, GetActiveWindow, MessageBoxW, SendMessageW, IsWindow, PtInRect, MessageBeep, FindWindowW, GetDesktopWindow, LoadCursorW, GetAncestor, GetSystemMetrics, MonitorFromRect, GetMonitorInfoW, LoadStringW, WaitForInputIdle, IsWindowVisible, CreateDialogParamW, SetDlgItemTextW, SendDlgItemMessageW, SetTimer, KillTimer, LoadMenuW, DestroyMenu, CheckMenuItem, GetSubMenu, TrackPopupMenu, DrawTextW, GetForegroundWindow, SetForegroundWindow, BeginPaint, EndPaint, GetCursorPos, ClientToScreen, GetFocus, DestroyIcon, CallNextHookEx, SetWindowsHookExW, ValidateRect, GetKeyState, PeekMessageW, GetWindowTextLengthW, GetWindowTextW, GetSysColorBrush, GetLastActivePopup, GetWindowThreadProcessId, IsWindowEnabled, UnhookWindowsHookEx, CharUpperW, EmptyClipboard, InsertMenuW, PostMessageW, GetClientRect, AdjustWindowRectEx, ShowWindow, GetMenuItemCount, GetMenuItemID, GetMenuState, GetMenuStringW, RemoveMenu, ReleaseDC, GetDC, GetAsyncKeyState, SetClipboardData, ScreenToClient, GetSysColor, SetClassLongW, GetParent, EnumThreadWindows, SystemParametersInfoW, FindWindowExW, MoveWindow, RegisterWindowMessageW, LoadImageW, GetClassNameW |
GDI32.dll | RestoreDC, SaveDC, SelectClipRgn, ExtSelectClipRgn, SelectPalette, SetBkMode, SetMapMode, SetLayout, GetLayout, SetPolyFillMode, SetROP2, SetTextAlign, RectVisible, GetObjectW, MoveToEx, TextOutW, SetViewportExtEx, SetViewportOrgEx, SetWindowExtEx, SetWindowOrgEx, OffsetViewportOrgEx, OffsetWindowOrgEx, ScaleViewportExtEx, ScaleWindowExtEx, CombineRgn, CreateFontIndirectW, CreateRectRgnIndirect, PtVisible, PatBlt, SetRectRgn, DPtoLP, GetTextExtentPoint32W, GetTextMetricsW, EnumFontFamiliesExW, LineTo, IntersectClipRect, GetWindowExtEx, GetViewportExtEx, GetPixel, GetObjectType, GetClipBox, ExcludeClipRect, Escape, CreateSolidBrush, CreateRectRgn, CreatePatternBrush, CreatePen, CreateHatchBrush, CreateCompatibleDC, CreateBitmap, BitBlt, DeleteObject, DeleteDC, CreateDCW, GetTextFaceW, GetViewportOrgEx, GetWindowOrgEx, SetPixelV, SetPaletteEntries, ExtFloodFill, PtInRegion, GetBoundsRect, FrameRgn, FillRgn, RoundRect, OffsetRgn, GetRgnBox, Rectangle, LPtoDP, CreateRoundRectRgn, Polyline, Polygon, CreatePolygonRgn, GetTextColor, Ellipse, CreateEllipticRgn, SetDIBColorTable, CreateDIBSection, StretchBlt, CopyMetaFileW, GetTextCharsetInfo, EnumFontFamiliesW, CreateDIBitmap, CreateCompatibleBitmap, GetBkColor, RealizePalette, GetDeviceCaps, GetStockObject, SelectObject, SetBkColor, SetTextColor, ExtTextOutW, GetSystemPaletteEntries, GetPaletteEntries, GetNearestPaletteIndex, CreatePalette, SetPixel |
WINSPOOL.DRV | GetJobW, ClosePrinter, OpenPrinterW, DocumentPropertiesW |
ADVAPI32.dll | CredWriteW, RegSetValueExW, RegQueryValueExW, RegOpenKeyExW, RegCreateKeyExW, RegEnumKeyExW, CredReadW, CredEnumerateW, CredDeleteW, CredFree, GetUserNameW, RegDeleteKeyExW, RegEnumValueW, RegFlushKey, RegOpenKeyW, RegOpenKeyExA, RegQueryValueExA, RegDeleteValueW, RegNotifyChangeKeyValue, RegCreateKeyA, RegCreateKeyW, RegDeleteKeyW, RegOpenKeyA, RegQueryValueW, RegDeleteKeyA, RegSetValueExA, RegCloseKey |
SHELL32.dll | DragQueryFileW, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetPathFromIDListW, SHGetFileInfoW, SHGetKnownFolderPath, ShellExecuteW, Shell_NotifyIconW, SHBrowseForFolderW, SHAppBarMessage, DragFinish, SHCreateDirectoryExW |
ole32.dll | OleGetClipboard, CoLockObjectExternal, RegisterDragDrop, RevokeDragDrop, OleCreateMenuDescriptor, OleDestroyMenuDescriptor, OleTranslateAccelerator, IsAccelerator, OleSetContainedObject, OleLockRunning, OleInitialize, OleUninitialize, DoDragDrop, CreateStreamOnHGlobal, CoInitializeEx, CoInitialize, CoUninitialize, CoCreateInstance, CoDisconnectObject, ReleaseStgMedium, OleDuplicateData, OleCreate, CoTaskMemAlloc, CoTaskMemFree, CoCreateGuid |
OLEAUT32.dll | VariantClear, VariantInit, SafeArrayAccessData, SafeArrayGetLBound, SafeArrayGetUBound, SysStringLen, SysFreeString, SysAllocStringLen, LoadTypeLib, SystemTimeToVariantTime, VariantTimeToSystemTime, SysAllocString, VariantCopy, VarBstrFromDate, VariantChangeType |
MSIMG32.dll | TransparentBlt, AlphaBlend |
SHLWAPI.dll | UrlEscapeW, PathAddExtensionW, PathAppendW, PathFindFileNameW, PathIsDirectoryW, PathIsFileSpecW, PathRemoveExtensionW, PathRemoveFileSpecW, PathRenameExtensionW, UrlCanonicalizeW, PathIsUNCW, PathStripToRootW, PathFindExtensionW, StrFormatKBSizeW, PathFileExistsW |
UxTheme.dll | GetThemeSysColor, IsThemeBackgroundPartiallyTransparent, IsAppThemed, GetWindowTheme, DrawThemeText, DrawThemeParentBackground, OpenThemeData, CloseThemeData, DrawThemeBackground, GetThemeColor, GetCurrentThemeName, GetThemePartSize |
bcrypt.dll | BCryptDestroyKey, BCryptEncrypt, BCryptGenerateSymmetricKey, BCryptSetProperty, BCryptDestroyHash, BCryptCloseAlgorithmProvider, BCryptFinishHash, BCryptHashData, BCryptCreateHash, BCryptVerifySignature, BCryptGetProperty, BCryptOpenAlgorithmProvider, BCryptDecrypt |
CRYPT32.dll | CertFindCertificateInStore, CertCloseStore, CertOpenStore, CryptImportPublicKeyInfoEx2, CryptHashCertificate2, CertCreateCertificateContext, CertVerifySubjectCertificateContext, CertFreeCertificateContext, CryptUnprotectData, CryptProtectData, CryptStringToBinaryW, CertAddCertificateContextToStore |
Secur32.dll | GetUserNameExW |
gdiplus.dll | GdipCreateFromHDC, GdipCreateBitmapFromHBITMAP, GdipDrawImageI, GdipDeleteGraphics, GdipBitmapUnlockBits, GdipBitmapLockBits, GdipCreateBitmapFromScan0, GdipCreateBitmapFromStream, GdipGetImagePaletteSize, GdipGetImagePalette, GdipGetImagePixelFormat, GdipGetImageHeight, GdipGetImageWidth, GdipGetImageGraphicsContext, GdipDisposeImage, GdipCloneImage, GdiplusStartup, GdipFree, GdipAlloc, GdiplusShutdown, GdipDrawImageRectI, GdipSetInterpolationMode |
OLEACC.dll | LresultFromObject, AccessibleObjectFromWindow, CreateStdAccessibleObject |
IMM32.dll | ImmReleaseContext, ImmGetOpenStatus, ImmGetContext |
WINMM.dll | PlaySoundW |
Description | Data |
---|---|
LegalCopyright | Copyright Adobe Systems Inc. 1992-2021 |
InternalName | AcroTray |
FileVersion | 21.1.20155.433178 |
CompanyName | Adobe Systems Inc. |
PrivateBuild | |
LegalTrademarks | |
Comments | |
ProductName | AcroTray - Adobe Acrobat Distiller helper application. |
SpecialBuild | |
ProductVersion | 21.1.20155.433178 |
FileDescription | AcroTray |
OriginalFilename | AcroTray.exe |
Translation | 0x0409 0x04b0 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Network Behavior |
---|
No network behavior found |
---|
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
High Level Behavior Distribution |
---|
back
Click to dive into process behavior distribution
System Behavior |
---|
Start time: | 17:24:47 |
Start date: | 18/05/2021 |
Path: | C:\Users\user\Desktop\acrotray.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1310000 |
File size: | 5237432 bytes |
MD5 hash: | 0EFD56703E827AA5A659757894EDBA29 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
LPC Port Activities
Disassembly |
---|
Code Analysis |
---|
Execution Graph |
---|
Execution Coverage
Dynamic/Packed Code Coverage
Signature Coverage
Execution Coverage: | 3.6% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 2% |
Total number of Nodes: | 1523 |
Total number of Limit Nodes: | 21 |
Graph
Executed Functions |
---|
Control-flow Graph |
---|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph |
---|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Non-executed Functions |
---|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |