Score: | 68 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
AV Detection |
|
---|
Source: |
Avira: |
Source: |
Virustotal: |
Perma Link | ||
Source: |
ReversingLabs: |
Source: |
Joe Sandbox ML: |
Source: |
Avira: |
Compliance |
|
---|
Source: |
Static PE information: |
Source: |
File opened: |
Jump to behavior |
Source: |
Static PE information: |
System Summary |
|
---|
Source: |
Static PE information: |
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
Source: |
Code function: |
0_2_00007FFA35F308F2 | |
Source: |
Code function: |
0_2_00007FFA35F3000A |
Source: |
Virustotal: |
||
Source: |
ReversingLabs: |
Source: |
Static PE information: |
Source: |
Key opened: |
Jump to behavior |
Source: |
Section loaded: |
Jump to behavior | ||
Source: |
Section loaded: |
Jump to behavior | ||
Source: |
Section loaded: |
Jump to behavior |
Source: |
Process created: |
||
Source: |
Process created: |
Source: |
Mutant created: |
Source: |
File created: |
Jump to behavior |
Source: |
Classification label: |
Source: |
Cryptographic APIs: |
||
Source: |
Cryptographic APIs: |
||
Source: |
Cryptographic APIs: |
Source: |
Static PE information: |
Source: |
File opened: |
Jump to behavior |
Source: |
Static PE information: |
Data Obfuscation |
|
---|
Source: |
.Net Code: |
||
Source: |
.Net Code: |
||
Source: |
.Net Code: |
Source: |
Code function: |
0_2_00885E2C |
Source: |
High entropy of concatenated method names: |
||
Source: |
High entropy of concatenated method names: |
||
Source: |
High entropy of concatenated method names: |
||
Source: |
High entropy of concatenated method names: |
||
Source: |
High entropy of concatenated method names: |
||
Source: |
High entropy of concatenated method names: |
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior |
Malware Analysis System Evasion |
|
---|
Source: |
Thread sleep time: |
Jump to behavior |
Source: |
Last function: |
Source: |
Thread delayed: |
Jump to behavior |
Source: |
Thread delayed: |
Jump to behavior |
Source: |
Memory allocated: |
Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
|
---|
Source: |
Reference to suspicious API methods: |
||
Source: |
Reference to suspicious API methods: |
||
Source: |
Reference to suspicious API methods: |
||
Source: |
Reference to suspicious API methods: |
||
Source: |
Reference to suspicious API methods: |
||
Source: |
Reference to suspicious API methods: |