Windows
Analysis Report
hiYc6Vnppc.exe
Overview
General Information
Detection
Score: | 84 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- hiYc6Vnppc.exe (PID: 2328 cmdline:
"C:\Users\ user\Deskt op\hiYc6Vn ppc.exe" MD5: 0C84297632DFFE68994D744487849FD5) - WerFault.exe (PID: 5504 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 2 328 -s 412 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
- cleanup
{"C2 url": "http://dba692117be7b6d3480fe5220fdd58b38bf.xyz/API/Clipper/configure.php?cf6zrlhn=QWERTY", "Wallet": ["DPUnu15wbXcvTwEuQssdD48Q9iZUModBEG", "rh2nM92mFC5XfDXu9AcAUvzivX4ZQerLx4", "0xAC63c256f3F5F03d63F4F206F8E030232461e8d5", "Xaume5k7mVQqgDfJyTtysF721e6gvTkY7M", "TMSpq8DHdUeJ8KzVj8bnNuQKB6fEWYhR5i", "t1P9vxqf7nYQ4tHpo7TUfsXMpiQq14RMpC5", "GAGATITC6CREAQAVLZNORIHVBB4P6SXHTXPF7FYBR3VOSSUDVBT5TIV3", "qpm92rqxzejjn0ur9tl53gk87u7nlzw2zs6qz8djkn", "bc1q6sjafgxlmrxwdhh0v5zu58f48pvaqc04hvedl0", "0xAC63c256f3F5F03d63F4F206F8E030232461e8d5", "ltc1qn66m2mfk4txmgvz9lhm6q8ffetklqf2rak4qqc"]}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Allcomeclipbanker | Yara detected Allcome clipbanker | Joe Security | ||
JoeSecurity_Allcomeclipbanker | Yara detected Allcome clipbanker | Joe Security | ||
JoeSecurity_Allcomeclipbanker | Yara detected Allcome clipbanker | Joe Security | ||
JoeSecurity_Allcomeclipbanker | Yara detected Allcome clipbanker | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Allcomeclipbanker | Yara detected Allcome clipbanker | Joe Security | ||
JoeSecurity_Allcomeclipbanker | Yara detected Allcome clipbanker | Joe Security | ||
JoeSecurity_Allcomeclipbanker | Yara detected Allcome clipbanker | Joe Security | ||
JoeSecurity_Allcomeclipbanker | Yara detected Allcome clipbanker | Joe Security | ||
JoeSecurity_Allcomeclipbanker | Yara detected Allcome clipbanker | Joe Security | ||
Click to see the 1 entries |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Binary string: |
Source: | Code function: | 0_2_0040AF20 | |
Source: | Code function: | 0_2_0040AFFB | |
Source: | Code function: | 0_2_021975C8 | |
Source: | Code function: | 0_2_021976A4 |
Source: | String found in binary or memory: |
System Summary |
---|
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process created: |
Source: | Code function: | 0_2_0040E890 | |
Source: | Code function: | 0_2_00411D7C | |
Source: | Code function: | 0_2_0040ED28 | |
Source: | Code function: | 0_2_00406644 | |
Source: | Code function: | 0_2_00413682 | |
Source: | Code function: | 0_2_00411E9C | |
Source: | Code function: | 0_2_021B62D8 | |
Source: | Code function: | 0_2_021AC980 | |
Source: | Code function: | 0_2_021AB1D8 |
Source: | Code function: |
Source: | Code function: | 0_2_021BDB00 |
Source: | Code function: | 0_2_021B02C0 |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Virustotal: | ||
Source: | Metadefender: | ||
Source: | ReversingLabs: |
Source: | Key opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | ||
Source: | Process created: |
Source: | Mutant created: |
Source: | Code function: | 0_2_00401B30 |
Source: | File created: | Jump to behavior |
Source: | Classification label: |
Source: | Code function: | 0_2_02197878 |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | Static PE information: |
Source: | Binary string: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00451627 | |
Source: | Code function: | 0_2_0041D847 | |
Source: | Code function: | 0_2_0041D81B | |
Source: | Code function: | 0_2_0041C80F | |
Source: | Code function: | 0_2_0045100D | |
Source: | Code function: | 0_2_0041D823 | |
Source: | Code function: | 0_2_0041D82B | |
Source: | Code function: | 0_2_0041D833 | |
Source: | Code function: | 0_2_0041D83B | |
Source: | Code function: | 0_2_0041D843 | |
Source: | Code function: | 0_2_0041627D | |
Source: | Code function: | 0_2_0041DBDF | |
Source: | Code function: | 0_2_0041DBE7 | |
Source: | Code function: | 0_2_0041DBEB | |
Source: | Code function: | 0_2_00419D06 | |
Source: | Code function: | 0_2_0041BEA6 | |
Source: | Code function: | 0_2_0041D767 | |
Source: | Code function: | 0_2_0041D767 | |
Source: | Code function: | 0_2_0041D7CB | |
Source: | Code function: | 0_2_0041D753 | |
Source: | Code function: | 0_2_0041D7CF | |
Source: | Code function: | 0_2_0041D7E3 | |
Source: | Code function: | 0_2_0041D7EB | |
Source: | Code function: | 0_2_0041D7F3 | |
Source: | Code function: | 0_2_0041D7FB | |
Source: | Code function: | 0_2_0041D803 | |
Source: | Code function: | 0_2_021B6A1C | |
Source: | Code function: | 0_2_021ADA44 | |
Source: | Code function: | 0_2_0219D2B8 | |
Source: | Code function: | 0_2_021A72E0 | |
Source: | Code function: | 0_2_021A9AC8 |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | Code function: | 0_2_00401AE0 |
Source: | Code function: | 0_2_00401AE0 |
Source: | Code function: | 0_2_021C0A10 |
Source: | Code function: | 0_2_00401B30 |
Source: | Code function: | 0_2_0040AF20 | |
Source: | Code function: | 0_2_0040AFFB | |
Source: | Code function: | 0_2_021975C8 | |
Source: | Code function: | 0_2_021976A4 |
Source: | API call chain: | graph_0-21115 | ||
Source: | API call chain: | graph_0-21465 |
Source: | Code function: | 0_2_00407A6D | |
Source: | Code function: | 0_2_0040C39C |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 0_2_0040CE43 |
Source: | Code function: | 0_2_021C0A10 |
Source: | Code function: | 0_2_00401B30 |
Source: | Code function: | 0_2_004031C0 | |
Source: | Code function: | 0_2_0040305E | |
Source: | Code function: | 0_2_004058B3 | |
Source: | Code function: | 0_2_004034F4 |
Source: | Code function: | 0_2_02194CB8 |
Source: | Code function: | 0_2_00403314 |
Source: | Code function: | 0_2_021C030C |
Source: | Code function: | 0_2_0219D318 |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 1 Virtualization/Sandbox Evasion | OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | Exfiltration Over Other Network Medium | 1 Encrypted Channel | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 2 Software Packing | LSASS Memory | 14 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | 1 Process Injection | Security Account Manager | 1 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | 1 Deobfuscate/Decode Files or Information | NTDS | 1 File and Directory Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | 3 Obfuscated Files or Information | LSA Secrets | 25 System Information Discovery | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
Replication Through Removable Media | Launchd | Rc.common | Rc.common | Steganography | Cached Domain Credentials | 1 Remote System Discovery | VNC | GUI Input Capture | Exfiltration Over C2 Channel | Multiband Communication | Jamming or Denial of Service | Abuse Accessibility Features |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
66% | Virustotal | Browse | ||
24% | Metadefender | Browse | ||
79% | ReversingLabs | Win32.Trojan.AgentTesla | ||
100% | Avira | TR/Crypt.Agent.lshmn | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link | Download |
---|---|---|---|---|---|
100% | Avira | HEUR/AGEN.1230732 | Download File | ||
100% | Avira | HEUR/AGEN.1215503 | Download File | ||
100% | Avira | HEUR/AGEN.1215824 | Download File | ||
100% | Avira | HEUR/AGEN.1215824 | Download File | ||
100% | Avira | HEUR/AGEN.1215824 | Download File |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high |
Joe Sandbox Version: | 34.0.0 Boulder Opal |
Analysis ID: | 582342 |
Start date: | 03.03.2022 |
Start time: | 12:30:57 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 6m 57s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | hiYc6Vnppc.exe |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 9 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal84.troj.evad.winEXE@2/4@0/0 |
EGA Information: |
|
HDC Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WerFault.exe, WMIADAP.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 104.208.16.94
- Excluded domains from analysis (whitelisted): blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, watson.telemetry.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
- Not all processes where analyzed, report is missing behavior information
Time | Type | Description |
---|---|---|
12:32:07 | API Interceptor | |
12:32:27 | API Interceptor |
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_hiYc6Vnppc.exe_b0d78236e65c5dc4ede9cda029eafd3eac4aca1b_983f6238_15bdd112\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.7760010118857009 |
Encrypted: | false |
SSDEEP: | 96:rDOVgFw5fCPn2Y0Lh457df0pXIQcQvc6QcEDMcw3Dj+HbHg/8BRTf3+kEJ8ImOyZ:ygUfin2YcHBUZMXAjcK/u7s0S274ItU |
MD5: | 55B1BA3A1951AC21064E16CEA531C3BA |
SHA1: | C5675C7FA6613D25DDFA61B520DEED700FE558B1 |
SHA-256: | 865E8AE2EFF8EA9370444CF2502612D21CD1DE3F7820FC2D78C0E423DC95ED58 |
SHA-512: | 0CF1ADBBF9378850364800A216118414EF353CAC664EB832D7AD3BDA7A005EB12AF01430D4EB71937B39F4DBD59B2E323E0EAA8864D0802FD3512640E94D1347 |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 35934 |
Entropy (8bit): | 2.215766478248911 |
Encrypted: | false |
SSDEEP: | 192:jC6WuIqHPK+Ont31TEVhxJI5ioY3zfmg8lI026Vz5Xo:WsHPontOPI5ioY3zfi268 |
MD5: | F5F39E7A4458705EF353DEB1C3B09D28 |
SHA1: | 31D40F28955A8B9A2C8C6B31F88B376CFC985118 |
SHA-256: | 1310D916175463DBACBE1936CA3EBE5B7D2CD2B7A679DD86DE815216493D66DE |
SHA-512: | 10E02009E131679FCEF78CAB966ADCB9E3EE1CA2D0A703E320F99BC54D9257102E3D30A184E80869B5101E15FD5F014E760034BAEB6AAB1B874BD680A8BC5F05 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8308 |
Entropy (8bit): | 3.698099255745368 |
Encrypted: | false |
SSDEEP: | 192:Rrl7r3GLNikV63Nd6YF9SUWh98ygmf3SXCprk89bKJsfzOm:RrlsNi+63Nd6Y/SUu95gmf3SuKifz |
MD5: | A5CBE426612154DC627AE7D4F0017BA8 |
SHA1: | FB4EDBA3147A0BEF9CAB96AFACF53A3A4EF0BC85 |
SHA-256: | A03FF1E7825FA9B08D9A6F8D317437C82140126B35BAB67381CFE564CCDBCA33 |
SHA-512: | 5CBE3E2A4AB2689FABF1139320C305702E72D471C6F77B6E76C8B7C0AC7495E859886360C5983B6305A4300D5B014EF65495B77F1A350BAD99A9927202071936 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4567 |
Entropy (8bit): | 4.460796257662251 |
Encrypted: | false |
SSDEEP: | 48:cvIwSD8zsdJgtWI9hdWSC8Bf8fm8M4JUjUjjFt+q8/eL6EKUTUed:uITf3qsSNGJUjMDkeG9UTUed |
MD5: | 84EC38FA42AA82A272A948D87B5660C9 |
SHA1: | 179B1E14AE382682B1D19E2221D05A6AD7D59BA9 |
SHA-256: | BCC3246440F255AE153315BBA2F3A959467086DB83E010553F3B728B7AF8EE08 |
SHA-512: | 073C9E13486A1E51CBE1B2770E72B2E07D70ABD0FD96FB4DA95FC29D4C433E5CF33854180ED827707B7259E16FC9DD7559E96E4EB046076C0118F541A1C292EF |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.915215782683756 |
TrID: |
|
File name: | hiYc6Vnppc.exe |
File size: | 524288 |
MD5: | 0c84297632dffe68994d744487849fd5 |
SHA1: | e91fc4c3a570950f7cebb691b75ba57990f0ee74 |
SHA256: | 6ccf16f1d1a495de9f5e7c1b60dd09da612ba2355887ebeb56cc1cacb5d64a5e |
SHA512: | 4add0048a025a90bd8ffdc9fa0b1762062e0ea61bceefb365e7d0f9a9539174cf7fc432cef303c01d5c4777a9c4e60ff31381845848bea2ed535c19fbf74813f |
SSDEEP: | 12288:dHDdD5BW/rGC9AqcrNNgqGK/lGRgOUqmq9kR6lhKXXCw0NWbWEyq7:dzU/rTAeqGK/cRgOnmq9g6qC/nq7 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d.-...~...~...~.n.....~.n.. ..~.n.....~.r.....~.r.....~.n.....~...~...~.r.....~Yr.....~YrX~...~Yr.....~Rich...~............... |
Icon Hash: | a259dbcda5e8da25 |
Entrypoint: | 0x401000 |
Entrypoint Section: | |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED |
DLL Characteristics: | TERMINAL_SERVER_AWARE, NX_COMPAT |
Time Stamp: | 0x6207A556 [Sat Feb 12 12:17:26 2022 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | cd8b760cb83f38644768621cc3945d49 |
Instruction |
---|
push 00451001h |
call 00007FBC44BE09B6h |
ret |
ret |
sub byte ptr [EF21h], bl |
scasb |
minps xmm7, dqword ptr [edi-6Fh] |
pop ebx |
mov dl, 11h |
mov eax, dword ptr [CCB3DF7Ah] |
xlatb |
out 1Ah, al |
pop ds |
mov ebp, ecx |
push esi |
in eax, dx |
fsub st(6), st(0) |
dec esi |
test dword ptr [eax-5C54306Eh], C2E72840h |
push esi |
mov esi, 9E13ED28h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x51c4c | 0xd8 | .data |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x1e000 | 0x306fd | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x1abdc | 0x1c | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x100000 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
0x1000 | 0x14000 | 0xac00 | False | 1.00047692587 | data | 7.99567995228 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ | |
0x15000 | 0x7000 | 0x3600 | False | 1.00079571759 | data | 7.98696648963 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ | |
0x1c000 | 0x2000 | 0xa00 | False | 1.004296875 | data | 7.92802135641 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ | |
.rsrc | 0x1e000 | 0x31000 | 0x15a00 | False | 0.998780708092 | data | 7.99660500201 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
0x4f000 | 0x2000 | 0x0 | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ | |
.data | 0x51000 | 0x5c000 | 0x5b600 | False | 0.967798820109 | data | 7.86896555158 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.adata | 0xad000 | 0x1000 | 0x0 | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
RT_ICON | 0x51eb8 | 0x12428 | data | ||
RT_RCDATA | 0x3056c | 0x1e000 | data | Russian | Russia |
RT_GROUP_ICON | 0x51ea4 | 0x14 | data | ||
RT_MANIFEST | 0x51d24 | 0x17d | XML 1.0 document text | English | United States |
DLL | Import |
---|---|
kernel32.dll | GetProcAddress, GetModuleHandleA, LoadLibraryA |
user32.dll | GetCursorPos |
oleaut32.dll | VariantChangeTypeEx |
kernel32.dll | RaiseException |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
Russian | Russia | |
English | United States |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 12:32:00 |
Start date: | 03/03/2022 |
Path: | C:\Users\user\Desktop\hiYc6Vnppc.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 524288 bytes |
MD5 hash: | 0C84297632DFFE68994D744487849FD5 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Yara matches: |
|
Reputation: | low |
Target ID: | 3 |
Start time: | 12:32:20 |
Start date: | 03/03/2022 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1310000 |
File size: | 434592 bytes |
MD5 hash: | 9E2B8ACAD48ECCA55C0230D63623661B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Execution Graph
Execution Coverage: | 3.2% |
Dynamic/Decrypted Code Coverage: | 20.8% |
Signature Coverage: | 8.1% |
Total number of Nodes: | 408 |
Total number of Limit Nodes: | 35 |
Graph
Function 02194CB8 Relevance: 28.2, APIs: 13, Strings: 3, Instructions: 151registrystringlibraryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00401B30 Relevance: 24.6, APIs: 11, Strings: 3, Instructions: 126sleepthreadCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00401AE0 Relevance: 10.5, APIs: 4, Strings: 2, Instructions: 24sleepCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004031C0 Relevance: 1.5, APIs: 1, Instructions: 3COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 021975C8 Relevance: .0, Instructions: 37COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0219AF84 Relevance: 6.1, APIs: 4, Instructions: 64threadCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00407626 Relevance: 4.6, APIs: 3, Instructions: 102COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040BF10 Relevance: 4.6, APIs: 3, Instructions: 68COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0045145C Relevance: 3.9, APIs: 3, Instructions: 116memoryCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004075D3 Relevance: 3.0, APIs: 2, Instructions: 33COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0045144F Relevance: 2.6, APIs: 2, Instructions: 82memoryCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0045148F Relevance: 2.6, APIs: 2, Instructions: 67memoryCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004514EA Relevance: 2.6, APIs: 2, Instructions: 53memoryCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0219141C Relevance: 2.5, APIs: 2, Instructions: 37memoryCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040C3CD Relevance: 1.6, APIs: 1, Instructions: 52COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00408DBE Relevance: 1.5, APIs: 1, Instructions: 39memoryCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00411F93 Relevance: 1.5, APIs: 1, Instructions: 36COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00409870 Relevance: 1.5, APIs: 1, Instructions: 32memoryCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00402900 Relevance: 1.5, APIs: 1, Instructions: 22COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 021915B0 Relevance: 1.3, APIs: 1, Instructions: 54memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 02191644 Relevance: 1.3, APIs: 1, Instructions: 48COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 021BCC20 Relevance: 1.3, APIs: 1, Instructions: 15memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 021BCC40 Relevance: 1.3, APIs: 1, Instructions: 8COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040ED28 Relevance: 10.2, APIs: 1, Strings: 4, Instructions: 1427COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040AFFB Relevance: 3.1, APIs: 2, Instructions: 99COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 021976A4 Relevance: 3.0, APIs: 2, Instructions: 33fileCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040AF20 Relevance: 1.6, APIs: 1, Instructions: 140COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 02197878 Relevance: 1.5, APIs: 1, Instructions: 49COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 021B62D8 Relevance: 1.4, Strings: 1, Instructions: 155COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00403314 Relevance: 1.4, Strings: 1, Instructions: 144COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040CE43 Relevance: 1.3, APIs: 1, Instructions: 5memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 021AC980 Relevance: .3, Instructions: 258COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 021AB1D8 Relevance: .2, Instructions: 209COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00411E9C Relevance: .1, Instructions: 104COMMONLIBRARYCODE
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00411D7C Relevance: .1, Instructions: 81COMMONLIBRARYCODE
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040C39C Relevance: .0, Instructions: 22COMMONLIBRARYCODE
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 021C0A10 Relevance: .0, Instructions: 2COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 021BDBEC Relevance: 38.7, APIs: 18, Strings: 4, Instructions: 164windowregistryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 021BD88C Relevance: 22.9, APIs: 8, Strings: 5, Instructions: 172windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004048DB Relevance: 16.1, APIs: 4, Strings: 5, Instructions: 303COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004089C8 Relevance: 15.1, APIs: 10, Instructions: 69COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0219B03C Relevance: 12.5, APIs: 1, Strings: 6, Instructions: 201threadCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040BF94 Relevance: 12.2, APIs: 8, Instructions: 203COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 02194B10 Relevance: 12.1, APIs: 5, Strings: 3, Instructions: 127stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 021A69D8 Relevance: 10.7, APIs: 3, Strings: 3, Instructions: 181fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00404684 Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 168COMMONLIBRARYCODE
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 021ADBEC Relevance: 8.9, APIs: 3, Strings: 2, Instructions: 117libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00408EBD Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 80COMMONLIBRARYCODE
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00407AF2 Relevance: 8.8, APIs: 2, Strings: 3, Instructions: 31libraryloaderCOMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00410B74 Relevance: 7.7, APIs: 5, Instructions: 199COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 021919C8 Relevance: 7.6, APIs: 5, Instructions: 62COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 02199F68 Relevance: 7.1, APIs: 1, Strings: 3, Instructions: 143threadCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 021B270C Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 108fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00405612 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 64COMMONLIBRARYCODE
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 021C0A14 Relevance: 6.2, APIs: 4, Instructions: 207threadCOMMON
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040AC45 Relevance: 6.1, APIs: 4, Instructions: 86COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 02199EB8 Relevance: 6.0, APIs: 4, Instructions: 50threadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004081DC Relevance: 6.0, APIs: 4, Instructions: 19COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00404C80 Relevance: 5.4, APIs: 1, Strings: 2, Instructions: 112COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 02198980 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 74threadCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004090C3 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 22memoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |