Windows
Analysis Report
mTGDPqzxwu.exe
Overview
General Information
Sample name: | mTGDPqzxwu.exerenamed because original name is a hash value |
Original sample name: | fe4452262e67ec54bb64bc76b303b5b4.exe |
Analysis ID: | 1520460 |
MD5: | fe4452262e67ec54bb64bc76b303b5b4 |
SHA1: | 2c0bdc07a45c65a736cd848b74c702f70a1c9bde |
SHA256: | 5d1ec27eb711dbafffe07dc8debb180abd22c3ebb0104a5c393252be6f65c5c0 |
Tags: | exeuser-abuse_ch |
Infos: | |
Detection
Score: | 72 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- mTGDPqzxwu.exe (PID: 6028 cmdline:
"C:\Users\ user\Deskt op\mTGDPqz xwu.exe" MD5: FE4452262E67EC54BB64BC76B303B5B4)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Trojan_CobaltStrike_f0b627fc | Rule for beacon reflective loader | unknown |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Trojan_CobaltStrike_f0b627fc | Rule for beacon reflective loader | unknown |
| |
Windows_Trojan_CobaltStrike_f0b627fc | Rule for beacon reflective loader | unknown |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Trojan_CobaltStrike_f0b627fc | Rule for beacon reflective loader | unknown |
| |
Windows_Trojan_CobaltStrike_f0b627fc | Rule for beacon reflective loader | unknown |
| |
Windows_Trojan_CobaltStrike_f0b627fc | Rule for beacon reflective loader | unknown |
| |
Windows_Trojan_CobaltStrike_f0b627fc | Rule for beacon reflective loader | unknown |
|
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Code function: | 0_2_006F71E0 | |
Source: | Code function: | 0_2_006F7180 | |
Source: | Code function: | 0_2_006F7240 | |
Source: | Code function: | 0_2_006CF49C | |
Source: | Code function: | 0_2_006CD730 | |
Source: | Code function: | 0_2_006CD7F0 | |
Source: | Code function: | 0_2_006F5860 | |
Source: | Code function: | 0_2_006F58E0 | |
Source: | Code function: | 0_2_006F58C0 | |
Source: | Code function: | 0_2_006CD8A0 | |
Source: | Code function: | 0_2_006F0940 | |
Source: | Code function: | 0_2_006F5D10 | |
Source: | Code function: | 0_2_006F0E10 | |
Source: | Code function: | 0_2_006CEF40 | |
Source: | Code function: | 0_2_006F7FA0 |
Source: | Code function: | 0_2_006AD8A0 | |
Source: | Binary or memory string: |
Source: | Code function: | 0_2_006E2B00 |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | DNS traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | Code function: | 0_2_006910C0 |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Code function: | 0_2_0068DB70 |
Source: | Code function: | 0_2_0068DB70 |
Source: | Code function: | 0_2_006F5D10 |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_006868F0 |
Source: | Code function: | 0_2_00685CE0 |
Source: | Code function: | 0_2_006F1010 | |
Source: | Code function: | 0_2_006C91E0 | |
Source: | Code function: | 0_2_006EB240 | |
Source: | Code function: | 0_2_006C02B0 | |
Source: | Code function: | 0_2_006D1320 | |
Source: | Code function: | 0_2_006A5300 | |
Source: | Code function: | 0_2_006D43E0 | |
Source: | Code function: | 0_2_006CC420 | |
Source: | Code function: | 0_2_006E6410 | |
Source: | Code function: | 0_2_006CF49C | |
Source: | Code function: | 0_2_006DE500 | |
Source: | Code function: | 0_2_006F3510 | |
Source: | Code function: | 0_2_006866C0 | |
Source: | Code function: | 0_2_00686720 | |
Source: | Code function: | 0_2_00698710 | |
Source: | Code function: | 0_2_006B1A30 | |
Source: | Code function: | 0_2_006CAAE0 | |
Source: | Code function: | 0_2_006EFB00 | |
Source: | Code function: | 0_2_00683E70 | |
Source: | Code function: | 0_2_006C9E20 | |
Source: | Code function: | 0_2_006DEEF0 | |
Source: | Code function: | 0_2_006F7F50 | |
Source: | Code function: | 0_2_006E3F90 | |
Source: | Code function: | 0_2_006E9F90 |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Binary string: |
Source: | Classification label: |
Source: | Code function: | 0_2_00685CE0 |
Source: | Code function: | 0_2_00685030 |
Source: | Code function: | 0_2_00687050 |
Source: | Code function: | 0_2_00685CE0 |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_006B9100 |
Source: | Code function: | 0_2_0069D1E9 |
Source: | Code function: | 0_2_0068AA10 |
Source: | Code function: | 0_2_00685CE0 |
Source: | Code function: | 0_2_00687B80 |
Source: | Code function: | 0_2_00681620 |
Source: | Code function: | 0_2_006867F0 |
Source: | Code function: | 0_2_00691D70 |
Source: | Code function: | 0_2_0069D37B |
Source: | Code function: | 0_2_006B9100 |
Source: | Code function: | 0_2_0069D37B | |
Source: | Code function: | 0_2_0069D50D | |
Source: | Code function: | 0_2_0069CC6C |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Code function: | 0_2_00685030 | |
Source: | Code function: | 0_2_00689AC0 | |
Source: | Code function: | 0_2_00689BC0 | |
Source: | Code function: | 0_2_00689D90 | |
Source: | Code function: | 0_2_00684E60 |
Source: | Code function: | 0_2_0069D5B6 |
Source: | Code function: | 0_2_0069D26D |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 2 Command and Scripting Interpreter | 12 Windows Service | 12 Windows Service | 1 Process Injection | OS Credential Dumping | 1 System Time Discovery | 1 Exploitation of Remote Services | 12 Archive Collected Data | 2 Encrypted Channel | Exfiltration Over Other Network Medium | 1 Data Encrypted for Impact |
Credentials | Domains | Default Accounts | 12 Service Execution | 1 DLL Side-Loading | 1 Process Injection | 1 Deobfuscate/Decode Files or Information | LSASS Memory | 1 Security Software Discovery | Remote Desktop Protocol | 2 Clipboard Data | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 1 Native API | Logon Script (Windows) | 1 DLL Side-Loading | 2 Obfuscated Files or Information | Security Account Manager | 11 Process Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | 1 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | 1 System Network Configuration Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | Steganography | Cached Domain Credentials | 13 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
42% | ReversingLabs | Win32.Infostealer.Tinba | ||
100% | Avira | TR/Hitbrovi.twnbc |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
206.23.85.13.in-addr.arpa | unknown | unknown | true | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1520460 |
Start date and time: | 2024-09-27 11:22:53 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 52s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 4 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | mTGDPqzxwu.exerenamed because original name is a hash value |
Original Sample Name: | fe4452262e67ec54bb64bc76b303b5b4.exe |
Detection: | MAL |
Classification: | mal72.evad.winEXE@1/0@1/0 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target mTGDPqzxwu.exe, PID 6028 because there are no executed function
- Report size exceeded maximum capacity and may have missing disassembly code.
- VT rate limit hit for: mTGDPqzxwu.exe
File type: | |
Entropy (8bit): | 6.652462911061133 |
TrID: |
|
File name: | mTGDPqzxwu.exe |
File size: | 5'087'232 bytes |
MD5: | fe4452262e67ec54bb64bc76b303b5b4 |
SHA1: | 2c0bdc07a45c65a736cd848b74c702f70a1c9bde |
SHA256: | 5d1ec27eb711dbafffe07dc8debb180abd22c3ebb0104a5c393252be6f65c5c0 |
SHA512: | e3f752d3cb18fd81ad085995fb3630e87b5da0f1e343f96e53d0e68f20eaacd13256a57fc56a8803a187a185b3a987ae8156b93e9285a84362e596c83c63e4ad |
SSDEEP: | 98304:HLsJDV9bD55mTEbek9rEdMQWlLYzjomp2vj6CwCV1hxT5MbkOO/glN4HuQlKn:a1BQyjYzjopaiHuQl+ |
TLSH: | 1736BE227490807AC66B0334991DB37E77BDA9740B3441D7ABD46E7D3CB04D2AA397A3 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............w...w...w...s...w..;....w..u....w.......w.......w.x.t...w.x.s...w.x.r...w...v.H.w.x.v...w.o.~...w.o.....w.......w.o.u...w |
Icon Hash: | 0e0f6acacc4c7113 |
Entrypoint: | 0x41c9b5 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x66F523B0 [Thu Sep 26 09:04:48 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 1 |
File Version Major: | 5 |
File Version Minor: | 1 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 1 |
Import Hash: | dab2b776c2b3a97f800f38a1b96c16fb |
Instruction |
---|
call 00007F75C45EE0C8h |
jmp 00007F75C45ED695h |
cmp ecx, dword ptr [00494014h] |
jne 00007F75C45ED815h |
ret |
jmp 00007F75C45EDADAh |
push ebp |
mov ebp, esp |
test byte ptr [ebp+08h], 00000001h |
push esi |
mov esi, ecx |
mov dword ptr [esi], 0047BAB4h |
je 00007F75C45ED81Ch |
push 0000000Ch |
push esi |
call 00007F75C45EDA89h |
pop ecx |
pop ecx |
mov eax, esi |
pop esi |
pop ebp |
retn 0004h |
push ebp |
mov ebp, esp |
mov eax, dword ptr [ebp+08h] |
push esi |
mov ecx, dword ptr [eax+3Ch] |
add ecx, eax |
movzx eax, word ptr [ecx+14h] |
lea edx, dword ptr [ecx+18h] |
add edx, eax |
movzx eax, word ptr [ecx+06h] |
imul esi, eax, 28h |
add esi, edx |
cmp edx, esi |
je 00007F75C45ED82Bh |
mov ecx, dword ptr [ebp+0Ch] |
cmp ecx, dword ptr [edx+0Ch] |
jc 00007F75C45ED81Ch |
mov eax, dword ptr [edx+08h] |
add eax, dword ptr [edx+0Ch] |
cmp ecx, eax |
jc 00007F75C45ED81Eh |
add edx, 28h |
cmp edx, esi |
jne 00007F75C45ED7FCh |
xor eax, eax |
pop esi |
pop ebp |
ret |
mov eax, edx |
jmp 00007F75C45ED80Bh |
call 00007F75C45EE530h |
test eax, eax |
jne 00007F75C45ED815h |
xor al, al |
ret |
mov eax, dword ptr fs:[00000018h] |
push esi |
mov esi, 00495374h |
mov edx, dword ptr [eax+04h] |
jmp 00007F75C45ED816h |
cmp edx, eax |
je 00007F75C45ED822h |
xor eax, eax |
mov ecx, edx |
lock cmpxchg dword ptr [esi], ecx |
test eax, eax |
jne 00007F75C45ED802h |
xor al, al |
pop esi |
ret |
mov al, 01h |
pop esi |
ret |
push ebp |
mov ebp, esp |
cmp dword ptr [ebp+08h], 00000000h |
jne 00007F75C45ED819h |
mov byte ptr [00495390h], 00000001h |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x90878 | 0x244 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x9a000 | 0x43f6a8 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x4da000 | 0x7034 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x8daf0 | 0x70 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x8dbbc | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x8db60 | 0x40 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x7b000 | 0xa4c | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x799ab | 0x79a00 | 461b8c87aef1cc4a9159e24d3aeddabb | False | 0.5302403166752312 | data | 6.488433839865328 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x7b000 | 0x1809a | 0x18200 | 4bf36ed2b8fad5674e754d8745d0511a | False | 0.37885565090673573 | data | 5.520388433299527 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x94000 | 0x4658 | 0x1400 | 09eba47acafa01f4fc363aeba0eb2bc3 | False | 0.410546875 | DOS executable (block device driver @\273\) | 5.835170282475183 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.tls | 0x99000 | 0x9 | 0x200 | 1f354d76203061bfdd5a53dae48d5435 | False | 0.033203125 | data | 0.020393135236084953 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x9a000 | 0x43f6a8 | 0x43f800 | 74eb8211427341e29ea6f9a29d5fbf08 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x4da000 | 0x7034 | 0x7200 | c0b314887efbe7d2425329a55b0324ba | False | 0.6990816885964912 | data | 6.706794313819381 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
AFX_DIALOG_LAYOUT | 0xb1de0 | 0x2 | data | Chinese | China | 5.0 |
DLL | 0xbb5d8 | 0x256e00 | PE32 executable (DLL) (GUI) Intel 80386, for MS Windows | Chinese | China | 0.564366340637207 |
DRV | 0xb23d8 | 0x9200 | PE32+ executable (native) x86-64, for MS Windows | Chinese | China | 0.504254066780822 |
G_GAMEE | 0x312548 | 0x3a00 | PE32 executable (console) Intel 80386, for MS Windows | Chinese | China | 0.5115167025862069 |
LONGPZ | 0xb1de8 | 0x5ea | ASCII text, with CRLF line terminators | Chinese | China | 0.4623513870541612 |
OLDDLL | 0x315f48 | 0x1c3400 | PE32 executable (DLL) (GUI) Intel 80386, for MS Windows | Chinese | China | 0.5643634796142578 |
RT_ICON | 0x9a630 | 0x130 | Device independent bitmap graphic, 32 x 64 x 1, image size 128 | Chinese | China | 0.5986842105263158 |
RT_ICON | 0x9a760 | 0x668 | Device independent bitmap graphic, 48 x 96 x 4, image size 1152 | Chinese | China | 0.4298780487804878 |
RT_ICON | 0x9adc8 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 512 | Chinese | China | 0.5228494623655914 |
RT_ICON | 0x9b0b0 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 128 | Chinese | China | 0.6047297297297297 |
RT_ICON | 0x9b1d8 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors | Chinese | China | 0.5770255863539445 |
RT_ICON | 0x9c080 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors | Chinese | China | 0.6620036101083032 |
RT_ICON | 0x9c928 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors | Chinese | China | 0.4436416184971098 |
RT_ICON | 0x9ce90 | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 67584 | Chinese | China | 0.15395421743759613 |
RT_ICON | 0xad6b8 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9600 | Chinese | China | 0.3053941908713693 |
RT_ICON | 0xafc60 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4224 | Chinese | China | 0.3700750469043152 |
RT_ICON | 0xb0d08 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | Chinese | China | 0.5141843971631206 |
RT_MENU | 0x3123d8 | 0x16c | data | Chinese | China | 0.45879120879120877 |
RT_DIALOG | 0xb1210 | 0x118 | data | Chinese | China | 0.625 |
RT_DIALOG | 0xb1328 | 0x7f8 | data | Chinese | China | 0.45245098039215687 |
RT_STRING | 0x4d9348 | 0x40 | data | Chinese | China | 0.671875 |
RT_GROUP_ICON | 0xb1170 | 0xa0 | data | Chinese | China | 0.625 |
RT_VERSION | 0xb1b20 | 0x2bc | data | Chinese | China | 0.4957142857142857 |
RT_MANIFEST | 0x4d9388 | 0x31c | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (736), with CRLF line terminators | English | United States | 0.5238693467336684 |
DLL | Import |
---|---|
mfc140u.dll | |
KERNEL32.dll | GetModuleHandleA, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, IsProcessorFeaturePresent, ResetEvent, WaitForSingleObjectEx, CreateEventW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetFileSize, GlobalUnlock, GlobalLock, GlobalSize, LoadLibraryW, GetCurrentDirectoryW, SetCurrentDirectoryW, GetProcAddress, GetModuleHandleW, GetCurrentProcessId, VirtualProtect, GetFileAttributesW, CreateDirectoryW, WritePrivateProfileStringW, CreateDirectoryA, CreateEventA, CreateFileMappingA, MapViewOfFile, CreateProcessA, CloseHandle, SetEvent, CreateWaitableTimerA, TerminateThread, CancelWaitableTimer, WideCharToMultiByte, GetTickCount, CreateToolhelp32Snapshot, SizeofResource, CreateThread, GetQueuedCompletionStatus, LeaveCriticalSection, PostQueuedCompletionStatus, GetFileSizeEx, VerifyVersionInfoW, VerSetConditionMask, PeekNamedPipe, GetFileType, GetStdHandle, GetEnvironmentVariableA, SleepEx, LoadLibraryA, FreeLibrary, GetSystemDirectoryA, GetCurrentThread, QueryPerformanceFrequency, MultiByteToWideChar, InitializeCriticalSectionEx, FormatMessageW, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, MoveFileExA, WaitForSingleObject, GetPrivateProfileIntW, WritePrivateProfileStringA, GetPrivateProfileIntA, GetPrivateProfileStringW, GetFileAttributesA, CreateMutexW, OutputDebugStringW, GetVolumeInformationA, CreateFileA, Sleep, DeviceIoControl, CreateFileW, GetTempPathA, GetLastError, GetSystemInfo, SetLastError, LockResource, LoadResource, FindResourceW, Process32FirstW, OpenFileMappingW, UnmapViewOfFile, Process32NextW, OpenProcess, VirtualQuery, TerminateProcess, InitializeCriticalSection, GetProcessTimes, FileTimeToSystemTime, SystemTimeToTzSpecificLocalTime, WaitForMultipleObjects, CreateIoCompletionPort, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, EnterCriticalSection, SetWaitableTimer, GetPrivateProfileStringA, ReadFile |
USER32.dll | SetWindowLongA, PeekMessageW, TranslateMessage, DispatchMessageW, MsgWaitForMultipleObjects, EnableWindow, LoadIconW, MessageBoxA, CallWindowProcW, LoadMenuW, GetSubMenu, GetCursorPos, PostMessageA, GetSystemMenu, AppendMenuW, GetClientRect, MessageBoxW, GetSystemMetrics, DrawIcon, GetWindowRect, GetParent, MoveWindow, UpdateWindow, GetWindow, GetDesktopWindow, GetWindowThreadProcessId, IsWindowVisible, GetWindowTextA, SendMessageA, GetWindowTextW, OpenClipboard, GetClipboardData, CloseClipboard, SendMessageW, IsIconic |
ADVAPI32.dll | RegCloseKey, RegQueryValueExW, OpenSCManagerA, OpenServiceA, CloseServiceHandle, CreateServiceA, StartServiceA, ControlService, DeleteService, RegQueryValueExA, RegOpenKeyExA, OpenThreadToken, CryptAcquireContextA, CryptReleaseContext, CryptGetHashParam, CryptCreateHash, CryptHashData, CryptDestroyHash, CryptDestroyKey, CryptImportKey, CryptEncrypt, RegOpenKeyExW |
SHELL32.dll | SHGetSpecialFolderPathA, SHGetFolderPathA, ShellExecuteW, SHFileOperationW, DragQueryFileA, SHGetSpecialFolderPathW |
COMCTL32.dll | InitCommonControlsEx |
SHLWAPI.dll | StrCmpW |
MSVCP140.dll | ?_Xbad_alloc@std@@YAXXZ, ?_Xout_of_range@std@@YAXPBD@Z, ?_Xlength_error@std@@YAXPBD@Z, ??0_Lockit@std@@QAE@H@Z, ??1_Lockit@std@@QAE@XZ, _Strcoll, _Strxfrm, ?_Init@locale@std@@CAPAV_Locimp@12@_N@Z, ?_Getgloballocale@locale@std@@CAPAV_Locimp@12@XZ, ?_Xregex_error@std@@YAXW4error_type@regex_constants@1@@Z, ?id@?$ctype@D@std@@2V0locale@2@A, ?id@?$collate@D@std@@2V0locale@2@A, ?_Getcat@?$ctype@D@std@@SAIPAPBVfacet@locale@2@PBV42@@Z, ?tolower@?$ctype@D@std@@QBEPBDPADPBD@Z, ?tolower@?$ctype@D@std@@QBEDD@Z, ??1facet@locale@std@@MAE@XZ, ??0facet@locale@std@@IAE@I@Z, ?_Decref@facet@locale@std@@UAEPAV_Facet_base@3@XZ, ?_Incref@facet@locale@std@@UAEXXZ, ??Bid@locale@std@@QAEIXZ, ?_Getcoll@_Locinfo@std@@QBE?AU_Collvec@@XZ, ??1_Locinfo@std@@QAE@XZ, ??0_Locinfo@std@@QAE@PBD@Z, ?_Xbad_function_call@std@@YAXXZ |
WS2_32.dll | freeaddrinfo, getaddrinfo, htonl, accept, __WSAFDIsSet, socket, WSACleanup, WSASetLastError, recvfrom, WSAResetEvent, WSAEventSelect, WSAEnumNetworkEvents, WSACreateEvent, WSACloseEvent, getsockopt, WSASend, send, gethostbyname, ioctlsocket, connect, inet_ntoa, select, recv, getpeername, getsockname, ntohs, shutdown, closesocket, WSAStartup, sendto, WSARecv, WSAIoctl, setsockopt, listen, bind, htons, inet_addr, WSAGetLastError, WSASocketW, WSAWaitForMultipleEvents, gethostname |
plfl32.dll | P_UserReg, P_GetDataValue, P_GetLoginValue, P_UserLogin, P_LoadSystem, P_CardReCharge |
PSAPI.DLL | GetProcessImageFileNameA |
WININET.dll | InternetReadFile, InternetOpenUrlA, InternetOpenW, InternetCloseHandle |
IPHLPAPI.DLL | GetAdaptersInfo |
VCRUNTIME140.dll | __std_terminate, memmove, memchr, strstr, memset, __CxxFrameHandler3, __telemetry_main_invoke_trigger, __telemetry_main_return_trigger, __vcrt_InitializeCriticalSectionEx, _except_handler4_common, __std_exception_copy, __std_exception_destroy, strchr, _purecall, memcpy, strrchr, _CxxThrowException |
api-ms-win-crt-stdio-l1-1-0.dll | fseek, __p__commode, _close, fread, _set_fmode, fputs, __stdio_common_vswprintf, ftell, __stdio_common_vsscanf, fputc, __stdio_common_vsprintf, fflush, _open, _lseeki64, _fseeki64, _read, fgets, feof, _write, _fileno, fclose, fwrite, fopen, __stdio_common_vfprintf, __acrt_iob_func, __stdio_common_vsprintf_s |
api-ms-win-crt-time-l1-1-0.dll | _time64, _localtime64_s, strftime, _gmtime64 |
api-ms-win-crt-filesystem-l1-1-0.dll | _unlink, _fstat64, remove, _stat64, _access |
api-ms-win-crt-string-l1-1-0.dll | _strdup, strtok, strncpy, strcspn, strspn, strpbrk, toupper, strncmp |
api-ms-win-crt-runtime-l1-1-0.dll | _seh_filter_exe, _set_app_type, system, _configure_wide_argv, exit, _get_wide_winmain_command_line, _initterm, _initterm_e, _exit, __sys_nerr, __sys_errlist, _cexit, _c_exit, _beginthreadex, _initialize_wide_environment, _register_thread_local_exe_atexit_callback, _initialize_onexit_table, _errno, _controlfp_s, terminate, _crt_atexit, _register_onexit_function, _invalid_parameter_noinfo_noreturn |
api-ms-win-crt-utility-l1-1-0.dll | qsort |
api-ms-win-crt-heap-l1-1-0.dll | realloc, malloc, free, calloc, _set_new_mode |
api-ms-win-crt-convert-l1-1-0.dll | strtol, strtoul, atoi, _wtoll, strtoll, atoll, _wtol, wcstombs |
api-ms-win-crt-math-l1-1-0.dll | _fdopen, __setusermatherr, _except1 |
api-ms-win-crt-locale-l1-1-0.dll | _configthreadlocale |
bcrypt.dll | BCryptGenRandom |
CRYPT32.dll | CertFreeCertificateChainEngine, CertFreeCertificateChain, CryptQueryObject, CertGetNameStringA, CertFindExtension, CertCreateCertificateChainEngine, CertGetCertificateChain, CryptStringToBinaryA, CertAddCertificateContextToStore, CryptDecodeObjectEx, PFXImportCertStore, CertFreeCertificateContext, CertFindCertificateInStore, CertEnumCertificatesInStore, CertCloseStore, CertOpenStore |
Normaliz.dll | IdnToAscii, IdnToUnicode |
WLDAP32.dll |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
Chinese | China | |
English | United States |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Sep 27, 2024 11:24:18.691026926 CEST | 53 | 57473 | 162.159.36.2 | 192.168.2.6 |
Sep 27, 2024 11:24:19.179656029 CEST | 63606 | 53 | 192.168.2.6 | 1.1.1.1 |
Sep 27, 2024 11:24:19.187035084 CEST | 53 | 63606 | 1.1.1.1 | 192.168.2.6 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Sep 27, 2024 11:24:19.179656029 CEST | 192.168.2.6 | 1.1.1.1 | 0x9386 | Standard query (0) | PTR (Pointer record) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Sep 27, 2024 11:24:19.187035084 CEST | 1.1.1.1 | 192.168.2.6 | 0x9386 | Name error (3) | none | none | PTR (Pointer record) | IN (0x0001) | false |
Target ID: | 0 |
Start time: | 05:23:47 |
Start date: | 27/09/2024 |
Path: | C:\Users\user\Desktop\mTGDPqzxwu.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x680000 |
File size: | 5'087'232 bytes |
MD5 hash: | FE4452262E67EC54BB64BC76B303B5B4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Function 006CF49C Relevance: 183.0, APIs: 56, Strings: 48, Instructions: 1037COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0068AA10 Relevance: 174.1, APIs: 75, Strings: 24, Instructions: 817fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00681620 Relevance: 93.1, APIs: 32, Strings: 21, Instructions: 334libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0068DB70 Relevance: 91.5, APIs: 48, Strings: 4, Instructions: 507windowclipboardfileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00687050 Relevance: 72.1, APIs: 32, Strings: 9, Instructions: 348fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006DE500 Relevance: 68.9, APIs: 19, Strings: 20, Instructions: 628stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00685030 Relevance: 68.5, APIs: 35, Strings: 4, Instructions: 243filetimeprocessCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006B9100 Relevance: 43.9, APIs: 16, Strings: 9, Instructions: 188libraryloaderstringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00689D90 Relevance: 42.4, APIs: 23, Strings: 1, Instructions: 392threadprocessCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006AD8A0 Relevance: 37.1, APIs: 12, Strings: 9, Instructions: 377stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00684E60 Relevance: 31.6, APIs: 16, Strings: 2, Instructions: 128fileprocessCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00685CE0 Relevance: 26.4, APIs: 14, Strings: 1, Instructions: 116servicewindowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00689BC0 Relevance: 24.6, APIs: 11, Strings: 3, Instructions: 79processCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006F0940 Relevance: 22.9, APIs: 5, Strings: 8, Instructions: 149encryptionCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006867F0 Relevance: 21.1, APIs: 8, Strings: 4, Instructions: 94stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006CAAE0 Relevance: 18.0, APIs: 6, Strings: 4, Instructions: 541stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006868F0 Relevance: 17.7, APIs: 9, Strings: 1, Instructions: 182fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006F0E10 Relevance: 17.7, APIs: 3, Strings: 7, Instructions: 157encryptionCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00689AC0 Relevance: 17.6, APIs: 9, Strings: 1, Instructions: 74processCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00691D70 Relevance: 16.6, APIs: 11, Instructions: 106COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006F7240 Relevance: 15.8, APIs: 8, Strings: 1, Instructions: 68encryptionCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006DEEF0 Relevance: 15.5, Strings: 12, Instructions: 514COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006F3510 Relevance: 14.6, Strings: 11, Instructions: 858COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006E6410 Relevance: 14.4, APIs: 2, Strings: 6, Instructions: 398fileCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006EFB00 Relevance: 12.9, Strings: 10, Instructions: 365COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006C9E20 Relevance: 12.3, APIs: 8, Instructions: 265sleepCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006B1A30 Relevance: 10.3, Strings: 8, Instructions: 303COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006C91E0 Relevance: 10.2, Strings: 8, Instructions: 222COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006F71E0 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 34encryptionCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006E2B00 Relevance: 3.0, APIs: 2, Instructions: 35COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006CD8A0 Relevance: 3.0, APIs: 2, Instructions: 14COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006D1320 Relevance: 2.7, APIs: 2, Instructions: 174COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006EB240 Relevance: 1.7, APIs: 1, Instructions: 231COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006CD730 Relevance: 1.6, APIs: 1, Instructions: 62COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006CD7F0 Relevance: 1.6, APIs: 1, Instructions: 61COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0069D50D Relevance: 1.5, APIs: 1, Instructions: 3COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00683E70 Relevance: .7, Instructions: 672COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006C02B0 Relevance: .6, Instructions: 611COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006866C0 Relevance: .1, Instructions: 98COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00686720 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006F7F50 Relevance: .0, Instructions: 38COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00681F00 Relevance: 147.4, APIs: 68, Strings: 16, Instructions: 426COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0068D460 Relevance: 130.0, APIs: 71, Strings: 3, Instructions: 474windowfileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00688E40 Relevance: 112.4, APIs: 59, Strings: 5, Instructions: 434windowfileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0068A340 Relevance: 110.7, APIs: 62, Strings: 1, Instructions: 425windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0068EC00 Relevance: 103.7, APIs: 56, Strings: 3, Instructions: 446fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0068B700 Relevance: 100.1, APIs: 55, Strings: 2, Instructions: 319windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00685470 Relevance: 93.1, APIs: 52, Strings: 1, Instructions: 324windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00684790 Relevance: 72.1, APIs: 48, Instructions: 113COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00687770 Relevance: 70.2, APIs: 37, Strings: 3, Instructions: 221windowfilememoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00685990 Relevance: 69.3, APIs: 46, Instructions: 263COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0068D0D0 Relevance: 68.5, APIs: 36, Strings: 3, Instructions: 255windowfileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0068CD40 Relevance: 68.5, APIs: 36, Strings: 3, Instructions: 255windowfileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00685E40 Relevance: 52.7, APIs: 23, Strings: 7, Instructions: 207filewindowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00681B10 Relevance: 49.3, APIs: 11, Strings: 17, Instructions: 270memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00681B40 Relevance: 49.3, APIs: 11, Strings: 17, Instructions: 258memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006F0330 Relevance: 44.0, APIs: 11, Strings: 14, Instructions: 294encryptionCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00691380 Relevance: 40.4, APIs: 22, Strings: 1, Instructions: 180networkCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006D1DB0 Relevance: 37.1, APIs: 14, Strings: 7, Instructions: 364networkCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006BDF40 Relevance: 37.1, APIs: 14, Strings: 7, Instructions: 337stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0068C8D0 Relevance: 36.9, APIs: 19, Strings: 2, Instructions: 198windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0068CBA0 Relevance: 35.1, APIs: 18, Strings: 2, Instructions: 121windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006D19C0 Relevance: 33.2, APIs: 8, Strings: 14, Instructions: 236stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0068C580 Relevance: 29.8, APIs: 14, Strings: 3, Instructions: 97fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006F0B40 Relevance: 28.2, APIs: 10, Strings: 6, Instructions: 172fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006BB830 Relevance: 26.6, APIs: 6, Strings: 9, Instructions: 347stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006D0500 Relevance: 26.6, APIs: 4, Strings: 11, Instructions: 314libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006E1540 Relevance: 26.5, APIs: 5, Strings: 10, Instructions: 269stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006A8670 Relevance: 25.8, APIs: 17, Instructions: 280synchronizationCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006D0950 Relevance: 24.9, APIs: 4, Strings: 10, Instructions: 425encryptionCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006D5A10 Relevance: 24.8, APIs: 8, Strings: 6, Instructions: 293stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00690EA0 Relevance: 24.7, APIs: 13, Strings: 1, Instructions: 164networksleepCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0068F820 Relevance: 24.6, APIs: 12, Strings: 2, Instructions: 87windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006C69D0 Relevance: 23.0, APIs: 4, Strings: 11, Instructions: 487stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006EC1E0 Relevance: 22.9, APIs: 9, Strings: 4, Instructions: 172libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00686E20 Relevance: 22.8, APIs: 10, Strings: 3, Instructions: 83networkfileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00688A40 Relevance: 22.6, APIs: 15, Instructions: 130COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006EF200 Relevance: 21.5, APIs: 6, Strings: 6, Instructions: 473stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006DD280 Relevance: 21.3, APIs: 3, Strings: 9, Instructions: 310stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006A8AA0 Relevance: 19.7, APIs: 13, Instructions: 210COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006D2330 Relevance: 19.5, APIs: 4, Strings: 7, Instructions: 271stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006D2E00 Relevance: 19.5, APIs: 5, Strings: 6, Instructions: 205stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006F0700 Relevance: 19.4, APIs: 3, Strings: 8, Instructions: 184encryptionCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0068EBDE Relevance: 19.4, APIs: 10, Strings: 1, Instructions: 115fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006A1500 Relevance: 19.3, APIs: 10, Strings: 1, Instructions: 97stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006812D0 Relevance: 19.3, APIs: 9, Strings: 2, Instructions: 76registryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006DBE60 Relevance: 17.7, APIs: 1, Strings: 9, Instructions: 186stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006EC420 Relevance: 17.6, APIs: 9, Strings: 1, Instructions: 126stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006CB130 Relevance: 17.6, APIs: 9, Strings: 1, Instructions: 89sleepCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0068B5E0 Relevance: 17.6, APIs: 6, Strings: 4, Instructions: 81processCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0068FB40 Relevance: 17.6, APIs: 9, Strings: 1, Instructions: 78windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006811C0 Relevance: 17.6, APIs: 9, Strings: 1, Instructions: 76registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00686F40 Relevance: 17.6, APIs: 9, Strings: 1, Instructions: 76registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006853C0 Relevance: 17.6, APIs: 9, Strings: 1, Instructions: 63fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0069C78A Relevance: 16.6, APIs: 11, Instructions: 51COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006B20D0 Relevance: 15.9, APIs: 3, Strings: 6, Instructions: 199stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006D0F60 Relevance: 15.9, APIs: 1, Strings: 8, Instructions: 182encryptionCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006CB210 Relevance: 15.9, APIs: 7, Strings: 2, Instructions: 166fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006C3720 Relevance: 15.2, APIs: 2, Strings: 8, Instructions: 245stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00684660 Relevance: 15.1, APIs: 10, Instructions: 81COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0068FE80 Relevance: 15.1, APIs: 10, Instructions: 72COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006DC3E0 Relevance: 14.2, APIs: 4, Strings: 4, Instructions: 240stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006E56B0 Relevance: 14.2, APIs: 6, Strings: 2, Instructions: 238stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006A7140 Relevance: 14.2, APIs: 3, Strings: 5, Instructions: 172fileCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0068E5C0 Relevance: 14.1, APIs: 6, Strings: 2, Instructions: 111sleepCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0068E3D0 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 64windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00689540 Relevance: 14.0, APIs: 4, Strings: 4, Instructions: 13processCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006C3DB0 Relevance: 13.8, APIs: 2, Strings: 7, Instructions: 251stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006ECAC0 Relevance: 13.7, APIs: 1, Strings: 8, Instructions: 226stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00686CF0 Relevance: 13.6, APIs: 9, Instructions: 84windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006B22C0 Relevance: 12.5, APIs: 2, Strings: 5, Instructions: 238stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006E0720 Relevance: 12.5, APIs: 5, Strings: 2, Instructions: 225stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006B3350 Relevance: 10.7, APIs: 1, Strings: 6, Instructions: 224stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006E76B0 Relevance: 10.7, APIs: 1, Strings: 6, Instructions: 193stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006BAB80 Relevance: 10.7, APIs: 2, Strings: 4, Instructions: 170fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006BDC40 Relevance: 10.6, APIs: 4, Strings: 3, Instructions: 137stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006D5DB0 Relevance: 10.6, APIs: 7, Instructions: 104COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00693740 Relevance: 10.6, APIs: 7, Instructions: 85COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006A8580 Relevance: 10.6, APIs: 7, Instructions: 79COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0068EA60 Relevance: 10.6, APIs: 7, Instructions: 64COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00689620 Relevance: 10.5, APIs: 7, Instructions: 48COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0068FA30 Relevance: 10.5, APIs: 7, Instructions: 47COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0068C8A0 Relevance: 10.5, APIs: 3, Strings: 3, Instructions: 11processCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006E1890 Relevance: 9.3, APIs: 1, Strings: 5, Instructions: 309stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006DCC60 Relevance: 9.2, APIs: 1, Strings: 5, Instructions: 186stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006C5AE0 Relevance: 9.2, APIs: 1, Strings: 5, Instructions: 168stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00691690 Relevance: 9.1, APIs: 6, Instructions: 108COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00697250 Relevance: 9.1, APIs: 6, Instructions: 85COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006A6AD0 Relevance: 9.1, APIs: 3, Strings: 2, Instructions: 323stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006833D0 Relevance: 9.1, APIs: 6, Instructions: 60timeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00687AB0 Relevance: 9.0, APIs: 6, Instructions: 49COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0068F480 Relevance: 9.0, APIs: 6, Instructions: 44COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0068F520 Relevance: 9.0, APIs: 6, Instructions: 44COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006896D0 Relevance: 9.0, APIs: 6, Instructions: 44COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00689770 Relevance: 9.0, APIs: 6, Instructions: 44COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0068C710 Relevance: 9.0, APIs: 6, Instructions: 44COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00689930 Relevance: 9.0, APIs: 6, Instructions: 44COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0068FD00 Relevance: 9.0, APIs: 6, Instructions: 44COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00694C90 Relevance: 9.0, APIs: 6, Instructions: 31COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00690560 Relevance: 9.0, APIs: 6, Instructions: 30COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00696640 Relevance: 9.0, APIs: 6, Instructions: 30COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006839C0 Relevance: 9.0, APIs: 6, Instructions: 29COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006E5500 Relevance: 8.9, APIs: 2, Strings: 3, Instructions: 162stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006ED6E0 Relevance: 7.7, APIs: 6, Instructions: 161COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006CB710 Relevance: 7.6, APIs: 5, Instructions: 140COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006E61E0 Relevance: 7.6, APIs: 3, Strings: 2, Instructions: 124stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00691B30 Relevance: 7.6, APIs: 5, Instructions: 99COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00682E40 Relevance: 7.6, APIs: 5, Instructions: 91COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00697720 Relevance: 7.6, APIs: 5, Instructions: 84COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00683480 Relevance: 7.6, APIs: 5, Instructions: 51COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00689A30 Relevance: 7.6, APIs: 5, Instructions: 51COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006B9F20 Relevance: 7.2, APIs: 2, Strings: 2, Instructions: 202fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006E52E0 Relevance: 7.2, APIs: 3, Strings: 1, Instructions: 162stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006A1BA0 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 59stringwindowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006EC5E0 Relevance: 7.0, APIs: 1, Strings: 3, Instructions: 35libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0068F330 Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 34windowCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00694D90 Relevance: 6.2, APIs: 4, Instructions: 188COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006D17C0 Relevance: 6.2, APIs: 2, Strings: 2, Instructions: 166stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00699620 Relevance: 6.1, APIs: 4, Instructions: 130COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006B8DA0 Relevance: 6.1, APIs: 1, Strings: 3, Instructions: 128stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006F7320 Relevance: 6.1, APIs: 3, Strings: 1, Instructions: 97stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006C3C50 Relevance: 6.1, APIs: 3, Strings: 1, Instructions: 76stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006915E0 Relevance: 6.1, APIs: 4, Instructions: 56COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006912E0 Relevance: 6.1, APIs: 4, Instructions: 52COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00691870 Relevance: 6.0, APIs: 4, Instructions: 48COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00683360 Relevance: 6.0, APIs: 4, Instructions: 47windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0068F600 Relevance: 6.0, APIs: 4, Instructions: 38windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006D67B0 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 95stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006D9B00 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 87stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006CEDE0 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 73encryptionCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006B37F0 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 63stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006D11C0 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 29encryptionCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 006E71E0 Relevance: 5.2, APIs: 4, Instructions: 248stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00699460 Relevance: 5.1, APIs: 4, Instructions: 119COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|