Windows
Analysis Report
kas77c5mDL.exe
Overview
General Information
Sample name: | kas77c5mDL.exerenamed because original name is a hash value |
Original sample name: | 8059579bea79e8c443e2195994c51bfe.exe |
Analysis ID: | 1521402 |
MD5: | 8059579bea79e8c443e2195994c51bfe |
SHA1: | d51b187147993d7fe5d20cb7ff02d8285e021860 |
SHA256: | cbd39ae2915c2b2a99fbd27afff7480aec76d595d88c34def92e4a66bbf396e2 |
Tags: | exeuser-abuse_ch |
Infos: | |
Detection
Score: | 7 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 60% |
Signatures
Classification
- System is w10x64
- kas77c5mDL.exe (PID: 7328 cmdline:
"C:\Users\ user\Deskt op\kas77c5 mDL.exe" MD5: 8059579BEA79E8C443E2195994C51BFE)
- cleanup
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: |
Source: | Code function: | 0_2_00644900 | |
Source: | Code function: | 0_2_00643E40 | |
Source: | Code function: | 0_2_00504FC0 |
Source: | Code function: | 0_2_00527D60 |
Source: | String found in binary or memory: |
Source: | Code function: | 0_2_00573140 | |
Source: | Code function: | 0_2_0051E1A0 | |
Source: | Code function: | 0_2_004F82C0 | |
Source: | Code function: | 0_2_004FB360 | |
Source: | Code function: | 0_2_0050A430 | |
Source: | Code function: | 0_2_004F8970 | |
Source: | Code function: | 0_2_004FB9C0 | |
Source: | Code function: | 0_2_004F7AF0 | |
Source: | Code function: | 0_2_00502A80 | |
Source: | Code function: | 0_2_004FAB70 | |
Source: | Code function: | 0_2_00502BF0 | |
Source: | Code function: | 0_2_0050FE20 | |
Source: | Code function: | 0_2_005DCE20 |
Source: | Code function: | 0_2_004E1490 | |
Source: | Code function: | 0_2_0064C030 | |
Source: | Code function: | 0_2_0073302F | |
Source: | Code function: | 0_2_005240E0 | |
Source: | Code function: | 0_2_00501110 | |
Source: | Code function: | 0_2_00503130 | |
Source: | Code function: | 0_2_00621110 | |
Source: | Code function: | 0_2_006A61E0 | |
Source: | Code function: | 0_2_005161C0 | |
Source: | Code function: | 0_2_007211E0 | |
Source: | Code function: | 0_2_006A41C0 | |
Source: | Code function: | 0_2_006A5270 | |
Source: | Code function: | 0_2_006A7230 | |
Source: | Code function: | 0_2_0072837E | |
Source: | Code function: | 0_2_0069E350 | |
Source: | Code function: | 0_2_00511310 | |
Source: | Code function: | 0_2_00529330 | |
Source: | Code function: | 0_2_006A6420 | |
Source: | Code function: | 0_2_0071840E | |
Source: | Code function: | 0_2_00510540 | |
Source: | Code function: | 0_2_00527530 | |
Source: | Code function: | 0_2_004E3530 | |
Source: | Code function: | 0_2_006A5790 | |
Source: | Code function: | 0_2_006A38C0 | |
Source: | Code function: | 0_2_0051F8B0 | |
Source: | Code function: | 0_2_0069D890 | |
Source: | Code function: | 0_2_0072D961 | |
Source: | Code function: | 0_2_0050E910 | |
Source: | Code function: | 0_2_00517990 | |
Source: | Code function: | 0_2_006A3A70 | |
Source: | Code function: | 0_2_00520AF0 | |
Source: | Code function: | 0_2_00510AB0 | |
Source: | Code function: | 0_2_0065AB60 | |
Source: | Code function: | 0_2_0069FB10 | |
Source: | Code function: | 0_2_00521C00 | |
Source: | Code function: | 0_2_0052DC20 | |
Source: | Code function: | 0_2_0069DCA0 | |
Source: | Code function: | 0_2_006B2D30 | |
Source: | Code function: | 0_2_006A6D10 | |
Source: | Code function: | 0_2_0053EDF0 | |
Source: | Code function: | 0_2_006A3DB0 | |
Source: | Code function: | 0_2_00577DB0 | |
Source: | Code function: | 0_2_00535E30 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_00647B80 |
Source: | Code function: | 0_2_0053BD00 |
Source: | Code function: | 0_2_004EA7E0 |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_0064E070 |
Source: | Static PE information: |
Source: | Code function: | 0_2_00710461 | |
Source: | Code function: | 0_2_004FF8A1 |
Source: | API coverage: |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Code function: | 0_2_00644900 | |
Source: | Code function: | 0_2_00643E40 | |
Source: | Code function: | 0_2_00504FC0 |
Source: | Code function: | 0_2_00527D60 |
Source: | Code function: | 0_2_007149B3 |
Source: | Code function: | 0_2_0063E400 |
Source: | Code function: | 0_2_0064E070 |
Source: | Code function: | 0_2_0070F32D | |
Source: | Code function: | 0_2_0071C8BC | |
Source: | Code function: | 0_2_00729E5A |
Source: | Code function: | 0_2_004F20A0 |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Code function: | 0_2_007149B3 | |
Source: | Code function: | 0_2_0070FE1E |
Source: | Code function: | 0_2_0063F600 |
Source: | Code function: | 0_2_0063E310 |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Native API | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Deobfuscate/Decode Files or Information | OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | LSASS Memory | 3 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 2 Obfuscated Files or Information | Security Account Manager | 2 File and Directory Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | 4 System Information Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | unknown |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1521402 |
Start date and time: | 2024-09-28 08:43:48 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 22s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 1 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | kas77c5mDL.exerenamed because original name is a hash value |
Original Sample Name: | 8059579bea79e8c443e2195994c51bfe.exe |
Detection: | CLEAN |
Classification: | clean7.winEXE@1/0@0/0 |
EGA Information: |
|
HCA Information: | Failed |
Cookbook Comments: |
|
- Report size getting too big, too many NtSetInformationFile calls found.
- VT rate limit hit for: kas77c5mDL.exe
File type: | |
Entropy (8bit): | 7.805394793430661 |
TrID: |
|
File name: | kas77c5mDL.exe |
File size: | 15'059'585 bytes |
MD5: | 8059579bea79e8c443e2195994c51bfe |
SHA1: | d51b187147993d7fe5d20cb7ff02d8285e021860 |
SHA256: | cbd39ae2915c2b2a99fbd27afff7480aec76d595d88c34def92e4a66bbf396e2 |
SHA512: | 1c6e33e8b15108602f32f937436cdc68b7c41795caad2fd6d401a18521d112f7259a751a56882305d01da30bf4e17f1ddff5a934f36ee9f42cf76b40f97dbb06 |
SSDEEP: | 393216:OX9lzMRum1QuPC0GxzYbTm6w99th6XKsJSl7Vs4VsZKc8jXj:09lzMRum1Qz0GxzYbFwhkPMLs46Kp |
TLSH: | 64E6F130764AC86BD56611B01A2C9AAB922CAD360F615CC7B3DC7D5E17B4DC31633E2B |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................3...!...3.......".......".......".......3.......3.......3.......3...................k.....A.......)............ |
Icon Hash: | f0f0d3f4f09a9c90 |
Entrypoint: | 0x630270 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x666AD704 [Thu Jun 13 11:24:52 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 63ed59597dad42eeec3f01fae0ba2a2e |
Signature Valid: | |
Signature Issuer: | |
Signature Validation Error: | |
Error Number: | |
Not Before, Not After | |
Subject Chain | |
Version: | |
Thumbprint MD5: | |
Thumbprint SHA-1: | |
Thumbprint SHA-256: | |
Serial: |
Instruction |
---|
call 00007FA2D4ACF58Bh |
jmp 00007FA2D4ACED4Dh |
push ebp |
mov ebp, esp |
and dword ptr [00781D64h], 00000000h |
sub esp, 24h |
or dword ptr [0077E068h], 01h |
push 0000000Ah |
call dword ptr [006C327Ch] |
test eax, eax |
je 00007FA2D4ACF082h |
and dword ptr [ebp-10h], 00000000h |
xor eax, eax |
push ebx |
push esi |
push edi |
xor ecx, ecx |
lea edi, dword ptr [ebp-24h] |
push ebx |
cpuid |
mov esi, ebx |
pop ebx |
nop |
mov dword ptr [edi], eax |
mov dword ptr [edi+04h], esi |
mov dword ptr [edi+08h], ecx |
xor ecx, ecx |
mov dword ptr [edi+0Ch], edx |
mov eax, dword ptr [ebp-24h] |
mov edi, dword ptr [ebp-20h] |
mov dword ptr [ebp-0Ch], eax |
xor edi, 756E6547h |
mov eax, dword ptr [ebp-18h] |
xor eax, 49656E69h |
mov dword ptr [ebp-04h], eax |
mov eax, dword ptr [ebp-1Ch] |
xor eax, 6C65746Eh |
mov dword ptr [ebp-08h], eax |
xor eax, eax |
inc eax |
push ebx |
cpuid |
mov esi, ebx |
pop ebx |
nop |
lea ebx, dword ptr [ebp-24h] |
mov dword ptr [ebx], eax |
mov eax, dword ptr [ebp-04h] |
or eax, dword ptr [ebp-08h] |
or eax, edi |
mov dword ptr [ebx+04h], esi |
mov dword ptr [ebx+08h], ecx |
mov dword ptr [ebx+0Ch], edx |
jne 00007FA2D4ACEF15h |
mov eax, dword ptr [ebp-24h] |
and eax, 0FFF3FF0h |
cmp eax, 000106C0h |
je 00007FA2D4ACEEF5h |
cmp eax, 00020660h |
je 00007FA2D4ACEEEEh |
cmp eax, 00020670h |
je 00007FA2D4ACEEE7h |
cmp eax, 00030650h |
je 00007FA2D4ACEEE0h |
cmp eax, 00030660h |
je 00007FA2D4ACEED9h |
cmp eax, 00030670h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x37c4d8 | 0x3c | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x38d000 | 0x2f100 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x336e690 | 0x2678 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x3bd000 | 0x30444 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x319f00 | 0x70 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x319f80 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x2e9370 | 0x40 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2c3000 | 0x330 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x37996c | 0x240 | .rdata |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x2c1e3a | 0x2c2000 | b0bf24b6d523cfb564d7e0757a952805 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x2c3000 | 0xba792 | 0xba800 | f919d87d6ee082679f915cffdf67e52f | False | 0.3259061348022788 | data | 5.066879645655034 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x37e000 | 0xda00 | 0x3600 | 38e6c63fe869f0b839b0076fb92be91c | False | 0.2349537037037037 | DOS executable (block device driver) | 4.452574671822254 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.didat | 0x38c000 | 0x70c | 0x800 | 80d6f41695e44fa54ad8cb4e873973ee | False | 0.4150390625 | data | 4.58561996007191 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x38d000 | 0x2f100 | 0x2f200 | c9456624283aedddaa976bf6c6000fdb | False | 0.1833347148541114 | data | 5.520234813725192 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x3bd000 | 0x30444 | 0x30600 | 11770f190b22ba27774a243769ef29f1 | False | 0.4781774870801034 | data | 6.5706317076247105 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_BITMAP | 0x38d910 | 0x13e | Device independent bitmap graphic, 32 x 16 x 4, image size 258, resolution 2834 x 2834 px/m, 5 important colors | English | United States | 0.25471698113207547 |
RT_BITMAP | 0x38da50 | 0x828 | Device independent bitmap graphic, 32 x 16 x 32, image size 0 | English | United States | 0.03017241379310345 |
RT_BITMAP | 0x38e278 | 0x48a8 | Device independent bitmap graphic, 290 x 16 x 32, image size 0 | English | United States | 0.11881720430107527 |
RT_BITMAP | 0x392b20 | 0xa6a | Device independent bitmap graphic, 320 x 16 x 4, image size 2562, resolution 2834 x 2834 px/m | English | United States | 0.21680420105026257 |
RT_BITMAP | 0x39358c | 0x152 | Device independent bitmap graphic, 32 x 16 x 4, image size 258, resolution 2834 x 2834 px/m, 10 important colors | English | United States | 0.5295857988165681 |
RT_BITMAP | 0x3936e0 | 0x828 | Device independent bitmap graphic, 32 x 16 x 32, image size 0 | English | United States | 0.4875478927203065 |
RT_ICON | 0x393f08 | 0x3864 | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | English | United States | 0.971737323358271 |
RT_ICON | 0x39776c | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9600 | English | United States | 0.08703319502074688 |
RT_ICON | 0x399d14 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4224 | English | United States | 0.16463414634146342 |
RT_ICON | 0x39adbc | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.18565573770491803 |
RT_ICON | 0x39b744 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.3262411347517731 |
RT_DIALOG | 0x39bbac | 0xac | data | English | United States | 0.7151162790697675 |
RT_DIALOG | 0x39bc58 | 0xcc | data | English | United States | 0.6911764705882353 |
RT_DIALOG | 0x39bd24 | 0x1b4 | data | English | United States | 0.5458715596330275 |
RT_DIALOG | 0x39bed8 | 0x136 | data | English | United States | 0.6064516129032258 |
RT_DIALOG | 0x39c010 | 0x4c | data | English | United States | 0.8289473684210527 |
RT_STRING | 0x39c05c | 0x234 | data | English | United States | 0.4645390070921986 |
RT_STRING | 0x39c290 | 0x182 | data | English | United States | 0.5103626943005182 |
RT_STRING | 0x39c414 | 0x50 | data | English | United States | 0.7375 |
RT_STRING | 0x39c464 | 0x9a | data | English | United States | 0.37662337662337664 |
RT_STRING | 0x39c500 | 0x2f6 | data | English | United States | 0.449868073878628 |
RT_STRING | 0x39c7f8 | 0x5c0 | data | English | United States | 0.3498641304347826 |
RT_STRING | 0x39cdb8 | 0x434 | data | English | United States | 0.32899628252788105 |
RT_STRING | 0x39d1ec | 0x100 | data | English | United States | 0.5703125 |
RT_STRING | 0x39d2ec | 0x484 | data | English | United States | 0.39186851211072665 |
RT_STRING | 0x39d770 | 0x1ea | data | English | United States | 0.44081632653061226 |
RT_STRING | 0x39d95c | 0x18a | data | English | United States | 0.5228426395939086 |
RT_STRING | 0x39dae8 | 0x216 | Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0 | English | United States | 0.46254681647940077 |
RT_STRING | 0x39dd00 | 0x624 | data | English | United States | 0.3575063613231552 |
RT_STRING | 0x39e324 | 0x660 | data | English | United States | 0.3474264705882353 |
RT_STRING | 0x39e984 | 0x41a | data | English | United States | 0.38095238095238093 |
RT_GROUP_ICON | 0x39eda0 | 0x14 | data | English | United States | 1.05 |
RT_VERSION | 0x39edb4 | 0x324 | data | English | United States | 0.4427860696517413 |
RT_HTML | 0x39f0d8 | 0x3835 | ASCII text, with very long lines (443), with CRLF line terminators | English | United States | 0.08298005420807561 |
RT_HTML | 0x3a2910 | 0x1316 | ASCII text, with CRLF line terminators | English | United States | 0.18399508800654932 |
RT_HTML | 0x3a3c28 | 0x8c77 | HTML document, ASCII text, with CRLF line terminators | English | United States | 0.08081426068578103 |
RT_HTML | 0x3ac8a0 | 0x6acd | HTML document, ASCII text, with CRLF line terminators | English | United States | 0.10679931238798873 |
RT_HTML | 0x3b3370 | 0x679 | HTML document, ASCII text, with CRLF line terminators | English | United States | 0.34339167169583584 |
RT_HTML | 0x3b39ec | 0x104a | HTML document, ASCII text, with CRLF line terminators | English | United States | 0.2170263788968825 |
RT_HTML | 0x3b4a38 | 0x15b1 | HTML document, ASCII text, with CRLF line terminators | English | United States | 0.17612101566720692 |
RT_HTML | 0x3b5fec | 0x2099 | exported SGML document, ASCII text, with very long lines (659), with CRLF line terminators | English | United States | 0.13732774116237267 |
RT_HTML | 0x3b8088 | 0x368d | HTML document, ASCII text, with CRLF line terminators | English | United States | 0.10834228428213391 |
RT_HTML | 0x3bb718 | 0x1d7 | ASCII text, with CRLF line terminators | English | United States | 0.6008492569002123 |
RT_MANIFEST | 0x3bb8f0 | 0x80f | XML 1.0 document, ASCII text, with CRLF, LF line terminators | English | United States | 0.40814348036839554 |
DLL | Import |
---|---|
KERNEL32.dll | WriteFile, DeleteFileW, HeapDestroy, HeapSize, HeapReAlloc, HeapFree, HeapAlloc, GetProcessHeap, SizeofResource, LockResource, LoadResource, FindResourceW, FindResourceExW, CreateEventExW, WaitForSingleObject, CreateProcessW, GetLastError, GetExitCodeProcess, SetEvent, RemoveDirectoryW, GetProcAddress, GetModuleHandleW, GetWindowsDirectoryW, CreateDirectoryW, GetTempPathW, GetTempFileNameW, MoveFileW, EnterCriticalSection, LeaveCriticalSection, GetModuleFileNameW, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, GetCurrentThreadId, RaiseException, SetLastError, GlobalUnlock, GlobalLock, GlobalAlloc, MulDiv, lstrcmpW, CreateEventW, FindClose, FindFirstFileW, GetFullPathNameW, InitializeCriticalSection, lstrcpynW, CreateThread, GetLogicalDriveStringsW, GetDriveTypeW, GetDiskFreeSpaceExW, Sleep, LoadLibraryExW, FreeLibrary, GetCurrentProcess, WideCharToMultiByte, GetSystemDirectoryW, GetCurrentProcessId, DecodePointer, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, CreateNamedPipeW, GetExitCodeThread, lstrlenW, VerifyVersionInfoW, VerSetConditionMask, lstrcmpiW, LoadLibraryW, CompareStringW, FindNextFileW, GetFileSize, GetFileAttributesW, GetShortPathNameW, GetFinalPathNameByHandleW, SetFileAttributesW, GetFileTime, CopyFileW, ReadFile, SetFilePointer, SetFileTime, SystemTimeToFileTime, MultiByteToWideChar, GetSystemInfo, WaitForMultipleObjects, GetVersionExW, CreateSemaphoreW, ReleaseSemaphore, GlobalMemoryStatus, GetModuleHandleA, GetProcessAffinityMask, VirtualProtect, VirtualQuery, LoadLibraryExA, GetStringTypeW, OutputDebugStringW, GetLocalTime, FlushFileBuffers, LocalFree, LocalAlloc, SetUnhandledExceptionFilter, FileTimeToSystemTime, GetEnvironmentVariableW, GetSystemTime, GetDateFormatW, GetTimeFormatW, GetLocaleInfoW, FormatMessageW, ConnectNamedPipe, CloseHandle, InitializeCriticalSectionEx, LoadLibraryA, GetModuleFileNameA, GetCurrentThread, GetConsoleOutputCP, Wow64DisableWow64FsRedirection, Wow64RevertWow64FsRedirection, IsWow64Process, SetConsoleTextAttribute, GetStdHandle, GetConsoleScreenBufferInfo, GetTickCount, GetCommandLineW, SetCurrentDirectoryW, SetEndOfFile, EnumResourceLanguagesW, GetSystemDefaultLangID, GetUserDefaultLangID, ResetEvent, GlobalFree, GetPrivateProfileStringW, GetPrivateProfileSectionNamesW, WritePrivateProfileStringW, TerminateThread, CompareFileTime, CopyFileExW, OpenEventW, PeekNamedPipe, WaitForSingleObjectEx, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, TryAcquireSRWLockExclusive, FormatMessageA, GetLocaleInfoEx, FindFirstFileExW, MoveFileExW, QueryPerformanceCounter, QueryPerformanceFrequency, WakeAllConditionVariable, SleepConditionVariableSRW, EncodePointer, LCMapStringEx, CompareStringEx, GetCPInfo, GetSystemTimeAsFileTime, IsDebuggerPresent, InitializeSListHead, InterlockedPopEntrySList, InterlockedPushEntrySList, FlushInstructionCache, IsProcessorFeaturePresent, VirtualAlloc, VirtualFree, UnhandledExceptionFilter, TerminateProcess, GetStartupInfoW, RtlUnwind, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, ExitThread, FreeLibraryAndExitThread, GetModuleHandleExW, ExitProcess, GetFileType, LCMapStringW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetConsoleMode, SetFilePointerEx, GetFileSizeEx, ReadConsoleW, GetTimeZoneInformation, IsValidCodePage, GetACP, GetOEMCP, GetCommandLineA, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, WriteConsoleW, GetEnvironmentStringsW, CreateFileW |
imagehlp.dll | SymGetModuleBase, SymFunctionTableAccess, SymGetLineFromAddr, SymSetSearchPath, SymCleanup, SymInitialize, SymSetOptions, StackWalk |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Target ID: | 0 |
Start time: | 02:44:40 |
Start date: | 28/09/2024 |
Path: | C:\Users\user\Desktop\kas77c5mDL.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x4e0000 |
File size: | 15'059'585 bytes |
MD5 hash: | 8059579BEA79E8C443E2195994C51BFE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Execution Graph
Execution Coverage: | 0.9% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 11.7% |
Total number of Nodes: | 368 |
Total number of Limit Nodes: | 12 |
Graph
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004E1490 Relevance: 13.9, Strings: 11, Instructions: 186COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00644900 Relevance: 4.6, APIs: 3, Instructions: 92fileCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F3870 Relevance: 17.8, APIs: 5, Strings: 5, Instructions: 263libraryloaderCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005C55B0 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 130libraryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0062B6A0 Relevance: 2.6, APIs: 2, Instructions: 133COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 007294D3 Relevance: 1.5, APIs: 1, Instructions: 39memoryCOMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004EB0F0 Relevance: 1.5, APIs: 1, Instructions: 34memoryCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0072822B Relevance: 1.5, APIs: 1, Instructions: 32memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0065AB60 Relevance: 46.3, APIs: 7, Strings: 19, Instructions: 819libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0063E400 Relevance: 40.8, APIs: 14, Strings: 9, Instructions: 524fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0064E070 Relevance: 31.8, APIs: 12, Strings: 6, Instructions: 308libraryloaderthreadCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0052DC20 Relevance: 23.8, APIs: 4, Strings: 9, Instructions: 1069stringsleepCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00527530 Relevance: 21.5, APIs: 2, Strings: 10, Instructions: 510libraryloaderCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00521C00 Relevance: 20.7, Strings: 16, Instructions: 738COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00504FC0 Relevance: 16.1, APIs: 6, Strings: 3, Instructions: 397fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00511310 Relevance: 13.3, Strings: 10, Instructions: 811COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00520AF0 Relevance: 10.9, Strings: 8, Instructions: 946COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00643E40 Relevance: 9.2, APIs: 4, Strings: 1, Instructions: 424fileCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0070F32D Relevance: 9.0, APIs: 6, Instructions: 41memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00510AB0 Relevance: 8.1, Strings: 6, Instructions: 569COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0072837E Relevance: 6.3, APIs: 4, Instructions: 337COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005240E0 Relevance: 5.5, Strings: 4, Instructions: 542COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051F8B0 Relevance: 5.4, Strings: 4, Instructions: 378COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00510540 Relevance: 5.3, Strings: 4, Instructions: 337COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006A41C0 Relevance: 5.3, Strings: 4, Instructions: 257COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0064C030 Relevance: 5.1, APIs: 3, Instructions: 604COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00527D60 Relevance: 4.9, APIs: 3, Instructions: 411COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004EA7E0 Relevance: 4.6, APIs: 3, Instructions: 65COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006B2D30 Relevance: 4.1, Strings: 3, Instructions: 314COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 007211E0 Relevance: 3.4, APIs: 2, Instructions: 449COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005161C0 Relevance: 3.2, Strings: 2, Instructions: 650COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00647B80 Relevance: 3.1, APIs: 2, Instructions: 145windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0071840E Relevance: 2.9, Strings: 2, Instructions: 388COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F20A0 Relevance: 2.6, APIs: 2, Instructions: 79memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00577DB0 Relevance: 2.0, Strings: 1, Instructions: 729COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0069DCA0 Relevance: 1.8, Strings: 1, Instructions: 561COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006A7230 Relevance: 1.8, Strings: 1, Instructions: 540COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0050E910 Relevance: 1.8, Strings: 1, Instructions: 511COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00501110 Relevance: 1.7, Strings: 1, Instructions: 425COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0050A430 Relevance: 1.6, APIs: 1, Instructions: 87COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0050FE20 Relevance: 1.5, APIs: 1, Instructions: 25nativeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006A61E0 Relevance: 1.5, Strings: 1, Instructions: 203COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0053EDF0 Relevance: .8, Instructions: 793COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00503130 Relevance: .6, Instructions: 596COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0069E350 Relevance: .6, Instructions: 554COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006A6420 Relevance: .4, Instructions: 409COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00535E30 Relevance: .4, Instructions: 403COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006A5790 Relevance: .3, Instructions: 309COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00517990 Relevance: .3, Instructions: 288COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0069D890 Relevance: .3, Instructions: 285COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006A5270 Relevance: .2, Instructions: 224COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006A6D10 Relevance: .2, Instructions: 151COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F8970 Relevance: .1, Instructions: 140COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006A38C0 Relevance: .1, Instructions: 138COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0069FB10 Relevance: .1, Instructions: 131COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00502BF0 Relevance: .1, Instructions: 103COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005DCE20 Relevance: .1, Instructions: 86COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00573140 Relevance: .1, Instructions: 82COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00502A80 Relevance: .1, Instructions: 69COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004FB360 Relevance: .1, Instructions: 59COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004FB9C0 Relevance: .1, Instructions: 59COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051E1A0 Relevance: .0, Instructions: 37COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004FAB70 Relevance: .0, Instructions: 28COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00729E5A Relevance: .0, Instructions: 22COMMONLIBRARYCODE
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0071C8BC Relevance: .0, Instructions: 12COMMONLIBRARYCODE
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005435B0 Relevance: 30.2, APIs: 9, Strings: 8, Instructions: 433libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005613E0 Relevance: 28.4, APIs: 9, Strings: 7, Instructions: 427libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0055F8B0 Relevance: 28.4, APIs: 9, Strings: 7, Instructions: 427libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00561A30 Relevance: 28.4, APIs: 9, Strings: 7, Instructions: 427libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00560DB0 Relevance: 28.4, APIs: 9, Strings: 7, Instructions: 427libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00507690 Relevance: 26.7, APIs: 9, Strings: 6, Instructions: 429libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00562060 Relevance: 26.7, APIs: 9, Strings: 6, Instructions: 427libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00562690 Relevance: 26.7, APIs: 9, Strings: 6, Instructions: 427libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00560780 Relevance: 26.7, APIs: 9, Strings: 6, Instructions: 427libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00564990 Relevance: 26.7, APIs: 9, Strings: 6, Instructions: 427libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00542EA0 Relevance: 24.9, APIs: 8, Strings: 6, Instructions: 416libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00540E10 Relevance: 24.9, APIs: 8, Strings: 6, Instructions: 409libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0063FA00 Relevance: 24.9, APIs: 11, Strings: 3, Instructions: 398libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00507C00 Relevance: 24.8, APIs: 8, Strings: 6, Instructions: 339libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F13A0 Relevance: 23.0, APIs: 7, Strings: 6, Instructions: 270libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0063E0B0 Relevance: 23.0, APIs: 11, Strings: 2, Instructions: 214fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0052D670 Relevance: 21.4, APIs: 4, Strings: 8, Instructions: 372libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0064A120 Relevance: 21.2, APIs: 3, Strings: 9, Instructions: 227libraryloaderCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005382A0 Relevance: 19.7, APIs: 9, Strings: 2, Instructions: 496synchronizationthreadCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004EEE10 Relevance: 15.9, APIs: 7, Strings: 2, Instructions: 179processsynchronizationCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0070F12B Relevance: 14.1, APIs: 3, Strings: 5, Instructions: 58libraryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0070F237 Relevance: 12.1, APIs: 8, Instructions: 73memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00648090 Relevance: 11.0, APIs: 7, Instructions: 462fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00505A20 Relevance: 10.8, APIs: 4, Strings: 3, Instructions: 346memoryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0064E8C0 Relevance: 10.8, APIs: 5, Strings: 1, Instructions: 291fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006444E0 Relevance: 10.7, APIs: 5, Strings: 1, Instructions: 179fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00500A20 Relevance: 10.6, APIs: 4, Strings: 2, Instructions: 150fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00646020 Relevance: 10.6, APIs: 7, Instructions: 121processsynchronizationCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0064DCD0 Relevance: 10.6, APIs: 2, Strings: 4, Instructions: 104libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00647D30 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 86libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0064ED10 Relevance: 10.6, APIs: 4, Strings: 2, Instructions: 83libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00729706 Relevance: 10.6, APIs: 4, Strings: 2, Instructions: 74COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0066D620 Relevance: 9.4, APIs: 6, Instructions: 447fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005305E0 Relevance: 9.2, APIs: 6, Instructions: 156COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005303E0 Relevance: 9.1, APIs: 6, Instructions: 142COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004FC230 Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 159threadCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0070ECA5 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 78COMMONLIBRARYCODE
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0071C8DE Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 42libraryloaderCOMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0054A250 Relevance: 7.8, APIs: 4, Strings: 1, Instructions: 276memoryCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0070CCBD Relevance: 7.6, APIs: 5, Instructions: 116threadCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0063C820 Relevance: 7.6, APIs: 5, Instructions: 102COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0063FF90 Relevance: 7.6, APIs: 6, Instructions: 98memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006410B0 Relevance: 7.2, APIs: 2, Strings: 2, Instructions: 241libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 006A0D20 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 147fileCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051C040 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 132stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0062D600 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 99libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F2A10 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 80libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00620B40 Relevance: 7.1, APIs: 1, Strings: 3, Instructions: 76libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0064CDB0 Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 39libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0052A550 Relevance: 6.2, APIs: 4, Instructions: 243COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F1100 Relevance: 6.1, APIs: 4, Instructions: 62threadCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0070D014 Relevance: 6.0, APIs: 4, Instructions: 44COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0063EA70 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 120fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F2B30 Relevance: 5.2, APIs: 4, Instructions: 237memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F2760 Relevance: 5.2, APIs: 4, Instructions: 155memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F04E0 Relevance: 5.1, APIs: 4, Instructions: 142memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0070F399 Relevance: 5.0, APIs: 4, Instructions: 41memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|