Windows
Analysis Report
Label.exe
Overview
General Information
Detection
Score: | 64 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Label.exe (PID: 6396 cmdline:
"C:\Users\ user\Deskt op\Label.e xe" MD5: E12F93D462A622F32A4FF1E646549C42) - cmd.exe (PID: 4444 cmdline:
"C:\Window s\system32 \cmd.exe" /c ping -n 3 127.0.0 .1 >NUL & echo EEEE > "C:\User s\user\Des ktop\Label .exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 4068 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - PING.EXE (PID: 1440 cmdline:
ping -n 3 127.0.0.1 MD5: 2F46799D79D22AC72C241EC0322B011D)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_000000014003E654 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Process created: |
Source: | Code function: | 0_2_0000000140056A50 |
Source: | Code function: | 0_2_000000014002C3A8 |
Source: | Binary or memory string: | memstr_ece8dcda-a |
Source: | Code function: | 0_2_0000000140054154 | |
Source: | Code function: | 0_2_0000000140014234 |
System Summary |
---|
Source: | Zip Entry: | ||
Source: | Zip Entry: |
Source: | Code function: | 0_2_0000000140015FF8 | |
Source: | Code function: | 0_2_0000000140082020 | |
Source: | Code function: | 0_2_000000014003404C | |
Source: | Code function: | 0_2_000000014001A0EC | |
Source: | Code function: | 0_2_0000000140041118 | |
Source: | Code function: | 0_2_000000014004E138 | |
Source: | Code function: | 0_2_0000000140054154 | |
Source: | Code function: | 0_2_0000000140020280 | |
Source: | Code function: | 0_2_000000014000C33C | |
Source: | Code function: | 0_2_000000014002C3A8 | |
Source: | Code function: | 0_2_00000001400373BC | |
Source: | Code function: | 0_2_00000001400383C4 | |
Source: | Code function: | 0_2_00000001400353CC | |
Source: | Code function: | 0_2_00000001400A33EC | |
Source: | Code function: | 0_2_00000001400453F4 | |
Source: | Code function: | 0_2_0000000140022458 | |
Source: | Code function: | 0_2_000000014005948C | |
Source: | Code function: | 0_2_000000014002649C | |
Source: | Code function: | 0_2_00000001400304C4 | |
Source: | Code function: | 0_2_00000001400434F8 | |
Source: | Code function: | 0_2_0000000140027588 | |
Source: | Code function: | 0_2_000000014002D6B0 | |
Source: | Code function: | 0_2_000000014003C6D0 | |
Source: | Code function: | 0_2_0000000140047788 | |
Source: | Code function: | 0_2_00000001401898BC | |
Source: | Code function: | 0_2_000000014002F934 | |
Source: | Code function: | 0_2_000000014003A9A0 | |
Source: | Code function: | 0_2_0000000140056A50 | |
Source: | Code function: | 0_2_0000000140089A44 | |
Source: | Code function: | 0_2_0000000140047AD0 | |
Source: | Code function: | 0_2_00000001400A5B34 | |
Source: | Code function: | 0_2_0000000140197B80 | |
Source: | Code function: | 0_2_0000000140038BAC | |
Source: | Code function: | 0_2_000000014004EBC8 | |
Source: | Code function: | 0_2_0000000140029BF8 | |
Source: | Code function: | 0_2_0000000140190C40 | |
Source: | Code function: | 0_2_0000000140039CE0 | |
Source: | Code function: | 0_2_0000000140055D1C | |
Source: | Code function: | 0_2_000000014000ADB4 | |
Source: | Code function: | 0_2_0000000140037DE0 | |
Source: | Code function: | 0_2_0000000140096E18 | |
Source: | Code function: | 0_2_00000001400E8E28 | |
Source: | Code function: | 0_2_0000000140058E50 | |
Source: | Code function: | 0_2_0000000140025E50 | |
Source: | Code function: | 0_2_000000014000BEE4 | |
Source: | Code function: | 0_2_0000000140043F6C | |
Source: | Code function: | 0_2_00000001400CFFC4 | |
Source: | Code function: | 0_2_01F885F0 | |
Source: | Code function: | 0_2_01FA0494 | |
Source: | Code function: | 0_2_01F87410 | |
Source: | Code function: | 0_2_01FA27A8 | |
Source: | Code function: | 0_2_01F87910 | |
Source: | Code function: | 0_2_01F9E860 | |
Source: | Code function: | 0_2_01F87B70 | |
Source: | Code function: | 0_2_01F9ED30 | |
Source: | Code function: | 0_2_01F91C10 | |
Source: | Code function: | 0_2_01F95F70 | |
Source: | Code function: | 0_2_01F9BF74 | |
Source: | Code function: | 0_2_01F91E8C |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_0000000140007258 |
Source: | Code function: | 0_2_000000014000807C |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_000000014003E924 |
Source: | Code function: | 0_2_000000014003BFF7 | |
Source: | Code function: | 0_2_000000014003BA81 | |
Source: | Code function: | 0_2_000000014003BFCC | |
Source: | Code function: | 0_2_01FAA2CE | |
Source: | Code function: | 0_2_01FA9926 |
Source: | Code function: | 0_2_0000000140004430 | |
Source: | Code function: | 0_2_0000000140046A00 | |
Source: | Code function: | 0_2_000000014002CBC8 | |
Source: | Code function: | 0_2_0000000140015FC4 |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | API coverage: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Code function: | 0_2_000000014003E654 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: | 0_2_0000000140185454 |
Source: | Code function: | 0_2_0000000140009FF0 |
Source: | Code function: | 0_2_000000014003E924 |
Source: | Code function: | 0_2_000000014018A7FC | |
Source: | Code function: | 0_2_0000000140184BFC |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_01FA25F0 |
Source: | Code function: | 0_2_000000014001C3CC |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_0000000140184E98 |
Source: | Code function: | 0_2_0000000140005240 |
Source: | Binary or memory string: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Native API | 1 DLL Side-Loading | 11 Process Injection | 11 Process Injection | 31 Input Capture | 1 System Time Discovery | Remote Services | 31 Input Capture | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Obfuscated Files or Information | LSASS Memory | 31 Security Software Discovery | Remote Desktop Protocol | 1 Archive Collected Data | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 DLL Side-Loading | Security Account Manager | 1 Application Window Discovery | SMB/Windows Admin Shares | 1 Clipboard Data | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | 1 Remote System Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | 1 System Network Configuration Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | Steganography | Cached Domain Credentials | 3 File and Directory Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | Compile After Delivery | DCSync | 33 System Information Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
42% | ReversingLabs | Win64.Backdoor.Preft | ||
62% | Virustotal | Browse |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|
IP |
---|
127.0.0.1 |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1525466 |
Start date and time: | 2024-10-04 09:17:09 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 36s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 8 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Label.exe |
Detection: | MAL |
Classification: | mal64.troj.evad.winEXE@6/6@0/1 |
EGA Information: |
|
HCA Information: | Failed |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing disassembly code.
- Report size getting too big, too many NtOpenFile calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtSetInformationFile calls found.
Process: | C:\Users\user\Desktop\Label.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 5209155 |
Entropy (8bit): | 7.999971086114151 |
Encrypted: | true |
SSDEEP: | 98304:1nNMt4OEk4QD1LfAVyfaMeTBSgyDVQw31AuQX471A:1NAik4QNfwFMeTBSiiDP |
MD5: | 97E12642562963839F57295FE4956C4A |
SHA1: | CEDB2F227A7F57B4A3C4B3F886647A090FCB2A1B |
SHA-256: | EDB96A1DED100A20DBDE74D16E75CAD6FFAADF17E18C8C4E24137AF15D3EEF10 |
SHA-512: | 1BA2FBBDDBBCBA141DEC69E4ABD1AFE5D90306F44BA4F3FC12175BABE6CCFB10C5F9465EC862D6C14280E58841AC10DB683D3B46EA682E9AD0916A1A971E8517 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Label.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 5208876 |
Entropy (8bit): | 7.999970639752912 |
Encrypted: | true |
SSDEEP: | 98304:FnNMt4OEk4QD1LfAVyfaMeTBSgyDVQw31AuQX471AJ:FNAik4QNfwFMeTBSiiDPU |
MD5: | 1227D1E23D584D086E22B224D124A012 |
SHA1: | 85C906E90E1C954D2708C5BBCA62009C265C1C45 |
SHA-256: | 838FB96586C8AB1947EE23B7BEAD7770023AA1B428016399712F2860C3E538CF |
SHA-512: | BBD9BB9F9B7E3E0773C336AC9CF99A9319A54C5B211593F812D9BD8BF3C76E7BBCEB4E820C93D110BBFC0F4B8E5C26E8582A570B6CCDD56F7291880AA3B605FB |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Label.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 20652840 |
Entropy (8bit): | 6.121611638874144 |
Encrypted: | false |
SSDEEP: | 393216:S4exspmNOEmwp15YBV6w9NOEmwGQA7L6oQ+oOEmwV3Lx:S4exspmNOEmwp15YBV6w9NOEmwGQA7Lg |
MD5: | FB34AB10F355B61BE843A899A334449E |
SHA1: | ED4944C873850AE9F8BEDD1D0BE85B3D81B52556 |
SHA-256: | 04ABE2480DC404B9B9214E4800702A196D1B12C4153BABCE55BD1C2E64A52946 |
SHA-512: | BE4433E53C94F76B0FEDC3567DC9FBD2A5A19F1B4460C57A324A8593965EFF62FE97868738AABB83432319F379E4965D7F89FDFDA0BAD79CC67C7A98D868BEFA |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Label.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 5210232 |
Entropy (8bit): | 7.999963265858713 |
Encrypted: | true |
SSDEEP: | 98304:jICnc/LUeqT15hUaIq3CmeEuzEHvlfQ6H4q2w2uvWkVkkVExk:ctmTPeaIq3CuqmvW6H4uHWOOk |
MD5: | 98F2CC920C7650DB145034B3306FFC0E |
SHA1: | E2B97C98C3EDF69DEC0B5E58898987E0B9677E37 |
SHA-256: | C5FBD968641A6856268EE62F9019DF0687D64D6F8F2297D8B4741BF272DDEDE4 |
SHA-512: | 01F85DE0A27350A8B47133A583919D1CB88BC39BE916CCCBB51840AA1A3AA2A906243E8AF24537987D93A0609809040D470689529C575C4E7778EC4E55449F8D |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 7 |
Entropy (8bit): | 1.6644977792004616 |
Encrypted: | false |
SSDEEP: | 3:xyn:gn |
MD5: | A0D776B42F75469801072FB25BCF8117 |
SHA1: | E6EA266288CB636D33EA2BA9CED2C123EB7C1077 |
SHA-256: | 7AB3F076E70350F06AD19863FDD9E794648020F621C0B1BD20AD4D80F0745142 |
SHA-512: | 0BCA7A9AEB4A9532B1F24C0EFB1D40836F969CB559CC445FCF422670BB1D16BB9B1EC7E3FC20188189C37B863834555C4F6B7DD116BD6187C12814DB9EE6B04A |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\PING.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 380 |
Entropy (8bit): | 4.937448817509359 |
Encrypted: | false |
SSDEEP: | 6:PzLSLzMRfmWxHLThx2LThx2LThx0sW26wGv+wAFeMmvVOIHJFxMVlmJHaVFEG1vv:PKMRJpTeTeT0sKvtAFSkIrxMVlmJHaVz |
MD5: | 63A3D026F6E4381585F5AEFACE172263 |
SHA1: | 3EA8FDD98AA9F20167008F57DAA6F8ED3ECA9738 |
SHA-256: | 4C31393CE8AE5EA969A049B3FF5DD0EA18E6C29E0E59841BEC1D7AFB7C64DE4C |
SHA-512: | FB88787000A6D258A1E3AAB97C46B8D92E68071B8E55C8F98278CB474AE6AFB31256A58BF198132D251F8EC666F28C085A88A103C8DB029B3B188F77163BE793 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
File type: | |
Entropy (8bit): | 6.41578623250506 |
TrID: |
|
File name: | Label.exe |
File size: | 2'814'800 bytes |
MD5: | e12f93d462a622f32a4ff1e646549c42 |
SHA1: | 540853beffb0ba9b26cf305bcf92fad82599eb3c |
SHA256: | f64dab23c50e3d131abcc1bdbb35ce9d68a34920dd77677730568c24a84411c5 |
SHA512: | 1def378e0ca7d2e861ad2e3443e471fa797b01fa92f9c539850912307546c4deef54e53e13b8bc23dce2b2156d7d8795e8c51c16e9ea03a5525574a497b44999 |
SSDEEP: | 49152:shQu5h/rBAEcMWGPODLKDakFxxQsEnhrAWKu6j112C4WR:shL/rOA2aDVdEnh8WKu6j11sm |
TLSH: | CCD58D57A7F860E4E5A6D034CA169A4BD7F2B9B10930C35F1069079E2FB3A634D1F722 |
File Content Preview: | MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.........a....@...@...@#r.@...@#r.@0..@#r.@...@...@...@...@...@...@...@...@...@...@...@r..A...@r..A...@r..A...@e..A...@e..@...@...@... |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x14018428c |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x140000000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x66206374 [Thu Apr 18 00:04:04 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 2 |
File Version Major: | 5 |
File Version Minor: | 2 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 2 |
Import Hash: | a534d17950d1f47f4f54eaad221c89b9 |
Signature Valid: | false |
Signature Issuer: | CN=Tableau Software Inc. |
Signature Validation Error: | A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider |
Error Number: | -2146762487 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 1DC7895A0C06936950D50A29047999BE |
Thumbprint SHA-1: | 6624C7B8FAAC176D1C1CB10B03E7EE58A4853F91 |
Thumbprint SHA-256: | F76D6AE999702C40C74D2575A2923F571359B90743A80BB5445C442C7C558EF6 |
Serial: | 76CB5D1E6C2B6895428115705D9AC765 |
Instruction |
---|
dec eax |
sub esp, 28h |
call 00007F986D453478h |
dec eax |
add esp, 28h |
jmp 00007F986D4526E7h |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
nop word ptr [eax+eax+00000000h] |
dec eax |
cmp ecx, dword ptr [000CC651h] |
jne 00007F986D452885h |
dec eax |
rol ecx, 10h |
test cx, FFFFh |
jne 00007F986D452875h |
ret |
dec eax |
ror ecx, 10h |
jmp 00007F986D4531D4h |
int3 |
int3 |
int3 |
dec eax |
sub esp, 28h |
call 00007F986D4539BCh |
test eax, eax |
je 00007F986D452893h |
dec eax |
mov eax, dword ptr [00000030h] |
dec eax |
mov ecx, dword ptr [eax+08h] |
jmp 00007F986D452877h |
dec eax |
cmp ecx, eax |
je 00007F986D452886h |
xor eax, eax |
dec eax |
cmpxchg dword ptr [000DB890h], ecx |
jne 00007F986D452860h |
xor al, al |
dec eax |
add esp, 28h |
ret |
mov al, 01h |
jmp 00007F986D452869h |
int3 |
int3 |
int3 |
inc eax |
push ebx |
dec eax |
sub esp, 20h |
movzx eax, byte ptr [000DB8ABh] |
test ecx, ecx |
mov ebx, 00000001h |
cmove eax, ebx |
mov byte ptr [000DB89Bh], al |
call 00007F986D4537A3h |
call 00007F986D4565EAh |
test al, al |
jne 00007F986D452876h |
xor al, al |
jmp 00007F986D452886h |
call 00007F986D466499h |
test al, al |
jne 00007F986D45287Bh |
xor ecx, ecx |
call 00007F986D45660Ah |
jmp 00007F986D45285Ch |
mov al, bl |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x24ea00 | 0x168 | |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x278000 | 0x4eec | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x262000 | 0x14c28 | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x2aee00 | 0x550 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x27d000 | 0xe9ac | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x215630 | 0x38 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x215708 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x215670 | 0x94 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x1ad150 | 0x1ad200 | 4be930738102f846c54a672d99a79a68 | False | 0.5295966993154675 | zlib compressed data | 6.4327759160342355 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x1af000 | 0x9f8a8 | 0x9fe00 | 5156067d27246d9f4b16f143bc293e13 | False | 0.27048719702892887 | OpenPGP Secret Key | 4.447896011976656 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.data | 0x24f000 | 0x12230 | 0x7000 | 8827661362822a66a4bb9aa6840584de | False | 0.19649832589285715 | data | 4.079716207632309 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0x262000 | 0x14c28 | 0x14e00 | 4cfc2f504eb9366845bba5495062b439 | False | 0.5026197604790419 | data | 6.147173678052106 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.tls | 0x277000 | 0x9 | 0x200 | 1f354d76203061bfdd5a53dae48d5435 | False | 0.033203125 | data | 0.020393135236084953 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x278000 | 0x4eec | 0x5000 | 597e8bdf6e836f5f3e1f9d82e253278e | False | 0.249658203125 | data | 3.790377888275123 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x27d000 | 0xe9ac | 0xea00 | ee08a85204b75eb7f518298f70e7edd0 | False | 0.09328258547008547 | Targa image data - RLE 41720 x 41728 x 8 +41696 +41704 - 3-bit alpha - top - four way interleave | 5.449872048239219 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_CURSOR | 0x278a60 | 0x134 | Targa image data - RGB 64 x 65536 x 1 +32 "\001" | English | United States | 0.4805194805194805 |
RT_CURSOR | 0x278b94 | 0xb4 | Targa image data - Map 32 x 65536 x 1 +16 "\001" | English | United States | 0.7 |
RT_CURSOR | 0x278c48 | 0x134 | AmigaOS bitmap font "(", fc_YSize 4294967264, 5120 elements, 2nd "\377\360?\377\377\370\177\377\377\374\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rd | English | United States | 0.36363636363636365 |
RT_CURSOR | 0x278d7c | 0x134 | Targa image data - RLE 64 x 65536 x 1 +32 "\001" | English | United States | 0.35714285714285715 |
RT_CURSOR | 0x278eb0 | 0x134 | data | English | United States | 0.37337662337662336 |
RT_CURSOR | 0x278fe4 | 0x134 | data | English | United States | 0.37662337662337664 |
RT_CURSOR | 0x279118 | 0x134 | Targa image data 64 x 65536 x 1 +32 "\001" | English | United States | 0.36688311688311687 |
RT_CURSOR | 0x27924c | 0x134 | Targa image data 64 x 65536 x 1 +32 "\001" | English | United States | 0.37662337662337664 |
RT_CURSOR | 0x279380 | 0x134 | Targa image data - Mono - RLE 64 x 65536 x 1 +32 "\001" | English | United States | 0.36688311688311687 |
RT_CURSOR | 0x2794b4 | 0x134 | Targa image data - RGB - RLE 64 x 65536 x 1 +32 "\001" | English | United States | 0.38636363636363635 |
RT_CURSOR | 0x2795e8 | 0x134 | data | English | United States | 0.44155844155844154 |
RT_CURSOR | 0x27971c | 0x134 | data | English | United States | 0.4155844155844156 |
RT_CURSOR | 0x279850 | 0x134 | AmigaOS bitmap font "(", fc_YSize 4294966847, 3840 elements, 2nd "\377?\374\377\377\300\003\377\377\300\003\377\377\340\007\377\377\360\017\377\377\370\037\377\377\374?\377\377\376\177\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rd | English | United States | 0.5422077922077922 |
RT_CURSOR | 0x279984 | 0x134 | data | English | United States | 0.2662337662337662 |
RT_CURSOR | 0x279ab8 | 0x134 | data | English | United States | 0.2824675324675325 |
RT_CURSOR | 0x279bec | 0x134 | data | English | United States | 0.3246753246753247 |
RT_BITMAP | 0x279d20 | 0xb8 | Device independent bitmap graphic, 12 x 10 x 4, image size 80 | English | United States | 0.44565217391304346 |
RT_BITMAP | 0x279dd8 | 0x144 | Device independent bitmap graphic, 33 x 11 x 4, image size 220 | English | United States | 0.37962962962962965 |
RT_DIALOG | 0x279f1c | 0x1c8 | data | English | United States | 0.5416666666666666 |
RT_DIALOG | 0x27a0e4 | 0xe8 | data | English | United States | 0.6336206896551724 |
RT_DIALOG | 0x27a1cc | 0x34 | data | English | United States | 0.9038461538461539 |
RT_STRING | 0x27a200 | 0x82 | StarOffice Gallery theme p, 536899072 objects, 1st n | English | United States | 0.7153846153846154 |
RT_STRING | 0x27a284 | 0x2a | data | English | United States | 0.5476190476190477 |
RT_STRING | 0x27a2b0 | 0x184 | data | English | United States | 0.48711340206185566 |
RT_STRING | 0x27a434 | 0x4ee | data | English | United States | 0.375594294770206 |
RT_STRING | 0x27a924 | 0x264 | data | English | United States | 0.3333333333333333 |
RT_STRING | 0x27ab88 | 0x2da | data | English | United States | 0.3698630136986301 |
RT_STRING | 0x27ae64 | 0x8a | data | English | United States | 0.6594202898550725 |
RT_STRING | 0x27aef0 | 0xac | data | English | United States | 0.45348837209302323 |
RT_STRING | 0x27af9c | 0xde | data | English | United States | 0.536036036036036 |
RT_STRING | 0x27b07c | 0x4a8 | data | English | United States | 0.3221476510067114 |
RT_STRING | 0x27b524 | 0x228 | data | English | United States | 0.4003623188405797 |
RT_STRING | 0x27b74c | 0x2c | data | English | United States | 0.5227272727272727 |
RT_STRING | 0x27b778 | 0x53e | data | English | United States | 0.2965722801788376 |
RT_GROUP_CURSOR | 0x27bcb8 | 0x22 | Lotus unknown worksheet or configuration, revision 0x2 | English | United States | 0.9705882352941176 |
RT_GROUP_CURSOR | 0x27bcdc | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x27bcf0 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x27bd04 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x27bd18 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x27bd2c | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x27bd40 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x27bd54 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x27bd68 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x27bd7c | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x27bd90 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x27bda4 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x27bdb8 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x27bdcc | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x27bde0 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_VERSION | 0x27bdf4 | 0x6ec | data | 0.34706546275395034 | ||
RT_VERSION | 0x27c4e0 | 0x6ec | data | English | United States | 0.34706546275395034 |
RT_MANIFEST | 0x27cbcc | 0x31e | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (738), with CRLF line terminators | English | United States | 0.5225563909774437 |
DLL | Import |
---|---|
KERNEL32.dll | SetEnvironmentVariableA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCPInfo, GetOEMCP, IsValidCodePage, FindNextFileW, FindFirstFileExW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, GetTimeZoneInformation, GetStringTypeW, LCMapStringW, GetACP, ExitProcess, GetStdHandle, GetFileType, SetStdHandle, VirtualQuery, VirtualAlloc, GetSystemInfo, QueryPerformanceFrequency, HeapQueryInformation, FreeLibraryAndExitThread, ExitThread, CreateThread, GetCommandLineW, GetCommandLineA, RtlUnwindEx, RtlPcToFileHeader, OutputDebugStringW, WriteConsoleW, TlsSetValue, LockResource, LoadResource, FindResourceW, MultiByteToWideChar, HeapFree, EnterCriticalSection, InitializeCriticalSectionAndSpinCount, LeaveCriticalSection, HeapSize, GetLastError, HeapReAlloc, RaiseException, HeapAlloc, DecodePointer, DeleteCriticalSection, GetProcessHeap, GetCurrentThread, GetCurrentThreadId, GetVersionExW, FreeLibrary, GetModuleFileNameW, LoadLibraryExW, GlobalAlloc, GlobalLock, GlobalDeleteAtom, lstrcmpA, lstrcmpW, WideCharToMultiByte, lstrcpyW, GetModuleHandleW, GetProcAddress, GetPrivateProfileIntW, GetPrivateProfileStringW, WritePrivateProfileStringW, OutputDebugStringA, SetLastError, FreeResource, GetModuleHandleExW, GlobalUnlock, GlobalFree, LoadLibraryW, CreateActCtxW, ActivateActCtx, DeactivateActCtx, FindActCtxSectionStringW, QueryActCtxW, GetCurrentProcessId, GlobalSize, LocalFree, MulDiv, FormatMessageW, CopyFileW, CloseHandle, SetEvent, WaitForSingleObject, CreateEventW, SetThreadPriority, ResumeThread, GlobalAddAtomW, EncodePointer, GetSystemDirectoryW, GlobalFindAtomW, InitializeCriticalSection, TlsAlloc, TlsGetValue, SizeofResource, TlsFree, GlobalReAlloc, GlobalHandle, LocalAlloc, LocalReAlloc, GetCurrentDirectoryW, CompareStringW, GetLocaleInfoW, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, GlobalFlags, DeleteFileW, GlobalGetAtomNameW, FileTimeToSystemTime, CreateFileW, FindClose, FindFirstFileW, FlushFileBuffers, GetFileSize, GetFullPathNameW, GetVolumeInformationW, LockFile, ReadFile, SetEndOfFile, SetFilePointer, UnlockFile, WriteFile, DuplicateHandle, GetCurrentProcess, lstrcmpiW, VerSetConditionMask, VerifyVersionInfoW, VirtualProtect, SetErrorMode, FileTimeToLocalFileTime, GetFileAttributesW, GetFileAttributesExW, GetFileSizeEx, GetFileTime, SystemTimeToTzSpecificLocalTime, GetWindowsDirectoryW, SearchPathW, GetTickCount, GetProfileIntW, Sleep, GetTempFileNameW, GetTempPathW, FindResourceExW, ResetEvent, WaitForSingleObjectEx, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW |
USER32.dll | EnumDisplayMonitors, SetLayeredWindowAttributes, DestroyIcon, MonitorFromPoint, UnionRect, EnableScrollBar, DestroyMenu, UpdateLayeredWindow, IsRectEmpty, SetMenuDefaultItem, GetMenuDefaultItem, GetMenuItemInfoW, CreatePopupMenu, NotifyWinEvent, MessageBeep, SetWindowRgn, GetSystemMenu, GetAsyncKeyState, CharUpperW, IsZoomed, TrackMouseEvent, GetSysColorBrush, LoadMenuW, IntersectRect, InflateRect, KillTimer, SetTimer, RealChildWindowFromPoint, DeleteMenu, SystemParametersInfoW, CopyImage, LoadCursorW, WindowFromPoint, ReleaseCapture, SetCapture, WaitMessage, OffsetRect, SetRectEmpty, SendDlgItemMessageA, IsDialogMessageW, SetWindowTextW, CheckDlgButton, MoveWindow, ShowWindow, GetMonitorInfoW, MonitorFromWindow, WinHelpW, GetScrollInfo, SetScrollInfo, GetWindow, GetTopWindow, GetClassLongPtrW, SetWindowLongPtrW, GetWindowLongPtrW, SetWindowLongW, EqualRect, MapWindowPoints, AdjustWindowRectEx, GetWindowTextLengthW, GetWindowTextW, RemovePropW, GetPropW, SetPropW, ShowScrollBar, GetScrollRange, SetScrollRange, GetScrollPos, SetScrollPos, ScrollWindow, RedrawWindow, SetForegroundWindow, GetForegroundWindow, TrackPopupMenu, MapDialogRect, GetMenu, GetCapture, SetFocus, GetDlgCtrlID, EndDeferWindowPos, DeferWindowPos, BeginDeferWindowPos, SetWindowPlacement, GetWindowPlacement, SetWindowPos, IsChild, IsMenu, CreateWindowExW, GetClassInfoExW, GetClassInfoW, RegisterClassW, CallWindowProcW, LoadImageW, BringWindowToTop, LoadAcceleratorsW, CreateDialogIndirectParamW, EndDialog, GetDlgItem, GetNextDlgTabItem, GetActiveWindow, DefWindowProcW, GetMessageTime, GetMessagePos, GetClassNameW, InvalidateRect, UpdateWindow, DrawStateW, SetCursor, ShowOwnedPopups, ValidateRect, GetKeyState, IsWindowVisible, PeekMessageW, DispatchMessageW, TranslateMessage, TranslateAcceleratorW, InsertMenuItemW, UnpackDDElParam, ReuseDDElParam, OpenClipboard, CloseClipboard, SetClipboardData, EmptyClipboard, DrawIconEx, SetRect, RegisterClipboardFormatW, DrawEdge, DrawFrameControl, GetMessageW, LoadBitmapW, DrawFocusRect, SetClassLongPtrW, SetParent, CharUpperBuffW, LockWindowUpdate, ModifyMenuW, ToUnicodeEx, DestroyAcceleratorTable, IsWindowEnabled, SetActiveWindow, GetWindowLongW, GetDesktopWindow, GetParent, GetKeyNameTextW, MapVirtualKeyW, GetDC, ReleaseDC, CopyRect, MessageBoxW, GetWindowThreadProcessId, GetLastActivePopup, GetMenuStringW, GetMenuState, GetSubMenu, GetMenuItemID, GetMenuItemCount, InsertMenuW, AppendMenuW, RemoveMenu, DrawTextW, DrawTextExW, GrayStringW, TabbedTextOutW, GetWindowDC, BeginPaint, EndPaint, ClientToScreen, ScreenToClient, GetSysColor, FillRect, GetFocus, GetWindowRect, GetCursorPos, PtInRect, SetWindowsHookExW, UnhookWindowsHookEx, CallNextHookEx, CheckMenuItem, EnableMenuItem, SetMenuItemBitmaps, GetMenuCheckMarkDimensions, SetMenuItemInfoW, GetKeyboardLayout, GetKeyboardState, CreateAcceleratorTableW, EnableWindow, LoadIconW, SendMessageW, IsIconic, GetSystemMetrics, GetClientRect, DrawIcon, UnregisterClassW, PostMessageW, PostQuitMessage, RegisterWindowMessageW, IsWindow, GetWindowRgn, SubtractRect, CreateMenu, GetUpdateRect, GetComboBoxInfo, MapVirtualKeyExW, IsCharLowerW, TranslateMDISysAccel, DefMDIChildProcW, DefFrameProcW, DrawMenuBar, DestroyCursor, GetDoubleClickTime, IsClipboardFormatAvailable, InvertRect, HideCaret, GetIconInfo, GetNextDlgGroupItem, PostThreadMessageW, FrameRect, CopyIcon, SetCursorPos, CopyAcceleratorTableW, SetMenu, DestroyWindow |
GDI32.dll | GetTextFaceW, SetPixelV, GetWindowOrgEx, GetViewportOrgEx, PtInRegion, GetBoundsRect, FrameRgn, FillRgn, RoundRect, SetPaletteEntries, ExtFloodFill, LPtoDP, GetSystemPaletteEntries, GetPaletteEntries, GetNearestPaletteIndex, CreatePalette, EnumFontFamiliesExW, Rectangle, Polyline, Polygon, CreatePolygonRgn, GetBkColor, Ellipse, CreateEllipticRgn, OffsetRgn, GetRgnBox, GetTextColor, SetDIBColorTable, StretchBlt, SetPixel, RealizePalette, GetTextCharsetInfo, EnumFontFamiliesW, CreateDIBitmap, CreateDIBSection, CreateCompatibleBitmap, CreateRoundRectRgn, DPtoLP, SetRectRgn, CombineRgn, GetTextMetricsW, GetTextExtentPoint32W, CreateFontIndirectW, ScaleWindowExtEx, ScaleViewportExtEx, OffsetWindowOrgEx, OffsetViewportOrgEx, SetWindowOrgEx, SetWindowExtEx, SetViewportOrgEx, SetViewportExtEx, ExtTextOutW, TextOutW, MoveToEx, GetObjectW, SetTextAlign, SetTextColor, SetROP2, SetPolyFillMode, GetLayout, SetLayout, SetMapMode, SetBkMode, SetBkColor, SelectPalette, SelectObject, ExtSelectClipRgn, SelectClipRgn, SaveDC, RestoreDC, RectVisible, PtVisible, LineTo, IntersectClipRect, GetWindowExtEx, GetViewportExtEx, GetStockObject, GetPixel, GetObjectType, GetClipBox, ExcludeClipRect, Escape, DeleteObject, CreateSolidBrush, CreateRectRgn, CreatePatternBrush, CreatePen, CreateHatchBrush, CreateCompatibleDC, CreateBitmap, BitBlt, GetDeviceCaps, CreateDCW, CopyMetaFileW, PatBlt, CreateRectRgnIndirect, DeleteDC |
MSIMG32.dll | AlphaBlend, TransparentBlt |
WINSPOOL.DRV | DocumentPropertiesW, OpenPrinterW, ClosePrinter |
ADVAPI32.dll | SystemFunction036, RegOpenKeyExW, RegQueryValueExW, RegEnumKeyExW, RegEnumValueW, RegQueryValueW, RegEnumKeyW, RegSetValueExW, RegDeleteValueW, RegDeleteKeyW, RegCreateKeyExW, RegCloseKey |
SHELL32.dll | SHGetMalloc, SHGetPathFromIDListW, SHGetSpecialFolderLocation, SHBrowseForFolderW, SHAppBarMessage, ShellExecuteW, DragFinish, DragQueryFileW, SHGetFileInfoW, SHGetDesktopFolder |
COMCTL32.dll | InitCommonControlsEx |
SHLWAPI.dll | PathFindFileNameW, PathIsUNCW, StrFormatKBSizeW, PathRemoveFileSpecW, PathStripToRootW, PathFindExtensionW |
UxTheme.dll | GetThemePartSize, GetThemeSysColor, GetWindowTheme, IsThemeBackgroundPartiallyTransparent, IsAppThemed, DrawThemeText, DrawThemeParentBackground, OpenThemeData, CloseThemeData, DrawThemeBackground, GetThemeColor, GetCurrentThemeName |
ole32.dll | OleCreateMenuDescriptor, OleDestroyMenuDescriptor, OleTranslateAccelerator, IsAccelerator, OleLockRunning, RevokeDragDrop, RegisterDragDrop, CoLockObjectExternal, OleGetClipboard, CoInitializeEx, CreateStreamOnHGlobal, DoDragDrop, CoDisconnectObject, ReleaseStgMedium, OleDuplicateData, CoTaskMemFree, CoTaskMemAlloc, CoInitialize, CoCreateInstance, CoCreateGuid, CoUninitialize |
OLEAUT32.dll | VariantChangeType, LoadTypeLib, SysStringLen, SystemTimeToVariantTime, VariantTimeToSystemTime, VariantClear, VariantCopy, VarBstrFromDate, VariantInit, SysAllocStringLen, SysFreeString, SysAllocString |
gdiplus.dll | GdipDrawImageRectI, GdipSetInterpolationMode, GdipCreateFromHDC, GdipCreateBitmapFromHBITMAP, GdipDrawImageI, GdipDeleteGraphics, GdipBitmapUnlockBits, GdipBitmapLockBits, GdipCreateBitmapFromScan0, GdipCreateBitmapFromStream, GdipGetImagePaletteSize, GdipGetImagePalette, GdipGetImagePixelFormat, GdipGetImageHeight, GdipGetImageWidth, GdipGetImageGraphicsContext, GdipDisposeImage, GdipCloneImage, GdiplusStartup, GdipFree, GdiplusShutdown, GdipAlloc |
OLEACC.dll | AccessibleObjectFromWindow, LresultFromObject, CreateStdAccessibleObject |
WINMM.dll | PlaySoundW |
IMM32.dll | ImmGetContext, ImmGetOpenStatus, ImmReleaseContext |
kernel32.dll | LoadLibraryA, GetModuleHandleA, CreateFileA, GetModuleFileNameA, VirtualFree |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 03:18:00 |
Start date: | 04/10/2024 |
Path: | C:\Users\user\Desktop\Label.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x140000000 |
File size: | 2'814'800 bytes |
MD5 hash: | E12F93D462A622F32A4FF1E646549C42 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 4 |
Start time: | 03:18:48 |
Start date: | 04/10/2024 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6fee60000 |
File size: | 289'792 bytes |
MD5 hash: | 8A2122E8162DBEF04694B9C3E0B6CDEE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 03:18:49 |
Start date: | 04/10/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 03:18:49 |
Start date: | 04/10/2024 |
Path: | C:\Windows\System32\PING.EXE |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7cbe80000 |
File size: | 22'528 bytes |
MD5 hash: | 2F46799D79D22AC72C241EC0322B011D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Execution Graph
Execution Coverage: | 0% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 0% |
Total number of Nodes: | 7 |
Total number of Limit Nodes: | 2 |
Graph
Function 0000000140198110 Relevance: 1.3, APIs: 1, Instructions: 36memoryCOMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140041118 Relevance: 49.4, APIs: 27, Strings: 1, Instructions: 426windowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014002C3A8 Relevance: 42.5, APIs: 28, Instructions: 491keyboardCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014000BEE4 Relevance: 38.8, APIs: 21, Strings: 1, Instructions: 276windowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014004EBC8 Relevance: 37.2, APIs: 20, Strings: 1, Instructions: 471windowstringCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140047AD0 Relevance: 33.8, APIs: 17, Strings: 2, Instructions: 579windowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140055D1C Relevance: 33.6, APIs: 18, Strings: 1, Instructions: 331windowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140022458 Relevance: 33.5, APIs: 18, Strings: 1, Instructions: 233windowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140054154 Relevance: 31.8, APIs: 16, Strings: 2, Instructions: 330windowkeyboardCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014000C33C Relevance: 31.7, APIs: 17, Strings: 1, Instructions: 230windowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140058E50 Relevance: 30.0, APIs: 16, Strings: 1, Instructions: 260COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400A5B34 Relevance: 28.8, APIs: 19, Instructions: 278windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140043F6C Relevance: 28.2, APIs: 15, Strings: 1, Instructions: 179COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400A33EC Relevance: 24.8, APIs: 13, Strings: 1, Instructions: 348windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400434F8 Relevance: 24.7, APIs: 13, Strings: 1, Instructions: 228memorywindowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014002CBC8 Relevance: 24.3, APIs: 16, Instructions: 260windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01F9ED30 Relevance: 24.1, APIs: 9, Strings: 4, Instructions: 1310COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140037DE0 Relevance: 23.1, APIs: 10, Strings: 3, Instructions: 383windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400E8E28 Relevance: 22.7, APIs: 15, Instructions: 196windowstringCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400353CC Relevance: 21.4, APIs: 11, Strings: 1, Instructions: 424keyboardwindowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014003A9A0 Relevance: 21.2, APIs: 10, Strings: 2, Instructions: 188timeCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014003C6D0 Relevance: 19.7, APIs: 13, Instructions: 243windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400383C4 Relevance: 19.6, APIs: 10, Strings: 1, Instructions: 310windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001A0EC Relevance: 18.1, APIs: 12, Instructions: 140windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014003404C Relevance: 17.9, APIs: 7, Strings: 3, Instructions: 409windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014005948C Relevance: 16.7, APIs: 11, Instructions: 240COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400373BC Relevance: 16.1, APIs: 8, Strings: 1, Instructions: 310windowtimeCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140020280 Relevance: 14.4, APIs: 7, Strings: 1, Instructions: 445windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140056A50 Relevance: 13.7, APIs: 9, Instructions: 180windowclipboardCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140009FF0 Relevance: 12.3, APIs: 5, Strings: 2, Instructions: 82COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001C3CC Relevance: 12.3, APIs: 5, Strings: 2, Instructions: 62libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014000ADB4 Relevance: 12.2, APIs: 8, Instructions: 236filecommemoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014018A7FC Relevance: 9.1, APIs: 6, Instructions: 83COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014003E924 Relevance: 7.6, APIs: 5, Instructions: 50libraryloaderCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140038BAC Relevance: 7.4, APIs: 2, Strings: 2, Instructions: 433windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140185454 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 42COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140039CE0 Relevance: 6.3, APIs: 4, Instructions: 287keyboardCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140014234 Relevance: 6.0, APIs: 4, Instructions: 49keyboardwindowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01FA0494 Relevance: 1.7, APIs: 1, Instructions: 194COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01F87B70 Relevance: 1.7, Strings: 1, Instructions: 426COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01F87410 Relevance: 1.5, Strings: 1, Instructions: 283COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001401898BC Relevance: 1.5, Strings: 1, Instructions: 219COMMONLIBRARYCODE
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140197B80 Relevance: 1.4, Strings: 1, Instructions: 139COMMONLIBRARYCODE
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01F87910 Relevance: 1.4, Strings: 1, Instructions: 135COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140029BF8 Relevance: .2, Instructions: 185COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01F885F0 Relevance: .2, Instructions: 170COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01FA25F0 Relevance: .0, Instructions: 32COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400408BC Relevance: 63.3, APIs: 42, Instructions: 315COMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400404E7 Relevance: 49.2, APIs: 23, Strings: 5, Instructions: 220stringCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400021A8 Relevance: 42.0, APIs: 12, Strings: 12, Instructions: 45registryclipboardCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01F81F90 Relevance: 40.5, APIs: 11, Strings: 12, Instructions: 236stringCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140059D00 Relevance: 31.7, APIs: 17, Strings: 1, Instructions: 173windowCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140034B5C Relevance: 26.6, APIs: 13, Strings: 2, Instructions: 324timewindowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140056DC4 Relevance: 26.5, APIs: 14, Strings: 1, Instructions: 208windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140016D3C Relevance: 24.7, APIs: 12, Strings: 2, Instructions: 154COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140011F20 Relevance: 24.2, APIs: 16, Instructions: 167windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001A45C Relevance: 24.2, APIs: 16, Instructions: 157windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400496F8 Relevance: 22.7, APIs: 15, Instructions: 207windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140021BB0 Relevance: 21.2, APIs: 11, Strings: 1, Instructions: 212COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140009004 Relevance: 21.1, APIs: 10, Strings: 2, Instructions: 92libraryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014005A294 Relevance: 19.4, APIs: 10, Strings: 1, Instructions: 189COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400711F4 Relevance: 19.4, APIs: 1, Strings: 10, Instructions: 176COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400B2C28 Relevance: 17.8, APIs: 9, Strings: 1, Instructions: 267windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001B6E8 Relevance: 17.6, APIs: 5, Strings: 5, Instructions: 71libraryloadercomCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01F810A0 Relevance: 16.0, APIs: 6, Strings: 3, Instructions: 288stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140041850 Relevance: 15.9, APIs: 8, Strings: 1, Instructions: 152windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01F997B0 Relevance: 15.9, APIs: 1, Strings: 8, Instructions: 117COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014016E9D4 Relevance: 15.9, APIs: 8, Strings: 1, Instructions: 114COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140011CE0 Relevance: 15.8, APIs: 6, Strings: 3, Instructions: 64libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014002AD44 Relevance: 15.3, APIs: 10, Instructions: 289windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001AC08 Relevance: 15.1, APIs: 10, Instructions: 115memoryCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140053BE0 Relevance: 15.1, APIs: 10, Instructions: 85keyboardwindowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01F805E0 Relevance: 15.0, Strings: 12, Instructions: 48COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001C4A8 Relevance: 14.1, APIs: 6, Strings: 2, Instructions: 135libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140016B74 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 113COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014007EC70 Relevance: 14.1, APIs: 6, Strings: 2, Instructions: 112sleepthreadCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140048CAC Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 72windowthreadCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140021D6C Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 66COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140018830 Relevance: 14.1, APIs: 6, Strings: 2, Instructions: 56libraryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014000A9F8 Relevance: 13.6, APIs: 9, Instructions: 104windowCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140044830 Relevance: 13.6, APIs: 9, Instructions: 73windowkeyboardCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140005F78 Relevance: 12.6, APIs: 5, Strings: 2, Instructions: 334memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140013E7C Relevance: 12.4, APIs: 4, Strings: 3, Instructions: 192libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400036A0 Relevance: 12.4, APIs: 5, Strings: 2, Instructions: 154stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140049220 Relevance: 12.4, APIs: 6, Strings: 1, Instructions: 145keyboardwindowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140006870 Relevance: 12.4, APIs: 6, Strings: 1, Instructions: 143registrylibraryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014000E2E0 Relevance: 12.4, APIs: 5, Strings: 2, Instructions: 116windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014000A1FC Relevance: 12.3, APIs: 5, Strings: 2, Instructions: 87COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014004A924 Relevance: 12.3, APIs: 5, Strings: 2, Instructions: 84COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140018524 Relevance: 12.3, APIs: 6, Strings: 1, Instructions: 83COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014003C0E0 Relevance: 12.3, APIs: 6, Strings: 1, Instructions: 79windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014003E9D4 Relevance: 12.3, APIs: 5, Strings: 2, Instructions: 79COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140009744 Relevance: 12.3, APIs: 5, Strings: 2, Instructions: 78COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140044BA0 Relevance: 12.3, APIs: 5, Strings: 2, Instructions: 77COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014004AA48 Relevance: 12.3, APIs: 5, Strings: 2, Instructions: 76COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140045C88 Relevance: 12.3, APIs: 5, Strings: 2, Instructions: 76COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140045D8C Relevance: 12.3, APIs: 5, Strings: 2, Instructions: 76COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001BD8C Relevance: 12.3, APIs: 5, Strings: 2, Instructions: 74libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140013860 Relevance: 12.3, APIs: 6, Strings: 1, Instructions: 70COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140018744 Relevance: 12.3, APIs: 5, Strings: 2, Instructions: 68COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140044CB8 Relevance: 12.3, APIs: 5, Strings: 2, Instructions: 68COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140044DA4 Relevance: 12.3, APIs: 5, Strings: 2, Instructions: 68COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140008EB4 Relevance: 12.3, APIs: 6, Strings: 1, Instructions: 68COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001BEA8 Relevance: 12.3, APIs: 5, Strings: 2, Instructions: 67libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140018670 Relevance: 12.3, APIs: 6, Strings: 1, Instructions: 62COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400188F4 Relevance: 12.3, APIs: 6, Strings: 1, Instructions: 59registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140019FB8 Relevance: 12.3, APIs: 6, Strings: 1, Instructions: 58COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400F63B0 Relevance: 12.3, APIs: 3, Strings: 4, Instructions: 41COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014003FCAC Relevance: 12.1, APIs: 8, Instructions: 62COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014002FB18 Relevance: 10.7, APIs: 1, Strings: 5, Instructions: 204COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140049A50 Relevance: 10.7, APIs: 5, Strings: 1, Instructions: 193windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140014964 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 130libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014000A5B8 Relevance: 10.6, APIs: 7, Instructions: 113windowthreadCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400070A4 Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 102registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140015BB8 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 95libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01F8C1CC Relevance: 10.6, APIs: 7, Instructions: 93COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140079E8C Relevance: 10.6, APIs: 7, Instructions: 74keyboardCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140005A3C Relevance: 10.6, APIs: 7, Instructions: 56memorystringCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140059844 Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 54COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001BB7C Relevance: 10.5, APIs: 4, Strings: 2, Instructions: 46libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001C764 Relevance: 10.5, APIs: 4, Strings: 2, Instructions: 44libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001C890 Relevance: 10.5, APIs: 4, Strings: 2, Instructions: 44libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001C938 Relevance: 10.5, APIs: 4, Strings: 2, Instructions: 44libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001C9DC Relevance: 10.5, APIs: 4, Strings: 2, Instructions: 44libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001C348 Relevance: 10.5, APIs: 4, Strings: 2, Instructions: 35libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140023618 Relevance: 10.5, APIs: 7, Instructions: 35COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001C80C Relevance: 10.5, APIs: 4, Strings: 2, Instructions: 35libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001BD0C Relevance: 10.5, APIs: 4, Strings: 2, Instructions: 35libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001BB04 Relevance: 10.5, APIs: 4, Strings: 2, Instructions: 31libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001C690 Relevance: 10.5, APIs: 4, Strings: 2, Instructions: 29libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001BA98 Relevance: 10.5, APIs: 4, Strings: 2, Instructions: 29libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001BC2C Relevance: 10.5, APIs: 4, Strings: 2, Instructions: 29libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001BC9C Relevance: 10.5, APIs: 4, Strings: 2, Instructions: 29libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400235A4 Relevance: 10.5, APIs: 7, Instructions: 27COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001C6FC Relevance: 10.5, APIs: 4, Strings: 2, Instructions: 27libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01F94730 Relevance: 9.2, APIs: 3, Strings: 2, Instructions: 488COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140079B54 Relevance: 9.2, APIs: 6, Instructions: 168keyboardCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001B1D8 Relevance: 9.1, APIs: 6, Instructions: 102memoryCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01F8C0EC Relevance: 9.1, APIs: 6, Instructions: 53COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400A6F20 Relevance: 9.0, APIs: 4, Strings: 1, Instructions: 208fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400142E8 Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 177windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400F607C Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 172COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014006E9DC Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 156COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014000F630 Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 155registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01F8D854 Relevance: 8.9, APIs: 3, Strings: 2, Instructions: 150COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400E1604 Relevance: 8.9, APIs: 3, Strings: 2, Instructions: 150COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140010EF8 Relevance: 8.9, APIs: 3, Strings: 2, Instructions: 137COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014000F2C0 Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 135registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001401285F8 Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 127keyboardCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140009C94 Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 110windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01F849D0 Relevance: 8.9, Strings: 7, Instructions: 105COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014000FCB4 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 98COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014000785C Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 66registrylibraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140008DD4 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 56COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014003DF00 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 56libraryfileloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140007990 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 48registrylibraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001C168 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 44libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001C2A4 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 44libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014004BA40 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 42libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001E368 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 40libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400538FC Relevance: 8.8, APIs: 2, Strings: 3, Instructions: 40COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001C210 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 39libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014000F5A4 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 39registrylibraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001C0F4 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 32libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001C080 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 31libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140199B68 Relevance: 7.6, APIs: 5, Instructions: 114libraryloaderCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140084BE0 Relevance: 7.6, APIs: 5, Instructions: 109keyboardCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014003504C Relevance: 7.6, APIs: 5, Instructions: 99timewindowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140044E9C Relevance: 7.6, APIs: 5, Instructions: 50libraryloaderCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014005A874 Relevance: 7.2, APIs: 3, Strings: 1, Instructions: 196COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01F91150 Relevance: 7.2, APIs: 2, Strings: 2, Instructions: 153COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01F91364 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 145COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014004A754 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 114COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014002D6BC Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 103windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400422C8 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 92COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014003784C Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 82COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400039C0 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 75stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140010D2C Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 56libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001CE74 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 53libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014016E918 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 44COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01F95458 Relevance: 6.4, Strings: 5, Instructions: 154COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014004E670 Relevance: 6.2, APIs: 4, Instructions: 166windowmemoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01FA0728 Relevance: 6.2, APIs: 4, Instructions: 160COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140007548 Relevance: 6.2, APIs: 4, Instructions: 153registryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001F824 Relevance: 6.1, APIs: 4, Instructions: 138registryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140009F40 Relevance: 6.0, APIs: 4, Instructions: 50libraryloaderCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014003FB98 Relevance: 6.0, APIs: 4, Instructions: 44COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014019885C Relevance: 6.0, APIs: 4, Instructions: 43COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00000001400B41B0 Relevance: 6.0, APIs: 4, Instructions: 19COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140189214 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 174COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01F91568 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 169COMMONLIBRARYCODE
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014018949C Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 169COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140024CDC Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 144COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01F99354 Relevance: 5.4, APIs: 1, Strings: 2, Instructions: 138COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014003FDB8 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 82COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001D054 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 42COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001481C Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 41windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014003FB0C Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 37COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01F86190 Relevance: 5.3, Strings: 4, Instructions: 283COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140008FA8 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 25COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01F84BB0 Relevance: 5.2, Strings: 4, Instructions: 225COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014001B0E8 Relevance: 5.0, APIs: 4, Instructions: 35COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|