Windows
Analysis Report
gEP8SOoakR.exe
Overview
General Information
Sample name: | gEP8SOoakR.exerenamed because original name is a hash value |
Original sample name: | 1af918875c67d204941ec2c8a780e312.exe |
Analysis ID: | 1542677 |
MD5: | 1af918875c67d204941ec2c8a780e312 |
SHA1: | ce9e2ce0460d9536f863c4fc4042958207f0802a |
SHA256: | 3621c6a555e79fd6640b3073b245d4e3b225d7a73403e2529d13a82a2b228c7f |
Tags: | 64exe |
Infos: | |
Detection
Score: | 72 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- gEP8SOoakR.exe (PID: 6768 cmdline:
"C:\Users\ user\Deskt op\gEP8SOo akR.exe" MD5: 1AF918875C67D204941EC2C8A780E312) - conhost.exe (PID: 6528 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - gEP8SOoakR.exe (PID: 6192 cmdline:
C:\Users\u ser\Deskto p\gep8sooa kr.exe 102 8 MD5: 1AF918875C67D204941EC2C8A780E312)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Code function: | 0_2_00007FF61864C240 | |
Source: | Code function: | 3_2_00007FF61864D570 | |
Source: | Code function: | 3_2_00007FF61864BEE0 | |
Source: | Code function: | 3_2_00007FF61864BF80 | |
Source: | Code function: | 3_2_00007FF6186FCED8 | |
Source: | Code function: | 3_2_0000025906CB1B10 | |
Source: | Code function: | 3_2_0000025906CB1BA8 |
Source: | Code function: | 0_2_00007FF61864C240 | |
Source: | Code function: | 0_2_00007FF61864F6D0 | |
Source: | Code function: | 0_2_00007FF61865A58A | |
Source: | Code function: | 0_2_00007FF618646970 | |
Source: | Code function: | 0_2_00007FF618644A80 | |
Source: | Code function: | 0_2_00007FF618646760 | |
Source: | Code function: | 0_2_00007FF61864B420 | |
Source: | Code function: | 0_2_00007FF61864E7F0 | |
Source: | Code function: | 0_2_00007FF618652CA0 | |
Source: | Code function: | 0_2_00007FF618650460 | |
Source: | Code function: | 3_2_00007FF61864C240 | |
Source: | Code function: | 3_2_00007FF61864F6D0 | |
Source: | Code function: | 3_2_00007FF618652CA0 | |
Source: | Code function: | 3_2_00007FF618650460 | |
Source: | Code function: | 3_2_00007FF61865A58A | |
Source: | Code function: | 3_2_00007FF618646970 | |
Source: | Code function: | 3_2_00007FF618644A80 | |
Source: | Code function: | 3_2_00007FF618646760 | |
Source: | Code function: | 3_2_00007FF61864B420 | |
Source: | Code function: | 3_2_00007FF61864E7F0 | |
Source: | Code function: | 3_2_0000025906CB0999 | |
Source: | Code function: | 3_2_0000025906CB0B36 | |
Source: | Code function: | 3_2_0000025906CB0730 | |
Source: | Code function: | 3_2_0000025906CB0AB3 | |
Source: | Code function: | 3_2_0000025906CB0BAD | |
Source: | Code function: | 3_2_00007FF848E61930 | |
Source: | Code function: | 3_2_00007FF848E6C6DE | |
Source: | Code function: | 3_2_00007FF848E690F2 | |
Source: | Code function: | 3_2_00007FF848E619E0 | |
Source: | Code function: | 3_2_00007FF848E696BC | |
Source: | Code function: | 3_2_00007FF848E60680 | |
Source: | Code function: | 3_2_00007FF848E618D3 | |
Source: | Code function: | 3_2_00007FF848E618B0 |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Classification label: |
Source: | Code function: | 0_2_00007FF61864D570 |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | .Net Code: |
Source: | Code function: | 0_2_00007FF61864C240 |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 3_2_00007FF848E6816A | |
Source: | Code function: | 3_2_00007FF848E600C1 |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Code function: | 0_2_00007FF61864D570 |
Source: | Thread delayed: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_00007FF61864D570 |
Source: | Code function: | 0_2_00007FF61864D570 |
Source: | Code function: | 0_2_00007FF61864C240 |
Source: | Code function: | 0_2_00007FF61864C240 |
Source: | Code function: | 0_2_00007FF618641154 | |
Source: | Code function: | 0_2_00007FF61864D570 | |
Source: | Code function: | 0_2_00007FF6186FCEE8 | |
Source: | Code function: | 0_2_00007FF6186FCED8 | |
Source: | Code function: | 3_2_00007FF61864D570 | |
Source: | Code function: | 3_2_00007FF618641154 | |
Source: | Code function: | 3_2_00007FF6186FCEE8 | |
Source: | Code function: | 3_2_00007FF6186FCED8 |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtWriteVirtualMemory: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtWriteVirtualMemory: | Jump to behavior |
Source: | Memory written: | Jump to behavior |
Source: | Thread register set: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_00007FF61864C240 |
Source: | Key value queried: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Native API | 1 DLL Side-Loading | 211 Process Injection | 1 Masquerading | OS Credential Dumping | 21 Security Software Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Abuse Elevation Control Mechanism | 1 Disable or Modify Tools | LSASS Memory | 31 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 DLL Side-Loading | 31 Virtualization/Sandbox Evasion | Security Account Manager | 2 Process Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 211 Process Injection | NTDS | 3 System Information Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Deobfuscate/Decode Files or Information | LSA Secrets | Internet Connection Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Abuse Elevation Control Mechanism | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 2 Obfuscated Files or Information | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 Software Packing | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
Network Topology | Malvertising | Exploit Public-Facing Application | Command and Scripting Interpreter | At | At | 1 DLL Side-Loading | /etc/passwd and /etc/shadow | Network Sniffing | Direct Cloud VM Connections | Data Staged | Web Protocols | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Internal Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | HEUR/AGEN.1329661 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
s-part-0017.t-0009.t-msedge.net | 13.107.246.45 | true | false | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false |
| unknown | ||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false |
| unknown | ||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1542677 |
Start date and time: | 2024-10-26 06:25:11 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 3s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 4 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | gEP8SOoakR.exerenamed because original name is a hash value |
Original Sample Name: | 1af918875c67d204941ec2c8a780e312.exe |
Detection: | MAL |
Classification: | mal72.evad.winEXE@4/3@0/0 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe
- Excluded domains from analysis (whitelisted): otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net
- Not all processes where analyzed, report is missing behavior information
- VT rate limit hit for: gEP8SOoakR.exe
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
s-part-0017.t-0009.t-msedge.net | Get hash | malicious | Stealc | Browse |
| |
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Stealc | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher, Mamba2FA | Browse |
| ||
Get hash | malicious | HTMLPhisher, Mamba2FA | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mamba2FA | Browse |
|
Process: | C:\Users\user\Desktop\gEP8SOoakR.exe |
File Type: | |
Category: | modified |
Size (bytes): | 847 |
Entropy (8bit): | 5.354334472896228 |
Encrypted: | false |
SSDEEP: | 24:ML9E4KQwKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQwYHKGSI6oPtHTHhAHKKkb |
MD5: | 9F9FA9EFE67E9BBD165432FA39813EEA |
SHA1: | 6FE9587FB8B6D9FE9FA9ADE987CB8112C294247A |
SHA-256: | 4488EA75E0AC1E2DEB4B7FC35D304CAED2F877A7FB4CC6B8755AE13D709CF37B |
SHA-512: | F4666179D760D32871DDF54700D6B283AD8DA82FA6B867A214557CBAB757F74ACDFCAD824FB188005C0CEF3B05BF2352B9CA51B2C55AECF762468BB8F5560DB3 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\gEP8SOoakR.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 3423 |
Entropy (8bit): | 4.925282229780145 |
Encrypted: | false |
SSDEEP: | 96:XWiA24IKTTXFZwvulZwcLCwjRSYHj8IWn:mi9iXPX99H8n |
MD5: | 134241D99B17EB93716F6E2AB3F3EBC1 |
SHA1: | 59CFD80CFB28BE549409CCFFBEA34E2B625C7BE5 |
SHA-256: | 766065F9921FE8E1D374AD628CB05A0A28A744358A5B38D6C3F924914AF0FF22 |
SHA-512: | 400ED3FEE282432FE5E28664B16E79353747D2DEAB3032E6CAFBA5E9FD8A1DD04F3BBF0826DCBC510C04F9AECBB0DFA7EB2037F194CE62158FDC7A952F8A002F |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.768576563287834 |
TrID: |
|
File name: | gEP8SOoakR.exe |
File size: | 710'656 bytes |
MD5: | 1af918875c67d204941ec2c8a780e312 |
SHA1: | ce9e2ce0460d9536f863c4fc4042958207f0802a |
SHA256: | 3621c6a555e79fd6640b3073b245d4e3b225d7a73403e2529d13a82a2b228c7f |
SHA512: | 498420dc4c3e44496159c9491580924c6c3ecf0a71d360c03c747dd4852980aeeda2b55d13059c198877aecf2653e182af1453d81842c7c61e9c28e0a40fbf7a |
SSDEEP: | 12288:x/uVxEZsd6Rq8sQ1M7dKHB8u4EqcJDhJzuT6p4qd7DmHrE0S48v7:x/axEadkqbEzTxnp4qdfoE0a |
TLSH: | C4E40132E36358F9C29AD23987C369A2E771FC290530387D56815A35BF7B960479EF02 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...X..g...............$.........`..%..........@..........................................`... ............................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x140001125 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x140000000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT |
Time Stamp: | 0x670F8558 [Wed Oct 16 09:20:24 2024 UTC] |
TLS Callbacks: | 0x400163a0, 0x1, 0x4001645f, 0x1 |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | e16254f44ddd98c690f5ad4d0a981e4a |
Instruction |
---|
push ebp |
dec eax |
mov ebp, esp |
dec eax |
sub esp, 30h |
mov dword ptr [ebp-04h], 000000FFh |
dec eax |
mov eax, dword ptr [000A2A25h] |
mov dword ptr [eax], 00000000h |
call 00007FE4FC6C4F73h |
mov dword ptr [ebp-04h], eax |
nop |
nop |
mov eax, dword ptr [ebp-04h] |
dec eax |
add esp, 30h |
pop ebp |
ret |
push ebp |
dec eax |
mov ebp, esp |
dec eax |
sub esp, 000000E0h |
dec eax |
mov dword ptr [ebp-08h], 00000000h |
mov dword ptr [ebp-0Ch], 00000000h |
dec eax |
lea eax, dword ptr [ebp-000000C0h] |
inc ecx |
mov eax, 00000068h |
mov edx, 00000000h |
dec eax |
mov ecx, eax |
call 00007FE4FC6E0DADh |
dec eax |
mov eax, dword ptr [000A29D1h] |
mov eax, dword ptr [eax] |
test eax, eax |
je 00007FE4FC6C4F75h |
dec eax |
lea eax, dword ptr [ebp-000000C0h] |
dec eax |
mov ecx, eax |
dec eax |
mov eax, dword ptr [000C60D6h] |
call eax |
dec eax |
mov dword ptr [ebp-18h], 00000000h |
mov dword ptr [ebp-24h], 00000030h |
mov eax, dword ptr [ebp-24h] |
dec eax |
mov eax, dword ptr [eax] |
dec eax |
mov dword ptr [ebp-30h], eax |
dec eax |
mov eax, dword ptr [ebp-30h] |
dec eax |
mov eax, dword ptr [eax+08h] |
dec eax |
mov dword ptr [ebp-20h], eax |
mov dword ptr [ebp-10h], 00000000h |
jmp 00007FE4FC6C4F83h |
dec eax |
mov eax, dword ptr [ebp-18h] |
dec eax |
cmp eax, dword ptr [ebp-20h] |
jne 00007FE4FC6C4F6Bh |
mov dword ptr [ebp-10h], 00000001h |
jmp 00007FE4FC6C4FA7h |
mov ecx, 000003E8h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0xbe000 | 0x8226 | .edata |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xc7000 | 0x900 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0xa6000 | 0xcd8 | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xca000 | 0x158 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0xa2f20 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0xc724c | 0x210 | .idata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x21308 | 0x21400 | 697461e01ea78406b90f0c3f56dc54b5 | False | 0.4983626057330827 | data | 6.317912809044539 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.data | 0x23000 | 0x170 | 0x200 | 499ad6b262ca2e8683e48cb01f36411f | False | 0.203125 | data | 1.2750151770303946 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rdata | 0x24000 | 0x80a80 | 0x80c00 | 19af8bda14eca7045e096ea8167cc840 | False | 0.9353837985436894 | data | 7.965105880061288 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ |
.eh_fram | 0xa5000 | 0x4 | 0x200 | bf619eac0cdf3f68d496ea9344137e8b | False | 0.02734375 | data | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0xa6000 | 0xcd8 | 0xe00 | e9fd6227820d1caa8f630a9567078d3f | False | 0.45926339285714285 | data | 4.8752339858897455 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ |
.xdata | 0xa7000 | 0xdbc | 0xe00 | 0d71a3ce1111cb21376017b8bcb0cd4f | False | 0.2826450892857143 | shared library | 4.535733918192951 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ |
.bss | 0xa8000 | 0x15e20 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.edata | 0xbe000 | 0x8226 | 0x8400 | 8fa0892c1b7fd738d7fc722b628796da | False | 0.3539003314393939 | data | 5.748512008657241 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ |
.idata | 0xc7000 | 0x900 | 0xa00 | f9096555bfa86aebf2337962d6c0ed43 | False | 0.325390625 | data | 3.944209218952523 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.CRT | 0xc8000 | 0x68 | 0x200 | d8260c5c2386e113692c96907f8e5744 | False | 0.07421875 | data | 0.39026490088656424 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.tls | 0xc9000 | 0x10 | 0x200 | bf619eac0cdf3f68d496ea9344137e8b | False | 0.02734375 | data | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.reloc | 0xca000 | 0x158 | 0x200 | 525a090b94176a23533a576afca74d54 | False | 0.53125 | data | 3.7955317654975613 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
DLL | Import |
---|---|
KERNEL32.dll | DeleteCriticalSection, EnterCriticalSection, FreeLibrary, GetLastError, GetModuleHandleA, GetProcAddress, GetStartupInfoA, InitializeCriticalSection, IsDBCSLeadByteEx, LeaveCriticalSection, LoadLibraryA, MultiByteToWideChar, SetUnhandledExceptionFilter, Sleep, TlsGetValue, VirtualAlloc, VirtualFree, VirtualProtect, VirtualQuery, WideCharToMultiByte |
msvcrt.dll | __C_specific_handler, ___lc_codepage_func, ___mb_cur_max_func, __getmainargs, __initenv, __iob_func, __lconv_init, __set_app_type, __setusermatherr, _acmdln, _amsg_exit, _cexit, _commode, _errno, _fileno, _fmode, _initterm, _lock, _onexit, _setjmp, _setmode, _unlock, abort, calloc, exit, fflush, fprintf, fputc, free, fwrite, localeconv, longjmp, malloc, memchr, memcpy, memset, signal, strcmp, strerror, strlen, strncmp, strstr, vfprintf, wcslen |
Name | Ordinal | Address |
---|---|---|
AmIDebugged__76oader_1372 | 1 | 0x200000000 |
BaseThreadInitThunk__76oader_1592 | 2 | 0x200000000 |
CheckHardwareBreakPoints__76oader_1388 | 3 | 0x200000000 |
CreatedInterrupt__76oader_1416 | 4 | 0x200000000 |
CurrentAssembly__OOZOOZ85sersZnicksZOnimbleZpkgsZwinim4551O57O50ZwinimZclr_20 | 5 | 0x1400b5e88 |
Dl_1023410185_ | 6 | 0x1400a8120 |
Dl_1023410187_ | 7 | 0x1400b6000 |
Dl_1023410194_ | 8 | 0x200000000 |
Dl_1023410203_ | 9 | 0x200000000 |
Dl_1056973869_ | 10 | 0x200000000 |
Dl_1342179610_ | 11 | 0x1400a8178 |
Dl_1342179648_ | 12 | 0x1400a8170 |
Dl_1342179665_ | 13 | 0x1400a8168 |
Dl_1342179856_ | 14 | 0x1400a8158 |
Dl_1342180241_ | 15 | 0x200000000 |
Dl_1342180301_ | 16 | 0x1400a8150 |
Dl_1342180314_ | 17 | 0x1400a8148 |
Dl_1342180339_ | 18 | 0x1400a8138 |
Dl_1342180341_ | 19 | 0x200000000 |
Dl_1342180365_ | 20 | 0x1400a8130 |
Dl_1342181099_ | 21 | 0x1400a8128 |
Dl_1342181994_ | 22 | 0x1400a8160 |
Dl_1342184270_ | 23 | 0x1400a8140 |
Dl_1375737445_ | 24 | 0x1400a8188 |
Dl_1375737893_ | 25 | 0x1400a8180 |
Dl_1862271172_ | 26 | 0x1400a8190 |
Dl_1862271258_ | 27 | 0x200000000 |
Dl_2113941776_ | 28 | 0x200000000 |
Dl_2113941788_ | 29 | 0x200000000 |
Dl_2113941820_ | 30 | 0x1400b5e28 |
Dl_2113941866_ | 31 | 0x1400b5e20 |
Dl_2113941903_ | 32 | 0x200000000 |
Dl_2113941905_ | 33 | 0x200000000 |
Dl_2113943166_ | 34 | 0x200000000 |
Dl_2113943836_ | 35 | 0x1400b5f60 |
Dl_2516586222_ | 36 | 0x1400a8198 |
Dl_2566914147_ | 37 | 0x200000000 |
Dl_2566914180_ | 38 | 0x200000000 |
Dl_2566914183_ | 39 | 0x200000000 |
Dl_436208173_ | 40 | 0x200000000 |
Dl_436208175_ | 41 | 0x200000000 |
Dl_452985033_ | 42 | 0x200000000 |
Dl_452986305_ | 43 | 0x200000000 |
Dl_452986337_ | 44 | 0x200000000 |
ETWExceptionHandler__76oader_1578 | 45 | 0x200000000 |
GetPPEB__76oader_359 | 46 | 0x200000000 |
GetSyscallStub__76oader_1023 | 47 | 0x200000000 |
Kernel32ThreadInitThunkFunction__76oader_1590 | 48 | 0x200000000 |
LPWSTRtoLowercase__76oader_294 | 49 | 0x200000000 |
MultiByteToWideChar__76oader_777 | 50 | 0x200000000 |
MyCloseHandle__76oader_773 | 51 | 0x200000000 |
MyCreateFileA__76oader_985 | 52 | 0x1400a8278 |
MyGetComputerNameExA__76oader_1439 | 53 | 0x200000000 |
MyGetCurrentProcessId__76oader_764 | 54 | 0x200000000 |
MyGetCurrentThreadId__76oader_775 | 55 | 0x200000000 |
MyGetDiskFreeSpaceExA__76oader_1441 | 56 | 0x200000000 |
MyGetFileSize__76oader_986 | 57 | 0x1400a8270 |
MyGetModuleHandleA__76oader_770 | 58 | 0x1400b5e08 |
MyGetProcAddress__76oader_768 | 59 | 0x1400b5df0 |
MyGetProcessHeap__76oader_767 | 60 | 0x1400a8288 |
MyGetThreadContext__76oader_771 | 61 | 0x200000000 |
MyGetTickCount__76oader_779 | 62 | 0x200000000 |
MyGlobalMemoryStatusEx__76oader_1440 | 63 | 0x200000000 |
MyLdrLoadDll__76oader_429 | 64 | 0x1400b5df8 |
MyOpenProcess__76oader_765 | 65 | 0x200000000 |
MyOpenThread__76oader_774 | 66 | 0x200000000 |
MyReadFile__76oader_988 | 67 | 0x1400a8260 |
MyRtlAddVectoredExceptionHandler__76oader_769 | 68 | 0x200000000 |
MyRtlAllocateHeap__76oader_987 | 69 | 0x1400a8268 |
MyRtlInitUnicodeString__76oader_284 | 70 | 0x1400b5e00 |
MySetThreadContext__76oader_772 | 71 | 0x200000000 |
MySleep__76oader_778 | 72 | 0x1400a8280 |
MyVirtualAllocEx__76oader_763 | 73 | 0x200000000 |
MyVirtualProtect__76oader_766 | 74 | 0x1400a8290 |
MyWaitForSingleObject__76oader_776 | 75 | 0x200000000 |
NTIarithmeticdefect__cT9c9bHlHSpA1QTnKbHjnIkA_ | 76 | 0x200000000 |
NTIarrayL48OO48_safearrayboundT__nKvO7wXZAsroXb0Wz9b7Rmw_ | 77 | 0x200000000 |
NTIarrayL48OO494957_uint5452T__wa4ExhM0I5D0wQQmyrXAHA_ | 78 | 0x200000000 |
NTIarrayL48OO5149_byteT__vEOa9c5qaE9ajWxR5R4zwfQg_ | 79 | 0x200000000 |
NTIbcgrmproc__7kPg4iIrFVxPW1SngAif2w_ | 80 | 0x200000000 |
NTIbool__VaVACK0bpYmqIQ0mKcHfQQ_ | 81 | 0x200000000 |
NTIbyte__k3HXouOuhqAKq0dx450lXQ_ | 82 | 0x200000000 |
NTIcatchableerror__qrLSDoe2oBoAqNtJ9badtnA_ | 83 | 0x200000000 |
NTIchar__nmiMWKVIe46vacnhAFrQvw_ | 84 | 0x200000000 |
NTIclrerror__PUxYufCPDbgUFMvFpPtSfQ_ | 85 | 0x1400b5e40 |
NTIcstring__S9agCYBinaYZnGWcjTdxclg_ | 86 | 0x200000000 |
NTIcy95struct49__ROud78kqeHjXYisn4jhtaw_ | 87 | 0x200000000 |
NTIcy__wDff8zKdhpvos9c7lBHUPSQ_ | 88 | 0x200000000 |
NTIdecimal95union4995struct49__79a7mES62JQ1oSE6vhkv3Mg_ | 89 | 0x200000000 |
NTIdecimal95union49__WGoXHqhEWH1qpRGdTEgBIQ_ | 90 | 0x200000000 |
NTIdecimal95union5095struct49__ndD9aJVbTCK7WcNNlcFDdRQ_ | 91 | 0x200000000 |
NTIdecimal95union50__AHLY3ntS3ifZxbjvCnrSYw_ | 92 | 0x200000000 |
NTIdecimal__7lwbcpbVYQOsyXq5rL9casA_ | 93 | 0x200000000 |
NTIdefect__LbeSGvgPzGzXnW9caIkJqMA_ | 94 | 0x200000000 |
NTIdouble__w9bl9a1ul9ctRJWiMl9cNnIMvg_ | 95 | 0x200000000 |
NTIecb__FqrsHsObEDvZPY9aUEY69aCA_ | 96 | 0x200000000 |
NTIexception__XEycrCsme5C8CVWAYEcdBQ_ | 97 | 0x200000000 |
NTIfloat__C875xFvYpI7aGybrDGHIaQ_ | 98 | 0x200000000 |
NTIhcryptprov__hMQEc0FMry7Up7EoPki79aA_ | 99 | 0x200000000 |
NTIidispatch__25afB9aQxduZVFt1Yu6YBbw_ | 100 | 0x200000000 |
NTIidispatchvtbl__m6cgE8u5k2W48yvpP0M9cVg_ | 101 | 0x200000000 |
NTIindexdefect__n6tGEPHKkh7E1AP9bj30WrQ_ | 102 | 0x200000000 |
NTIint__rR5Bzr1D5krxoo1NcNyeMA_ | 103 | 0x200000000 |
NTIint__xHTZrq9aYs6boc9bCba0JbpQ_ | 104 | 0x200000000 |
NTIioerror__iLZrPn9anoh9ad1MmO0RczFw_ | 105 | 0x1400a80e0 |
NTIirecordinfo__o7mu6JCMnDiOC4fiz5Cxtw_ | 106 | 0x200000000 |
NTIirecordinfovtbl__Rtoycx0FzRmTEejgGZss8w_ | 107 | 0x200000000 |
NTIiunknown__GaCOTm3fAeQng3LkqGK9cpw_ | 108 | 0x200000000 |
NTIiunknownvtbl__jF4R4hWZYkQD9a5uVek42vg_ | 109 | 0x200000000 |
NTIkeyvaluepair__2wauyaneUIEXFZnckdv0OQ_ | 110 | 0x200000000 |
NTIkeyvaluepairseq__QyuekR9bgDQj4oxD9cw0z4fw_ | 111 | 0x1400b5f80 |
NTIlong__sVg18TP9cLifHyygRe9cro9aA_ | 112 | 0x200000000 |
NTIlonglong__Aav8dQoMlCFnZRxA0IhTHQ_ | 113 | 0x200000000 |
NTImyntflushinstructioncache__3eV1XklMMklNDUIHDUNWNQ_ | 114 | 0x200000000 |
NTIobject__diB2NTuAIWY0FO9c5IUJRGg_ | 115 | 0x200000000 |
NTIobject__nftp7RTJl9bUkGnValdDrfQ_ | 116 | 0x1400a8220 |
NTIoverflowdefect__9cxMi1BPLc3UKt9br86bGfGQ_ | 117 | 0x200000000 |
NTIpointer__vr5DoT1jILTGdRlYv1OYpw_ | 118 | 0x200000000 |
NTIprocLself58ptridispatch_dispidmember58dispid_riid58refiid_lcid58lcid_wflags58word_pdispparams58ptrdispparams_pvarresult58ptrvariant_pexcepinfo58ptrexcepinfo_puargerr58ptruintT58hresultLOstdcallOT__HMTIlg0ibX9c3DUxZWiFDlg_ | 119 | 0x200000000 |
NTIprocLself58ptridispatch_itinfo58uint_lcid58lcid_pptinfo58ptrptritypeinfoT58hresultLOstdcallOT__PJRj0uRX50rVBId5wxoWWg_ | 120 | 0x200000000 |
NTIprocLself58ptridispatch_pctinfo58ptruintT58hresultLOstdcallOT__zezkKyqfMpGrdLXfsTMoKg_ | 121 | 0x200000000 |
NTIprocLself58ptridispatch_riid58refiid_rgsznames58ptrlpolestr_cnames58uint_lcid58lcid_rgdispid58ptrdispidT58hresultLOstdcallOT__vTmQiiZaMJLP5PVxP1nC6g_ | 122 | 0x200000000 |
NTIprocLself58ptrirecordinfoT58pvoidLOstdcallOT__tl4K6HbRH9akfWlpgfxzhhQ_ | 123 | 0x200000000 |
NTIprocLself58ptrirecordinfo_pbstrname58ptrbstrT58hresultLOstdcallOT__CiNRVOLKE0o4du7TW0veXA_ | 124 | 0x200000000 |
NTIprocLself58ptrirecordinfo_pcbsize58ptrulongT58hresultLOstdcallOT__9bUQLlQzyTYq9cn1PPQoncWg_ | 125 | 0x200000000 |
NTIprocLself58ptrirecordinfo_pcnames58ptrulong_rgbstrnames58ptrbstrT58hresultLOstdcallOT__3flVhatAuo2wDQ3pLqPtWw_ | 126 | 0x200000000 |
NTIprocLself58ptrirecordinfo_pguid58ptrguidT58hresultLOstdcallOT__szvo7XZUqIEvn15njypZnQ_ | 127 | 0x200000000 |
NTIprocLself58ptrirecordinfo_pptypeinfo58ptrptritypeinfoT58hresultLOstdcallOT__lgbxIcoFlqaRoc8l1J5x6A_ | 128 | 0x200000000 |
NTIprocLself58ptrirecordinfo_precordinfo58ptrirecordinfoT58winboolLOstdcallOT__UrLfbkx3jYpl8aTT7EGhew_ | 129 | 0x200000000 |
NTIprocLself58ptrirecordinfo_pvdata58pvoid_szfieldname58lpcolestr_pvarfield58ptrvariantT58hresultLOstdcallOT__a8wuVcgf8JFBdtyIlUvAGg_ | 130 | 0x200000000 |
NTIprocLself58ptrirecordinfo_pvdata58pvoid_szfieldname58lpcolestr_pvarfield58ptrvariant_ppvdatacarray58ptrpvoidT58hresultLOstdcallOT__V5FpwH0D4atxA49a8FYaWEg_ | 131 | 0x200000000 |
NTIprocLself58ptrirecordinfo_pvexisting58pvoid_pvnew58pvoidT58hresultLOstdcallOT__ZI1jobj8DmvwFnbiO6qPCg_ | 132 | 0x200000000 |
NTIprocLself58ptrirecordinfo_pvnew58pvoidT58hresultLOstdcallOT__79cx3unW0Z6BgDnOrcHfitQ_ | 133 | 0x200000000 |
NTIprocLself58ptrirecordinfo_pvsource58pvoid_ppvdest58ptrpvoidT58hresultLOstdcallOT__ymDIUs9akB6qYPB24WgIOaQ_ | 134 | 0x200000000 |
NTIprocLself58ptrirecordinfo_wflags58ulong_pvdata58pvoid_szfieldname58lpcolestr_pvarfield58ptrvariantT58hresultLOstdcallOT__LKhTenaIJkf6RxVNrDi3BA_ | 135 | 0x200000000 |
NTIprocLself58ptriunknownT58ulongLOstdcallOT__3MBg39aXrFJCcyBWUf6B79aQ_ | 136 | 0x200000000 |
NTIprocLself58ptriunknown_riid58refiid_ppvobject58ptrpointerT58hresultLOstdcallOT__9bWBI5aELdW2XHTbyYNjFXQ_ | 137 | 0x200000000 |
NTIprocLx58timeT58zonedtimeLOclosure_gcsafe_locks5848OT__7xnKxEC24cr3qZyj3gX32w_ | 138 | 0x200000000 |
NTIptrbstr__Pdw3MEiEie9cIIBXdRF4aZg_ | 139 | 0x200000000 |
NTIptrbyte__cG1a2XAxsP28AUq2q9aXnNg_ | 140 | 0x200000000 |
NTIptrchar__9b60r3P3z08159cCfYvgtoSg_ | 141 | 0x200000000 |
NTIptrcy__jXbtSxLfw0itmjWsMdWfNw_ | 142 | 0x200000000 |
NTIptrdecimal__tOyFM5VpR5CfoueNblK2NQ_ | 143 | 0x200000000 |
NTIptrdouble__dHulNBWhJTS79cd5h9cp4OHg_ | 144 | 0x200000000 |
NTIptrfloat__K9c5mNCKsxyPa9bhQF1Un42w_ | 145 | 0x200000000 |
NTIptridispatch__kYuJ1yXKaTDKM1gBNBYZMA_ | 146 | 0x200000000 |
NTIptridispatchvtbl__D2nH2Oqivmr8QTsU9aLjsOQ_ | 147 | 0x200000000 |
NTIptrirecordinfo__3WT32ZAg6wsc9ay7tyclJnQ_ | 148 | 0x200000000 |
NTIptrirecordinfovtbl__7VzmdWawVAQPByb1qFKRtA_ | 149 | 0x200000000 |
NTIptriunknown__UyU8VSOcMgg7fdJy7SxeGw_ | 150 | 0x200000000 |
NTIptriunknownvtbl__RE27JCE9bOJX1xy12IDcHnA_ | 151 | 0x200000000 |
NTIptrlong__9awHbpuyuG8AxbsaqeBLKDQ_ | 152 | 0x200000000 |
NTIptrlonglong__qTZjETMuYhaATb9arhin3WA_ | 153 | 0x200000000 |
NTIptrolechar__9arplNu1iE9bhlDxcL6A4PMw_ | 154 | 0x200000000 |
NTIptrptridispatch__9cAC89c2ntOozT6m3udvMQRQ_ | 155 | 0x200000000 |
NTIptrptriunknown__8MnBU5BrvTao0wsQ9alw3AQ_ | 156 | 0x200000000 |
NTIptrptrsafearray__SD30oco7TmqisM1c9brwQSg_ | 157 | 0x200000000 |
NTIptrsafearray__DTydpwcrqtIWM70d0MgBsw_ | 158 | 0x200000000 |
NTIptrshort__BjHmAJOH9agj4KRxOkanazQ_ | 159 | 0x200000000 |
NTIptrvariant__k5zDQ9aqJXQRCQNlOgs85Ow_ | 160 | 0x200000000 |
NTIqipcproc__BlBp9c2J7tRXTU9adX1vV5gQ_ | 161 | 0x200000000 |
NTIqpcproc__eV9b9cYSUZoo6tKaCd9b3k9bzA_ | 162 | 0x200000000 |
NTIquitproc__PD9b9cqhDqM6Xy1oSxwODsOQ_ | 163 | 0x200000000 |
NTIrefclrerror__FRS9cQbNhae5zCH8EuU1Jew_ | 164 | 0x200000000 |
NTIrefexception__vU9aO9cTqOMn6CBzhV8rX7Sw_ | 165 | 0x200000000 |
NTIrefindexdefect__RJnHOb9cQV3neNC9cDkRgMyw_ | 166 | 0x200000000 |
NTIrefioerror__HMIVdYjdZYWskTmTQVo5BQ_ | 167 | 0x1400a80a0 |
NTIrefobject__HsJiUUcO9cHBdUCi0HwkSTA_ | 168 | 0x200000000 |
NTIrefobject__PNpya69bg5jOKXuhnlj83NQ_ | 169 | 0x1400a81e0 |
NTIrefoverflowdefect__r8GBEWywN07B3Rat3azS4Q_ | 170 | 0x200000000 |
NTIrefreraisedefect__uG62cfJZ15c2siK3CKLmnQ_ | 171 | 0x200000000 |
NTIrefvalueerror__Ie1m0dv1ZHg72IgPRr1cDw_ | 172 | 0x1400b6060 |
NTIrefvariantconversionerror__sSrF5S0WQBiSGAvsVyZTJQ_ | 173 | 0x1400b5ee0 |
NTIreraisedefect__E0L0wGYS1gPD81VLstNO2g_ | 174 | 0x200000000 |
NTIrijndaelcontext__uzMEyYcUmtQ6HTVQxlfmCQ_ | 175 | 0x200000000 |
NTIrootobj__ytyiCJqK439aF9cIibuRVpAg_ | 176 | 0x200000000 |
NTIsafearray__DKskJgJKqdiGvU7qvx1u8A_ | 177 | 0x200000000 |
NTIsafearraybound__MAW7pPwMg9cUv0ZH0AE2pzQ_ | 178 | 0x200000000 |
NTIseqLbyteT__6H5Oh5UUvVCLiakt9aTwtUQ_ | 179 | 0x1400b5da0 |
NTIseqLstacktraceentryT__uB9b75OUPRENsBAu4AnoePA_ | 180 | 0x200000000 |
NTIseqLstringT__sM4lkSb7zS6F7OVMvW9cffQ_ | 181 | 0x1400b5fc0 |
NTIseqLvariantT__3a0Lf6u9aPn9bq0V0eQ07mtw_ | 182 | 0x200000000 |
NTIshort__kDPg4wXyR8DDyA0MeEjIsw_ | 183 | 0x200000000 |
NTIstacktraceentry__oLyohQ7O2XOvGnflOss8EA_ | 184 | 0x200000000 |
NTIstring__77mFvmsOLKik79ci2hXkHEg_ | 185 | 0x200000000 |
NTIsystemrng58objecttype__X9aKjcE9bDr41cpowCIZoGpQ_ | 186 | 0x200000000 |
NTIsystemrng__9aWCZSregXolmau8IgbwrpA_ | 187 | 0x200000000 |
NTItable__MyiXBZqHlwtVNEEvYnEmjg_ | 188 | 0x200000000 |
NTItableref__mmbDGmie1Vw3nGJ9cRqQG7w_ | 189 | 0x1400a81a0 |
NTItimezone58objecttype__F8OvqlxXyGXRSiK9c1fCDVw_ | 190 | 0x200000000 |
NTItimezone__9a5v4OQPlGqsA25ioN8hFYA_ | 191 | 0x200000000 |
NTIuint5150__JrFyJbYm9b5I4hJ9cWDqvfYA_ | 192 | 0x200000000 |
NTIuint5452__wMtfD88jmrPZwfzTH9c8e9cA_ | 193 | 0x200000000 |
NTIuncheckedarrayLutf4954charT__Tyd4y3haUOOHTj71TPIRag_ | 194 | 0x200000000 |
NTIvalueerror__yoNlBGx0D2tRizIdhQuENw_ | 195 | 0x1400b6020 |
NTIvariant58objecttype__FBSF3pWyJz9clqwLRXzZTsA_ | 196 | 0x200000000 |
NTIvariant95union4995struct4995union4995struct49__DtI9bsEAgJB3Tyh5MHrgkrw_ | 197 | 0x200000000 |
NTIvariant95union4995struct4995union49__DjJ9a9aNjdVJoA2NlSK7Lz7Q_ | 198 | 0x200000000 |
NTIvariant95union4995struct49__c8Wtv5nqLcM2jwvHc9cTY9bg_ | 199 | 0x200000000 |
NTIvariant95union49__Sr5LLwiwjGCKhbDlb25pAQ_ | 200 | 0x200000000 |
NTIvariant__UPxdF8T9b3GRPNZqBCwEDkw_ | 201 | 0x200000000 |
NTIvariant__VYnrN9cMJav8fTNB7Pu9bPZw_ | 202 | 0x1400b5f20 |
NTIvariantconversionerror__Y4pKacDNXcA9boOh7ryibHg_ | 203 | 0x1400b5ea0 |
NTIvartype__M4na42GvebBMnI5wV9cYMxg_ | 204 | 0x200000000 |
NTIwidecstringobj__4HwedE75WPfqZSQ0Cq2OUg_ | 205 | 0x200000000 |
NaturalToInt32__OOZOOZ85sersZnicksZOnimbleZpkgsZwinim4551O57O50ZwinimZwinstr_49 | 206 | 0x200000000 |
NimMain | 207 | 0x200000000 |
NimMainInner | 208 | 0x200000000 |
NimMainModule | 209 | 0x200000000 |
NtAllocateVirtualMemory__76oader_817 | 210 | 0x200000000 |
NtClose__76oader_800 | 211 | 0x200000000 |
NtCreateSection__76oader_898 | 212 | 0x200000000 |
NtCreateThreadEx__76oader_832 | 213 | 0x200000000 |
NtFreeVirtualMemory__76oader_936 | 214 | 0x200000000 |
NtMapViewOfSection__76oader_923 | 215 | 0x200000000 |
NtProtectVirtualMemory__76oader_879 | 216 | 0x200000000 |
NtReadVirtualMemory__76oader_951 | 217 | 0x200000000 |
NtWriteVirtualMemory__76oader_864 | 218 | 0x200000000 |
Null__OOZOOZ85sersZnicksZOnimbleZpkgsZwinim4551O57O50ZwinimZclr_18 | 219 | 0x1400b5e90 |
OpenMoreMaxPIDProcess__76oader_1509 | 220 | 0x200000000 |
PreMain | 221 | 0x200000000 |
PreMainInner | 222 | 0x200000000 |
RVAtoRawOffset__76oader_989 | 223 | 0x200000000 |
Rcon__OOZOOZ85sersZnicksZOnimbleZpkgsZnimcrypto4548O54O48ZnimcryptoZrijndael_6 | 224 | 0x200000000 |
RuntimeHelp__OOZOOZ85sersZnicksZOnimbleZpkgsZwinim4551O57O50ZwinimZclr_2248 | 225 | 0x200000000 |
SYSCALL_STUB_SIZE__76oader_793 | 226 | 0x200000000 |
SetupETWBreakpoints__76oader_3206 | 227 | 0x14000d570 |
SinkVtbl__OOZOOZ85sersZnicksZOnimbleZpkgsZwinim4551O57O50ZwinimZcom_7125 | 228 | 0x200000000 |
Sink_AddRef__OOZOOZ85sersZnicksZOnimbleZpkgsZwinim4551O57O50ZwinimZcom_7024 | 229 | 0x200000000 |
Sink_GetIDsOfNames__OOZOOZ85sersZnicksZOnimbleZpkgsZwinim4551O57O50ZwinimZcom_7051 | 230 | 0x200000000 |
Sink_GetTypeInfoCount__OOZOOZ85sersZnicksZOnimbleZpkgsZwinim4551O57O50ZwinimZcom_7040 | 231 | 0x200000000 |
Sink_GetTypeInfo__OOZOOZ85sersZnicksZOnimbleZpkgsZwinim4551O57O50ZwinimZcom_7044 | 232 | 0x200000000 |
Sink_Invoke__OOZOOZ85sersZnicksZOnimbleZpkgsZwinim4551O57O50ZwinimZcom_7060 | 233 | 0x200000000 |
Sink_QueryInterface__OOZOOZ85sersZnicksZOnimbleZpkgsZwinim4551O57O50ZwinimZcom_7006 | 234 | 0x200000000 |
Sink_Release__OOZOOZ85sersZnicksZOnimbleZpkgsZwinim4551O57O50ZwinimZcom_7032 | 235 | 0x200000000 |
StartProcess__76oader_1782 | 236 | 0x200000000 |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Oct 26, 2024 06:26:21.691421986 CEST | 1.1.1.1 | 192.168.2.5 | 0x4393 | No error (0) | s-part-0017.t-0009.t-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Oct 26, 2024 06:26:21.691421986 CEST | 1.1.1.1 | 192.168.2.5 | 0x4393 | No error (0) | 13.107.246.45 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 00:26:05 |
Start date: | 26/10/2024 |
Path: | C:\Users\user\Desktop\gEP8SOoakR.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff618640000 |
File size: | 710'656 bytes |
MD5 hash: | 1AF918875C67D204941EC2C8A780E312 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 00:26:05 |
Start date: | 26/10/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 00:26:07 |
Start date: | 26/10/2024 |
Path: | C:\Users\user\Desktop\gEP8SOoakR.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff618640000 |
File size: | 710'656 bytes |
MD5 hash: | 1AF918875C67D204941EC2C8A780E312 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Execution Graph
Execution Coverage: | 15% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 31.4% |
Total number of Nodes: | 1705 |
Total number of Limit Nodes: | 37 |
Graph
Function 00007FF61864C240 Relevance: 137.4, APIs: 46, Strings: 31, Instructions: 2605memorysleepCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618641154 Relevance: 10.7, APIs: 5, Strings: 1, Instructions: 193COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF61865D9E0 Relevance: 293.3, APIs: 4, Strings: 162, Instructions: 2775COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618648C30 Relevance: 22.9, APIs: 11, Strings: 2, Instructions: 190libraryloaderCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618642260 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 62memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618645B50 Relevance: 3.1, APIs: 1, Strings: 1, Instructions: 96COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618657A84 Relevance: 3.0, APIs: 1, Strings: 1, Instructions: 36stringCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF61864D570 Relevance: 28.3, APIs: 15, Strings: 1, Instructions: 334threadlibraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618650460 Relevance: 19.5, APIs: 11, Strings: 1, Instructions: 1506COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618652CA0 Relevance: 14.6, APIs: 5, Strings: 3, Instructions: 593COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF61865A58A Relevance: 5.9, APIs: 1, Strings: 2, Instructions: 1364COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF61864B420 Relevance: .4, Instructions: 447COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6186FCED8 Relevance: .0, Instructions: 22COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6186FCEE8 Relevance: .0, Instructions: 20COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6186499F0 Relevance: 31.9, APIs: 10, Strings: 8, Instructions: 373COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6186483F0 Relevance: 31.7, APIs: 3, Strings: 15, Instructions: 224COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF61864A740 Relevance: 28.3, APIs: 8, Strings: 8, Instructions: 297memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618645110 Relevance: 27.5, APIs: 8, Strings: 10, Instructions: 466stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618649280 Relevance: 16.7, APIs: 3, Strings: 8, Instructions: 193COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618652790 Relevance: 16.7, APIs: 2, Strings: 9, Instructions: 167COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF61864D1F0 Relevance: 14.2, APIs: 2, Strings: 6, Instructions: 187COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618646150 Relevance: 14.0, APIs: 2, Strings: 6, Instructions: 28stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618648FD0 Relevance: 13.6, APIs: 2, Strings: 7, Instructions: 142COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6186416F0 Relevance: 12.3, APIs: 4, Strings: 3, Instructions: 40libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF61864E170 Relevance: 12.3, APIs: 2, Strings: 6, Instructions: 257stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618644F70 Relevance: 10.6, APIs: 2, Strings: 4, Instructions: 69COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF61864B080 Relevance: 8.9, APIs: 2, Strings: 3, Instructions: 190COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618656E90 Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 108COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618641E40 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 120fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6186420F0 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 92libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618645970 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 85COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618642050 Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 38COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618641DF0 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 17fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF61864A3E0 Relevance: 6.2, APIs: 1, Strings: 3, Instructions: 196COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618643170 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 119COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6186564B0 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 51COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF61865653D Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 31COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618656530 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 31COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618656516 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 31COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618656523 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 31COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618656509 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 31COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6186564FC Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 31COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 10.7% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 0% |
Total number of Nodes: | 1042 |
Total number of Limit Nodes: | 70 |
Graph
Function 00007FF61864C240 Relevance: 137.4, APIs: 46, Strings: 31, Instructions: 2605memorysleepCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF61864D570 Relevance: 30.1, APIs: 16, Strings: 1, Instructions: 334threadlibraryloaderCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618650460 Relevance: 19.5, APIs: 11, Strings: 1, Instructions: 1506COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618652CA0 Relevance: 16.3, APIs: 6, Strings: 3, Instructions: 593COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618641154 Relevance: 10.7, APIs: 5, Strings: 1, Instructions: 193COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF61864BF80 Relevance: 4.6, APIs: 3, Instructions: 58threadinjectionCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E690F2 Relevance: .6, Instructions: 554COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF61865D9E0 Relevance: 293.3, APIs: 4, Strings: 162, Instructions: 2775COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF61864A740 Relevance: 28.3, APIs: 8, Strings: 8, Instructions: 297memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618648C30 Relevance: 22.9, APIs: 11, Strings: 2, Instructions: 190libraryloaderCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618642260 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 62memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618645B50 Relevance: 3.1, APIs: 1, Strings: 1, Instructions: 96COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6F4A9 Relevance: .6, Instructions: 612COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E68280 Relevance: .4, Instructions: 383COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E70501 Relevance: .3, Instructions: 283COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E606C8 Relevance: .3, Instructions: 259COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E606C0 Relevance: .2, Instructions: 216COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6B548 Relevance: .2, Instructions: 174COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6A890 Relevance: .2, Instructions: 161COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E674D3 Relevance: .1, Instructions: 135COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6DA1E Relevance: .1, Instructions: 126COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6E5E5 Relevance: .1, Instructions: 126COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E604B8 Relevance: .1, Instructions: 112COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E68FB0 Relevance: .1, Instructions: 105COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6FC9F Relevance: .1, Instructions: 104COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E685C1 Relevance: .1, Instructions: 100COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6E161 Relevance: .1, Instructions: 83COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E66B20 Relevance: .1, Instructions: 74COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E70135 Relevance: .1, Instructions: 68COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E70EED Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E60845 Relevance: .1, Instructions: 60COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6FA9D Relevance: .1, Instructions: 58COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6FE8C Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6873C Relevance: .1, Instructions: 54COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6FB09 Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6A9E9 Relevance: .1, Instructions: 52COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E674D0 Relevance: .1, Instructions: 51COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E70060 Relevance: .1, Instructions: 51COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E606A8 Relevance: .0, Instructions: 47COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E609ED Relevance: .0, Instructions: 40COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E62560 Relevance: .0, Instructions: 39COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E674B0 Relevance: .0, Instructions: 34COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E612B0 Relevance: .0, Instructions: 27COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6A301 Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6707B Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E605A0 Relevance: .0, Instructions: 21COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6FC6B Relevance: .0, Instructions: 20COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6A339 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6186499F0 Relevance: 31.9, APIs: 10, Strings: 8, Instructions: 373COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6186483F0 Relevance: 31.7, APIs: 3, Strings: 15, Instructions: 224COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618645110 Relevance: 27.5, APIs: 8, Strings: 10, Instructions: 466stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618649280 Relevance: 16.7, APIs: 3, Strings: 8, Instructions: 193COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618652790 Relevance: 16.7, APIs: 2, Strings: 9, Instructions: 167COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF61864D1F0 Relevance: 14.2, APIs: 2, Strings: 6, Instructions: 187COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618646150 Relevance: 14.0, APIs: 2, Strings: 6, Instructions: 28stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618648FD0 Relevance: 13.6, APIs: 2, Strings: 7, Instructions: 142COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6186416F0 Relevance: 12.3, APIs: 4, Strings: 3, Instructions: 40libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF61864E170 Relevance: 12.3, APIs: 2, Strings: 6, Instructions: 257stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618644F70 Relevance: 10.6, APIs: 2, Strings: 4, Instructions: 69COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF61864B080 Relevance: 8.9, APIs: 2, Strings: 3, Instructions: 190COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618656E90 Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 108COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618641E40 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 120fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6186420F0 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 92libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618645970 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 85COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618642050 Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 38COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618641DF0 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 17fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF61864A3E0 Relevance: 6.2, APIs: 1, Strings: 3, Instructions: 196COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618643170 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 119COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6186564B0 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 51COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF61865653D Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 31COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618656530 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 31COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618656516 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 31COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618656523 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 31COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF618656509 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 31COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6186564FC Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 31COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|