Windows
Analysis Report
Arc.exe
Overview
General Information
Detection
Score: | 3 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 60% |
Signatures
Classification
- System is w10x64
- Arc.exe (PID: 7952 cmdline:
"C:\Users\ user\Deskt op\Arc.exe " MD5: 9EFBD1E945B18F274D9C5A620D5FE7D5)
- cleanup
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-31T14:10:39.091987+0100 | 2022930 | 1 | A Network Trojan was detected | 52.149.20.212 | 443 | 192.168.2.10 | 49767 | TCP |
2024-10-31T14:11:17.276962+0100 | 2022930 | 1 | A Network Trojan was detected | 172.202.163.200 | 443 | 192.168.2.10 | 49910 | TCP |
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: |
Source: | Code function: | 6_2_00007FF7DF1AF940 |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Code function: | 6_2_00007FF7DF26508C | |
Source: | Code function: | 6_2_00007FF7DF2490BC | |
Source: | Code function: | 6_2_00007FF7DF1AC0D0 | |
Source: | Code function: | 6_2_00007FF7DF1F40A0 | |
Source: | Code function: | 6_2_00007FF7DF294110 | |
Source: | Code function: | 6_2_00007FF7DF205100 | |
Source: | Code function: | 6_2_00007FF7DF24BF30 | |
Source: | Code function: | 6_2_00007FF7DF1A0F80 | |
Source: | Code function: | 6_2_00007FF7DF23FF78 | |
Source: | Code function: | 6_2_00007FF7DF1B5F90 | |
Source: | Code function: | 6_2_00007FF7DF265F78 | |
Source: | Code function: | 6_2_00007FF7DF256F84 | |
Source: | Code function: | 6_2_00007FF7DF240F70 | |
Source: | Code function: | 6_2_00007FF7DF229F60 | |
Source: | Code function: | 6_2_00007FF7DF191000 | |
Source: | Code function: | 6_2_00007FF7DF1F1010 | |
Source: | Code function: | 6_2_00007FF7DF1B4E40 | |
Source: | Code function: | 6_2_00007FF7DF202E20 | |
Source: | Code function: | 6_2_00007FF7DF25EE30 | |
Source: | Code function: | 6_2_00007FF7DF194EB0 | |
Source: | Code function: | 6_2_00007FF7DF23EEF0 | |
Source: | Code function: | 6_2_00007FF7DF1B6EF0 | |
Source: | Code function: | 6_2_00007FF7DF1F1EF0 | |
Source: | Code function: | 6_2_00007FF7DF245D90 | |
Source: | Code function: | 6_2_00007FF7DF240D6C | |
Source: | Code function: | 6_2_00007FF7DF242D74 | |
Source: | Code function: | 6_2_00007FF7DF20ADA0 | |
Source: | Code function: | 6_2_00007FF7DF1A6E00 | |
Source: | Code function: | 6_2_00007FF7DF201DE0 | |
Source: | Code function: | 6_2_00007FF7DF21EC40 | |
Source: | Code function: | 6_2_00007FF7DF19DC20 | |
Source: | Code function: | 6_2_00007FF7DF1FAC20 | |
Source: | Code function: | 6_2_00007FF7DF20FC30 | |
Source: | Code function: | 6_2_00007FF7DF1AAC30 | |
Source: | Code function: | 6_2_00007FF7DF1A9C30 | |
Source: | Code function: | 6_2_00007FF7DF229C20 | |
Source: | Code function: | 6_2_00007FF7DF244CC4 | |
Source: | Code function: | 6_2_00007FF7DF22ACA0 | |
Source: | Code function: | 6_2_00007FF7DF21CCF6 | |
Source: | Code function: | 6_2_00007FF7DF1C2B50 | |
Source: | Code function: | 6_2_00007FF7DF20DB40 | |
Source: | Code function: | 6_2_00007FF7DF22CB60 | |
Source: | Code function: | 6_2_00007FF7DF1C3BD0 | |
Source: | Code function: | 6_2_00007FF7DF1BEBB0 | |
Source: | Code function: | 6_2_00007FF7DF228A50 | |
Source: | Code function: | 6_2_00007FF7DF25EA38 | |
Source: | Code function: | 6_2_00007FF7DF205A20 | |
Source: | Code function: | 6_2_00007FF7DF1F2A20 | |
Source: | Code function: | 6_2_00007FF7DF191A90 | |
Source: | Code function: | 6_2_00007FF7DF1BDA90 | |
Source: | Code function: | 6_2_00007FF7DF1C7A90 | |
Source: | Code function: | 6_2_00007FF7DF195A60 | |
Source: | Code function: | 6_2_00007FF7DF24DACC | |
Source: | Code function: | 6_2_00007FF7DF293AD0 | |
Source: | Code function: | 6_2_00007FF7DF244AB8 | |
Source: | Code function: | 6_2_00007FF7DF1BCB10 | |
Source: | Code function: | 6_2_00007FF7DF217940 | |
Source: | Code function: | 6_2_00007FF7DF23E940 | |
Source: | Code function: | 6_2_00007FF7DF20E960 | |
Source: | Code function: | 6_2_00007FF7DF1C59B0 | |
Source: | Code function: | 6_2_00007FF7DF1EB9B0 | |
Source: | Code function: | 6_2_00007FF7DF2159F0 | |
Source: | Code function: | 6_2_00007FF7DF23F9E0 | |
Source: | Code function: | 6_2_00007FF7DF1E9890 | |
Source: | Code function: | 6_2_00007FF7DF2638CC | |
Source: | Code function: | 6_2_00007FF7DF2448AC | |
Source: | Code function: | 6_2_00007FF7DF296750 | |
Source: | Code function: | 6_2_00007FF7DF25E750 | |
Source: | Code function: | 6_2_00007FF7DF1B7750 | |
Source: | Code function: | 6_2_00007FF7DF1B9730 | |
Source: | Code function: | 6_2_00007FF7DF21B720 | |
Source: | Code function: | 6_2_00007FF7DF214780 | |
Source: | Code function: | 6_2_00007FF7DF241780 | |
Source: | Code function: | 6_2_00007FF7DF1FD7A0 | |
Source: | Code function: | 6_2_00007FF7DF2467B0 | |
Source: | Code function: | 6_2_00007FF7DF19A7E0 | |
Source: | Code function: | 6_2_00007FF7DF19D7F0 | |
Source: | Code function: | 6_2_00007FF7DF2197E0 | |
Source: | Code function: | 6_2_00007FF7DF19E640 | |
Source: | Code function: | 6_2_00007FF7DF1BB640 | |
Source: | Code function: | 6_2_00007FF7DF216650 | |
Source: | Code function: | 6_2_00007FF7DF202620 | |
Source: | Code function: | 6_2_00007FF7DF20962E | |
Source: | Code function: | 6_2_00007FF7DF1A1670 | |
Source: | Code function: | 6_2_00007FF7DF1B2670 | |
Source: | Code function: | 6_2_00007FF7DF294590 | |
Source: | Code function: | 6_2_00007FF7DF1C6590 | |
Source: | Code function: | 6_2_00007FF7DF24157C | |
Source: | Code function: | 6_2_00007FF7DF204560 | |
Source: | Code function: | 6_2_00007FF7DF1A95C0 | |
Source: | Code function: | 6_2_00007FF7DF1B35C0 | |
Source: | Code function: | 6_2_00007FF7DF2035C0 | |
Source: | Code function: | 6_2_00007FF7DF1955B0 | |
Source: | Code function: | 6_2_00007FF7DF1C5440 | |
Source: | Code function: | 6_2_00007FF7DF1C2490 | |
Source: | Code function: | 6_2_00007FF7DF1F5490 | |
Source: | Code function: | 6_2_00007FF7DF19F460 | |
Source: | Code function: | 6_2_00007FF7DF1C4460 | |
Source: | Code function: | 6_2_00007FF7DF1AF510 | |
Source: | Code function: | 6_2_00007FF7DF1B4340 | |
Source: | Code function: | 6_2_00007FF7DF22D350 | |
Source: | Code function: | 6_2_00007FF7DF22E330 | |
Source: | Code function: | 6_2_00007FF7DF241378 | |
Source: | Code function: | 6_2_00007FF7DF1B93C0 | |
Source: | Code function: | 6_2_00007FF7DF1E3400 | |
Source: | Code function: | 6_2_00007FF7DF24724E | |
Source: | Code function: | 6_2_00007FF7DF194250 | |
Source: | Code function: | 6_2_00007FF7DF213230 | |
Source: | Code function: | 6_2_00007FF7DF1E8230 | |
Source: | Code function: | 6_2_00007FF7DF19B290 | |
Source: | Code function: | 6_2_00007FF7DF217270 | |
Source: | Code function: | 6_2_00007FF7DF1972B7 | |
Source: | Code function: | 6_2_00007FF7DF1E72B0 | |
Source: | Code function: | 6_2_00007FF7DF2002B0 | |
Source: | Code function: | 6_2_00007FF7DF2462A4 | |
Source: | Code function: | 6_2_00007FF7DF1BA300 | |
Source: | Code function: | 6_2_00007FF7DF241174 | |
Source: | Code function: | 6_2_00007FF7DF26A160 | |
Source: | Code function: | 6_2_00007FF7DF1EC1C0 | |
Source: | Code function: | 6_2_00007FF7DF1A61E0 | |
Source: | Code function: | 6_2_00007FF7DF1BD1E0 |
Source: | Code function: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Classification label: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: |
Source: | Code function: | 6_2_00007FF7DF1F3A20 |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 6_2_00007FF7DF1FD7A0 |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Code function: | 6_2_00007FF7DF1AF940 |
Source: | Code function: | 6_2_00007FF7DF1FD7A0 |
Source: | Code function: | 6_2_00007FF7DF19CC90 |
Source: | Code function: | 6_2_00007FF7DF1F3A20 |
Source: | Code function: | 6_2_00007FF7DF29A690 |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Code function: | 6_2_00007FF7DF23AF28 | |
Source: | Code function: | 6_2_00007FF7DF24F278 |
Source: | Code function: | 6_2_00007FF7DF261FBC | |
Source: | Code function: | 6_2_00007FF7DF261CBC | |
Source: | Code function: | 6_2_00007FF7DF25CCC4 | |
Source: | Code function: | 6_2_00007FF7DF296B50 | |
Source: | Code function: | 6_2_00007FF7DF262568 | |
Source: | Code function: | 6_2_00007FF7DF25D4F8 | |
Source: | Code function: | 6_2_00007FF7DF2622D8 |
Source: | Code function: | 6_2_00007FF7DF1B0D10 |
Source: | Code function: | 6_2_00007FF7DF264234 |
Source: | Code function: | 6_2_00007FF7DF231970 |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Native API | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Deobfuscate/Decode Files or Information | OS Credential Dumping | 2 System Time Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | LSASS Memory | 3 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Obfuscated Files or Information | Security Account Manager | 1 File and Directory Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | 13 System Information Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1546106 |
Start date and time: | 2024-10-31 14:09:30 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 23s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 12 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Arc.exe |
Detection: | CLEAN |
Classification: | clean3.winEXE@1/0@0/0 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, Sgrmuserer.exe, conhost.exe, svchost.exe
- Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target Arc.exe, PID 7952 because there are no executed function
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing disassembly code.
- VT rate limit hit for: Arc.exe
File type: | |
Entropy (8bit): | 6.465733659796907 |
TrID: |
|
File name: | Arc.exe |
File size: | 1'424'728 bytes |
MD5: | 9efbd1e945b18f274d9c5a620d5fe7d5 |
SHA1: | 7eceb65d872d41fe856e0b0857ce26555a208966 |
SHA256: | f4a276a1a1ac31ef87549648b5c71f2a637bd354efe265fdd60b505d7888424f |
SHA512: | 93fb0e5b46c87995ec3074dbd08d598f52918bd5b9e7792e16b0a4f46b063bbc97b38f3359bce5ebd0cd36959bc2c6cc99e555d4ffc814ebcdd645dbc1f611aa |
SSDEEP: | 24576:FwPZwgn53r2fCYJlTyWxaAOvKop/bqYmgN/u1xZbre89f:FqN5jYmWkAEKKbiGuBXf |
TLSH: | 92658C07F2D900D8D06AC175CB568636EAB2BC420734AAEF06A0B6592F77EE45F3D711 |
File Content Preview: | MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d......g.........."..........z......0..........@..........................................`........................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x1400ac230 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x140000000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x670FB806 [Wed Oct 16 12:56:38 2024 UTC] |
TLS Callbacks: | 0x40019280, 0x1, 0x400abae0, 0x1, 0x4003bf70, 0x1, 0x400ab1d0, 0x1, 0x40053e20, 0x1, 0x40062ff0, 0x1 |
CLR (.Net) Version: | |
OS Version Major: | 10 |
OS Version Minor: | 0 |
File Version Major: | 10 |
File Version Minor: | 0 |
Subsystem Version Major: | 10 |
Subsystem Version Minor: | 0 |
Import Hash: | 99d45b9f942bc9db0baf9c1a6678f7e4 |
Signature Valid: | true |
Signature Issuer: | CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE |
Signature Validation Error: | The operation completed successfully |
Error Number: | 0 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | F603633817F431ACDC90E8F5724C4A9C |
Thumbprint SHA-1: | 308A6E7467D2FCC6CAFA5D5F21348C2E9900635D |
Thumbprint SHA-256: | 98826F51C6D1A6D6B1AAACF11FABC2FDD07339796829CE55D402D9273E5FA071 |
Serial: | 4B50A5F9C411FB81406E3AC2 |
Instruction |
---|
dec eax |
sub esp, 28h |
call 00007F4B30AFB320h |
dec eax |
add esp, 28h |
jmp 00007F4B30AFB18Fh |
int3 |
int3 |
dec eax |
mov dword ptr [esp+18h], ebx |
push ebp |
dec eax |
mov ebp, esp |
dec eax |
sub esp, 30h |
dec eax |
mov eax, dword ptr [00092DE8h] |
dec eax |
mov ebx, 2DDFA232h |
cdq |
sub eax, dword ptr [eax] |
add byte ptr [eax+3Bh], cl |
ret |
jne 00007F4B30AFB386h |
dec eax |
and dword ptr [ebp+10h], 00000000h |
dec eax |
lea ecx, dword ptr [ebp+10h] |
call dword ptr [000888FAh] |
dec eax |
mov eax, dword ptr [ebp+10h] |
dec eax |
mov dword ptr [ebp-10h], eax |
call dword ptr [000887DCh] |
mov eax, eax |
dec eax |
xor dword ptr [ebp-10h], eax |
call dword ptr [000887B8h] |
mov eax, eax |
dec eax |
lea ecx, dword ptr [ebp+18h] |
dec eax |
xor dword ptr [ebp-10h], eax |
call dword ptr [00088A00h] |
mov eax, dword ptr [ebp+18h] |
dec eax |
lea ecx, dword ptr [ebp-10h] |
dec eax |
shl eax, 20h |
dec eax |
xor eax, dword ptr [ebp+18h] |
dec eax |
xor eax, dword ptr [ebp-10h] |
dec eax |
xor eax, ecx |
dec eax |
mov ecx, FFFFFFFFh |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x1341e7 | 0x69 | .rdata |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x134250 | 0x50 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x158000 | 0x7bcc | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x158e00 | 0x2f58 | .pdata |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x166000 | 0x1628 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x132a2c | 0x38 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x132900 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x1120f0 | 0x140 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x1348b8 | 0x618 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x1338a8 | 0x120 | .rdata |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x110c86 | 0x110e00 | 7952528d9824b1ec357965967ed821b5 | False | 0.5083636337608796 | data | 6.554091949322757 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x112000 | 0x2c874 | 0x2ca00 | 473414c046e18a3d4c47b9bc40d54af7 | False | 0.39854144782913165 | data | 5.335833860965855 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x13f000 | 0x18564 | 0xea00 | 215a5ca9c05822c44aee234fc711e414 | False | 0.029430422008547008 | data | 1.2725824236951675 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0x158000 | 0x7bcc | 0x7c00 | 98e551c5682a964236833e7533493bba | False | 0.5199092741935484 | data | 5.954097064208307 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.gxfg | 0x160000 | 0x2c70 | 0x2e00 | dcc619476a65cd21c1e950f3fec77e7a | False | 0.40837296195652173 | data | 5.117168021903965 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.retplne | 0x163000 | 0x8c | 0x200 | 8c950f651287cbc1296bcb4e8cd7e990 | False | 0.126953125 | data | 1.050583247971927 | |
.tls | 0x164000 | 0x1c1 | 0x200 | b002408e53c6103e2aba29120595f88c | False | 0.068359375 | data | 0.2951446603346658 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
_RDATA | 0x165000 | 0x1f4 | 0x200 | 178f984fc751ccb0eab5bc7650201995 | False | 0.51953125 | data | 4.187722159546528 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x166000 | 0x1628 | 0x1800 | 700a2bd027859aefdf7440f9c86af5da | False | 0.4098307291666667 | data | 5.302132720948706 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
DLL | Import |
---|---|
chrome_elf.dll | IsExtensionPointDisableSet |
KERNEL32.dll | AcquireSRWLockExclusive, AssignProcessToJobObject, CloseHandle, CompareStringW, ContinueDebugEvent, CreateDirectoryW, CreateEventW, CreateFileMappingW, CreateFileW, CreateIoCompletionPort, CreateJobObjectW, CreateMutexW, CreateProcessW, CreateRemoteThread, CreateThread, DebugActiveProcess, DebugBreak, DeleteCriticalSection, DeleteFileW, DeleteProcThreadAttributeList, DuplicateHandle, EncodePointer, EnterCriticalSection, EnumSystemLocalesEx, EnumSystemLocalesW, ExitProcess, ExpandEnvironmentStringsW, FindClose, FindFirstFileExW, FindNextFileW, FlsAlloc, FlsFree, FlsGetValue, FlsSetValue, FlushFileBuffers, FlushInstructionCache, FormatMessageA, FormatMessageW, FreeEnvironmentStringsW, FreeLibrary, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentDirectoryW, GetCurrentProcess, GetCurrentProcessId, GetCurrentProcessorNumber, GetCurrentThread, GetCurrentThreadId, GetDateFormatW, GetDriveTypeW, GetEnvironmentStringsW, GetEnvironmentVariableW, GetExitCodeProcess, GetFileAttributesW, GetFileInformationByHandle, GetFileSizeEx, GetFileType, GetFullPathNameW, GetLastError, GetLocalTime, GetLocaleInfoW, GetLongPathNameW, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetNativeSystemInfo, GetOEMCP, GetProcAddress, GetProcessHandleCount, GetProcessHeap, GetProcessHeaps, GetProcessId, GetProcessMitigationPolicy, GetProductInfo, GetQueuedCompletionStatus, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemDirectoryW, GetSystemInfo, GetSystemTimeAsFileTime, GetTempPathW, GetThreadContext, GetThreadId, GetThreadPriority, GetTickCount, GetTimeFormatW, GetTimeZoneInformation, GetUserDefaultLCID, GetUserDefaultLangID, GetUserDefaultLocaleName, GetVersionExW, GetWindowsDirectoryW, GlobalMemoryStatusEx, HeapDestroy, HeapSetInformation, InitOnceExecuteOnce, InitializeCriticalSectionAndSpinCount, InitializeProcThreadAttributeList, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, IsWow64Process, LCMapStringW, LeaveCriticalSection, LoadLibraryExA, LoadLibraryExW, LoadLibraryW, LocalFree, MapViewOfFile, MultiByteToWideChar, OpenThread, OutputDebugStringA, PostQueuedCompletionStatus, PrefetchVirtualMemory, QueryInformationJobObject, QueryPerformanceCounter, QueryPerformanceFrequency, QueryThreadCycleTime, RaiseException, ReadConsoleW, ReadFile, ReadProcessMemory, RegisterWaitForSingleObject, ReleaseMutex, ReleaseSRWLockExclusive, RemoveDirectoryW, RemoveVectoredExceptionHandler, ResetEvent, RtlCaptureContext, RtlCaptureStackBackTrace, RtlLookupFunctionEntry, RtlPcToFileHeader, RtlUnwind, RtlUnwindEx, RtlVirtualUnwind, SetDefaultDllDirectories, SetEndOfFile, SetEnvironmentVariableW, SetEvent, SetFileAttributesW, SetFilePointerEx, SetHandleInformation, SetInformationJobObject, SetLastError, SetProcessMitigationPolicy, SetProcessShutdownParameters, SetStdHandle, SetThreadAffinityMask, SetThreadContext, SetThreadInformation, SetThreadPriority, SetUnhandledExceptionFilter, Sleep, SleepConditionVariableSRW, SwitchToThread, TerminateJobObject, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, TryAcquireSRWLockExclusive, UnhandledExceptionFilter, UnmapViewOfFile, UnregisterWaitEx, UpdateProcThreadAttribute, VirtualAlloc, VirtualAllocEx, VirtualFree, VirtualFreeEx, VirtualProtect, VirtualProtectEx, VirtualQuery, WaitForDebugEvent, WaitForSingleObject, WakeAllConditionVariable, WakeConditionVariable, WideCharToMultiByte, WriteConsoleW, WriteFile, WriteProcessMemory |
ntdll.dll | RtlInitUnicodeString, RtlNtStatusToDosError |
Name | Ordinal | Address |
---|---|---|
GetHandleVerifier | 1 | 0x140039180 |
IsSandboxedProcess | 2 | 0x1400583d0 |
Target ID: | 6 |
Start time: | 09:10:20 |
Start date: | 31/10/2024 |
Path: | C:\Users\user\Desktop\Arc.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7df190000 |
File size: | 1'424'728 bytes |
MD5 hash: | 9EFBD1E945B18F274D9C5A620D5FE7D5 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Function 00007FF7DF20962E Relevance: 71.3, APIs: 32, Strings: 8, Instructions: 1322synchronizationCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1FD7A0 Relevance: 45.4, APIs: 11, Strings: 14, Instructions: 1657threadtimeCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1F40A0 Relevance: 37.3, APIs: 16, Strings: 5, Instructions: 535synchronizationCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1AC0D0 Relevance: 35.7, APIs: 17, Strings: 3, Instructions: 687threadprocesssynchronizationCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1A6E00 Relevance: 34.3, APIs: 11, Strings: 8, Instructions: 1080injectionmemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF296750 Relevance: 33.5, APIs: 15, Strings: 4, Instructions: 288threadCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF194EB0 Relevance: 33.5, APIs: 18, Strings: 1, Instructions: 255threadCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1F5490 Relevance: 32.2, APIs: 15, Strings: 3, Instructions: 693COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1B2670 Relevance: 30.3, APIs: 4, Strings: 13, Instructions: 572libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF2035C0 Relevance: 28.6, APIs: 4, Strings: 12, Instructions: 606COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1C6590 Relevance: 24.9, APIs: 9, Strings: 5, Instructions: 405synchronizationlibraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1BCB10 Relevance: 23.3, APIs: 8, Strings: 5, Instructions: 537COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF19F460 Relevance: 21.6, APIs: 7, Strings: 5, Instructions: 559threadCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF22ACA0 Relevance: 19.5, APIs: 10, Strings: 1, Instructions: 261COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1C59B0 Relevance: 19.5, APIs: 7, Strings: 4, Instructions: 244libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF19D7F0 Relevance: 19.5, APIs: 7, Strings: 4, Instructions: 213filelibraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF21B720 Relevance: 18.4, APIs: 4, Strings: 6, Instructions: 857COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF217940 Relevance: 18.3, APIs: 4, Strings: 6, Instructions: 831COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF19DC20 Relevance: 17.7, APIs: 6, Strings: 4, Instructions: 203fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1BDA90 Relevance: 17.7, APIs: 8, Strings: 2, Instructions: 177libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1B35C0 Relevance: 17.7, APIs: 9, Strings: 1, Instructions: 151libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1C2490 Relevance: 17.6, APIs: 6, Strings: 4, Instructions: 126filelibraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1AF940 Relevance: 14.4, APIs: 5, Strings: 3, Instructions: 400fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF19CC90 Relevance: 14.1, APIs: 6, Strings: 2, Instructions: 96threadlibraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF202E20 Relevance: 12.7, APIs: 3, Strings: 4, Instructions: 482COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1C3BD0 Relevance: 10.8, APIs: 4, Strings: 2, Instructions: 316threadCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF204560 Relevance: 10.8, APIs: 3, Strings: 3, Instructions: 274COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF19E640 Relevance: 10.7, APIs: 2, Strings: 4, Instructions: 237COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1B5F90 Relevance: 10.7, APIs: 3, Strings: 3, Instructions: 209COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1B9730 Relevance: 9.2, APIs: 4, Strings: 1, Instructions: 419libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF2467B0 Relevance: 7.4, APIs: 2, Strings: 2, Instructions: 448COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1EB9B0 Relevance: 7.3, APIs: 3, Strings: 1, Instructions: 300COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1F3A20 Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 43libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1B0D10 Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 12libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1B4E40 Relevance: 6.3, APIs: 3, Strings: 1, Instructions: 349COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF296B50 Relevance: 5.5, APIs: 2, Strings: 1, Instructions: 236memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF25CCC4 Relevance: 3.5, APIs: 1, Strings: 1, Instructions: 37COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF20DB40 Relevance: .6, Instructions: 558COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1C2B50 Relevance: .5, Instructions: 491COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1A9C30 Relevance: .5, Instructions: 485COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1B6EF0 Relevance: .5, Instructions: 459COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF191000 Relevance: .4, Instructions: 444COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF20FC30 Relevance: .4, Instructions: 396COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF293AD0 Relevance: .4, Instructions: 380COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF2197E0 Relevance: .4, Instructions: 352COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF23EEF0 Relevance: .4, Instructions: 351COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF24BF30 Relevance: .3, Instructions: 339COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF23FF78 Relevance: .3, Instructions: 327COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF202620 Relevance: .3, Instructions: 305COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF294110 Relevance: .3, Instructions: 290COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1C7A90 Relevance: .3, Instructions: 269COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF214780 Relevance: .3, Instructions: 254COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF23E940 Relevance: .2, Instructions: 250COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF23F9E0 Relevance: .2, Instructions: 241COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF256F84 Relevance: .2, Instructions: 205COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF25E750 Relevance: .2, Instructions: 198COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1AAC30 Relevance: .2, Instructions: 158COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF244CC4 Relevance: .1, Instructions: 146COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF244AB8 Relevance: .1, Instructions: 146COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF2448AC Relevance: .1, Instructions: 146COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF240F70 Relevance: .1, Instructions: 145COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF240D6C Relevance: .1, Instructions: 145COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF241780 Relevance: .1, Instructions: 145COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF24157C Relevance: .1, Instructions: 145COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF294590 Relevance: .1, Instructions: 139COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF24DACC Relevance: .1, Instructions: 126COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF205A20 Relevance: .1, Instructions: 106COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF2490BC Relevance: .1, Instructions: 91COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1A4900 Relevance: 57.9, APIs: 1, Strings: 32, Instructions: 149COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF207F50 Relevance: 19.5, APIs: 10, Strings: 1, Instructions: 287COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF20F710 Relevance: 19.5, APIs: 10, Strings: 1, Instructions: 287COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF231B90 Relevance: 16.1, APIs: 5, Strings: 4, Instructions: 394COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1AEE30 Relevance: 16.0, APIs: 6, Strings: 3, Instructions: 201fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1B9E40 Relevance: 15.8, APIs: 8, Strings: 1, Instructions: 83COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF24374C Relevance: 14.5, APIs: 3, Strings: 5, Instructions: 475COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1F4D90 Relevance: 14.4, APIs: 5, Strings: 3, Instructions: 381COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF19EB70 Relevance: 14.3, APIs: 2, Strings: 6, Instructions: 320COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF19A580 Relevance: 14.2, APIs: 4, Strings: 4, Instructions: 150COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF208CD0 Relevance: 14.1, APIs: 2, Strings: 6, Instructions: 132libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF2127E0 Relevance: 14.1, APIs: 2, Strings: 6, Instructions: 132libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1A5D3D Relevance: 14.1, APIs: 6, Strings: 2, Instructions: 118injectionCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF2895C0 Relevance: 13.6, APIs: 9, Instructions: 67synchronizationCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF191F90 Relevance: 12.6, APIs: 4, Strings: 3, Instructions: 378fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF195830 Relevance: 12.4, APIs: 3, Strings: 4, Instructions: 147COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1A0B70 Relevance: 12.4, APIs: 6, Strings: 1, Instructions: 127COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF19DE21 Relevance: 12.4, APIs: 4, Strings: 3, Instructions: 102fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF268BCC Relevance: 12.3, APIs: 5, Strings: 2, Instructions: 88libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF2525C0 Relevance: 11.0, APIs: 3, Strings: 3, Instructions: 494COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1BB880 Relevance: 10.8, APIs: 3, Strings: 3, Instructions: 281COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1A8E50 Relevance: 10.6, APIs: 4, Strings: 2, Instructions: 133libraryloaderthreadCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1BE680 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 133COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1996E9 Relevance: 10.6, APIs: 4, Strings: 2, Instructions: 120libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF20F530 Relevance: 10.6, APIs: 2, Strings: 4, Instructions: 94libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1AB560 Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 94injectionCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF22D040 Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 80libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1C17E0 Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 78filelibraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF290070 Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 73COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF296F4C Relevance: 10.6, APIs: 2, Strings: 4, Instructions: 54COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF26B75C Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF2539A4 Relevance: 9.0, APIs: 4, Strings: 1, Instructions: 299fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1B5CC0 Relevance: 8.9, APIs: 2, Strings: 3, Instructions: 103COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1A0070 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 97libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1BBFD0 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 93libraryloadersynchronizationCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1FC800 Relevance: 7.2, APIs: 2, Strings: 2, Instructions: 228COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF22B7B0 Relevance: 7.2, APIs: 2, Strings: 2, Instructions: 174libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF293560 Relevance: 7.2, APIs: 3, Strings: 1, Instructions: 162COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF2896A0 Relevance: 7.1, APIs: 1, Strings: 3, Instructions: 148synchronizationCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF19BF20 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 130threadCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1F3CF0 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 127libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1EC630 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 79COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1EC750 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 69COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF19E100 Relevance: 7.1, APIs: 1, Strings: 3, Instructions: 66COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF196880 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 57filelibraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF24FE90 Relevance: 5.5, APIs: 2, Strings: 1, Instructions: 204fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1CBD50 Relevance: 5.4, APIs: 1, Strings: 2, Instructions: 107COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF25403C Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 100fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1C90D0 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 86libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1B7610 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 86libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1A39D0 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 77COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF263548 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 66COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1E85A0 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 54COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF1A2DE0 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 42libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF2708D0 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 37COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF2666A8 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 36COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7DF22EB90 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 33libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|