Windows
Analysis Report
file.exe
Overview
General Information
Detection
Score: | 24 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 60% |
Signatures
Classification
- System is w10x64
- file.exe (PID: 4252 cmdline:
"C:\Users\ user\Deskt op\file.ex e" MD5: 2699448F43FE2A97C2CF07BF56FE92F3)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00CBE0D8 | |
Source: | Code function: | 0_2_00CEF8D0 | |
Source: | Code function: | 0_2_00CEF8D0 | |
Source: | Code function: | 0_2_00CEBCE0 | |
Source: | Code function: | 0_2_00CEB8E0 | |
Source: | Code function: | 0_2_00CEB8E0 | |
Source: | Code function: | 0_2_00CB98F0 | |
Source: | Code function: | 0_2_00CBBC9D | |
Source: | Code function: | 0_2_00CB5C90 | |
Source: | Code function: | 0_2_00CB5C90 | |
Source: | Code function: | 0_2_00CD8CB0 | |
Source: | Code function: | 0_2_00CEC040 | |
Source: | Code function: | 0_2_00CEC040 | |
Source: | Code function: | 0_2_00CEC040 | |
Source: | Code function: | 0_2_00CEC040 | |
Source: | Code function: | 0_2_00CEB860 | |
Source: | Code function: | 0_2_00CD0870 | |
Source: | Code function: | 0_2_00CBC02B | |
Source: | Code function: | 0_2_00CBE970 | |
Source: | Code function: | 0_2_00CBAD00 | |
Source: | Code function: | 0_2_00CD5E90 | |
Source: | Code function: | 0_2_00CBEA38 | |
Source: | Code function: | 0_2_00CB77D0 | |
Source: | Code function: | 0_2_00CB77D0 | |
Source: | Code function: | 0_2_00CBE35B | |
Source: | Code function: | 0_2_00CF0F60 | |
Source: | Code function: | 0_2_00CBCF05 |
Source: | Code function: | 0_2_00CE4470 |
Source: | Code function: | 0_2_00CE4470 |
Source: | Code function: | 0_2_00CB89A0 | |
Source: | Code function: | 0_2_00CB6CC0 | |
Source: | Code function: | 0_2_00CBE0D8 | |
Source: | Code function: | 0_2_00CB94D0 | |
Source: | Code function: | 0_2_00CEF8D0 | |
Source: | Code function: | 0_2_00CE24E0 | |
Source: | Code function: | 0_2_00CEB8E0 | |
Source: | Code function: | 0_2_00CB98F0 | |
Source: | Code function: | 0_2_00CF0C80 | |
Source: | Code function: | 0_2_00CB5C90 | |
Source: | Code function: | 0_2_00CD8CB0 | |
Source: | Code function: | 0_2_00CB6840 | |
Source: | Code function: | 0_2_00CB4040 | |
Source: | Code function: | 0_2_00CEC040 | |
Source: | Code function: | 0_2_00CD0870 | |
Source: | Code function: | 0_2_00CB542C | |
Source: | Code function: | 0_2_00CE9030 | |
Source: | Code function: | 0_2_00CE41D0 | |
Source: | Code function: | 0_2_00CB3580 | |
Source: | Code function: | 0_2_00CF1580 | |
Source: | Code function: | 0_2_00CB61A0 | |
Source: | Code function: | 0_2_00CBE970 | |
Source: | Code function: | 0_2_00CD3D70 | |
Source: | Code function: | 0_2_00CBAD00 | |
Source: | Code function: | 0_2_00CC9530 | |
Source: | Code function: | 0_2_00CB5AC9 | |
Source: | Code function: | 0_2_00CB4AC0 | |
Source: | Code function: | 0_2_00CD5E90 | |
Source: | Code function: | 0_2_00CD0650 | |
Source: | Code function: | 0_2_00CB9210 | |
Source: | Code function: | 0_2_00CBB210 | |
Source: | Code function: | 0_2_00CD7E20 | |
Source: | Code function: | 0_2_00CB77D0 | |
Source: | Code function: | 0_2_00CB27D0 | |
Source: | Code function: | 0_2_00CB2B80 | |
Source: | Code function: | 0_2_00CEC780 | |
Source: | Code function: | 0_2_00CD1790 | |
Source: | Code function: | 0_2_00CE87B0 | |
Source: | Code function: | 0_2_00CCFB60 | |
Source: | Code function: | 0_2_00CF0F60 | |
Source: | Code function: | 0_2_00CD8770 | |
Source: | Code function: | 0_2_00CBCF05 | |
Source: | Code function: | 0_2_00CCDB30 |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_00CE9030 |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Code function: | 0_2_00CC5058 | |
Source: | Code function: | 0_2_00CC802B | |
Source: | Code function: | 0_2_00CC6438 | |
Source: | Code function: | 0_2_00CC81DB | |
Source: | Code function: | 0_2_00CC8102 | |
Source: | Code function: | 0_2_00CC8135 | |
Source: | Code function: | 0_2_00CC4BD4 |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | API call chain: | graph_0-6212 |
Source: | Code function: | 0_2_00CEDF70 |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 DLL Side-Loading | OS Credential Dumping | 2 System Information Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 2 Obfuscated Files or Information | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | 2 Clipboard Data | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Joe Sandbox ML |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1561634 |
Start date and time: | 2024-11-24 02:22:04 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 6s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 12 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | file.exe |
Detection: | SUS |
Classification: | sus24.winEXE@1/0@0/0 |
EGA Information: |
|
HCA Information: | Failed |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
- Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
File type: | |
Entropy (8bit): | 6.844134547555611 |
TrID: |
|
File name: | file.exe |
File size: | 314'368 bytes |
MD5: | 2699448f43fe2a97c2cf07bf56fe92f3 |
SHA1: | 672e4bdd08082c99ed7adba3799288c22f50338e |
SHA256: | a4ac352fe49d6162961007d64b2ac23413cc5575ea17b61a91f6d808795e994b |
SHA512: | 8cb00120efae52c666235edbc33412cbac8e731fd247340ed76b4ca10602532bbf97bb9b81e8af7d348e65598f4847dc59db761afc470c0ee10f1426a564aa9d |
SSDEEP: | 6144:uo4HXvnCuQlBHyS0zIrm09/67XQIPwES4J3PjYTMMA:p4HXvA7HyYyK/QCEtJfjYTM |
TLSH: | 0C649D0ADB3395A1D987547862CEB33F9D341B0153348EE7DBC4DEC66823EE19936A06 |
File Content Preview: | MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...Q<?g..........................................@.......................................@..................................;..... |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x4089a0 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x673F3C51 [Thu Nov 21 13:57:37 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | efd5a1321fb3549606827ae52de6c65d |
Instruction |
---|
push ebp |
push ebx |
push edi |
push esi |
sub esp, 00000234h |
call 00007F0158852F26h |
test al, al |
je 00007F015881F062h |
lea eax, dword ptr [esp+2Ch] |
push 00000000h |
push 00000010h |
push eax |
push 00000000h |
call dword ptr [00443D20h] |
call 00007F015884C9B8h |
test al, al |
je 00007F015881F03Fh |
call dword ptr [00443D38h] |
mov ebx, eax |
call dword ptr [00443D34h] |
mov edx, 92A9E86Dh |
mov esi, A1396FFBh |
mov ecx, ebx |
shrd esi, edx, cl |
mov dword ptr [esp+14h], eax |
shr edx, cl |
test bl, 00000020h |
je 00007F015881ED66h |
mov esi, edx |
xor edx, edx |
mov eax, esi |
xor eax, A1396FFBh |
mov dword ptr [esp], eax |
mov dword ptr [esp+10h], esi |
mov ecx, esi |
mov edi, esi |
xor ecx, 5EC69004h |
mov dword ptr [esp+0Ch], ecx |
and ecx, 0C9A8831h |
and eax, F36577CEh |
or eax, ecx |
mov ebp, edx |
xor ebp, 92A9E86Dh |
mov esi, edx |
mov ebx, edx |
xor edx, 6D561792h |
mov dword ptr [esp+20h], edx |
and edx, B02F9AF5h |
mov ecx, ebp |
mov dword ptr [esp+1Ch], ebp |
and ecx, 4FD0650Ah |
or ecx, edx |
xor edi, 01004349h |
xor eax, 095ACB78h |
and edi, 05C04349h |
or edi, eax |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x43bcd | 0x8c | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x57000 | 0x3e34 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x43d18 | 0xbc | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x408a9 | 0x40a00 | 8a46d6ae9b5b01b1dd90720ae7d64007 | False | 0.5540906068665378 | data | 6.7016028228100835 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x42000 | 0x20a7 | 0x2200 | 24a8f09a7e46ddc621819240dcf1e29d | False | 0.4619715073529412 | data | 6.51463268349717 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x45000 | 0x1008c | 0x5a00 | 90ce7b6f17ea05d1c477c34c603dec62 | False | 0.5654079861111111 | data | 6.6085821044949355 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.CRT | 0x56000 | 0x4 | 0x200 | ccfa490aa10bd5cdb00c372c749d720e | False | 0.03125 | data | 0.06116285224115448 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x57000 | 0x3e34 | 0x4000 | dff6c95eed4f601e4410770cdd6d5904 | False | 0.4940185546875 | data | 6.427756711499859 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
DLL | Import |
---|---|
SHELL32.dll | SHEmptyRecycleBinW, SHGetFileInfoW, SHGetSpecialFolderPathW |
KERNEL32.dll | CopyFileW, ExitProcess, GetCommandLineW, GetCurrentProcessId, GetCurrentThreadId, GetLogicalDrives, GetSystemDirectoryW, GlobalLock, GlobalUnlock |
USER32.dll | CloseClipboard, GetClipboardData, GetDC, GetForegroundWindow, GetSystemMetrics, GetWindowLongW, OpenClipboard, ReleaseDC |
GDI32.dll | BitBlt, CreateCompatibleBitmap, CreateCompatibleDC, CreateDIBSection, DeleteDC, DeleteObject, GetCurrentObject, GetDIBits, GetObjectW, GetPixel, SelectObject, StretchBlt |
ole32.dll | CoCreateInstance, CoInitializeEx, CoInitializeSecurity, CoSetProxyBlanket, CoUninitialize |
OLEAUT32.dll | SysAllocString, SysFreeString, VariantClear, VariantInit |
Target ID: | 0 |
Start time: | 20:22:56 |
Start date: | 23/11/2024 |
Path: | C:\Users\user\Desktop\file.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xcb0000 |
File size: | 314'368 bytes |
MD5 hash: | 2699448F43FE2A97C2CF07BF56FE92F3 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 1.4% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 71.1% |
Total number of Nodes: | 225 |
Total number of Limit Nodes: | 15 |
Graph
Function 00CB89A0 Relevance: 7.7, APIs: 5, Instructions: 242threadCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CEDF70 Relevance: 1.5, APIs: 1, Instructions: 14libraryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CE9030 Relevance: 30.4, APIs: 10, Strings: 7, Instructions: 621memorycomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CD3D70 Relevance: 24.3, Strings: 19, Instructions: 515COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CE4470 Relevance: 19.4, APIs: 6, Strings: 5, Instructions: 111clipboardCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CB94D0 Relevance: 17.9, Strings: 14, Instructions: 385COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CBCF05 Relevance: 15.6, Strings: 12, Instructions: 574COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CB98F0 Relevance: 10.4, Strings: 8, Instructions: 428COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CCDB30 Relevance: 9.0, Strings: 7, Instructions: 235COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CB9210 Relevance: 6.5, Strings: 5, Instructions: 269COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CD0870 Relevance: 5.9, Strings: 4, Instructions: 861COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CBB210 Relevance: 5.5, Strings: 4, Instructions: 464COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CD7E20 Relevance: 5.5, Strings: 4, Instructions: 461COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CBAD00 Relevance: 5.4, Strings: 4, Instructions: 424COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CB4040 Relevance: 4.2, Strings: 3, Instructions: 428COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CD5E90 Relevance: 4.0, Strings: 3, Instructions: 295COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CBC02B Relevance: 3.9, Strings: 3, Instructions: 166COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CEF8D0 Relevance: 3.3, Strings: 2, Instructions: 813COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CEC040 Relevance: 3.1, Strings: 2, Instructions: 624COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CE24E0 Relevance: 2.8, Strings: 2, Instructions: 254COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CB5AC9 Relevance: 2.7, Strings: 2, Instructions: 219COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CB542C Relevance: 2.7, Strings: 2, Instructions: 217COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CBE970 Relevance: 2.6, Strings: 2, Instructions: 106COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CD8CB0 Relevance: 1.7, Strings: 1, Instructions: 490COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CD8770 Relevance: 1.7, Strings: 1, Instructions: 466COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CC9530 Relevance: 1.7, Strings: 1, Instructions: 449COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CF0F60 Relevance: 1.5, Strings: 1, Instructions: 272COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CB61A0 Relevance: 1.5, Strings: 1, Instructions: 265COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CEBCE0 Relevance: 1.5, Strings: 1, Instructions: 261COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CBE0D8 Relevance: 1.4, Strings: 1, Instructions: 190COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CBEA38 Relevance: 1.4, Strings: 1, Instructions: 139COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CB77D0 Relevance: .8, Instructions: 758COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CB6CC0 Relevance: .7, Instructions: 670COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CB4AC0 Relevance: .7, Instructions: 665COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CB2B80 Relevance: .7, Instructions: 657COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CB3580 Relevance: .6, Instructions: 631COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CB5C90 Relevance: .4, Instructions: 417COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CB6840 Relevance: .3, Instructions: 320COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CE87B0 Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CF1580 Relevance: .3, Instructions: 293COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CEC780 Relevance: .3, Instructions: 283COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CCFB60 Relevance: .3, Instructions: 281COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CF0C80 Relevance: .3, Instructions: 269COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CE41D0 Relevance: .2, Instructions: 244COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CEB8E0 Relevance: .2, Instructions: 217COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CD0650 Relevance: .2, Instructions: 194COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CD1790 Relevance: .2, Instructions: 165COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CB27D0 Relevance: .1, Instructions: 76COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CBBC9D Relevance: .0, Instructions: 31COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CEB860 Relevance: .0, Instructions: 13COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|