Analysis Report
Overview
General Information |
|---|
| Analysis ID: | 9281 |
| Start time: | 12:01:53 |
| Start date: | 06/05/2015 |
| Overall analysis duration: | 0h 5m 10s |
| Report type: | full |
| Sample file name: | FRUK22.exe |
| Cookbook file name: | default.jbs |
| Analysis system description: | W7 Native, up to date 12.12.2013 physical Machine for testing VM-aware malware (Acrobat Reader 11.0.04, Flash 11.9.900.170, Internet Explorer 11, Firefox 26, Java 1.7 Update 45) |
| Number of analysed new started processes analysed: | 7 |
| Number of new started drivers analysed: | 0 |
| Number of existing processes analysed: | 0 |
| Number of existing drivers analysed: | 0 |
| Number of injected processes analysed: | 1 |
| HCA enabled: | true |
| HCA success: |
|
| Cookbook Comments: |
|
| Warnings: | Show All
|
Detection |
|---|
| Strategy | Score | Range | Reporting | Detection | |
|---|---|---|---|---|---|
| Threshold | 84 | 0 - 100 | Report FP / FN | ||
Signature Overview |
|---|
DDOS: |
|---|
| Contains functionality to access network services in a loop (often DDOS functionality) | Show sources | ||
| Source: C:\Windows\explorer.exe | Code function: | 4_2_02D311C5 | |
Cryptography: |
|---|
| Uses Microsoft's Enhanced Cryptographic Provider | Show sources | ||
| Source: C:\FRUK22.exe | Code function: | 1_2_00401520 | |
| Source: C:\Windows\explorer.exe | Code function: | 4_2_02D39C8C | |
| Source: C:\Windows\explorer.exe | Code function: | 4_2_02D39BA0 | |
Spam, unwanted Advertisements and Ransom Demands: |
|---|
| Contains functionality to import cryptographic keys (often used in ransomware) | Show sources | ||
| Source: C:\Windows\explorer.exe | Code function: | 4_2_02D39C8C | |
| Source: C:\Windows\explorer.exe | Code function: | 4_2_02D39BA0 | |
Key, Mouse, Clipboard, Microphone and Screen Capturing: |
|---|
| Creates a window with clipboard capturing capabilities | Show sources | ||
| Source: C:\FRUK22.exe | Window created: | ||
| Source: C:\Users\john\AppData\Local\gNLgAaLjeJfBoaJ.exe | Window created: | ||
E-Banking Fraud: |
|---|
| Checks if browser processes are running | Show sources | ||
| Source: C:\Windows\explorer.exe | Code function: | 4_2_02D3DE9A | |
| Source: C:\Windows\explorer.exe | Code function: | 4_2_02D3DE9A | |
| Source: C:\Windows\explorer.exe | Code function: | 4_2_02D3DE9A | |
Networking: |
|---|
| Urls found in memory or binary data | Show sources | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: WerFault.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: gNLgAaLjeJfBoaJ.exe, explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: WerFault.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: WerFault.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Contains functionality to download additional files from the internet | Show sources | ||
| Source: C:\Windows\explorer.exe | Code function: | 4_2_02D3A8B0 | |
| Performs DNS lookups | Show sources | ||
| Source: unknown | DNS traffic detected: | ||
| Detected TCP or UDP traffic on non-standard ports | Show sources | ||
| Source: global traffic | TCP traffic: | ||
| Source: global traffic | TCP traffic: | ||
| Uses STUN server to do NAT traversial | Show sources | ||
| Source: unknown | DNS query: | ||
| Uses the I2P (Invisible Internet Project) to hide its network activities | Show sources | ||
| Source: gNLgAaLjeJfBoaJ.exe | String found in binary or memory: | ||
| Source: gNLgAaLjeJfBoaJ.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
Boot Survival: |
|---|
| Contains functionality to start windows services | Show sources | ||
| Source: C:\FRUK22.exe | Code function: | 1_2_00403850 | |
| Creates an autostart registry key | Show sources | ||
| Source: C:\Users\john\AppData\Local\gNLgAaLjeJfBoaJ.exe | Registry value created or modified: | ||
| Source: C:\Users\john\AppData\Local\gNLgAaLjeJfBoaJ.exe | Registry value created or modified: | ||
Remote Access Functionality: |
|---|
| Contains functionality to open a port and listen for incoming connection (possibly a backdoor) | Show sources | ||
| Source: C:\Windows\explorer.exe | Code function: | 4_2_02D3A7D2 | |
| Source: C:\Windows\explorer.exe | Code function: | 4_2_02D3ABB6 | |
| Contains strings which may be related to BOT commands | Show sources | ||
| Source: gNLgAaLjeJfBoaJ.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
| Contains VNC / remote desktop functionality (version string found) | Show sources | ||
| Source: gNLgAaLjeJfBoaJ.exe | String found in binary or memory: | ||
| Source: explorer.exe | String found in binary or memory: | ||
Stealing of Sensitive Information: |
|---|
| OS version to string mapping found (often used in BOTs) | Show sources | ||
| Source: explorer.exe | Binary or memory string: | ||
| Source: explorer.exe | Binary or memory string: | ||
| Source: explorer.exe | Binary or memory string: | ||
| Source: explorer.exe | Binary or memory string: | ||
| Source: explorer.exe | Binary or memory string: | ||
| Source: explorer.exe | Binary or memory string: | ||
| Source: explorer.exe | Binary or memory string: | ||
| Source: explorer.exe | Binary or memory string: | ||
| Source: explorer.exe | Binary or memory string: | ||
Data Obfuscation: |
|---|
| Binary may include packed or encrypted code | Show sources | ||
| Source: initial sample | Static PE information: | ||
| Contains functionality to dynamically determine API calls | Show sources | ||
| Source: C:\FRUK22.exe | Code function: | 1_1_00446A90 | |
| Entry point lies outside standard sections | Show sources | ||
| Source: initial sample | Static PE information: | ||
| Generates new code (likely due to unpacking of malware or shellcode) | Show sources | ||
| Source: C:\FRUK22.exe | Code execution: | ||
| Source: C:\Users\john\AppData\Local\gNLgAaLjeJfBoaJ.exe | Code execution: | ||
| PE file contains an invalid checksum | Show sources | ||
| Source: initial sample | Static PE information: | ||
| PE file contains sections with non-standard names | Show sources | ||
| Source: initial sample | Static PE information: | ||
| Source: initial sample | Static PE information: | ||
System Summary: |
|---|
| Executable creates window controls seldom found in malware | Show sources | ||
| Source: C:\FRUK22.exe | Window found: | ||
| Uses Rich Edit Controls | Show sources | ||
| Source: C:\FRUK22.exe | File opened: | ||
| Binary contains paths to debug symbols | Show sources | ||
| Source: | Binary string: | ||
| Contains functionality to adjust token privileges (e.g. debug / backup) | Show sources | ||
| Source: C:\FRUK22.exe | Code function: | 1_2_004014B0 | |
| Source: C:\Windows\explorer.exe | Code function: | 4_2_02D3529F | |
| Source: C:\Windows\explorer.exe | Code function: | 4_2_02D35303 | |
| Contains functionality to create services | Show sources | ||
| Source: C:\FRUK22.exe | Code function: | 1_2_00402900 | |
| Contains functionality to enum processes or threads | Show sources | ||
| Source: C:\FRUK22.exe | Code function: | 1_2_00402B10 | |
| Contains functionality to load and extract PE file embedded resources | Show sources | ||
| Source: C:\FRUK22.exe | Code function: | 1_2_00402AA0 | |
| Contains functionality to modify services (start/stop/modify) | Show sources | ||
| Source: C:\FRUK22.exe | Code function: | 1_2_00403850 | |
| Creates files inside the user directory | Show sources | ||
| Source: C:\FRUK22.exe | File created: | ||
| Reads ini files | Show sources | ||
| Source: C:\FRUK22.exe | File read: | ||
| Spawns processes | Show sources | ||
| Source: unknown | Process created: | ||
| Source: unknown | Process created: | ||
| Source: unknown | Process created: | ||
| Source: unknown | Process created: | ||
| Source: C:\FRUK22.exe | Process created: | ||
| Source: C:\Windows\System32\svchost.exe | Process created: | ||
| PE file has a high occurrence of arithmetic instructions at the PE entrypoint (possbibily packed) | Show sources | ||
| Source: initial sample | Static PE information: | ||
| Contains functionality to call native functions | Show sources | ||
| Source: C:\FRUK22.exe | Code function: | 1_2_00402C20 | |
| Source: C:\FRUK22.exe | Code function: | 1_2_00402DE0 | |
| Source: C:\Windows\explorer.exe | Code function: | 4_2_02D3D97E | |
| Source: C:\Windows\explorer.exe | Code function: | 4_2_02D3DAA9 | |
| Contains functionality to delete services | Show sources | ||
| Source: C:\FRUK22.exe | Code function: | 1_2_00402900 | |
| Contains functionality to launch a process as a different user | Show sources | ||
| Source: C:\Windows\explorer.exe | Code function: | 4_2_02D35770 | |
| Contains functionality to shutdown / reboot the system | Show sources | ||
| Source: C:\Windows\explorer.exe | Code function: | 4_2_02D35A57 | |
| Creates mutexes | Show sources | ||
| Source: C:\Windows\explorer.exe | Mutant created: | ||
| One or more processes crash | Show sources | ||
| Source: unknown | Process created: | ||
| PE file contains strange resources | Show sources | ||
| Source: initial sample | Static PE information: | ||
| Reads the hosts file | Show sources | ||
| Source: C:\Windows\explorer.exe | File read: | ||
HIPS / PFW / Operating System Protection Evasion: |
|---|
| May try to detect the Windows Explorer process (often used for injection) | Show sources | ||
| Source: explorer.exe | Binary or memory string: | ||
| Source: explorer.exe, WerFault.exe | Binary or memory string: | ||
| Source: explorer.exe | Binary or memory string: | ||
| Source: explorer.exe, WerFault.exe | Binary or memory string: | ||
| Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection) | Show sources | ||
| Source: C:\FRUK22.exe | Code function: | 1_2_00403150 | |
| Source: C:\Windows\explorer.exe | Code function: | 4_2_02D35649 | |
| Maps a DLL or memory area into another process | Show sources | ||
| Source: C:\Users\john\AppData\Local\gNLgAaLjeJfBoaJ.exe | Section loaded: | ||
| Queues an APC in another process (thread injection) | Show sources | ||
| Source: C:\Users\john\AppData\Local\gNLgAaLjeJfBoaJ.exe | Thread APC queued: | ||
Anti Debugging: |
|---|
| Contains functionality to register its own exception handler | Show sources | ||
| Source: C:\FRUK22.exe | Code function: | 1_1_00446F90 | |
| Source: C:\Users\john\AppData\Local\gNLgAaLjeJfBoaJ.exe | Code function: | 3_1_00446F90 | |
| Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation)) | Show sources | ||
| Source: C:\FRUK22.exe | System information queried: | ||
| Checks if the current process is being debugged | Show sources | ||
| Source: C:\Windows\System32\WerFault.exe | Process queried: | ||
| Contains functionality to dynamically determine API calls | Show sources | ||
| Source: C:\FRUK22.exe | Code function: | 1_1_00446A90 | |
| Contains functionality to read the PEB | Show sources | ||
| Source: C:\FRUK22.exe | Code function: | 1_2_00403850 | |
| Source: C:\FRUK22.exe | Code function: | 1_2_00390117 | |
| Source: C:\Users\john\AppData\Local\gNLgAaLjeJfBoaJ.exe | Code function: | 3_2_00230117 | |
| Found API chain indicative of debugger detection | Show sources | ||
| Source: C:\FRUK22.exe | Debugger detection routine: | ||
Malware Analysis System Evasion: |
|---|
| Queries a list of all running processes | Show sources | ||
| Source: C:\FRUK22.exe | Process information queried: | ||
Hooking and other Techniques for Hiding and Protection: |
|---|
| Disables application error messsages (SetErrorMode) | Show sources | ||
| Source: C:\FRUK22.exe | Process information set: | ||
| Source: C:\FRUK22.exe | Process information set: | ||
| Source: C:\FRUK22.exe | Process information set: | ||
| Source: C:\Windows\System32\svchost.exe | Process information set: | ||
| Source: C:\Windows\System32\svchost.exe | Process information set: | ||
| Source: C:\Windows\System32\svchost.exe | Process information set: | ||
| Source: C:\Windows\System32\svchost.exe | Process information set: | ||
| Source: C:\Windows\System32\WerFault.exe | Process information set: | ||
| Source: C:\Windows\System32\WerFault.exe | Process information set: | ||
| Source: C:\Windows\System32\WerFault.exe | Process information set: | ||
| Source: C:\Windows\System32\WerFault.exe | Process information set: | ||
| Deletes itself after installation | Show sources | ||
| Source: C:\Users\john\AppData\Local\gNLgAaLjeJfBoaJ.exe | File deleted: | ||
Language, Device and Operating System Detection: |
|---|
| Contains functionality to create pipes for IPC | Show sources | ||
| Source: C:\Windows\explorer.exe | Code function: | 4_2_02D36C58 | |
| Contains functionality to query local / system time | Show sources | ||
| Source: C:\Windows\explorer.exe | Code function: | 4_2_02D354CF | |
| Contains functionality to query windows version | Show sources | ||
| Source: C:\FRUK22.exe | Code function: | 1_1_00445930 | |
| Queries the cryptographic machine GUID | Show sources | ||
| Source: C:\FRUK22.exe | Key value queried: | ||
Yara Overview |
|---|
| No Yara matches |
|---|
Screenshot |
|---|
Startup |
|---|
|
Created / dropped Files |
|---|
| File Path | Type and Hashes |
|---|---|
| |
|
Contacted Domains/Contacted IPs |
|---|
Contacted Domains |
|---|
| Name | IP | Name Server | Active | Registrar | |
|---|---|---|---|---|---|
| google.com | 216.58.209.110 | unknown | true | unknown | unknown |
| stun.ipshka.com | 193.28.184.4 | unknown | true | unknown | unknown |
Contacted IPs |
|---|
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
| IP | Country | Pingable | Open Ports |
|---|---|---|---|
| 216.58.209.110 | United States | unknown | unknown |
| 193.28.184.4 | Ukraine | unknown | unknown |
| 8.8.8.8 | United States | unknown | unknown |
| 27.111.14.93 | New Zealand | unknown | unknown |
Static File Info |
|---|
General | |
|---|---|
| File type: | PE32 executable (GUI) Intel 80386, for MS Windows |
| TrID: |
|
| File name: | FRUK22.exe |
| File size: | 574464 |
| MD5: | cbdda646a20d95f078393506ecdc0796 |
| SHA1: | daa9a55fd946361f216248b563d01c5e16d44644 |
| SHA256: | 10b5975b40f45ba153d91be5a2d6b1ad5c5a359ad5c385c426e39460a9c60c4b |
| SHA512: | e2b5cf5a7f648df83b704885c9782806589a4d4aca2e95c588d144a0181da895bb0cc74016a176f404769d96a91793b8880b74ae9b80732dfb8f41e9fd06510b |
File Icon |
|---|
Static PE Info |
|---|
General | |
|---|---|
| Entrypoint: | 0x4456d4 |
| Entrypoint Section: | AUTO |
| Digitally signed: | false |
| Imagebase: | 0x400000 |
| Subsystem: | windows gui 111 |
| Image File Characteristics: | 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE |
| DLL Characteristics: | |
| Time Stamp: | 0x55309EA0 [Fri Apr 17 05:48:16 2015 UTC] |
| TLS Callbacks: | |
| CLR (.Net) Version: | |
| OS Version Major: | 1 |
| OS Version Minor: | 11 |
| File Version Major: | 1 |
| File Version Minor: | 11 |
| Subsystem Version Major: | 1 |
| Subsystem Version Minor: | 11 |
Entrypoint Preview |
|---|
| Instruction |
|---|
| jmp 00007F2F44A9FFCCh |
| add edx, dword ptr [eax] |
| inc eax |
| add byte ptr [edi+70h], cl |
| outsb |
| and byte ptr [edi+61h], dl |
| je 00007F2F44A9FFD5h |
| outsd |
| insd |
| and byte ptr [ebx+2Fh], al |
| inc ebx |
| and byte ptr [eax], ah |
| xor esi, dword ptr [edx] |
| and byte ptr [edx+75h], dl |
| outsb |
| sub eax, 656D6954h |
| and byte ptr [ebx+79h], dh |
| jnc 00007F2F44A9FFE6h |
| insd |
| and byte ptr [eax+6Fh], dl |
| jc 00007F2F44A9FFE6h |
| imul ebp, dword ptr [edi+6Eh], 6F432073h |
| jo 00007F2F44A9FFEBh |
| jc 00007F2F44A9FFDBh |
| push 43282074h |
| sub dword ptr [eax], esp |
| push ebx |
| jns 00007F2F44A9FFD4h |
| popad |
| jnc 00007F2F44A9FFD7h |
| sub al, 20h |
| dec ecx |
| outsb |
| arpl word ptr [esi], bp |
| and byte ptr [ecx], dh |
| cmp dword ptr [eax], edi |
| cmp byte ptr [32303032h], ch |
| push ebx |
| push ecx |
| push edx |
| push ebp |
| mov ebp, esp |
| sub esp, 08h |
| mov eax, 00000001h |
| call 00007F2F44AA0022h |
| mov eax, dword ptr [004561E0h] |
| add eax, 03h |
| and al, FCh |
| xor edx, edx |
| sub esp, eax |
| mov ecx, esp |
| mov ebx, dword ptr [004561E0h] |
| mov eax, ecx |
| call 00007F2F44AA00E5h |
| mov eax, dword ptr [004561E0h] |
| mov dword ptr [ecx+00000104h], eax |
| mov eax, ecx |
| mov edx, ecx |
| call 00007F2F44AA00A1h |
| lea eax, dword ptr [ebp-08h] |
| call 00007F2F44AA0369h |
| mov ecx, dword ptr [00456258h] |
| add ecx, 03h |
| and cl, FFFFFFFCh |
| call 00007F2F44AA0418h |
| cmp ecx, eax |
| jc 00007F2F44A9FFAAh |
| xor eax, eax |
Data Directories |
|---|
| Name | Virtual Address | Virtual Size | Is in Section |
|---|---|---|---|
| IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_IMPORT | 0x4a000 | 0x6ba | .idata |
| IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x59000 | 0x37200 | |
| IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x58000 | 0x594 | |
| IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Sections |
|---|
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Xored PE | ZLIB Complexity | File Type | Characteristics |
|---|---|---|---|---|---|---|---|---|
| AUTO | 0x1000 | 0x48900 | 0x48a00 | 6.82719373769 | False | 0.632876371558 | data | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
| .idata | 0x4a000 | 0x6ba | 0x800 | 4.69143665948 | False | 0.39306640625 | data | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
| DGROUP | 0x4b000 | 0xcf70 | 0xb600 | 6.1835981847 | False | 0.574605082418 | Targa image data - Map | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
| .reloc | 0x58000 | 0x0 | 0x600 | 6.44460562783 | False | 0.83984375 | data | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
| .rsrc | 0x59000 | 0x0 | 0x37200 | 6.45978587849 | False | 0.666706526361 | data | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Resources |
|---|
| Name | RVA | Size | Type | Language | Country | Nbr Of Functions | Xored PE |
|---|---|---|---|---|---|---|---|
| RT_BITMAP | 0x59280 | 0xae | data | 0 | False | ||
| RT_BITMAP | 0x59330 | 0xaa | data | 0 | False | ||
| RT_BITMAP | 0x593dc | 0xb6 | data | 0 | False | ||
| RT_BITMAP | 0x59494 | 0xa6 | data | 0 | False | ||
| RT_BITMAP | 0x5953c | 0x1b0b0 | data | 0 | False | ||
| RT_BITMAP | 0x745ec | 0x19d18 | data | 0 | False | ||
| RT_ICON | 0x8e304 | 0xea8 | data | 0 | False | ||
| RT_ICON | 0x8f1ac | 0x8a8 | data | 0 | False | ||
| RT_ICON | 0x8fa54 | 0x568 | GLS_BINARY_LSB_FIRST | 0 | False | ||
| RT_GROUP_ICON | 0x8ffbc | 0x30 | MS Windows icon resource - 3 icons, 48x48, 256-colors | 0 | False | ||
| RT_MANIFEST | 0x8ffec | 0x18c | ASCII text, with CRLF line terminators | 0 | False |
Imports |
|---|
| DLL | Import |
|---|---|
| KERNEL32.DLL | CloseHandle, CreateEventA, CreateFileA, ExitProcess, FreeEnvironmentStringsA, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetCurrentThreadId, GetEnvironmentStringsA, GetFileType, GetModuleFileNameA, GetModuleFileNameW, GetModuleHandleA, GetOEMCP, GetProcAddress, GetStartupInfoA, GetStdHandle, GetSystemDirectoryA, GetVersion, LoadLibraryA, MultiByteToWideChar, SetConsoleCtrlHandler, SetEnvironmentVariableA, SetEnvironmentVariableW, SetStdHandle, SetUnhandledExceptionFilter, UnhandledExceptionFilter, VirtualAlloc, VirtualFree, VirtualQuery, WideCharToMultiByte, WriteFile |
| USER32.DLL | BeginPaint, CharUpperA, CreateWindowExA, DefWindowProcA, DestroyWindow, DispatchMessageA, EndDialog, EndPaint, GetKeyboardState, GetMenu, GetMenuItemID, GetMessageA, GetParent, GetPropA, LoadAcceleratorsA, LoadIconA, LoadStringA, PostQuitMessage, RegisterClassExA, SendMessageA, SetParent, SetPropW, SetScrollInfo, SetScrollPos, SetScrollRange, ShowWindow, TranslateAcceleratorA, TranslateMessage, UpdateWindow, WindowFromPoint |
Network Behavior |
|---|
TCP Packets |
|---|
| Timestamp | Source Port | Dest Port | Source IP | Dest IP |
|---|---|---|---|---|
| May 6, 2015 12:04:47.321763039 CEST | 56689 | 53 | 192.168.0.30 | 8.8.8.8 |
| May 6, 2015 12:04:47.458939075 CEST | 53 | 56689 | 8.8.8.8 | 192.168.0.30 |
| May 6, 2015 12:04:47.469017029 CEST | 49174 | 80 | 192.168.0.30 | 216.58.209.110 |
| May 6, 2015 12:04:47.469038010 CEST | 80 | 49174 | 216.58.209.110 | 192.168.0.30 |
| May 6, 2015 12:04:47.469434977 CEST | 49174 | 80 | 192.168.0.30 | 216.58.209.110 |
| May 6, 2015 12:04:47.469624996 CEST | 49174 | 80 | 192.168.0.30 | 216.58.209.110 |
| May 6, 2015 12:04:47.469650030 CEST | 80 | 49174 | 216.58.209.110 | 192.168.0.30 |
| May 6, 2015 12:04:47.469760895 CEST | 80 | 49174 | 216.58.209.110 | 192.168.0.30 |
| May 6, 2015 12:04:47.470124006 CEST | 49174 | 80 | 192.168.0.30 | 216.58.209.110 |
| May 6, 2015 12:04:47.475708008 CEST | 64916 | 53 | 192.168.0.30 | 8.8.8.8 |
| May 6, 2015 12:04:47.666583061 CEST | 53 | 64916 | 8.8.8.8 | 192.168.0.30 |
| May 6, 2015 12:04:47.667903900 CEST | 44719 | 3478 | 192.168.0.30 | 193.28.184.4 |
| May 6, 2015 12:04:47.966063023 CEST | 44719 | 3478 | 192.168.0.30 | 193.28.184.4 |
| May 6, 2015 12:04:48.667948008 CEST | 44719 | 3478 | 192.168.0.30 | 193.28.184.4 |
| May 6, 2015 12:04:50.181401968 CEST | 44719 | 3478 | 192.168.0.30 | 193.28.184.4 |
| May 6, 2015 12:04:53.323299885 CEST | 44719 | 3478 | 192.168.0.30 | 193.28.184.4 |
| May 6, 2015 12:04:58.008397102 CEST | 44719 | 3478 | 192.168.0.30 | 193.28.184.4 |
| May 6, 2015 12:05:05.220022917 CEST | 44719 | 3478 | 192.168.0.30 | 27.111.14.93 |
| May 6, 2015 12:05:05.528678894 CEST | 44719 | 3478 | 192.168.0.30 | 27.111.14.93 |
| May 6, 2015 12:05:06.268353939 CEST | 44719 | 3478 | 192.168.0.30 | 27.111.14.93 |
| May 6, 2015 12:05:07.757616997 CEST | 44719 | 3478 | 192.168.0.30 | 27.111.14.93 |
| May 6, 2015 12:05:10.836292982 CEST | 44719 | 3478 | 192.168.0.30 | 27.111.14.93 |
| May 6, 2015 12:05:15.547976971 CEST | 44719 | 3478 | 192.168.0.30 | 27.111.14.93 |
UDP Packets |
|---|
| Timestamp | Source Port | Dest Port | Source IP | Dest IP |
|---|---|---|---|---|
| May 6, 2015 12:04:47.321763039 CEST | 56689 | 53 | 192.168.0.30 | 8.8.8.8 |
| May 6, 2015 12:04:47.458939075 CEST | 53 | 56689 | 8.8.8.8 | 192.168.0.30 |
| May 6, 2015 12:04:47.475708008 CEST | 64916 | 53 | 192.168.0.30 | 8.8.8.8 |
| May 6, 2015 12:04:47.666583061 CEST | 53 | 64916 | 8.8.8.8 | 192.168.0.30 |
| May 6, 2015 12:04:47.667903900 CEST | 44719 | 3478 | 192.168.0.30 | 193.28.184.4 |
| May 6, 2015 12:04:47.966063023 CEST | 44719 | 3478 | 192.168.0.30 | 193.28.184.4 |
| May 6, 2015 12:04:48.667948008 CEST | 44719 | 3478 | 192.168.0.30 | 193.28.184.4 |
| May 6, 2015 12:04:50.181401968 CEST | 44719 | 3478 | 192.168.0.30 | 193.28.184.4 |
| May 6, 2015 12:04:53.323299885 CEST | 44719 | 3478 | 192.168.0.30 | 193.28.184.4 |
| May 6, 2015 12:04:58.008397102 CEST | 44719 | 3478 | 192.168.0.30 | 193.28.184.4 |
| May 6, 2015 12:05:05.220022917 CEST | 44719 | 3478 | 192.168.0.30 | 27.111.14.93 |
| May 6, 2015 12:05:05.528678894 CEST | 44719 | 3478 | 192.168.0.30 | 27.111.14.93 |
| May 6, 2015 12:05:06.268353939 CEST | 44719 | 3478 | 192.168.0.30 | 27.111.14.93 |
| May 6, 2015 12:05:07.757616997 CEST | 44719 | 3478 | 192.168.0.30 | 27.111.14.93 |
| May 6, 2015 12:05:10.836292982 CEST | 44719 | 3478 | 192.168.0.30 | 27.111.14.93 |
| May 6, 2015 12:05:15.547976971 CEST | 44719 | 3478 | 192.168.0.30 | 27.111.14.93 |
DNS Queries |
|---|
| Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class |
|---|---|---|---|---|---|---|---|
| May 6, 2015 12:04:47.321763039 CEST | 192.168.0.30 | 8.8.8.8 | 0xc9d5 | Standard query (0) | google.com | A (IP address) | IN (0x0001) |
| May 6, 2015 12:04:47.475708008 CEST | 192.168.0.30 | 8.8.8.8 | 0xce24 | Standard query (0) | stun.ipshka.com | A (IP address) | IN (0x0001) |
DNS Answers |
|---|
| Timestamp | Source IP | Dest IP | Trans ID | Replay Code | Name | CName | Address | Type | Class |
|---|---|---|---|---|---|---|---|---|---|
| May 6, 2015 12:04:47.458939075 CEST | 8.8.8.8 | 192.168.0.30 | 0xc9d5 | No error (0) | google.com | 216.58.209.110 | A (IP address) | IN (0x0001) | |
| May 6, 2015 12:04:47.666583061 CEST | 8.8.8.8 | 192.168.0.30 | 0xce24 | No error (0) | stun.ipshka.com | 193.28.184.4 | A (IP address) | IN (0x0001) |
Hooks - Code Manipulation Behavior |
|---|
Statistics |
|---|
CPU Usage |
|---|
Click to jump to process
Memory Usage |
|---|
Click to jump to process
High Level Behavior Distribution |
|---|
back
Click to dive into process behavior distribution
System Behavior |
|---|
General |
|---|
| Start time: | 09:09:10 |
| Start date: | 03/04/2015 |
| Path: | C:\FRUK22.exe |
| Wow64 process (32bit): | false |
| Commandline: | unknown |
| Imagebase: | 0x400000 |
| File size: | 574464 bytes |
| MD5 hash: | CBDDA646A20D95F078393506ECDC0796 |
General |
|---|
| Start time: | 09:09:20 |
| Start date: | 03/04/2015 |
| Path: | C:\Users\john\AppData\Local\gNLgAaLjeJfBoaJ.exe |
| Wow64 process (32bit): | false |
| Commandline: | C:\FRUK22.exe |
| Imagebase: | 0x400000 |
| File size: | 574464 bytes |
| MD5 hash: | CBDDA646A20D95F078393506ECDC0796 |
General |
|---|
| Start time: | 09:09:37 |
| Start date: | 03/04/2015 |
| Path: | C:\Windows\explorer.exe |
| Wow64 process (32bit): | false |
| Commandline: | C:\Windows\Explorer.EXE |
| Imagebase: | 0xa10000 |
| File size: | 2616320 bytes |
| MD5 hash: | 8B88EBBB05A0E56B7DCC708498C02B3E |
General |
|---|
| Start time: | 09:10:48 |
| Start date: | 03/04/2015 |
| Path: | C:\Windows\System32\svchost.exe |
| Wow64 process (32bit): | false |
| Commandline: | unknown |
| Imagebase: | 0xb00000 |
| File size: | 20992 bytes |
| MD5 hash: | 54A47F6B5E09A77E61649109C6A08866 |
General |
|---|
| Start time: | 09:10:49 |
| Start date: | 03/04/2015 |
| Path: | C:\Windows\System32\WerFault.exe |
| Wow64 process (32bit): | false |
| Commandline: | werfault.exe /h /shared Global\1228dbc095bd4e0baaa8c8bc9211d447 |
| Imagebase: | 0x756e0000 |
| File size: | 360448 bytes |
| MD5 hash: | 5FEAB868CAEDBBD1B7A145CA8261E4AA |
Disassembly |
|---|
Code Analysis |
|---|
Execution Graph |
|---|
| Execution Coverage: | 26.7% |
| Dynamic/Decrypted Code Coverage: | 100% |
| Signature Coverage: | 29.4% |
| Total number of Nodes: | 452 |
| Total number of Limit Nodes: | 28 |
Executed Functions |
|---|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
Non-executed Functions |
|---|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
Execution Graph |
|---|
| Execution Coverage: | 43.9% |
| Dynamic/Decrypted Code Coverage: | 100% |
| Signature Coverage: | 77.8% |
| Total number of Nodes: | 45 |
| Total number of Limit Nodes: | 12 |
Executed Functions |
|---|
| APIs |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
Non-executed Functions |
|---|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
Execution Graph |
|---|
| Execution Coverage: | 6.7% |
| Dynamic/Decrypted Code Coverage: | 98.8% |
| Signature Coverage: | 5.8% |
| Total number of Nodes: | 1652 |
| Total number of Limit Nodes: | 85 |
Executed Functions |
|---|
| APIs |
|
| Strings |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
Non-executed Functions |
|---|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Strings |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Strings |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Strings |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Strings |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Strings |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Strings |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Strings |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Strings |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Strings |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Strings |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Memory Dump Source |
|
| Joe Sandbox IDA Plugin |
|