Sample files count | 1 |
Created files count | 6 |
Modified files count | 0 |
File Properties | |
---|---|
Names | 249bebc650b7160cfeee41d08bc61dc220ecb740.malware.exe (Sample File) |
Size | 1.99 MB (2084864 bytes) |
Hash Values | MD5: a66df34f40f1345861846918f4f8f56d SHA1: 249bebc650b7160cfeee41d08bc61dc220ecb740 SHA256: 91de42dda9985493ed08b1e6b7f5c3931135189a5455a3afb9bac8cc8d7c0870 |
Actions |
|
File Properties | |
---|---|
Image Base | 0x400000 |
Entry Point | 0x401000 |
Size Of Code | 0xa9000 |
Size Of Initialized Data | 0xccd8 |
Size Of Uninitialized Data | 0x0 |
Format | x86 |
Type | Executable |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2016-08-20 02:57:57 |
Compiler/Packer | Unknown |
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0xa9000 | 0xa9000 | 0x600 | CNT_CODE, MEM_EXECUTE, MEM_READ | 7.1 |
.rdata | 0x4aa000 | 0x2000 | 0x2800 | 0xa9600 | CNT_INITIALIZED_DATA, MEM_READ | 0.18 |
.data | 0x4ac000 | 0x150000 | 0x150000 | 0xabe00 | CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE | 5.87 |
.rsrc | 0x5fc000 | 0x1200 | 0x1200 | 0x1fbe00 | CNT_CODE, MEM_LOCKED, MEM_READ, MEM_WRITE | 5.82 |
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset |
---|---|---|---|---|
GetCurrentProcess | 0x0 | 0x4aa000 | 0xaa038 | 0xa9638 |
GetUserDefaultLangID | 0x0 | 0x4aa004 | 0xaa03c | 0xa963c |
VirtualAlloc | 0x0 | 0x4aa008 | 0xaa040 | 0xa9640 |
File Properties | |
---|---|
Names | c:\users\wi2yhmti onvscy7pe\ayooemee\xumiasww (Created File) c:\programdata\vmymsigm\yoummieo (Created File) |
Size | 0.00 KB (0 bytes) |
Hash Values | MD5: d41d8cd98f00b204e9800998ecf8427e SHA1: da39a3ee5e6b4b0d3255bfef95601890afd80709 SHA256: e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
File Properties | |
---|---|
Names | c:\users\wi2yhmti onvscy7pe\ayooemee\xumiasww.exe (Created File) |
Size | 2.00 MB (2100224 bytes) |
Hash Values | MD5: e8b81e4a627a9f9a772b6d42d9bb3a3c SHA1: 08cdff2e0e82651cde54a58eca4747aadc940a53 SHA256: 0fbd214902a4b12b22dd57fc04449cf9642a220d2cc5c0cd274013131446c899 |
Actions |
|
File Properties | |
---|---|
Image Base | 0x400000 |
Entry Point | 0x401000 |
Size Of Code | 0xa7000 |
Size Of Initialized Data | 0x45534 |
Size Of Uninitialized Data | 0x0 |
Format | x86 |
Type | Executable |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2016-09-26 12:42:39 |
Compiler/Packer | Unknown |
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0xa7000 | 0xa7000 | 0x400 | CNT_CODE, MEM_EXECUTE, MEM_READ | 7.08 |
.rdata | 0x4a8000 | 0x2000 | 0x2800 | 0xa7400 | CNT_INITIALIZED_DATA, MEM_READ | 0.23 |
.data | 0x4aa000 | 0x157000 | 0x157000 | 0xa9c00 | CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE | 5.77 |
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset |
---|---|---|---|---|
GetVersion | 0x0 | 0x4a8000 | 0xa8050 | 0xa7450 |
VirtualAlloc | 0x0 | 0x4a8004 | 0xa8054 | 0xa7454 |
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset |
---|---|---|---|---|
GetOpenClipboardWindow | 0x0 | 0x4a800c | 0xa805c | 0xa745c |
File Properties | |
---|---|
Names | c:\programdata\vmymsigm\yoummieo.exe (Created File) |
Size | 1.95 MB (2042880 bytes) |
Hash Values | MD5: 25081af7955ff8b96260f64cc3c76bcb SHA1: e02b4eab3fe752312aadd58de8a2e3558aebe12d SHA256: c7c619989c3733e37fa0b40b0e606cd0f6b3711378cbffd4908c4364fbf1e18c |
Actions |
|
File Properties | |
---|---|
Image Base | 0x400000 |
Entry Point | 0x401000 |
Size Of Code | 0xa7000 |
Size Of Initialized Data | 0x63d40 |
Size Of Uninitialized Data | 0x0 |
Format | x86 |
Type | Executable |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2016-09-26 12:42:51 |
Compiler/Packer | Unknown |
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0xa7000 | 0xa7000 | 0x400 | CNT_CODE, MEM_EXECUTE, MEM_READ | 7.11 |
.rdata | 0x4a8000 | 0x2000 | 0x2800 | 0xa7400 | CNT_INITIALIZED_DATA, MEM_READ | 0.22 |
.data | 0x4aa000 | 0x149000 | 0x149000 | 0xa9c00 | CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE | 5.85 |
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset |
---|---|---|---|---|
GetSystemDefaultLangID | 0x0 | 0x4a8000 | 0xa8050 | 0xa7450 |
VirtualAlloc | 0x0 | 0x4a8004 | 0xa8054 | 0xa7454 |
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset |
---|---|---|---|---|
GetClipboardOwner | 0x0 | 0x4a800c | 0xa805c | 0xa745c |
File Properties | |
---|---|
Names | c:\programdata\baieaacu\xuaecwog.exe (Created File) |
Size | 1.98 MB (2079744 bytes) |
Hash Values | MD5: 958a7f26c423db4ed7c1caafc0dda8e9 SHA1: 0af04b61a579c82fe3a4b06a62fc4d3cd0e2c571 SHA256: b9796040e89f3877c538a338d75bab2beeec94a720571f3d5df08e019cff3380 |
Actions |
|
File Properties | |
---|---|
Image Base | 0x400000 |
Entry Point | 0x401000 |
Size Of Code | 0xa7000 |
Size Of Initialized Data | 0xd504 |
Size Of Uninitialized Data | 0x0 |
Format | x86 |
Type | Executable |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2016-09-26 12:43:07 |
Compiler/Packer | Unknown |
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0xa7000 | 0xa7000 | 0x400 | CNT_CODE, MEM_EXECUTE, MEM_READ | 7.09 |
.rdata | 0x4a8000 | 0x2000 | 0x2800 | 0xa7400 | CNT_INITIALIZED_DATA, MEM_READ | 0.2 |
.data | 0x4aa000 | 0x152000 | 0x152000 | 0xa9c00 | CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE | 5.8 |
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset |
---|---|---|---|---|
VirtualAlloc | 0x0 | 0x4a8000 | 0xa8050 | 0xa7450 |
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset |
---|---|---|---|---|
GetMessageTime | 0x0 | 0x4a8008 | 0xa8058 | 0xa7458 |
GetMenuCheckMarkDimensions | 0x0 | 0x4a800c | 0xa805c | 0xa745c |
File Properties | |
---|---|
Names | c:\users\wi2yhm~1\appdata\local\temp\dwaaskwo.bat (Created File) |
Size | 0.00 KB (4 bytes) |
Hash Values | MD5: f6f0aa95187fb1682cfbee02e3348d4f SHA1: 46c7c7331f30edf31b3308f077cb583ec37a68be SHA256: b9c68ec4d2854ae3bc968140b7c9ceefb21f5dd73365d16590741bce796ec459 |
Actions |
|
File Properties | |
---|---|
Names | c:\users\wi2yhmti onvscy7pe\desktop\249bebc650b7160cfeee41d08bc61dc220ecb740.malware (Created File) |
Size | 6.80 KB (6968 bytes) |
Hash Values | MD5: 672a1f1de82c3076688c129d2c89d0e2 SHA1: 02e8f06ad6888c9fb28059f5eac065b7bbfdd365 SHA256: 1d8a8607dd5b6aa413649cd3dc7187497e6a7fcb616e56c980fcfb682ee8c363 |
Actions |
|
This feature requires an online-connection to the VMRay backend.
An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefox
with deactivated setting "security.fileuri.strict_origin_policy".