d0abcf56...b05c | Files
Try VMRay Analyzer
VTI SCORE: 100/100
Dynamic Analysis Report
Classification: -
Threat Names:
DeepScan:Generic.Ransom.Fonix.2.57D59D3A
DeepScan:Generic.Ransom.Fonix.2.7637E1D3
Gen:Variant.Ulise.156743
Filters:
Filename Category Type Severity Actions
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\26SDlxCbvJlumPMe.exe Sample File Binary
Malicious
»
Also Known As C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\XINOF.exe (Dropped File)
C:\ProgramData\XINOF.exe (Dropped File)
C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XINOF.exe (Dropped File)
XINOF.exe (Dropped File)
Mime Type application/vnd.microsoft.portable-executable
File Size 1.21 MB
MD5 f7730883c85cf8dd32203177f58ad932 Copy to Clipboard
SHA1 de5269bee7bbebb221f900feadb7c5b51ea0c7cd Copy to Clipboard
SHA256 d0abcf560468841fbfc9f728c655be8394bd078adca4cb37025c3681b429b05c Copy to Clipboard
SSDeep 24576:fMemBqGcSZtoTznQq779o63ZkuyidpAkTOmNDyN:EemBtZeTDQc7/WBikkT5 Copy to Clipboard
ImpHash d6af38ba6817ff9c3d8530259fd555fb Copy to Clipboard
PE Information
»
Image Base 0x400000
Entry Point 0x472a74
Size Of Code 0xcbc00
Size Of Initialized Data 0x6c800
File Type FileType.executable
Subsystem Subsystem.windows_cui
Machine Type MachineType.amd64
Compile Timestamp 2021-01-22 15:55:46+00:00
Sections (7)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x401000 0xcbaa4 0xcbc00 0x400 IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ 6.42
.rdata 0x4cd000 0x53b00 0x53c00 0xcc000 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ 5.45
.data 0x521000 0xbd4c 0x8a00 0x11fc00 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE 4.87
.pdata 0x52d000 0x9dd4 0x9e00 0x128600 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ 5.97
_RDATA 0x537000 0x94 0x200 0x132400 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ 1.43
.rsrc 0x538000 0x1e0 0x200 0x132600 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ 4.71
.reloc 0x539000 0x2ba0 0x2c00 0x132800 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ 5.45
Imports (7)
»
KERNEL32.dll (149)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
SetThreadPriority 0x0 0x4cd038 0x11f920 0x11e920 0x56b
CreateMutexW 0x0 0x4cd040 0x11f928 0x11e928 0xda
InitializeCriticalSectionEx 0x0 0x4cd048 0x11f930 0x11e930 0x369
FindClose 0x0 0x4cd050 0x11f938 0x11e938 0x17b
LocalAlloc 0x0 0x4cd058 0x11f940 0x11e940 0x3cd
ReleaseMutex 0x0 0x4cd060 0x11f948 0x11e948 0x4b4
GetLocaleInfoA 0x0 0x4cd068 0x11f950 0x11e950 0x269
OpenProcess 0x0 0x4cd070 0x11f958 0x11e958 0x410
SetFileAttributesW 0x0 0x4cd078 0x11f960 0x11e960 0x52b
CreateToolhelp32Snapshot 0x0 0x4cd080 0x11f968 0x11e968 0xfb
Sleep 0x0 0x4cd088 0x11f970 0x11e970 0x58b
FormatMessageW 0x0 0x4cd090 0x11f978 0x11e978 0x1ad
CopyFileA 0x0 0x4cd098 0x11f980 0x11e980 0xa8
GetLastError 0x0 0x4cd0a0 0x11f988 0x11e988 0x267
Process32NextW 0x0 0x4cd0a8 0x11f990 0x11e990 0x431
DeleteFileA 0x0 0x4cd0b0 0x11f998 0x11e998 0x113
Process32FirstW 0x0 0x4cd0b8 0x11f9a0 0x11e9a0 0x42f
CloseHandle 0x0 0x4cd0c0 0x11f9a8 0x11e9a8 0x86
RaiseException 0x0 0x4cd0c8 0x11f9b0 0x11e9b0 0x466
DecodePointer 0x0 0x4cd0d0 0x11f9b8 0x11e9b8 0x10a
GetDriveTypeA 0x0 0x4cd0d8 0x11f9c0 0x11e9c0 0x235
LocalFree 0x0 0x4cd0e0 0x11f9c8 0x11e9c8 0x3d2
DeleteCriticalSection 0x0 0x4cd0e8 0x11f9d0 0x11e9d0 0x111
CopyFileW 0x0 0x4cd0f0 0x11f9d8 0x11e9d8 0xad
WideCharToMultiByte 0x0 0x4cd0f8 0x11f9e0 0x11e9e0 0x60d
GetConsoleWindow 0x0 0x4cd100 0x11f9e8 0x11e9e8 0x20d
GetDiskFreeSpaceExA 0x0 0x4cd108 0x11f9f0 0x11e9f0 0x22e
OpenMutexW 0x0 0x4cd110 0x11f9f8 0x11e9f8 0x40c
GetDriveTypeW 0x0 0x4cd118 0x11fa00 0x11ea00 0x236
SetLastError 0x0 0x4cd120 0x11fa08 0x11ea08 0x53f
QueryPerformanceCounter 0x0 0x4cd128 0x11fa10 0x11ea10 0x450
QueryPerformanceFrequency 0x0 0x4cd130 0x11fa18 0x11ea18 0x451
GetCurrentThread 0x0 0x4cd138 0x11fa20 0x11ea20 0x221
GetThreadTimes 0x0 0x4cd140 0x11fa28 0x11ea28 0x30c
SetEndOfFile 0x0 0x4cd148 0x11fa30 0x11ea30 0x51e
WriteConsoleW 0x0 0x4cd150 0x11fa38 0x11ea38 0x620
CreateFileW 0x0 0x4cd158 0x11fa40 0x11ea40 0xcb
SetStdHandle 0x0 0x4cd160 0x11fa48 0x11ea48 0x557
GetProcessHeap 0x0 0x4cd168 0x11fa50 0x11ea50 0x2bb
SetEnvironmentVariableW 0x0 0x4cd170 0x11fa58 0x11ea58 0x522
FreeEnvironmentStringsW 0x0 0x4cd178 0x11fa60 0x11ea60 0x1b0
TerminateProcess 0x0 0x4cd180 0x11fa68 0x11ea68 0x59a
GetCurrentProcess 0x0 0x4cd188 0x11fa70 0x11ea70 0x21d
FindNextFileW 0x0 0x4cd190 0x11fa78 0x11ea78 0x192
SetPriorityClass 0x0 0x4cd198 0x11fa80 0x11ea80 0x549
FindFirstFileW 0x0 0x4cd1a0 0x11fa88 0x11ea88 0x186
SetThreadPriorityBoost 0x0 0x4cd1a8 0x11fa90 0x11ea90 0x56c
SetProcessPriorityBoost 0x0 0x4cd1b0 0x11fa98 0x11ea98 0x551
GetEnvironmentStringsW 0x0 0x4cd1b8 0x11faa0 0x11eaa0 0x23e
GetOEMCP 0x0 0x4cd1c0 0x11faa8 0x11eaa8 0x29e
GetACP 0x0 0x4cd1c8 0x11fab0 0x11eab0 0x1b8
IsValidCodePage 0x0 0x4cd1d0 0x11fab8 0x11eab8 0x38e
FindFirstFileExW 0x0 0x4cd1d8 0x11fac0 0x11eac0 0x181
HeapSize 0x0 0x4cd1e0 0x11fac8 0x11eac8 0x357
HeapReAlloc 0x0 0x4cd1e8 0x11fad0 0x11ead0 0x355
ReadConsoleW 0x0 0x4cd1f0 0x11fad8 0x11ead8 0x474
ReadFile 0x0 0x4cd1f8 0x11fae0 0x11eae0 0x477
GetFileAttributesExW 0x0 0x4cd200 0x11fae8 0x11eae8 0x249
CreateProcessW 0x0 0x4cd208 0x11faf0 0x11eaf0 0xe5
GetExitCodeProcess 0x0 0x4cd210 0x11faf8 0x11eaf8 0x243
GetConsoleMode 0x0 0x4cd218 0x11fb00 0x11eb00 0x202
GetConsoleCP 0x0 0x4cd220 0x11fb08 0x11eb08 0x1f0
FlushFileBuffers 0x0 0x4cd228 0x11fb10 0x11eb10 0x1a5
MultiByteToWideChar 0x0 0x4cd230 0x11fb18 0x11eb18 0x3f2
GetStringTypeW 0x0 0x4cd238 0x11fb20 0x11eb20 0x2de
EnterCriticalSection 0x0 0x4cd240 0x11fb28 0x11eb28 0x135
LeaveCriticalSection 0x0 0x4cd248 0x11fb30 0x11eb30 0x3c0
TryEnterCriticalSection 0x0 0x4cd250 0x11fb38 0x11eb38 0x5b5
GetCurrentThreadId 0x0 0x4cd258 0x11fb40 0x11eb40 0x222
WaitForSingleObjectEx 0x0 0x4cd260 0x11fb48 0x11eb48 0x5e7
SwitchToThread 0x0 0x4cd268 0x11fb50 0x11eb50 0x595
EncodePointer 0x0 0x4cd270 0x11fb58 0x11eb58 0x131
InitializeCriticalSectionAndSpinCount 0x0 0x4cd278 0x11fb60 0x11eb60 0x368
CreateEventW 0x0 0x4cd280 0x11fb68 0x11eb68 0xbf
TlsAlloc 0x0 0x4cd288 0x11fb70 0x11eb70 0x5ac
TlsGetValue 0x0 0x4cd290 0x11fb78 0x11eb78 0x5ae
TlsSetValue 0x0 0x4cd298 0x11fb80 0x11eb80 0x5af
TlsFree 0x0 0x4cd2a0 0x11fb88 0x11eb88 0x5ad
GetSystemTimeAsFileTime 0x0 0x4cd2a8 0x11fb90 0x11eb90 0x2f0
GetTickCount 0x0 0x4cd2b0 0x11fb98 0x11eb98 0x30e
GetModuleHandleW 0x0 0x4cd2b8 0x11fba0 0x11eba0 0x27e
GetProcAddress 0x0 0x4cd2c0 0x11fba8 0x11eba8 0x2b5
CompareStringW 0x0 0x4cd2c8 0x11fbb0 0x11ebb0 0x9b
LCMapStringW 0x0 0x4cd2d0 0x11fbb8 0x11ebb8 0x3b4
GetLocaleInfoW 0x0 0x4cd2d8 0x11fbc0 0x11ebc0 0x26b
GetCPInfo 0x0 0x4cd2e0 0x11fbc8 0x11ebc8 0x1c7
IsDebuggerPresent 0x0 0x4cd2e8 0x11fbd0 0x11ebd0 0x382
OutputDebugStringW 0x0 0x4cd2f0 0x11fbd8 0x11ebd8 0x41c
SetEvent 0x0 0x4cd2f8 0x11fbe0 0x11ebe0 0x524
ResetEvent 0x0 0x4cd300 0x11fbe8 0x11ebe8 0x4ca
InitializeSListHead 0x0 0x4cd308 0x11fbf0 0x11ebf0 0x36c
RtlCaptureContext 0x0 0x4cd310 0x11fbf8 0x11ebf8 0x4d3
RtlLookupFunctionEntry 0x0 0x4cd318 0x11fc00 0x11ec00 0x4da
RtlVirtualUnwind 0x0 0x4cd320 0x11fc08 0x11ec08 0x4e1
UnhandledExceptionFilter 0x0 0x4cd328 0x11fc10 0x11ec10 0x5bc
SetUnhandledExceptionFilter 0x0 0x4cd330 0x11fc18 0x11ec18 0x57b
IsProcessorFeaturePresent 0x0 0x4cd338 0x11fc20 0x11ec20 0x389
GetStartupInfoW 0x0 0x4cd340 0x11fc28 0x11ec28 0x2d7
GetCurrentProcessId 0x0 0x4cd348 0x11fc30 0x11ec30 0x21e
CreateTimerQueue 0x0 0x4cd350 0x11fc38 0x11ec38 0xf9
SignalObjectAndWait 0x0 0x4cd358 0x11fc40 0x11ec40 0x589
CreateThread 0x0 0x4cd360 0x11fc48 0x11ec48 0xf2
GetThreadPriority 0x0 0x4cd368 0x11fc50 0x11ec50 0x308
GetLogicalProcessorInformation 0x0 0x4cd370 0x11fc58 0x11ec58 0x26f
CreateTimerQueueTimer 0x0 0x4cd378 0x11fc60 0x11ec60 0xfa
ChangeTimerQueueTimer 0x0 0x4cd380 0x11fc68 0x11ec68 0x78
DeleteTimerQueueTimer 0x0 0x4cd388 0x11fc70 0x11ec70 0x11b
GetNumaHighestNodeNumber 0x0 0x4cd390 0x11fc78 0x11ec78 0x290
GetProcessAffinityMask 0x0 0x4cd398 0x11fc80 0x11ec80 0x2b6
SetThreadAffinityMask 0x0 0x4cd3a0 0x11fc88 0x11ec88 0x560
RegisterWaitForSingleObject 0x0 0x4cd3a8 0x11fc90 0x11ec90 0x4ad
UnregisterWait 0x0 0x4cd3b0 0x11fc98 0x11ec98 0x5c5
FreeLibrary 0x0 0x4cd3b8 0x11fca0 0x11eca0 0x1b1
FreeLibraryAndExitThread 0x0 0x4cd3c0 0x11fca8 0x11eca8 0x1b2
GetModuleFileNameW 0x0 0x4cd3c8 0x11fcb0 0x11ecb0 0x27a
GetModuleHandleA 0x0 0x4cd3d0 0x11fcb8 0x11ecb8 0x27b
LoadLibraryExW 0x0 0x4cd3d8 0x11fcc0 0x11ecc0 0x3c6
GetVersionExW 0x0 0x4cd3e0 0x11fcc8 0x11ecc8 0x324
VirtualAlloc 0x0 0x4cd3e8 0x11fcd0 0x11ecd0 0x5d5
VirtualProtect 0x0 0x4cd3f0 0x11fcd8 0x11ecd8 0x5db
VirtualFree 0x0 0x4cd3f8 0x11fce0 0x11ece0 0x5d8
DuplicateHandle 0x0 0x4cd400 0x11fce8 0x11ece8 0x12f
ReleaseSemaphore 0x0 0x4cd408 0x11fcf0 0x11ecf0 0x4b8
InterlockedPopEntrySList 0x0 0x4cd410 0x11fcf8 0x11ecf8 0x371
InterlockedPushEntrySList 0x0 0x4cd418 0x11fd00 0x11ed00 0x372
InterlockedFlushSList 0x0 0x4cd420 0x11fd08 0x11ed08 0x370
QueryDepthSList 0x0 0x4cd428 0x11fd10 0x11ed10 0x446
UnregisterWaitEx 0x0 0x4cd430 0x11fd18 0x11ed18 0x5c6
LoadLibraryW 0x0 0x4cd438 0x11fd20 0x11ed20 0x3c7
WaitForSingleObject 0x0 0x4cd440 0x11fd28 0x11ed28 0x5e6
RtlUnwindEx 0x0 0x4cd448 0x11fd30 0x11ed30 0x4e0
RtlPcToFileHeader 0x0 0x4cd450 0x11fd38 0x11ed38 0x4dc
ExitProcess 0x0 0x4cd458 0x11fd40 0x11ed40 0x164
GetModuleHandleExW 0x0 0x4cd460 0x11fd48 0x11ed48 0x27d
ExitThread 0x0 0x4cd468 0x11fd50 0x11ed50 0x165
MoveFileExW 0x0 0x4cd470 0x11fd58 0x11ed58 0x3eb
GetStdHandle 0x0 0x4cd478 0x11fd60 0x11ed60 0x2d9
WriteFile 0x0 0x4cd480 0x11fd68 0x11ed68 0x621
GetCommandLineA 0x0 0x4cd488 0x11fd70 0x11ed70 0x1dc
GetCommandLineW 0x0 0x4cd490 0x11fd78 0x11ed78 0x1dd
GetFileSizeEx 0x0 0x4cd498 0x11fd80 0x11ed80 0x253
SetFilePointerEx 0x0 0x4cd4a0 0x11fd88 0x11ed88 0x531
GetFileType 0x0 0x4cd4a8 0x11fd90 0x11ed90 0x255
HeapAlloc 0x0 0x4cd4b0 0x11fd98 0x11ed98 0x34e
HeapFree 0x0 0x4cd4b8 0x11fda0 0x11eda0 0x352
IsValidLocale 0x0 0x4cd4c0 0x11fda8 0x11eda8 0x390
GetUserDefaultLCID 0x0 0x4cd4c8 0x11fdb0 0x11edb0 0x31b
EnumSystemLocalesW 0x0 0x4cd4d0 0x11fdb8 0x11edb8 0x159
RtlUnwind 0x0 0x4cd4d8 0x11fdc0 0x11edc0 0x4df
USER32.dll (5)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
GetKeyboardLayoutList 0x0 0x4cd500 0x11fde8 0x11ede8 0x16a
ExitWindowsEx 0x0 0x4cd508 0x11fdf0 0x11edf0 0x10f
ShowWindow 0x0 0x4cd510 0x11fdf8 0x11edf8 0x388
MessageBoxW 0x0 0x4cd518 0x11fe00 0x11ee00 0x28a
SystemParametersInfoW 0x0 0x4cd520 0x11fe08 0x11ee08 0x398
ADVAPI32.dll (4)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
CryptAcquireContextA 0x0 0x4cd000 0x11f8e8 0x11e8e8 0xc1
CryptGenRandom 0x0 0x4cd008 0x11f8f0 0x11e8f0 0xd2
CryptReleaseContext 0x0 0x4cd010 0x11f8f8 0x11e8f8 0xdc
GetUserNameA 0x0 0x4cd018 0x11f900 0x11e900 0x17a
IPHLPAPI.DLL (1)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
GetIpNetTable 0x0 0x4cd028 0x11f910 0x11e910 0x69
WS2_32.dll (11)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
inet_ntoa 0xc 0x4cd540 0x11fe28 0x11ee28 -
connect 0x4 0x4cd548 0x11fe30 0x11ee30 -
WSAGetLastError 0x6f 0x4cd550 0x11fe38 0x11ee38 -
socket 0x17 0x4cd558 0x11fe40 0x11ee40 -
send 0x13 0x4cd560 0x11fe48 0x11ee48 -
WSAStartup 0x73 0x4cd568 0x11fe50 0x11ee50 -
gethostbyname 0x34 0x4cd570 0x11fe58 0x11ee58 -
closesocket 0x3 0x4cd578 0x11fe60 0x11ee60 -
WSACleanup 0x74 0x4cd580 0x11fe68 0x11ee68 -
recv 0x10 0x4cd588 0x11fe70 0x11ee70 -
htons 0x9 0x4cd590 0x11fe78 0x11ee78 -
WININET.dll (1)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
InternetCheckConnectionA 0x0 0x4cd530 0x11fe18 0x11ee18 0x92
NETAPI32.dll (2)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
NetShareEnum 0x0 0x4cd4e8 0x11fdd0 0x11edd0 0xde
NetApiBufferFree 0x0 0x4cd4f0 0x11fdd8 0x11edd8 0x51
Memory Dumps (2)
»
Name Process ID Start VA End VA Dump Reason PE Rebuild Bitness Entry Point AV YARA Actions
26sdlxcbvjlumpme.exe 1 0x01210000 0x0134BFFF Relevant Image True 64-bit 0x012A1928 True False
26sdlxcbvjlumpme.exe 1 0x01210000 0x0134BFFF Final Dump True 64-bit 0x012C0AB8 True False
Local AV Matches (1)
»
Threat Name Severity
DeepScan:Generic.Ransom.Fonix.2.57D59D3A
Malicious
Cpriv.key Dropped File Text
Unknown
»
Mime Type text/plain
File Size 1.61 KB
MD5 20ed96b7e92f983f591ba0b42630d0c4 Copy to Clipboard
SHA1 8ed1fe32cdc6276f8ad578dfdb8df2cd687dbfbe Copy to Clipboard
SHA256 16caf23acfe21903319bedfe2361151ec63d4c2b19b66af9e8d1076a79dd2486 Copy to Clipboard
SSDeep 24:dcj9GjRrZ/xL3bosehjofb6LHNrynD9amIi9C2zfrW7Son9T5QD5el:d8sjjdQhjo+pOnBaS8QPYU8 Copy to Clipboard
ImpHash -
C:\ProgramData\Cpriv.key Dropped File Text
Unknown
»
Also Known As Cpriv.key (Dropped File)
Mime Type text/plain
File Size 2.18 KB
MD5 afd950b87483c90737cdfbc00fe8e094 Copy to Clipboard
SHA1 3394ad8dd8dab6894d7f61b9b31f2aa0610285e5 Copy to Clipboard
SHA256 59dc447e1704bf232f2eb7d98c020c4aeadc0402f373f2f5d7989819fc5986b9 Copy to Clipboard
SSDeep 48:nxOhK6JF0JQhFOlJEgaABjoYOhjDsO5GBajK47fFl5:nkhrJaUOlJE0OhvsOFK47fv5 Copy to Clipboard
ImpHash -
Cpub.key Dropped File Stream
Unknown
»
Also Known As C:\ProgramData\Cpub.key (Dropped File)
Mime Type application/octet-stream
File Size 292 Bytes
MD5 52c090bacd9a04a8fd5e04f256681e0c Copy to Clipboard
SHA1 e453a0367a4c75ec68f64a80acc253f6569051b9 Copy to Clipboard
SHA256 c610676c4542a0b529903fefabd454a922ab902fb1498f3addbd7a058ef856f4 Copy to Clipboard
SSDeep 6:sLT7fFNnYIXsjYksFvgC8CN3NgPmnerRwaXyGllHlQtOVPn:uViI8NsFvghO3yYerRwcyslFQk Copy to Clipboard
ImpHash -
SystemID Dropped File Text
Unknown
»
Also Known As C:\ProgramData\SystemID (Dropped File)
Mime Type text/plain
File Size 8 Bytes
MD5 07336ecfd35657e661857296cd24c744 Copy to Clipboard
SHA1 63be15d8a9a099593409cfe95bc1670835093b94 Copy to Clipboard
SHA256 e33d60720d0153469673afb2ef97a579d0b6d01ddcfab5259512e3072c13f42c Copy to Clipboard
SSDeep 3:OxT:OxT Copy to Clipboard
ImpHash -
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\How To Decrypt Files.hta Dropped File Text
Unknown
»
Also Known As C:\ProgramData\How To Decrypt Files.hta (Dropped File)
Mime Type text/html
File Size 4.53 KB
MD5 8a902683185fef7310c47d7a3119eda4 Copy to Clipboard
SHA1 3e9b6ce7b4e16610487e73de60e92bab91d62109 Copy to Clipboard
SHA256 2c00bd0cf3e83753e157b7f8f21b57d3634b65569f47ffe8000447eac50a3182 Copy to Clipboard
SSDeep 96:hy+PMNs2CEWQOIwz5Y545YUcqtBadPuLVVFe9IQWhM4cMO1a5:vPcsIOIw5Y545TrXadcVHQWhMrL+ Copy to Clipboard
ImpHash -
Parser Error Remark Static engine was unable to completely parse the analyzed file
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image