a475511a...20c8 | Files
Try VMRay Analyzer
VTI SCORE: 100/100
Dynamic Analysis Report
Classification:
Pua
Threat Names:
Trojan.GenericKD.43051724
App/Generic-NM

[BEST SOFTWARE] EARN $1350 PER DAY.exe

Windows Exe (x86-64)

Created at 2020-04-28T10:39:00

Master Boot Record Changes
»
Sector Number Sector Size Actions
2063 512 Bytes


Filters:
Filename Category Type Severity Actions
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\[BEST SOFTWARE] EARN $1350 PER DAY.exe Sample File Binary
Malicious
»
Mime Type application/vnd.microsoft.portable-executable
File Size 2.78 MB
MD5 b6832ec73ff529bad81ef91d50e37568 Copy to Clipboard
SHA1 dce50975c42b9df4d5ab1ab21949a39c7af658fe Copy to Clipboard
SHA256 a475511a2bbbd6b7a310fb3062aa5b42b76a73983f1da68febeda600ee6d20c8 Copy to Clipboard
SSDeep 49152:/QofUk3cAZSXErvQXN2jXtBMtOVjI2MkN8m75:dfF1g0UXNk/MtOFN Copy to Clipboard
ImpHash 91802a615b3a5c4bcc05bc5f66a5b219 Copy to Clipboard
File Reputation Information
»
Severity
Suspicious
Names App/Generic-NM
Families -
PE Information
»
Image Base 0x400000
Entry Point 0x462180
Size Of Code 0x14ee00
Size Of Initialized Data 0x1b000
File Type FileType.executable
Subsystem Subsystem.windows_gui
Machine Type MachineType.amd64
Compile Timestamp 1970-01-01 00:00:00+00:00
Sections (5)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x401000 0x14ec69 0x14ee00 0x600 IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ 5.92
.rdata 0x550000 0x15d264 0x15d400 0x14f400 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ 5.31
.data 0x6ae000 0x4b6c8 0x1b000 0x2ac800 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE 4.21
.idata 0x6fa000 0x442 0x600 0x2c7800 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE 3.44
.symtab 0x6fb000 0x4 0x200 0x2c7e00 IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ 0.02
Imports (1)
»
kernel32.dll (37)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
WriteFile 0x0 0x6ae020 0x2fa312 0x2c7b12 0x0
WriteConsoleW 0x0 0x6ae028 0x2fa31a 0x2c7b1a 0x0
WaitForMultipleObjects 0x0 0x6ae030 0x2fa322 0x2c7b22 0x0
WaitForSingleObject 0x0 0x6ae038 0x2fa32a 0x2c7b2a 0x0
VirtualQuery 0x0 0x6ae040 0x2fa332 0x2c7b32 0x0
VirtualFree 0x0 0x6ae048 0x2fa33a 0x2c7b3a 0x0
VirtualAlloc 0x0 0x6ae050 0x2fa342 0x2c7b42 0x0
SwitchToThread 0x0 0x6ae058 0x2fa34a 0x2c7b4a 0x0
SuspendThread 0x0 0x6ae060 0x2fa352 0x2c7b52 0x0
SetWaitableTimer 0x0 0x6ae068 0x2fa35a 0x2c7b5a 0x0
SetUnhandledExceptionFilter 0x0 0x6ae070 0x2fa362 0x2c7b62 0x0
SetProcessPriorityBoost 0x0 0x6ae078 0x2fa36a 0x2c7b6a 0x0
SetEvent 0x0 0x6ae080 0x2fa372 0x2c7b72 0x0
SetErrorMode 0x0 0x6ae088 0x2fa37a 0x2c7b7a 0x0
SetConsoleCtrlHandler 0x0 0x6ae090 0x2fa382 0x2c7b82 0x0
ResumeThread 0x0 0x6ae098 0x2fa38a 0x2c7b8a 0x0
PostQueuedCompletionStatus 0x0 0x6ae0a0 0x2fa392 0x2c7b92 0x0
LoadLibraryA 0x0 0x6ae0a8 0x2fa39a 0x2c7b9a 0x0
LoadLibraryW 0x0 0x6ae0b0 0x2fa3a2 0x2c7ba2 0x0
SetThreadContext 0x0 0x6ae0b8 0x2fa3aa 0x2c7baa 0x0
GetThreadContext 0x0 0x6ae0c0 0x2fa3b2 0x2c7bb2 0x0
GetSystemInfo 0x0 0x6ae0c8 0x2fa3ba 0x2c7bba 0x0
GetSystemDirectoryA 0x0 0x6ae0d0 0x2fa3c2 0x2c7bc2 0x0
GetStdHandle 0x0 0x6ae0d8 0x2fa3ca 0x2c7bca 0x0
GetQueuedCompletionStatus 0x0 0x6ae0e0 0x2fa3d2 0x2c7bd2 0x0
GetProcessAffinityMask 0x0 0x6ae0e8 0x2fa3da 0x2c7bda 0x0
GetProcAddress 0x0 0x6ae0f0 0x2fa3e2 0x2c7be2 0x0
GetEnvironmentStringsW 0x0 0x6ae0f8 0x2fa3ea 0x2c7bea 0x0
GetConsoleMode 0x0 0x6ae100 0x2fa3f2 0x2c7bf2 0x0
FreeEnvironmentStringsW 0x0 0x6ae108 0x2fa3fa 0x2c7bfa 0x0
ExitProcess 0x0 0x6ae110 0x2fa402 0x2c7c02 0x0
DuplicateHandle 0x0 0x6ae118 0x2fa40a 0x2c7c0a 0x0
CreateThread 0x0 0x6ae120 0x2fa412 0x2c7c12 0x0
CreateIoCompletionPort 0x0 0x6ae128 0x2fa41a 0x2c7c1a 0x0
CreateEventA 0x0 0x6ae130 0x2fa422 0x2c7c22 0x0
CloseHandle 0x0 0x6ae138 0x2fa42a 0x2c7c2a 0x0
AddVectoredExceptionHandler 0x0 0x6ae140 0x2fa432 0x2c7c32 0x0
Memory Dumps (2)
»
Name Process ID Start VA End VA Dump Reason PE Rebuild Bitness Entry Point AV YARA Actions
[best software] earn $1350 per day.exe 1 0x00400000 0x006FBFFF Relevant Image True 64-bit 0x00461910 False False
[best software] earn $1350 per day.exe 1 0x00400000 0x006FBFFF Final Dump True 64-bit 0x0044F962 False False
Local AV Matches (1)
»
Threat Name Severity
Trojan.GenericKD.43051724
Malicious
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image