Windows
Analysis Report
CodeTwo QR Code Desktop Reader & Generator.exe
Overview
General Information
Detection
Score: | 3 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 60% |
Signatures
Classification
Analysis Advice
Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--") |
Sample crashes during execution, try analyze it on another analysis machine |
- System is w10x64
CodeTwo QR Code Desktop Reader & Generator.exe (PID: 6816 cmdline:
C:\Users\u ser\Deskto p\CodeTwo QR Code De sktop Read er & Gener ator.exe MD5: 0DED5D49693657EB59144402E7850936) WerFault.exe (PID: 6884 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 6 816 -s 768 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
- cleanup
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Binary or memory string: | memstr_4247be68-9 |
Source: | Static PE information: |
Source: | Binary or memory string: |
Source: | Process created: |
Source: | File read: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Static file information: | |||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Process created: | ||
Source: | Process created: |
Source: | Key value queried: | Jump to behavior |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | String found in binary or memory: |
Source: | Classification label: |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File created: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | 2 Command and Scripting Interpreter | Path Interception | 1 Process Injection | 1 Virtualization/Sandbox Evasion | 1 Input Capture | 21 Security Software Discovery | Remote Services | 1 Input Capture | Exfiltration Over Other Network Medium | Data Obfuscation | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Disable or Modify Tools | LSASS Memory | 1 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | 1 Process Injection | Security Account Manager | 11 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Binary Padding | NTDS | 1 Remote System Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs | |||
0% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown |
Joe Sandbox Version: | 38.0.0 Beryl |
Analysis ID: | 1318498 |
Start date and time: | 2023-10-03 09:14:23 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 4m 52s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Run name: | Run with higher sleep bypass |
Number of analysed new started processes analysed: | 29 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample file name: | CodeTwo QR Code Desktop Reader & Generator.exe |
Detection: | CLEAN |
Classification: | clean3.winEXE@2/6@0/0 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, d llhost.exe, audiodg.exe, Backg roundTransferHost.exe, WerFaul t.exe, WMIADAP.exe, SgrmBroker .exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuap ihost.exe - Excluded IPs from analysis (wh
itelisted): 20.42.73.29 - Excluded domains from analysis
(whitelisted): www.bing.com, geo.prod.do.dsp.mp.microsoft.c om, login.live.com, blobcollec tor.events.data.trafficmanager .net, onedsblobprdeus15.eastus .cloudapp.azure.com, tse1.mm.b ing.net, displaycatalog.mp.mic rosoft.com, watson.telemetry.m icrosoft.com, arc.msn.com, kv8 01.prod.do.dsp.mp.microsoft.co m - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtSetInformationFile c alls found.
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.9078197531055681 |
Encrypted: | false |
SSDEEP: | 96:6tFGoZQYnCzxDsTh5pXIQcQvc6QcEDMcw3Dr+BHUHZ0ownOgtYsH5Ef5BAKcp2OB:u4WMiHHBUZMXSaKM/u7sxS274ItGk8 |
MD5: | AA56C366F18C2D1662E8D5B7CC5BB8AC |
SHA1: | 965D3815D7EAB95BEBFC21A6C51955D343A6C92C |
SHA-256: | B6CA00CD79F2E120BCB40D790FE79DEE0793A169A732F863682ACD694F84051E |
SHA-512: | 4D7A98A82DA61A46B3BC8A4086C42D11FF8731E6B9E571DF36FA87B00160385059EF0DEB7B1CDA1245FF35B883B13A429E2ED5548772B8E94629BBB156B258BF |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 123955 |
Entropy (8bit): | 3.7564421049360055 |
Encrypted: | false |
SSDEEP: | 768:ebaMbf6HTJdzFRP3pVNN1t0z32JrnTE0QB8kXNLTIQfJASBOZDTsiwABpanKMDxL:ezS9fRRVNdu38YekdLTIeAKqEiSbcO |
MD5: | AC834B6F336DE8D7D2900274E62AAB41 |
SHA1: | 24824E86A48A46EDB0CC7A2EAF65AE1F898DDA79 |
SHA-256: | 51F5984C3DBCC63C4342E54BBD79AC0A092B445020774087E2A33E2AD34AA3B7 |
SHA-512: | D3DC27085B8230C000339767A13CB29902149F8CD6D80BE2E00E04A6CA84CAE35BB3E2DFF32B2C14FC9A982A15DBBBC27F3A2655A9F31D0E3A9B17C830C10671 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8446 |
Entropy (8bit): | 3.7031698005767173 |
Encrypted: | false |
SSDEEP: | 192:Rrl7r3GLNiSh646YWsSU7ndgmfH4x8SU+prM89bmxsfuim:RrlsNiE646YNSU7ndgmfH42SRmqfC |
MD5: | F55DC805D63A3C3A964CF7E841BE63E6 |
SHA1: | 2D9CB42E9AE43A7CA536CF40B7163D4C55CF3FE9 |
SHA-256: | 64842C6336CD38BE2D7DCC7771E43896CF882E0A7D9088DBA9F6BA52A1DC420B |
SHA-512: | 4D144C7580E89DDB4427332D640FE2E1E70842BEBD999567C18BBB17602D85E8FCB8E49CC3E5E023E1C0D74C9E01FB07173ACC3D3243FF7A72F65CD5C86BEC1A |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4859 |
Entropy (8bit): | 4.538717908303393 |
Encrypted: | false |
SSDEEP: | 48:cvIwSD8zsiJgtWI9uQWgc8sqYjn8fm8M4JPo0oQjFb+q8AoX0yWPoSo87o8moFd:uITfwtpgrsqYwJ/dy5yPTd |
MD5: | 8746899D60D436A91EC96F7AFE6D3C39 |
SHA1: | D20AD46B7874EDC18390624552D4B9C237899B29 |
SHA-256: | 5A31D3C9FADD6397431629470430A144D5C2665862FFB1A5F5418E916FF1EE5D |
SHA-512: | ED66FC4894C4AC0896886867F62C5ECC8DF6F34B07F5FA8B9E212107A4386DAF35E703A08123024466B1F35A49C00252529904D7EAB0757054CF96786864316F |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1572864 |
Entropy (8bit): | 4.443384375163787 |
Encrypted: | false |
SSDEEP: | 12288:NDGDfcWUuo4dlQK5RAd4TFSzM578MJZRg0TtHu4wy/YGEDLvLDvrdd:lGDfcWUuo4dlQK5Xpb |
MD5: | FEC46C74491533448A6812A79110AB28 |
SHA1: | E87102CEBF6410631E0E3F4307637F3BA93BDD63 |
SHA-256: | 7F498853E3CAC0521B41889E0C08BA61E5A3394D0ED1913D87F2AEEB60BBA93F |
SHA-512: | A762AB57083BC6C94D0E0AC2590CEC0AFAE716AABB45B38AC761BCF61F06BE6A94AEBA44DBABA41C85162A2A2913054955D9129FF401838BDF7FB4A0DBBA84C8 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 20480 |
Entropy (8bit): | 3.973735714577823 |
Encrypted: | false |
SSDEEP: | 384:6PV5JV2YnSR7MFez8fKFvKLr29zzRNYpvdaNDhC2ZgimTJkU:GrqYu7MFez8fKFvKLrMzRNYpvdaNVC23 |
MD5: | 8AF691B6AC0AE195E071A3532446723A |
SHA1: | 502B11E029681CBF0B1A0C0E23298D4BC52B4BB5 |
SHA-256: | 3BC018B3ADD2D71EE1075EE01E8D861B6419827E9DE55840076C218C8F41C573 |
SHA-512: | 2408707A6886DE9A9CB7000573D1D9F893B32010250967103B4274AF36A892C4A4256EC8BE0DCC311B06FB5C631DEA55A0AD4438519AC545083DBC2771708DAD |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 6.1110750777753315 |
TrID: |
|
File name: | CodeTwo QR Code Desktop Reader & Generator.exe |
File size: | 1'240'424 bytes |
MD5: | 0ded5d49693657eb59144402e7850936 |
SHA1: | 64261610923af582c671d37dc108261cad2b20f5 |
SHA256: | d67855e9230429ea4348f5e2c5badab8647f2bc1cd66fc06be1fed2e0fe2cff5 |
SHA512: | 08c7ec2beb8662448972eb85c8b48f6c312fbd17bfe3dbca716b90791240eb4270addfaab0ec805e0ff554387bfff219507bde71e4c56b7c3086b26793f1be2d |
SSDEEP: | 12288:G08iGvSdndfbLPDBpUsE/atF5ccqt73Pjb:fGGdfbLPDBp8S5ccqhPX |
TLSH: | 50456C3A7929AC01D04C11B1A960EBB801B46CB8E8B6D25DFEF6BF5F3D7334538A5905 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...i..\................................. ........@.. ..............................oR....@................................ |
Icon Hash: | a85188e1a79aa5a0 |
Entrypoint: | 0x4ffa06 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x5C1CF369 [Fri Dec 21 14:06:33 2018 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Signature Valid: | true |
Signature Issuer: | CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US |
Signature Validation Error: | The operation completed successfully |
Error Number: | 0 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | FBBCF902F5B78C6FCD84B3B9C2366081 |
Thumbprint SHA-1: | 59F48D3702247DE35D778F5B6DCE6F6CBD42B838 |
Thumbprint SHA-256: | 0598D0BC2BD4985DBE18A4927ED43AE5DC3B47FBACECD29647AC756FFAF269C1 |
Serial: | 7CA6BA103F7C06F8 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xff9bc | 0x4a | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x100000 | 0x2d7fe | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x12b800 | 0x3568 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x12e000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0xff90a | 0xb2 | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0xfda0c | 0xfdc00 | False | 0.43799838362068966 | data | 6.457221841752009 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x100000 | 0x2d7fe | 0x2d800 | False | 0.1111564217032967 | data | 3.4464654185876036 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x12e000 | 0xc | 0x200 | False | 0.044921875 | data | 0.10191042566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x1000ac | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1024 | 0.5966312056737588 | ||
RT_ICON | 0x100538 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2304 | 0.4848360655737705 | ||
RT_ICON | 0x100ee4 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4096 | 0.3968105065666041 | ||
RT_ICON | 0x101fb0 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9216 | 0.22520746887966805 | ||
RT_ICON | 0x10457c | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16384 | 0.1558219178082192 | ||
RT_ICON | 0x1087c8 | 0x94a8 | Device independent bitmap graphic, 96 x 192 x 32, image size 36864 | 0.08621505150304815 | ||
RT_ICON | 0x111c94 | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 65536 | 0.0645480894357033 | ||
RT_ICON | 0x1224e0 | 0xa628 | Device independent bitmap graphic, 192 x 384 x 8, image size 36864, 256 important colors | 0.08783148391950348 | ||
RT_ICON | 0x12cb2c | 0x54c | PNG image data, 256 x 256, 8-bit grayscale, non-interlaced | 0.8915929203539823 | ||
RT_GROUP_ICON | 0x12d0b4 | 0x84 | data | 0.7348484848484849 | ||
RT_VERSION | 0x12d174 | 0x464 | data | 0.35320284697508897 | ||
RT_MANIFEST | 0x12d614 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 09:15:05 |
Start date: | 03/10/2023 |
Path: | C:\Users\user\Desktop\CodeTwo QR Code Desktop Reader & Generator.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x170000 |
File size: | 1'240'424 bytes |
MD5 hash: | 0DED5D49693657EB59144402E7850936 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 09:15:05 |
Start date: | 03/10/2023 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xb20000 |
File size: | 434'592 bytes |
MD5 hash: | 9E2B8ACAD48ECCA55C0230D63623661B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Reputation: | high |
Has exited: | true |