Edit tour

Windows Analysis Report
SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Generic.9830.8335.exe

Overview

General Information

Sample name:SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Generic.9830.8335.exe
Analysis ID:1370804
MD5:60338b2e7a9e41adb5a2f59c3f9eb11d
SHA1:c1fc34d4dfc25631ef7dfe452b17a473abad8631
SHA256:6b9a6412f2be50608dcca1f79b749a9b8f9b61c0576dd8ae2e2e724227530e12
Tags:exe

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Generic.9830.8335.exeVirustotal: Detection: 18%Perma Link
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Generic.9830.8335.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Generic.9830.8335.exe, 00000000.00000003.2001237663.00000000009E9000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCOMCTL32.DLL.MUIj% vs SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Generic.9830.8335.exe
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Generic.9830.8335.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: classification engineClassification label: mal48.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Generic.9830.8335.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Generic.9830.8335.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Generic.9830.8335.exeVirustotal: Detection: 18%
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
Valid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping1
System Information Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1370804 Sample: SecuriteInfo.com.not-a-viru... Startdate: 06/01/2024 Architecture: WINDOWS Score: 48 7 Multi AV Scanner detection for submitted file 2->7 5 SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Generic.9830.8335.exe 2->5         started        process3

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Generic.9830.8335.exe9%ReversingLabs
SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Generic.9830.8335.exe18%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:38.0.0 Ammolite
Analysis ID:1370804
Start date and time:2024-01-06 22:16:05 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 2m 33s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:4
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Generic.9830.8335.exe
Detection:MAL
Classification:mal48.winEXE@1/0@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.546042586091484
TrID:
  • Win32 Executable (generic) a (10002005/4) 93.60%
  • Win32 Executable Borland Delphi 7 (665061/41) 6.22%
  • Windows Screen Saver (13104/52) 0.12%
  • Win16/32 Executable Delphi generic (2074/23) 0.02%
  • Generic Win/DOS Executable (2004/3) 0.02%
File name:SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Generic.9830.8335.exe
File size:515'072 bytes
MD5:60338b2e7a9e41adb5a2f59c3f9eb11d
SHA1:c1fc34d4dfc25631ef7dfe452b17a473abad8631
SHA256:6b9a6412f2be50608dcca1f79b749a9b8f9b61c0576dd8ae2e2e724227530e12
SHA512:b02b76d88bc21962473cbcc7a121ec2ae9770f9a60f6d2204f69af728b8ed5f46dc6d84fae89e857fc2c625054d713edb6f3e36dd27c118ded426556b219be42
SSDEEP:12288:9kCacXk1byaeBSif5h5v/dIMa0ra2iVwAGxS:9vtXkBeBS25h5vCx0rnKpD
TLSH:AFB48E71F3E15537C1232A7E8C1F96749929BF212E29248A3BE85D8D4F3A7813D191E3
File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
Icon Hash:0b7a33330b12062d
Entrypoint:0x46a788
Entrypoint Section:.itext
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
DLL Characteristics:
Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:d42ed0b9b432ce379ae655ab3cfcd244
Instruction
push ebp
mov ebp, esp
add esp, FFFFFFF0h
mov eax, 00468FF4h
call 00007FE2A94A62F5h
mov eax, dword ptr [0046D26Ch]
mov eax, dword ptr [eax]
call 00007FE2A94F39B9h
mov eax, dword ptr [0046D26Ch]
mov eax, dword ptr [eax]
mov edx, 0046A7E8h
call 00007FE2A94F3440h
mov ecx, dword ptr [0046D008h]
mov eax, dword ptr [0046D26Ch]
mov eax, dword ptr [eax]
mov edx, dword ptr [00468978h]
call 00007FE2A94F39A8h
mov eax, dword ptr [0046D26Ch]
mov eax, dword ptr [eax]
call 00007FE2A94F3A1Ch
call 00007FE2A94A43BBh
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x720000x2702.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x7d0000xa000.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x770000x5e30.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x760000x18.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x727380x60c.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x681a40x68200False0.5367858080732293data6.576615815754288IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.itext0x6a0000x7fc0x800False0.63720703125data6.314133924045093IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0x6b0000x23e40x2400False0.4365234375data4.424439712984049IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.bss0x6e0000x35a80x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata0x720000x27020x2800False0.3158203125data5.087382046843884IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.tls0x750000x340x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rdata0x760000x180x200False0.05078125data0.2108262677871819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x770000x5e300x6000False0.648193359375data6.646383797742478IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
.rsrc0x7d0000xa0000xa000False0.25576171875data3.788143467577722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_CURSOR0x7d7e80x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
RT_CURSOR0x7d91c0x134dataEnglishUnited States0.4642857142857143
RT_CURSOR0x7da500x134dataEnglishUnited States0.4805194805194805
RT_CURSOR0x7db840x134dataEnglishUnited States0.38311688311688313
RT_CURSOR0x7dcb80x134dataEnglishUnited States0.36038961038961037
RT_CURSOR0x7ddec0x134dataEnglishUnited States0.4090909090909091
RT_CURSOR0x7df200x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4967532467532468
RT_ICON0x7e0540x1ca8Device independent bitmap graphic, 48 x 96 x 24, image size 7296GreekGreece0.22123773173391495
RT_ICON0x7fcfc0xca8Device independent bitmap graphic, 32 x 64 x 24, image size 3200GreekGreece0.3509259259259259
RT_ICON0x809a40x368Device independent bitmap graphic, 16 x 32 x 24, image size 832GreekGreece0.591743119266055
RT_ICON0x80d0c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600GreekGreece0.15435684647302905
RT_ICON0x832b40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224GreekGreece0.21177298311444653
RT_ICON0x8435c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088GreekGreece0.34131205673758863
RT_STRING0x847c40x2d8data0.4478021978021978
RT_STRING0x84a9c0x9cdata0.717948717948718
RT_STRING0x84b380xecdata0.6271186440677966
RT_STRING0x84c240x3e4data0.4066265060240964
RT_STRING0x850080x398data0.38369565217391305
RT_STRING0x853a00x370data0.4022727272727273
RT_STRING0x857100x3ccdata0.33539094650205764
RT_STRING0x85adc0x214data0.49624060150375937
RT_STRING0x85cf00xccdata0.6274509803921569
RT_STRING0x85dbc0x194data0.5643564356435643
RT_STRING0x85f500x3c4data0.3288381742738589
RT_STRING0x863140x338data0.42961165048543687
RT_STRING0x8664c0x294data0.42424242424242425
RT_RCDATA0x868e00x10data1.5
RT_RCDATA0x868f00x224data0.7591240875912408
RT_RCDATA0x86b140x29eDelphi compiled form 'TTesseraLoader'0.6029850746268657
RT_GROUP_CURSOR0x86db40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
RT_GROUP_CURSOR0x86dc80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
RT_GROUP_CURSOR0x86ddc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_CURSOR0x86df00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_CURSOR0x86e040x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_CURSOR0x86e180x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_CURSOR0x86e2c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_ICON0x86e400x5adataGreekGreece0.7111111111111111
DLLImport
oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
user32.dllGetKeyboardType, DestroyWindow, LoadStringA, MessageBoxA, CharNextA
kernel32.dllGetACP, Sleep, VirtualFree, VirtualAlloc, GetTickCount, QueryPerformanceCounter, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, CompareStringA, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle
kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
user32.dllCreateWindowExA, WindowFromPoint, WaitMessage, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongW, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClassLongA, SetCapture, SetActiveWindow, SendMessageW, SendMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageW, PeekMessageA, OffsetRect, OemToCharA, MessageBoxA, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageW, IsDialogMessageA, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongW, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessagePos, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameA, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassLongA, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EnumChildWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawEdge, DispatchMessageW, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, ClientToScreen, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerBuffA, CharLowerA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
gdi32.dllUnrealizeObject, StretchBlt, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SaveDC, RestoreDC, Rectangle, RectVisible, RealizePalette, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectA, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, ExcludeClipRect, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, BitBlt
version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
kernel32.dlllstrcpyA, WriteFile, WaitForSingleObject, VirtualQuery, VirtualAlloc, SizeofResource, SetThreadLocale, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, ReadFile, MulDiv, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalFindAtomA, GlobalDeleteAtom, GlobalAddAtomA, GetVersionExA, GetVersion, GetTickCount, GetThreadLocale, GetStdHandle, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetFileAttributesA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetCPInfo, FreeResource, InterlockedExchange, FreeLibrary, FormatMessageA, FindResourceA, FindNextFileA, FindFirstFileA, FindClose, FileTimeToLocalFileTime, FileTimeToDosDateTime, EnumCalendarInfoA, EnterCriticalSection, DeleteCriticalSection, CreateThread, CreateFileA, CreateEventA, CompareStringA, CloseHandle
advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegFlushKey, RegCloseKey
kernel32.dllSleep
oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
comctl32.dll_TrackMouseEvent, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create
shell32.dllShellExecuteA
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
GreekGreece
No network behavior found

Click to jump to process

  • File
  • Registry

Click to dive into process behavior distribution

Target ID:0
Start time:22:16:54
Start date:06/01/2024
Path:C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Generic.9830.8335.exe
Wow64 process (32bit):true
Commandline:C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.Generic.9830.8335.exe
Imagebase:0x400000
File size:515'072 bytes
MD5 hash:60338B2E7A9E41ADB5A2F59C3F9EB11D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Reputation:low
Has exited:true

No disassembly