Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Lostitem.exe

Overview

General Information

Sample name:Lostitem.exe
Analysis ID:1467154
MD5:b76e8b0ff4aa3aec76919fa82d8122ac
SHA1:4676bb3243294ad2fc0c844300efb40b6b4f3ba0
SHA256:323dab7dc9e97c725f053e5021d367d76ac17885145bc27b42c06dac785eb352
Tags:exe
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
One or more processes crash
PE file contains more sections than normal
PE file contains sections with non-standard names

Classification

  • System is w10x64
  • Lostitem.exe (PID: 7576 cmdline: "C:\Users\user\Desktop\Lostitem.exe" MD5: B76E8B0FF4AA3AEC76919FA82D8122AC)
    • WerFault.exe (PID: 7648 cmdline: C:\Windows\system32\WerFault.exe -u -p 7576 -s 416 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Lostitem.exeReversingLabs: Detection: 29%
Source: Lostitem.exeString found in binary or memory: http://139.155.135.230/ID.txt
Source: Lostitem.exeString found in binary or memory: http://139.155.135.230/Name.txt
Source: Lostitem.exeString found in binary or memory: http://139.155.135.230/ver.txt
Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
Source: Lostitem.exeString found in binary or memory: http://www.indyproject.org/
Source: C:\Users\user\Desktop\Lostitem.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7576 -s 416
Source: Lostitem.exeStatic PE information: Number of sections : 11 > 10
Source: classification engineClassification label: mal48.winEXE@2/5@0/0
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7576
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\6b5cef5e-2668-4604-ae3a-71015545cc15Jump to behavior
Source: C:\Users\user\Desktop\Lostitem.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Lostitem.exeReversingLabs: Detection: 29%
Source: Lostitem.exeString found in binary or memory: NATS-SEFI-ADD
Source: Lostitem.exeString found in binary or memory: NATS-DANO-ADD
Source: Lostitem.exeString found in binary or memory: JIS_C6229-1984-b-add
Source: Lostitem.exeString found in binary or memory: jp-ocr-b-add
Source: Lostitem.exeString found in binary or memory: JIS_C6229-1984-hand-add
Source: Lostitem.exeString found in binary or memory: jp-ocr-hand-add
Source: Lostitem.exeString found in binary or memory: ISO_6937-2-add
Source: unknownProcess created: C:\Users\user\Desktop\Lostitem.exe "C:\Users\user\Desktop\Lostitem.exe"
Source: C:\Users\user\Desktop\Lostitem.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7576 -s 416
Source: C:\Users\user\Desktop\Lostitem.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Lostitem.exeSection loaded: wtsapi32.dllJump to behavior
Source: Lostitem.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: Lostitem.exeStatic file information: File size 7083008 > 1048576
Source: Lostitem.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x523200
Source: Lostitem.exeStatic PE information: More than 200 imports for user32.dll
Source: Lostitem.exeStatic PE information: section name: .didata
Source: Lostitem.exeStatic PE information: section name: .rsrc entropy: 7.509470533792128
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.3.drBinary or memory string: VMware
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: vmci.sys
Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: VMware20,1
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\Lostitem.exeProcess queried: DebugPortJump to behavior
Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Software Packing
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1467154 Sample: Lostitem.exe Startdate: 03/07/2024 Architecture: WINDOWS Score: 48 13 Multi AV Scanner detection for submitted file 2->13 6 Lostitem.exe 2->6         started        process3 process4 8 WerFault.exe 19 16 6->8         started        file5 11 C:\ProgramData\Microsoft\...\Report.wer, Unicode 8->11 dropped

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Lostitem.exe30%ReversingLabsWin64.Virus.Virut
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
http://139.155.135.230/Name.txt0%Avira URL Cloudsafe
http://139.155.135.230/ver.txt0%Avira URL Cloudsafe
http://www.indyproject.org/0%Avira URL Cloudsafe
http://139.155.135.230/ID.txt0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://139.155.135.230/Name.txtLostitem.exefalse
  • Avira URL Cloud: safe
unknown
http://139.155.135.230/ID.txtLostitem.exefalse
  • Avira URL Cloud: safe
unknown
http://upx.sf.netAmcache.hve.3.drfalse
  • URL Reputation: safe
unknown
http://www.indyproject.org/Lostitem.exefalse
  • Avira URL Cloud: safe
unknown
http://139.155.135.230/ver.txtLostitem.exefalse
  • Avira URL Cloud: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1467154
Start date and time:2024-07-03 19:23:36 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 8s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run name:Run with higher sleep bypass
Number of analysed new started processes analysed:9
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:Lostitem.exe
Detection:MAL
Classification:mal48.winEXE@2/5@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 52.182.143.212
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: Lostitem.exe
No simulations
No context
No context
No context
No context
No context
Process:C:\Windows\System32\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.7908818519540545
Encrypted:false
SSDEEP:96:hSwuFtqsVieNWSI2ssnBeslbLfQQXIDcQ7c6xcEjcw3wtp+HbHgA5JHQgih88WpK:EVBU92B0V1pBjzvqzuiFeZ24lO85I
MD5:95DE9D5C3EB76E6B2429F5194C977F29
SHA1:C90D8F12D45F81151271676FE059B195EB933286
SHA-256:7B5DBB63DE6460E1C9D38BA3CC073E667F6B1ED89F186C97AFD59B9255500893
SHA-512:CD7164A8229103AE93BCDE91F6F87BE215023AD10D8058480C23CF44B6AAAE46A375851AE25BDC0E8DF96CD4EA4B34CBF36929788B1D77A5EC35095C2D3D40E0
Malicious:true
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.4.5.0.1.0.6.5.1.7.6.8.4.8.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.4.5.0.1.0.6.5.5.9.8.7.1.7.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.7.9.e.8.a.b.a.-.c.1.2.1.-.4.5.c.b.-.8.f.c.1.-.8.8.9.0.f.4.6.d.b.4.9.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.6.b.6.9.d.7.4.-.b.0.d.8.-.4.6.3.0.-.9.0.8.e.-.a.6.2.d.e.5.3.c.5.5.6.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.L.o.s.t.i.t.e.m...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.9.8.-.0.0.0.1.-.0.0.1.4.-.0.8.1.a.-.9.4.d.9.6.d.c.d.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.d.b.7.e.5.8.f.b.8.6.f.6.6.2.3.0.d.a.2.d.0.5.6.6.a.6.9.9.e.9.b.0.0.0.0.0.9.0.4.!.0.0.0.0.4.6.7.6.b.b.3.2.4.3.2.9.4.a.d.2.f.c.0.c.8.4.4.3.0.0.e.f.b.4.0.b.6.b.4.f.3.b.a.0.!.L.o.s.t.i.t.e.m...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.0.9././.1.2././.0.4.:.1.3.:.
Process:C:\Windows\System32\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Wed Jul 3 17:24:25 2024, 0x1205a4 type
Category:dropped
Size (bytes):53906
Entropy (8bit):1.5604703456901028
Encrypted:false
SSDEEP:96:5m8wZbqDSh+CF82UcAZh0WFoE7gdHBSi7YTP/ng2t3/EPFdvvzi3G7MYfNfu4xSV:XmujedkOYLPzG9dVfNfu40jynmxVN
MD5:8B3BBABDDA9B29AC021DF7CAE68F80B0
SHA1:2321D19E6EC4062D62157674D5A86D0468D0D192
SHA-256:921685B1458792C69ED6EECA5F8217E190DE071BCE780B70EFBC5A7C55B36C14
SHA-512:4240337799E1FDA5051474C1191A18D0C6ED8368D28310D71E710F0592AE107A1D0B68202DB6DEC2BFDE6E0F3D8465982F023EFC9D255725B1F238E71D3D9701
Malicious:false
Reputation:low
Preview:MDMP..a..... .......I..f........................................@+..........T.......8...........T.......................................................................................................................eJ..............Lw......................T...........H..f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8708
Entropy (8bit):3.695792574969849
Encrypted:false
SSDEEP:192:R6l7wVeJ7YCC6Y94kKPGgmfbfprT89b9XEf//m:R6lXJEn6YykbgmfbW9Ufm
MD5:64CE7F4D6092363A779D0E3E93E81883
SHA1:1F0C9F12146C1AA5DA11D48BA2A279F9F61E85F7
SHA-256:541385A2A330C6FE47D5AD382C988C5EF049C2BAC27909324087B9D2BD27E1EE
SHA-512:DD1FF8170517102F85F1B786E84424A0A5DA51CD2633A05C745C9B5D0989124F720E371A21C69089203489CBD44D0E5BD8C60EBB707E390816509B0A6940EF67
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.5.7.6.<./.P.i.
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4623
Entropy (8bit):4.437278380314611
Encrypted:false
SSDEEP:48:cvIwWl8zsNLiJg771I9oDWpW8VY2q5Ym8M4JjMmlMlZFwVyq858M8MNnODMAVWd:uIjfdwI7vy7V0oJjXdVDf9YAVWd
MD5:076D03AED28D76BFC25322D9CFF4AAE0
SHA1:5DC53C5D6572BE848CBC6CB505A55F551946EF02
SHA-256:C8850DA3396E91A54ECFFE1F8903076564B1DCA5F67DEDC6EEDDE2D20BD2F8AF
SHA-512:C49242270843FA688D690EF611CF64387E251573496B5698D403255101B775563C8F5F289CFC1C839D3404F5C46E0FAC4D8556E4BD1FA3F90F92F404BA8D4141
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="395067" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\System32\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.465585744982373
Encrypted:false
SSDEEP:6144:eIXfpi67eLPU9skLmb0b4WWSPKaJG8nAgejZMMhA2gX4WABl0uNJdwBCswSbq:zXD94WWlLZMM6YFHr+q
MD5:DB33D9EB7EA7E801D498D0330E1E7D09
SHA1:494F00051C8A27920F02121C193EC51AEEF94F47
SHA-256:13A63244A54BAB68EA30680E9F82C132B9286AAFE9FF68E894821E11ABBEFA6E
SHA-512:93A7198DE640133B33A4EC2D379777A2221DE1A8841FA7DBF32D1B8E84D844984584347E6FDE650B2379A102050025CDC7372F6734AC74D3D6ABE127560F66E6
Malicious:false
Reputation:low
Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmVC..m...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):6.194529409359724
TrID:
  • Win64 Executable GUI (202006/5) 92.64%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • VXD Driver (31/22) 0.01%
File name:Lostitem.exe
File size:7'083'008 bytes
MD5:b76e8b0ff4aa3aec76919fa82d8122ac
SHA1:4676bb3243294ad2fc0c844300efb40b6b4f3ba0
SHA256:323dab7dc9e97c725f053e5021d367d76ac17885145bc27b42c06dac785eb352
SHA512:93def118f6e7cfa2c5f57b629f3bc1ecd022daad000e8a0a7bdf50197eff74d03109f59b6354877a9ba654481e4ace0874678006c7fb1d037e395a1cfc597959
SSDEEP:49152:+t0NZUdxqWurM+wcoMpSaJoOiJlHwBnj81Xu4Cae1G6US8a0a+6mQDf1bJ0hjfWa:+CQdgKd1CaUuxe187r9YA
TLSH:90666C7B71A4812DC12ED27AC1B78F00E533B5B11B77C2FB979112561F6AAC49E3E620
File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win64..$7.......................................................................................................................................
Icon Hash:0769d656ea4d330f
Entrypoint:0x9241dc
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, TERMINAL_SERVER_AWARE
Time Stamp:0x4B19103F [Fri Dec 4 13:35:59 2009 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:86e744d21ca8cca0b71b42fefe229f67
Instruction
inc cl
add ecx, ADEED773h
mov ecx, BDC94E6Bh
cmp ch, FFFFFFF4h
dec edx
push 00006A18h
clc
pop eax
not ecx
jmp 00007F2DD4F75C21h
add byte ptr [eax], al
add byte ptr [eax+eax+00h], bl
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x5c10000x71.edata
IMAGE_DIRECTORY_ENTRY_IMPORT0x5ba0000x4b24.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x6440000x9f800.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x5c40000x3c820.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x5c30000x28.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x5bb2c80x11b0.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x5bf0000x1164.didata
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x5232000x523200cea1f790886903ab6e69422dcbdf0bd8unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0x5250000x726d80x7280004ba7c144513c1dc43854ae9c34ec484False0.2685738775927948data4.860900233232423IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.bss0x5980000x2177c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata0x5ba0000x4b240x4c00499c3914bd592c3653675807cbf34578False0.25801809210526316data4.394750706313722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.didata0x5bf0000x11640x1200196f30d652db9395c2862bf382b54907False0.2595486111111111data3.4465430702443594IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.edata0x5c10000x710x20033e833a36d8d91e8be54512d46a3558cFalse0.181640625data1.3571941527050162IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.tls0x5c20000x2800x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rdata0x5c30000x6d0x2004c9847c894573d2b61e22fb01e319f74False0.197265625data1.384366201237787IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x5c40000x3c8200x3ca008a7c2868c138dd3f2991db5ae71dcf14False0.4610744201030928data6.452970259326724IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
.pdata0x6010000x424200x42600f2d5edab3f09bfa6fd80b3fe5d8db39bFalse0.4946739642184557data6.422077484908901IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x6440000xa68000xa6400d3676f1ee7c67a8e57974a65aa4f4be3False0.7165531015037594data7.509470533792128IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
NameRVASizeTypeLanguageCountryZLIB Complexity
VCLSTYLE0x6454700x28d80dataEnglishUnited States0.9276611514919664
VCLSTYLE0x66e1f00x3336cdataEnglishUnited States0.9360067120492725
RT_CURSOR0x6a155c0x134dataEnglishUnited States0.43506493506493504
RT_CURSOR0x6a16900x134dataEnglishUnited States0.4642857142857143
RT_CURSOR0x6a17c40x134dataEnglishUnited States0.4805194805194805
RT_CURSOR0x6a18f80x134dataEnglishUnited States0.38311688311688313
RT_CURSOR0x6a1a2c0x134dataEnglishUnited States0.36038961038961037
RT_CURSOR0x6a1b600x134dataEnglishUnited States0.4090909090909091
RT_CURSOR0x6a1c940x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4967532467532468
RT_CURSOR0x6a1dc80x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
RT_ICON0x6a1efc0x3974PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9956486265977699
RT_ICON0x6a58700x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States0.07938010173902757
RT_ICON0x6b60980x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States0.14365847897968823
RT_ICON0x6ba2c00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.18890041493775933
RT_ICON0x6bc8680x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.26852720450281425
RT_ICON0x6bd9100x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.4858156028368794
RT_STRING0x6bdd780x81cdata0.302504816955684
RT_STRING0x6be5940xb04data0.23120567375886525
RT_STRING0x6bf0980x898data0.3109090909090909
RT_STRING0x6bf9300x106cdata0.21741198858230257
RT_STRING0x6c099c0x9f8data0.32053291536050155
RT_STRING0x6c13940x894data0.3087431693989071
RT_STRING0x6c1c280x87cdata0.27532228360957645
RT_STRING0x6c24a40x400data0.392578125
RT_STRING0x6c28a40x2bcdata0.4257142857142857
RT_STRING0x6c2b600x5b0data0.34203296703296704
RT_STRING0x6c31100x3e4data0.4166666666666667
RT_STRING0x6c34f40x408data0.4108527131782946
RT_STRING0x6c38fc0x35cdata0.4197674418604651
RT_STRING0x6c3c580x478data0.38286713286713286
RT_STRING0x6c40d00x358data0.4287383177570093
RT_STRING0x6c44280x394data0.35262008733624456
RT_STRING0x6c47bc0x264data0.4542483660130719
RT_STRING0x6c4a200x464data0.33629893238434166
RT_STRING0x6c4e840x448data0.3521897810218978
RT_STRING0x6c52cc0x348data0.3607142857142857
RT_STRING0x6c56140x398Targa image data - Color 99 x 107 x 32 +68 +111 "z"0.42934782608695654
RT_STRING0x6c59ac0x324data0.4539800995024876
RT_STRING0x6c5cd00xacdata0.7209302325581395
RT_STRING0x6c5d7c0x15cdata0.5545977011494253
RT_STRING0x6c5ed80x3c4data0.3993775933609959
RT_STRING0x6c629c0x3c8data0.3822314049586777
RT_STRING0x6c66640x3dcdata0.395748987854251
RT_STRING0x6c6a400x428data0.37781954887218044
RT_STRING0x6c6e680x400data0.298828125
RT_STRING0x6c72680x2c4data0.3559322033898305
RT_STRING0x6c752c0x434data0.40055762081784385
RT_STRING0x6c79600x610data0.34213917525773196
RT_STRING0x6c7f700x568data0.3634393063583815
RT_STRING0x6c84d80x3a0data0.3728448275862069
RT_STRING0x6c88780x32cdata0.4187192118226601
RT_STRING0x6c8ba40x3bcdata0.36610878661087864
RT_STRING0x6c8f600x3b0data0.3781779661016949
RT_STRING0x6c93100xd0data0.5288461538461539
RT_STRING0x6c93e00xb8data0.6467391304347826
RT_STRING0x6c94980x298data0.4819277108433735
RT_STRING0x6c97300x438data0.3212962962962963
RT_STRING0x6c9b680x344data0.4043062200956938
RT_STRING0x6c9eac0x2dcdata0.3770491803278688
RT_STRING0x6ca1880x318data0.33080808080808083
RT_RCDATA0x6ca4a00x10data1.5
RT_RCDATA0x6ca4b00x148bPNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0020916524054002
RT_RCDATA0x6cb93c0x111ePNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0025102692834322
RT_RCDATA0x6cca5c0xd8cPNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0031718569780854
RT_RCDATA0x6cd7e80xec4data0.49206349206349204
RT_RCDATA0x6ce6ac0x2dataEnglishUnited States5.0
RT_RCDATA0x6ce6b00x3c0fDelphi compiled form 'TForm1'0.31278048780487805
RT_RCDATA0x6d22c00x3970PNG image data, 4800 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9263465723612623
RT_RCDATA0x6d5c300x333dPNG image data, 768 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9950445986124876
RT_RCDATA0x6d8f700x4d4ePNG image data, 768 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9888832743810005
RT_RCDATA0x6ddcc00xe43PNG image data, 512 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9726102437688304
RT_RCDATA0x6deb040xbc3PNG image data, 16 x 16, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0036532713384259
RT_RCDATA0x6df6c80xc58PNG image data, 32 x 32, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0034810126582279
RT_RCDATA0x6e03200xbd1PNG image data, 16 x 16, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0036363636363637
RT_RCDATA0x6e0ef40xcfaPNG image data, 32 x 32, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0033112582781456
RT_RCDATA0x6e1bf00x117cPNG image data, 1024 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9159964253798034
RT_GROUP_CURSOR0x6e2d6c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
RT_GROUP_CURSOR0x6e2d800x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_CURSOR0x6e2d940x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
RT_GROUP_CURSOR0x6e2da80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_CURSOR0x6e2dbc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_CURSOR0x6e2dd00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_CURSOR0x6e2de40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_CURSOR0x6e2df80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_ICON0x6e2e0c0x5adataEnglishUnited States0.7666666666666667
RT_VERSION0x6e2e680x230dataEnglishUnited States0.49642857142857144
RT_MANIFEST0x6e30980x70bXML 1.0 document, ASCII text, with CRLF, LF line terminatorsEnglishUnited States0.403771491957848
DLLImport
winspool.drvDocumentPropertiesW, ClosePrinter, OpenPrinterW, GetDefaultPrinterW, EnumPrintersW
comdlg32.dllFindTextW
comctl32.dllImageList_GetImageInfo, FlatSB_SetScrollInfo, InitCommonControls, ImageList_DragMove, ImageList_Destroy, _TrackMouseEvent, ImageList_DragShowNolock, ImageList_Add, FlatSB_SetScrollProp, ImageList_GetDragImage, ImageList_Create, ImageList_EndDrag, ImageList_DrawEx, ImageList_SetImageCount, FlatSB_GetScrollPos, FlatSB_SetScrollPos, InitializeFlatSB, ImageList_Copy, FlatSB_GetScrollInfo, ImageList_Write, ImageList_DrawIndirect, ImageList_SetBkColor, ImageList_GetBkColor, ImageList_BeginDrag, ImageList_GetIcon, ImageList_Replace, ImageList_GetImageCount, ImageList_DragEnter, ImageList_GetIconSize, ImageList_SetIconSize, ImageList_Read, ImageList_DragLeave, ImageList_LoadImageW, ImageList_Draw, ImageList_Remove, ImageList_ReplaceIcon, ImageList_SetOverlayImage
shell32.dllShell_NotifyIconW, SHAppBarMessage, ShellExecuteW
user32.dllCopyImage, MoveWindow, SetMenuItemInfoW, GetMenuItemInfoW, SetCaretPos, GetCaretPos, DefFrameProcW, ScrollWindowEx, GetDlgCtrlID, FrameRect, RegisterWindowMessageW, GetMenuStringW, FillRect, SendMessageA, IsClipboardFormatAvailable, EnumWindows, ShowOwnedPopups, GetClassInfoExW, GetClassInfoW, GetScrollRange, SetActiveWindow, GetActiveWindow, DrawEdge, GetKeyboardLayoutList, LoadBitmapW, EnumChildWindows, GetScrollBarInfo, UnhookWindowsHookEx, SetCapture, GetCapture, ShowCaret, CreatePopupMenu, GetMenuItemID, DestroyCaret, CharLowerBuffW, PostMessageW, IsZoomed, SetParent, DrawMenuBar, GetClientRect, IsChild, IsIconic, CallNextHookEx, ShowWindow, SetForegroundWindow, GetWindowTextW, IsDialogMessageW, DestroyWindow, RegisterClassW, EndMenu, CharNextW, GetFocus, GetDC, SetFocus, ReleaseDC, mouse_event, SetScrollRange, DrawTextW, PeekMessageA, MessageBeep, RegisterHotKey, RemovePropW, GetSubMenu, DestroyIcon, IsWindowVisible, PtInRect, DispatchMessageA, UnregisterClassW, GetTopWindow, SendMessageW, GetMessageTime, GetComboBoxInfo, GetWindowLongPtrW, SetWindowLongPtrW, LoadStringW, CreateMenu, CharLowerW, SetWindowRgn, SetWindowPos, GetMenuItemCount, GetSysColorBrush, GetWindowDC, DrawTextExW, EnumClipboardFormats, GetScrollInfo, SetWindowTextW, GetMessageExtraInfo, GetSysColor, EnableScrollBar, TrackPopupMenu, keybd_event, DrawIconEx, GetClassNameW, GetMessagePos, GetIconInfo, SetScrollInfo, GetKeyNameTextW, GetDesktopWindow, SetCursorPos, GetCursorPos, SetMenu, GetMenuState, GetMenu, UnregisterHotKey, SetRect, GetKeyState, IsRectEmpty, ValidateRect, IsCharAlphaW, GetCursor, KillTimer, BeginDeferWindowPos, WaitMessage, TranslateMDISysAccel, GetWindowPlacement, GetMenuItemRect, CreateIconIndirect, CreateWindowExW, GetDCEx, PeekMessageW, MonitorFromWindow, GetUpdateRect, SetTimer, WindowFromPoint, BeginPaint, RegisterClipboardFormatW, MapVirtualKeyW, OffsetRect, IsWindowUnicode, DispatchMessageW, CreateAcceleratorTableW, DefMDIChildProcW, GetSystemMenu, SetScrollPos, GetScrollPos, InflateRect, DrawFocusRect, ReleaseCapture, LoadCursorW, ScrollWindow, GetLastActivePopup, GetSystemMetrics, CharUpperBuffW, SetClassLongPtrW, GetClassLongPtrW, ClientToScreen, SetClipboardData, GetClipboardData, SetWindowPlacement, GetMonitorInfoW, CheckMenuItem, CharUpperW, DefWindowProcW, GetForegroundWindow, EnableWindow, GetWindowThreadProcessId, RedrawWindow, EndPaint, MsgWaitForMultipleObjectsEx, LoadKeyboardLayoutW, ActivateKeyboardLayout, GetParent, CreateCaret, MonitorFromRect, InsertMenuItemW, GetPropW, MessageBoxW, SetPropW, UpdateWindow, MsgWaitForMultipleObjects, DestroyMenu, SetWindowsHookExW, GetDoubleClickTime, EmptyClipboard, GetDlgItem, AdjustWindowRectEx, IsWindow, DrawIcon, EnumThreadWindows, InvalidateRect, SetKeyboardState, GetKeyboardState, ScreenToClient, DrawFrameControl, IsCharAlphaNumericW, BringWindowToTop, SetCursor, CreateIcon, RemoveMenu, GetKeyboardLayoutNameW, OpenClipboard, TranslateMessage, MapWindowPoints, EnumDisplayMonitors, CallWindowProcW, CountClipboardFormats, CloseClipboard, DestroyCursor, CopyIcon, PostQuitMessage, ShowScrollBar, EnableMenuItem, DeferWindowPos, HideCaret, EndDeferWindowPos, FindWindowExW, MonitorFromPoint, LoadIconW, SystemParametersInfoW, GetWindow, GetWindowRect, InsertMenuW, IsWindowEnabled, IsDialogMessageA, FindWindowW, GetKeyboardLayout, DeleteMenu
version.dllGetFileVersionInfoSizeW, VerQueryValueW, GetFileVersionInfoW
oleaut32.dllSafeArrayPutElement, GetErrorInfo, VariantInit, VariantClear, SysFreeString, SafeArrayAccessData, SysReAllocStringLen, SafeArrayCreate, SafeArrayGetElement, SysAllocStringLen, SafeArrayUnaccessData, SafeArrayPtrOfIndex, VariantCopy, SafeArrayGetUBound, SafeArrayGetLBound, VariantChangeType
WTSAPI32.DLLWTSUnRegisterSessionNotification, WTSRegisterSessionNotification
advapi32.dllRegSetValueExW, RegConnectRegistryW, RegEnumKeyExW, RegLoadKeyW, RegDeleteKeyW, RegOpenKeyExW, RegQueryInfoKeyW, RegUnLoadKeyW, RegSaveKeyW, RegDeleteValueW, RegReplaceKeyW, RegFlushKey, RegQueryValueExW, RegEnumValueW, RegCloseKey, RegCreateKeyExW, RegRestoreKeyW
kernel32.dllGetFileType, RtlUnwindEx, GetACP, CloseHandle, LocalFree, GetCurrentProcessId, SizeofResource, OpenFileMappingW, QueryPerformanceFrequency, IsDebuggerPresent, GetFullPathNameW, VirtualFree, GetProcessHeap, ExitProcess, HeapAlloc, GetCPInfoExW, GlobalSize, RtlUnwind, GetCPInfo, EnumSystemLocalesW, GetStdHandle, GetTimeZoneInformation, GetModuleHandleW, FreeLibrary, TryEnterCriticalSection, HeapDestroy, ReadFile, GetLastError, GetModuleFileNameW, SetLastError, GlobalAlloc, GlobalUnlock, FindResourceW, CreateThread, CompareStringW, MapViewOfFile, LoadLibraryA, ResetEvent, OpenEventW, MulDiv, FreeResource, GetVersion, RaiseException, GlobalAddAtomW, FormatMessageW, OpenProcess, SwitchToThread, GetExitCodeThread, OutputDebugStringW, GetCurrentThread, LoadLibraryExW, TerminateProcess, LockResource, GetCurrentThreadId, UnhandledExceptionFilter, GlobalFindAtomW, VirtualQuery, GlobalFree, VirtualQueryEx, Sleep, EnterCriticalSection, SetFilePointer, LoadResource, SuspendThread, GetTickCount, WritePrivateProfileStringW, GetFileSize, GlobalDeleteAtom, GetStartupInfoW, GetFileAttributesW, InitializeCriticalSection, GetThreadPriority, GetCurrentProcess, SetThreadPriority, GlobalLock, VirtualAlloc, GetTempPathW, GetCommandLineW, GetSystemInfo, LeaveCriticalSection, GetProcAddress, ResumeThread, GetVersionExW, VerifyVersionInfoW, HeapCreate, LCMapStringW, GetDiskFreeSpaceW, VerSetConditionMask, FindFirstFileW, GetUserDefaultUILanguage, GetConsoleOutputCP, UnmapViewOfFile, GetConsoleCP, lstrlenW, QueryPerformanceCounter, SetEndOfFile, HeapFree, WideCharToMultiByte, MultiByteToWideChar, FindClose, LoadLibraryW, SetEvent, GetLocaleInfoW, CreateFileW, EnumResourceNamesW, DeleteFileW, IsDBCSLeadByteEx, GetEnvironmentVariableW, GetLocalTime, WaitForSingleObject, WriteFile, ExitThread, DeleteCriticalSection, GetDateFormatW, TlsGetValue, SetErrorMode, GetComputerNameW, IsValidLocale, TlsSetValue, CreateDirectoryW, GetSystemDefaultUILanguage, EnumCalendarInfoW, LocalAlloc, RemoveDirectoryW, CreateEventW, GetPrivateProfileStringW, WaitForMultipleObjectsEx, GetThreadLocale, SetThreadLocale
ole32.dllIsEqualGUID, OleInitialize, OleUninitialize, CoInitialize, CoCreateInstance, CoUninitialize, CoTaskMemFree, CoTaskMemAlloc
api-ms-win-crt-string-l1-1-0.dllmemset
gdi32.dllPie, SetBkMode, CreateCompatibleBitmap, GetEnhMetaFileHeader, RectVisible, AngleArc, ResizePalette, SetAbortProc, SetTextColor, GetTextColor, StretchBlt, RoundRect, SelectClipRgn, RestoreDC, SetRectRgn, GetTextMetricsW, GetWindowOrgEx, CreatePalette, CreateDCW, CreateICW, PolyBezierTo, GetStockObject, CreateSolidBrush, GetBkMode, Polygon, MoveToEx, PlayEnhMetaFile, Ellipse, StartPage, GetBitmapBits, StartDocW, AbortDoc, GetSystemPaletteEntries, GetEnhMetaFileBits, GetEnhMetaFilePaletteEntries, CreatePenIndirect, SetMapMode, CreateFontIndirectW, PolyBezier, ExtCreatePen, EndDoc, GetObjectW, GetCurrentObject, GetWinMetaFileBits, SetROP2, GetEnhMetaFileDescriptionW, ArcTo, Arc, SelectPalette, SetGraphicsMode, ExcludeClipRect, MaskBlt, SetWindowOrgEx, EndPage, DeleteEnhMetaFile, Chord, SetDIBits, SetViewportOrgEx, GetViewportOrgEx, CreateRectRgn, RealizePalette, SetDIBColorTable, GetDIBColorTable, CreateBrushIndirect, PatBlt, SetEnhMetaFileBits, Rectangle, SaveDC, DeleteDC, BitBlt, SetWorldTransform, FrameRgn, GetDeviceCaps, GetTextExtentPoint32W, GetClipBox, IntersectClipRect, Polyline, CreateBitmap, CombineRgn, SetWinMetaFileBits, CreateDIBitmap, GetStretchBltMode, CreateDIBSection, SetStretchBltMode, GetDIBits, ExtCreateRegion, LineTo, GetRgnBox, EnumFontsW, SetWindowExtEx, CreateHalftonePalette, SelectObject, DeleteObject, ExtFloodFill, UnrealizeObject, CopyEnhMetaFileW, SetBkColor, CreateCompatibleDC, GetBrushOrgEx, GetCurrentPositionEx, SetDCPenColor, GetNearestPaletteIndex, CreateRoundRectRgn, GetTextExtentPointW, ExtTextOutW, SetBrushOrgEx, GetPixel, GdiFlush, SetViewportExtEx, SetPixel, PolyPolyline, EnumFontFamiliesExW, StretchDIBits, GetPaletteEntries
NameOrdinalAddress
__dbk_fcall_wrapper20x41bf70
dbkFCallWrapperAddr10x99e2a8
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:13:24:24
Start date:03/07/2024
Path:C:\Users\user\Desktop\Lostitem.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\Lostitem.exe"
Imagebase:0x400000
File size:7'083'008 bytes
MD5 hash:B76E8B0FF4AA3AEC76919FA82D8122AC
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:3
Start time:13:24:24
Start date:03/07/2024
Path:C:\Windows\System32\WerFault.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\WerFault.exe -u -p 7576 -s 416
Imagebase:0x7ff6e7f60000
File size:570'736 bytes
MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

No disassembly