Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FYBRUTggrf.exe

Overview

General Information

Sample name:FYBRUTggrf.exe
(renamed file extension from txt to exe, renamed because original name is a hash value)
Original sample name:4E928F2C40DC96A6A84C207B4B1145997CDC3387B706F0C254A4CC72797C4AB0.txt
Analysis ID:1546618
MD5:9bd767f6b9bb867fe32a6cae6b3dd659
SHA1:53e2092bb89df2e77178c9abfd79ce8b194bf18f
SHA256:4e928f2c40dc96a6a84c207b4b1145997cdc3387b706f0c254a4cc72797c4ab0
Infos:

Detection

Score:21
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

AI detected suspicious sample
Drops PE files
Found dropped PE file which has not been started or loaded
Uses 32bit PE files

Classification

  • System is w10x64
  • FYBRUTggrf.exe (PID: 7364 cmdline: "C:\Users\user\Desktop\FYBRUTggrf.exe" MD5: 9BD767F6B9BB867FE32A6CAE6B3DD659)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.2% probability
Source: FYBRUTggrf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: Binary string: D:\users\jyhshyuan_su\Desktop\RunAsAdmin\Release\RunAsAdmin.pdb source: RunAsAdmin.exe.0.dr
Source: FYBRUTggrf.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
Source: FYBRUTggrf.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: FYBRUTggrf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: sus21.winEXE@1/2@0/0
Source: C:\Users\user\Desktop\FYBRUTggrf.exeFile created: C:\Users\user\AppData\Local\Temp\nsj3117.tmpJump to behavior
Source: FYBRUTggrf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\FYBRUTggrf.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\FYBRUTggrf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\FYBRUTggrf.exeFile read: C:\Users\user\Desktop\FYBRUTggrf.exeJump to behavior
Source: C:\Users\user\Desktop\FYBRUTggrf.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\FYBRUTggrf.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\FYBRUTggrf.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\FYBRUTggrf.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\FYBRUTggrf.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\FYBRUTggrf.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\FYBRUTggrf.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\FYBRUTggrf.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\FYBRUTggrf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
Source: Binary string: D:\users\jyhshyuan_su\Desktop\RunAsAdmin\Release\RunAsAdmin.pdb source: RunAsAdmin.exe.0.dr
Source: C:\Users\user\Desktop\FYBRUTggrf.exeFile created: C:\Users\user\AppData\Local\Temp\RunAsAdmin.exeJump to dropped file
Source: C:\Users\user\Desktop\FYBRUTggrf.exeFile created: C:\Users\user\AppData\Local\Temp\nsz3186.tmp\UserInfo.dllJump to dropped file
Source: C:\Users\user\Desktop\FYBRUTggrf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\FYBRUTggrf.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\RunAsAdmin.exeJump to dropped file
Source: C:\Users\user\Desktop\FYBRUTggrf.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsz3186.tmp\UserInfo.dllJump to dropped file
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping1
File and Directory Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
FYBRUTggrf.exe0%ReversingLabs
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\RunAsAdmin.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsz3186.tmp\UserInfo.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://nsis.sf.net/NSIS_Error0%URL Reputationsafe
http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://nsis.sf.net/NSIS_ErrorFYBRUTggrf.exefalse
  • URL Reputation: safe
unknown
http://nsis.sf.net/NSIS_ErrorErrorFYBRUTggrf.exefalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1546618
Start date and time:2024-11-01 08:52:05 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 1m 48s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:2
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:FYBRUTggrf.exe
(renamed file extension from txt to exe, renamed because original name is a hash value)
Original Sample Name:4E928F2C40DC96A6A84C207B4B1145997CDC3387B706F0C254A4CC72797C4AB0.txt
Detection:SUS
Classification:sus21.winEXE@1/2@0/0
Cookbook Comments:
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): dllhost.exe
  • VT rate limit hit for: FYBRUTggrf.exe
No simulations
No context
No context
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
C:\Users\user\AppData\Local\Temp\nsz3186.tmp\UserInfo.dll563299efce875400a8d9b44b96597c8e-sample (1).zipGet hashmaliciousUnknownBrowse
    Fiserv_SHIP_RangerForDigitalCheckTSSeries_CX30_4.9.4.0-2.2.2.8_RR_v2.2.2.1_NL.exeGet hashmaliciousUnknownBrowse
      Fiserv_SHIP_RangerForDigitalCheckTSSeries_CX30_4.9.4.0-2.2.2.8_RR_v2.2.2.1_NL.exeGet hashmaliciousUnknownBrowse
        LINWorks-1.10.3.exeGet hashmaliciousUnknownBrowse
          saa.zipGet hashmaliciousUnknownBrowse
            finalshell_windows_x64.exeGet hashmaliciousUnknownBrowse
              CuratorStandardSetup.exeGet hashmaliciousUnknownBrowse
                CuratorStandardSetup.exeGet hashmaliciousUnknownBrowse
                  HancockWhitney_AdminNoScanner_555036 (1).exeGet hashmaliciousUnknownBrowse
                    ibaLicenseService-V2_v2.5.2.zipGet hashmaliciousUnknownBrowse
                      Process:C:\Users\user\Desktop\FYBRUTggrf.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):1716736
                      Entropy (8bit):6.406505011645108
                      Encrypted:false
                      SSDEEP:49152:aY8m6/ufkUZkCH1cq0YvdUsvoO/O0K8X9KKoFECcA2ht0vk1Dg8KhUF6RfhXhcyt:aY8sfkUZkCVcSvhvoOOn8X9KKoFEd6kq
                      MD5:7F48C5CDAFD8FB5CF869FFDE65F7DA07
                      SHA1:0F0E3DE46E607B8A0A61AF56921B42D38FF5D967
                      SHA-256:6CEC5DDC0BBD789E23F5125113F03973228C0D5C1AFDAF74666158DCD280CF83
                      SHA-512:684CC6D076200F8E38B8DE2409F9640FC2675A31B8730F388EFD41A512AC8DA7033068CF25C91D51C5C7886B88D3AE4BF6ECC34FB06B67C0DFF0506BDF62A90E
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Reputation:low
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......P..u..`&..`&..`&...&..`&...&..`&...&7.`&..a&..`&.n.&9.`&.n.&..`&.n.&..`&.n.&..`&.n.&..`&.n.&..`&Rich..`&................PE..L...)..T.................b..........n ............@.................................. ....@.....................................h...........................@..T...p...................................@............................................text....`.......b.................. ..`.rdata..\8.......:...f..............@..@.data............b..................@....rsrc..............................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\FYBRUTggrf.exe
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):4096
                      Entropy (8bit):3.331979080664426
                      Encrypted:false
                      SSDEEP:48:iViF7LLM4wXqQH1wRrOpArXMVyjlZSXRN:ky7EcQHu4tVy4R
                      MD5:7579ADE7AE1747A31960A228CE02E666
                      SHA1:8EC8571A296737E819DCF86353A43FCF8EC63351
                      SHA-256:564C80DEC62D76C53497C40094DB360FF8A36E0DC1BDA8383D0F9583138997F5
                      SHA-512:A88BC56E938374C333B0E33CB72951635B5D5A98B9CB2D6785073CBCAD23BF4C0F9F69D3B7E87B46C76EB03CED9BB786844CE87656A9E3DF4CA24ACF43D7A05B
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Joe Sandbox View:
                      • Filename: 563299efce875400a8d9b44b96597c8e-sample (1).zip, Detection: malicious, Browse
                      • Filename: Fiserv_SHIP_RangerForDigitalCheckTSSeries_CX30_4.9.4.0-2.2.2.8_RR_v2.2.2.1_NL.exe, Detection: malicious, Browse
                      • Filename: Fiserv_SHIP_RangerForDigitalCheckTSSeries_CX30_4.9.4.0-2.2.2.8_RR_v2.2.2.1_NL.exe, Detection: malicious, Browse
                      • Filename: LINWorks-1.10.3.exe, Detection: malicious, Browse
                      • Filename: saa.zip, Detection: malicious, Browse
                      • Filename: finalshell_windows_x64.exe, Detection: malicious, Browse
                      • Filename: CuratorStandardSetup.exe, Detection: malicious, Browse
                      • Filename: CuratorStandardSetup.exe, Detection: malicious, Browse
                      • Filename: HancockWhitney_AdminNoScanner_555036 (1).exe, Detection: malicious, Browse
                      • Filename: ibaLicenseService-V2_v2.5.2.zip, Detection: malicious, Browse
                      Reputation:moderate, very likely benign file
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................4..............Rich..................PE..L......K...........!......................... ...............................P...................................... "......L ..<............................@..d.................................................... ..L............................text............................... ..`.rdata....... ......................@..@.data...X....0......................@....reloc.......@......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                      Entropy (8bit):7.979519157007951
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 92.16%
                      • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:FYBRUTggrf.exe
                      File size:868'635 bytes
                      MD5:9bd767f6b9bb867fe32a6cae6b3dd659
                      SHA1:53e2092bb89df2e77178c9abfd79ce8b194bf18f
                      SHA256:4e928f2c40dc96a6a84c207b4b1145997cdc3387b706f0c254a4cc72797c4ab0
                      SHA512:03c7bea815f238443292d02127e615078d68fa922b6031666cd5682d04e8cbefefac4c2798574400f3e95f0da989059a87324c938cdab400298056883bc1d132
                      SSDEEP:12288:UxjBxPKNm/qtBN/YThN4iQ55K0P2a+7GRnvct4tsthzm0uhq1J7pKiUGfW+x1L:UxGNx4T74iSYq+KRUxhPm29dUGvL
                      TLSH:9005237D61E1F86FC564B53269F79C78A23A828983A79D0FEB43EB6F68144C25C442D0
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..iu..i...iw..iu..i...i...id..i!..i...i...it..iRichu..i........................PE..L......K.................^.........
                      Icon Hash:0771ccf8d84d2907
                      Entrypoint:0x4030fa
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                      DLL Characteristics:TERMINAL_SERVER_AWARE
                      Time Stamp:0x4B1AE3CC [Sat Dec 5 22:50:52 2009 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:7fa974366048f9c551ef45714595665e
                      Instruction
                      sub esp, 00000180h
                      push ebx
                      push ebp
                      push esi
                      xor ebx, ebx
                      push edi
                      mov dword ptr [esp+18h], ebx
                      mov dword ptr [esp+10h], 00409160h
                      xor esi, esi
                      mov byte ptr [esp+14h], 00000020h
                      call dword ptr [00407030h]
                      push 00008001h
                      call dword ptr [004070B0h]
                      push ebx
                      call dword ptr [0040727Ch]
                      push 00000008h
                      mov dword ptr [0042EC18h], eax
                      call 00007F1AE06E78C6h
                      mov dword ptr [0042EB64h], eax
                      push ebx
                      lea eax, dword ptr [esp+34h]
                      push 00000160h
                      push eax
                      push ebx
                      push 00428F98h
                      call dword ptr [00407158h]
                      push 00409154h
                      push 0042E360h
                      call 00007F1AE06E7579h
                      call dword ptr [004070ACh]
                      mov edi, 00434000h
                      push eax
                      push edi
                      call 00007F1AE06E7567h
                      push ebx
                      call dword ptr [0040710Ch]
                      cmp byte ptr [00434000h], 00000022h
                      mov dword ptr [0042EB60h], eax
                      mov eax, edi
                      jne 00007F1AE06E4CDCh
                      mov byte ptr [esp+14h], 00000022h
                      mov eax, 00434001h
                      push dword ptr [esp+14h]
                      push eax
                      call 00007F1AE06E705Ah
                      push eax
                      call dword ptr [0040721Ch]
                      mov dword ptr [esp+1Ch], eax
                      jmp 00007F1AE06E4D35h
                      cmp cl, 00000020h
                      jne 00007F1AE06E4CD8h
                      inc eax
                      cmp byte ptr [eax], 00000020h
                      je 00007F1AE06E4CCCh
                      cmp byte ptr [eax], 00000022h
                      mov byte ptr [eax+eax+00h], 00000000h
                      Programming Language:
                      • [EXP] VC++ 6.0 SP5 build 8804
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x74b00xb4.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x370000x3e48.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x70000x28c.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x5c4c0x5e00856b32eb77dfd6fb67f21d6543272da5False0.6697140957446809data6.440105549497952IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x70000x129c0x1400dc77f8a1e6985a4361c55642680ddb4fFalse0.43359375data5.046835307909969IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x90000x25c580x4007922d4ce117d7d5b3ac2cffe4b0b5e4fFalse0.5849609375data4.801003752715384IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .ndata0x2f0000x80000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x370000x3e480x40009220819ee863b995b92fdec2d679e17dFalse0.62823486328125data5.942322566388902IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_ICON0x372b00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.7213883677298312
                      RT_ICON0x383580xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688, 256 important colorsEnglishUnited States0.6751066098081023
                      RT_ICON0x392000x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152, 256 important colorsEnglishUnited States0.7851985559566786
                      RT_ICON0x39aa80x568Device independent bitmap graphic, 16 x 32 x 8, image size 320, 256 important colorsEnglishUnited States0.6560693641618497
                      RT_ICON0x3a0100x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.8031914893617021
                      RT_ICON0x3a4780x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.3118279569892473
                      RT_ICON0x3a7600x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.36824324324324326
                      RT_DIALOG0x3a8880x100dataEnglishUnited States0.5234375
                      RT_DIALOG0x3a9880x11cdataEnglishUnited States0.6056338028169014
                      RT_DIALOG0x3aaa80x60dataEnglishUnited States0.7291666666666666
                      RT_GROUP_ICON0x3ab080x68dataEnglishUnited States0.6634615384615384
                      RT_MANIFEST0x3ab700x2d7XML 1.0 document, ASCII text, with very long lines (727), with no line terminatorsEnglishUnited States0.5639614855570839
                      DLLImport
                      KERNEL32.dllCompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, GetTickCount, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, GetWindowsDirectoryA, SetFileTime, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, GetVersion, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, GetTempPathA
                      USER32.dllEndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow
                      GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject
                      SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation
                      ADVAPI32.dllRegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA
                      COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                      ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                      VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      No network behavior found

                      Click to jump to process

                      Click to jump to process

                      Target ID:0
                      Start time:03:52:55
                      Start date:01/11/2024
                      Path:C:\Users\user\Desktop\FYBRUTggrf.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\FYBRUTggrf.exe"
                      Imagebase:0x400000
                      File size:868'635 bytes
                      MD5 hash:9BD767F6B9BB867FE32A6CAE6B3DD659
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      No disassembly