Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FB101DRIT_V13SP3.exe

Overview

General Information

Sample name:FB101DRIT_V13SP3.exe
Analysis ID:1546860
MD5:fcd8c07af0e9620fb40fb44ed5a3dc43
SHA1:319fd243ff58f400b3b5663111b2ab201406ed04
SHA256:41c0d0bd114301973fd6e3ea1f6fb2a95a8283899fcd7243c652624e7abc96a5

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

PE file contains sections with non-standard names
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files

Classification

  • System is w10x64
  • FB101DRIT_V13SP3.exe (PID: 7396 cmdline: "C:\Users\user\Desktop\FB101DRIT_V13SP3.exe" MD5: FCD8C07AF0E9620FB40FB44ED5A3DC43)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-11-01T16:47:59.836403+010020229301A Network Trojan was detected4.245.163.56443192.168.2.449730TCP
2024-11-01T16:48:38.608272+010020229301A Network Trojan was detected20.12.23.50443192.168.2.449736TCP

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: FB101DRIT_V13SP3.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.12.23.50:443 -> 192.168.2.4:49736
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.245.163.56:443 -> 192.168.2.4:49730
Source: setup.exeString found in binary or memory: ftp://%s%d.tmpsetup.ethermk:
Source: setup.exeString found in binary or memory: http://crl.thawte.com/ThawteCodeSigningCA.crl0
Source: setup.exeString found in binary or memory: http://crl.thawte.com/ThawtePremiumServerCA.crl0
Source: data1.hdrString found in binary or memory: http://deviis4.installshield.com/NetNirvana/
Source: setup.exeString found in binary or memory: http://www.installengine.com/oci_range_check.txt
Source: setup.exeString found in binary or memory: http://www.installengine.com/oci_range_check.txtproxy
Source: setup.iniString found in binary or memory: http://www.installshield.com/isetup/ProErrorCentral.asp?ErrorCode=%d
Source: setup.exeString found in binary or memory: http://www.installshield.com0
Source: FB101DRIT_V13SP3.exe, 00000000.00000002.2930563969.0000000001244000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.winzip.com
Source: FB101DRIT_V13SP3.exe, 00000000.00000002.2930563969.0000000001244000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.winzip.comCan
Source: setup.exeString found in binary or memory: https://http://...
Source: FB101DRIT_V13SP3.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: clean1.winEXE@1/0@0/0
Source: FB101DRIT_V13SP3.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: FB101DRIT_V13SP3.exeString found in binary or memory: /aDdw
Source: setup.exeString found in binary or memory: re Installasjonsprogrammet igjen.-Installasjonsprogrammet har oppdaget en feil.
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeFile read: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: networkexplorer.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: samlib.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: drprov.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: ntlanman.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: davclnt.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: davhlpr.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: dlnashext.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: playtodevice.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: devdispitemprovider.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: mmdevapi.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: devobj.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: wpdshext.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: portabledeviceapi.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: audiodev.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: wmvcore.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: wmasf.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: mfperfhelper.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: thumbcache.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{76765b11-3f95-4af2-ac9d-ea55d8994f1a}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeAutomated click: OK
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeAutomated click: OK
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeAutomated click: OK
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeAutomated click: OK
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeAutomated click: OK
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeAutomated click: OK
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeAutomated click: OK
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeAutomated click: OK
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeAutomated click: OK
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: FB101DRIT_V13SP3.exeStatic file information: File size 12963840 > 1048576
Source: FB101DRIT_V13SP3.exeStatic PE information: Raw size of _winzip_ is bigger than: 0x100000 < 0xc53a00
Source: FB101DRIT_V13SP3.exeStatic PE information: section name: _winzip_
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\FB101DRIT_V13SP3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: FB101DRIT_V13SP3.exe, 00000000.00000003.1736246811.00000000012AB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
Source: FB101DRIT_V13SP3.exe, 00000000.00000003.1736246811.00000000012AB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: FB101DRIT_V13SP3.exe, 00000000.00000003.1736246811.00000000012AB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
Source: FB101DRIT_V13SP3.exe, 00000000.00000002.2930563969.0000000001293000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}SS[#
Source: FB101DRIT_V13SP3.exe, 00000000.00000002.2930563969.00000000012AB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: lca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
Source: FB101DRIT_V13SP3.exe, 00000000.00000003.1878815296.0000000001308000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 8-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&
Source: FB101DRIT_V13SP3.exe, 00000000.00000002.2930563969.00000000012AB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
FB101DRIT_V13SP3.exe5%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://deviis4.installshield.com/NetNirvana/data1.hdrfalse
    unknown
    http://www.installengine.com/oci_range_check.txtproxysetup.exefalse
      unknown
      http://www.winzip.comFB101DRIT_V13SP3.exe, 00000000.00000002.2930563969.0000000001244000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        https://http://...setup.exefalse
          unknown
          http://www.installshield.com/isetup/ProErrorCentral.asp?ErrorCode=%dsetup.inifalse
            unknown
            http://crl.thawte.com/ThawtePremiumServerCA.crl0setup.exefalse
              unknown
              http://www.installengine.com/oci_range_check.txtsetup.exefalse
                unknown
                ftp://%s%d.tmpsetup.ethermk:setup.exefalse
                  unknown
                  http://www.winzip.comCanFB101DRIT_V13SP3.exe, 00000000.00000002.2930563969.0000000001244000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    http://crl.thawte.com/ThawteCodeSigningCA.crl0setup.exefalse
                      unknown
                      http://www.installshield.com0setup.exefalse
                        unknown
                        No contacted IP infos
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1546860
                        Start date and time:2024-11-01 16:46:50 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 3m 55s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:5
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:FB101DRIT_V13SP3.exe
                        Detection:CLEAN
                        Classification:clean1.winEXE@1/0@0/0
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • VT rate limit hit for: FB101DRIT_V13SP3.exe
                        No simulations
                        No context
                        No context
                        No context
                        No context
                        No context
                        No created / dropped files found
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):7.998780758831593
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.73%
                        • Winzip Win32 self-extracting archive (generic) (23002/1) 0.23%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:FB101DRIT_V13SP3.exe
                        File size:12'963'840 bytes
                        MD5:fcd8c07af0e9620fb40fb44ed5a3dc43
                        SHA1:319fd243ff58f400b3b5663111b2ab201406ed04
                        SHA256:41c0d0bd114301973fd6e3ea1f6fb2a95a8283899fcd7243c652624e7abc96a5
                        SHA512:903f4e530b020b5d10f136f60d8060b48acf53a98ccf8010f87144faa57488a5afaa2ab74eb0a2d721d2ee611cfce3225fa88824d6d05ef3e09dcf0711dc6c90
                        SSDEEP:393216:W98517IDBGRiqSbpt89vFMWQ2YVNg+tm:W985m0Ri3Ft+tMpN1t
                        TLSH:10D6336DDF844297C27074B0AE711FAEBB3B4CB210545882CA428D3E59D4FBD2F76299
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........'~S.F...F...F...F...F...@...F...Z...F..Rich.F..........................PE..L...]..8.................R...J.......8.......p....@
                        Icon Hash:20e89e9b9a9e808a
                        Entrypoint:0x4038f8
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                        DLL Characteristics:
                        Time Stamp:0x38FDEF5D [Wed Apr 19 17:39:41 2000 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:21e326f170fd82d896f09f64d43c6fed
                        Instruction
                        push ebx
                        call dword ptr [00407060h]
                        mov bl, 22h
                        cmp byte ptr [eax], bl
                        je 00007FCAA4FABF85h
                        add bl, FFFFFFFEh
                        mov cl, byte ptr [eax+01h]
                        inc eax
                        xor edx, edx
                        cmp cl, dl
                        je 00007FCAA4FABF8Ch
                        cmp cl, bl
                        je 00007FCAA4FABF88h
                        mov cl, byte ptr [eax+01h]
                        inc eax
                        jmp 00007FCAA4FABF74h
                        cmp byte ptr [eax], dl
                        je 00007FCAA4FABF83h
                        inc eax
                        push edx
                        push eax
                        push edx
                        push edx
                        call dword ptr [00407064h]
                        push eax
                        call 00007FCAA4FAB7BDh
                        push eax
                        call dword ptr [00407068h]
                        pop ebx
                        ret
                        mov eax, dword ptr [esp+04h]
                        mov eax, dword ptr [eax+3Ch]
                        add eax, 000000F8h
                        ret
                        push ebp
                        mov ebp, esp
                        push ecx
                        mov eax, dword ptr [0040B608h]
                        or dword ptr [0040B4A0h], FFFFFFFFh
                        push esi
                        xor esi, esi
                        cmp dword ptr [0040AFD4h], esi
                        mov dword ptr [0040B5CCh], esi
                        mov dword ptr [0040B604h], esi
                        mov dword ptr [0040B784h], eax
                        jne 00007FCAA4FABF87h
                        call 00007FCAA4FA98CCh
                        cmp dword ptr [0040B5EEh], esi
                        jbe 00007FCAA4FABFA7h
                        movzx eax, word ptr [0040B5E4h]
                        cmp eax, esi
                        je 00007FCAA4FAC051h
                        cmp eax, 08h
                        je 00007FCAA4FAC039h
                        push 0000001Dh
                        call 00007FCAA4FA9675h
                        push eax
                        call 00007FCAA4FA97CCh
                        mov eax, dword ptr [0040B604h]
                        inc dword ptr [0040AFD8h]
                        cmp eax, esi
                        jle 00007FCAA4FABFB6h
                        push eax
                        push dword ptr [0040B608h]
                        call 00007FCAA4FA9CB3h
                        Programming Language:
                        • [RES] VS97 (5.0) SP3 cvtres 5.00.1668
                        • [IMP] VS97 (5.0) SP3 link 5.10.7303
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x7a700x32.rdata
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x71bc0x78.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xc0000x508.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x70000x1ac.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x50160x5200ed6b47a15e5bd168e28a19611e25969dFalse0.6014672256097561data6.449003422775913IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x70000xaa20xc00eaf7b7a3c421a9f1a03775a6b2f15517False0.4205729166666667data4.663928389920008IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x80000x379c0x2e00109f66534db48f1557a7742b4aba15d1False0.25857676630434784Matlab v4 mat-file (little endian) <\001, numeric, rows 79, columns 114, imaginary2.6786313672597286IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0xc0000x5080x60045efda82c985d880c15a95c9caa6d02eFalse0.24739583333333334data2.795301122615629IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        _winzip_0xd0000xc540000xc53a00ff028d8a6b470a03789c4c7e2528783dunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0xc0d00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.2701612903225806
                        RT_ICON0xc3b80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.5033783783783784
                        RT_GROUP_ICON0xc4e00x22dataEnglishUnited States1.0
                        DLLImport
                        SHELL32.dllShellExecuteA, FindExecutableA
                        USER32.dllCharNextA, DefWindowProcA, GetWindowWord, SetWindowWord, BeginPaint, GetSysColor, GetClientRect, SetRect, EndPaint, RegisterClassA, OemToCharBuffA, LoadCursorA, GetLastActivePopup, ShowWindow, PostMessageA, EnableWindow, DestroyWindow, SetWindowTextA, SetForegroundWindow, SetActiveWindow, GetWindowRect, SetTimer, KillTimer, DialogBoxIndirectParamA, GetDlgItemTextA, EndDialog, SendMessageA, GetKeyState, PeekMessageA, TranslateMessage, DispatchMessageA, GetParent, SetDlgItemTextA, SendDlgItemMessageA, GetDlgItem, InvalidateRect, UpdateWindow, wsprintfA, MessageBoxA, SetCursor, GetSystemMetrics, SetWindowPos
                        KERNEL32.dllLocalFileTimeToFileTime, _lread, _lwrite, LocalFree, VirtualAlloc, VirtualFree, RtlUnwind, HeapAlloc, HeapFree, GetCommandLineA, GetModuleHandleA, ExitProcess, GetACP, GetModuleFileNameA, SetErrorMode, GetVersion, LoadLibraryA, GetProcAddress, FreeLibrary, lstrcmpiA, GetWindowsDirectoryA, GetEnvironmentVariableA, LocalAlloc, _llseek, GlobalHandle, GlobalUnlock, GlobalFree, GlobalAlloc, GlobalLock, FindClose, FindFirstFileA, GetCurrentDirectoryA, SetCurrentDirectoryA, lstrlenA, CreateDirectoryA, lstrcatA, SetFileTime, _lclose, DosDateTimeToFileTime, _lcreat, lstrcpyA, _lopen, GetVolumeInformationA, WinExec, GetDriveTypeA
                        GDI32.dllGetBkColor, SetBkColor, SetTextColor, SetTextAlign, DeleteObject, GetTextExtentPoint32A, ExtTextOutA, CreateDCA, GetDeviceCaps, CreateFontIndirectA, DeleteDC, SelectObject
                        ADVAPI32.dllRegQueryValueA
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        No network behavior found

                        Click to jump to process

                        Click to jump to process

                        Target ID:0
                        Start time:11:47:40
                        Start date:01/11/2024
                        Path:C:\Users\user\Desktop\FB101DRIT_V13SP3.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\FB101DRIT_V13SP3.exe"
                        Imagebase:0x400000
                        File size:12'963'840 bytes
                        MD5 hash:FCD8C07AF0E9620FB40FB44ED5A3DC43
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:false

                        No disassembly