Edit tour

Windows Analysis Report
Office_2024_EN_64Bits.exe

Overview

General Information

Sample name:Office_2024_EN_64Bits.exe
Analysis ID:1603393
MD5:7408133e63aa3d775beedba6ea6ed3e9
SHA1:c0c98105a43f1478e659ca675be30ac56fe0bcb7
SHA256:0157afe7fbb8757a5f92bbb9d2dfbc2f06d9a1a8493b6d25e64a1735ac455811

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

Allocates memory with a write watch (potentially for evading sandboxes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
PE file contains sections with non-standard names
Uses 32bit PE files

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • Office_2024_EN_64Bits.exe (PID: 6740 cmdline: "C:\Users\user\Desktop\Office_2024_EN_64Bits.exe" MD5: 7408133E63AA3D775BEEDBA6EA6ED3E9)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: Office_2024_EN_64Bits.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Office_2024_EN_64Bits.exeStatic PE information: certificate valid
Source: Office_2024_EN_64Bits.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: Office_2024_EN_64Bits.exe
Source: Office_2024_EN_64Bits.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: Office_2024_EN_64Bits.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
Source: Office_2024_EN_64Bits.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
Source: Office_2024_EN_64Bits.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
Source: Office_2024_EN_64Bits.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
Source: Office_2024_EN_64Bits.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
Source: Office_2024_EN_64Bits.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
Source: Office_2024_EN_64Bits.exeString found in binary or memory: http://ocsp.comodoca.com0
Source: Office_2024_EN_64Bits.exeString found in binary or memory: http://ocsp.sectigo.com0
Source: Office_2024_EN_64Bits.exeString found in binary or memory: http://ocsp.sectigo.com0J
Source: Office_2024_EN_64Bits.exeString found in binary or memory: https://sectigo.com/CPS0
Source: Office_2024_EN_64Bits.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: clean1.winEXE@1/0@0/0
Source: Office_2024_EN_64Bits.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeFile read: C:\Windows\win.iniJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeFile read: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: dxgidebug.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: ieframe.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: msiso.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: mshtml.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: msimtf.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: d2d1.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: mlang.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: uiautomationcore.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: Office_2024_EN_64Bits.exeStatic PE information: certificate valid
Source: Office_2024_EN_64Bits.exeStatic file information: File size 2939800 > 1048576
Source: Office_2024_EN_64Bits.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: Office_2024_EN_64Bits.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: Office_2024_EN_64Bits.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: Office_2024_EN_64Bits.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Office_2024_EN_64Bits.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: Office_2024_EN_64Bits.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: Office_2024_EN_64Bits.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Office_2024_EN_64Bits.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: Office_2024_EN_64Bits.exe
Source: Office_2024_EN_64Bits.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: Office_2024_EN_64Bits.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: Office_2024_EN_64Bits.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: Office_2024_EN_64Bits.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: Office_2024_EN_64Bits.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: Office_2024_EN_64Bits.exeStatic PE information: section name: .didat
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeMemory allocated: 7A60000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeMemory allocated: 8390000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Office_2024_EN_64Bits.exeWindow / User API: threadDelayed 7496Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
Virtualization/Sandbox Evasion
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
DLL Side-Loading
LSASS Memory1
Application Window Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1603393 Sample: Office_2024_EN_64Bits.exe Startdate: 30/01/2025 Architecture: WINDOWS Score: 1 4 Office_2024_EN_64Bits.exe 12 2->4         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Office_2024_EN_64Bits.exe3%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://ocsp.sectigo.com0J0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0Office_2024_EN_64Bits.exefalse
    high
    http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tOffice_2024_EN_64Bits.exefalse
      high
      https://sectigo.com/CPS0Office_2024_EN_64Bits.exefalse
        high
        http://ocsp.sectigo.com0JOffice_2024_EN_64Bits.exefalse
        • Avira URL Cloud: safe
        unknown
        http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#Office_2024_EN_64Bits.exefalse
          high
          http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0Office_2024_EN_64Bits.exefalse
            high
            http://ocsp.sectigo.com0Office_2024_EN_64Bits.exefalse
              high
              http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#Office_2024_EN_64Bits.exefalse
                high
                http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#Office_2024_EN_64Bits.exefalse
                  high
                  No contacted IP infos
                  Joe Sandbox version:42.0.0 Malachite
                  Analysis ID:1603393
                  Start date and time:2025-01-30 23:22:21 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 3m 51s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:5
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:Office_2024_EN_64Bits.exe
                  Detection:CLEAN
                  Classification:clean1.winEXE@1/0@0/0
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                  • Excluded IPs from analysis (whitelisted): 20.190.159.0, 20.190.159.71, 40.126.31.130, 20.190.159.75, 20.190.159.73, 40.126.31.128, 20.190.159.131, 40.126.31.71, 172.202.163.200, 13.107.246.45
                  • Excluded domains from analysis (whitelisted): prdv4a.aadg.msidentity.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, login.live.com, www.tm.lg.prod.aadmsa.akadns.net, www.tm.v4.a.prd.aadg.trafficmanager.net, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • VT rate limit hit for: Office_2024_EN_64Bits.exe
                  No simulations
                  No context
                  No context
                  No context
                  No context
                  No context
                  No created / dropped files found
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):7.956507226101689
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:Office_2024_EN_64Bits.exe
                  File size:2'939'800 bytes
                  MD5:7408133e63aa3d775beedba6ea6ed3e9
                  SHA1:c0c98105a43f1478e659ca675be30ac56fe0bcb7
                  SHA256:0157afe7fbb8757a5f92bbb9d2dfbc2f06d9a1a8493b6d25e64a1735ac455811
                  SHA512:c59924c8256d17a9444cfcb7cb84dde2be18a90c5ec1badc5d6d0164545472f74be81fe01f1ff02770a062ca58e88403d8cee21eefdf5ed75f0742b06f5c980a
                  SSDEEP:49152:6svEdypEIJFS6G/9nQ0Ra15r80+qRnmMbYgtLg93bBhYo0Z043k17t6OXoCiB:6sM4WuFSH9nQ0wF+snmMpLgdwo0ZcxVa
                  TLSH:12D52353B3C080B2D4712B315A79DA50517DBC941F72CBEF63E6B82E96205D28B32B97
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........W...6...6...6....V..6....T.'6....U..6..)MZ..6..)M...6..)M...6..)M...6...N$..6...N4..6...6...7..'M...6..'M...6..'MX..6..'M...6.
                  Icon Hash:1515d4d4442f2d2d
                  Entrypoint:0x421d50
                  Entrypoint Section:.text
                  Digitally signed:true
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                  Time Stamp:0x651BC7F7 [Tue Oct 3 07:51:19 2023 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:5
                  OS Version Minor:1
                  File Version Major:5
                  File Version Minor:1
                  Subsystem Version Major:5
                  Subsystem Version Minor:1
                  Import Hash:75e9596d74d063246ba6f3ac7c5369a0
                  Signature Valid:true
                  Signature Issuer:CN=Sectigo Public Code Signing CA EV R36, O=Sectigo Limited, C=GB
                  Signature Validation Error:The operation completed successfully
                  Error Number:0
                  Not Before, Not After
                  • 08/02/2024 00:00:00 07/02/2025 23:59:59
                  Subject Chain
                  • CN=Technik Markt TMA e.K., O=Technik Markt TMA e.K., S=Bayern, C=DE, OID.2.5.4.15=Business Entity, OID.1.3.6.1.4.1.311.60.2.1.3=DE, SERIALNUMBER=HRA 6377
                  Version:3
                  Thumbprint MD5:3C035689BFBECA75B4597E7128821FA4
                  Thumbprint SHA-1:E727ACE05DAA6F7550AA02F639E885003F1A1538
                  Thumbprint SHA-256:5511E784533E07EF2C421E48E01E0BF724A61F3701372608B84258FDA126DE78
                  Serial:1CC828BC7B93110966A92D5F20111E7B
                  Instruction
                  call 00007FEE30EA69FBh
                  jmp 00007FEE30EA63ADh
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  push 00424F20h
                  push dword ptr fs:[00000000h]
                  mov eax, dword ptr [esp+10h]
                  mov dword ptr [esp+10h], ebp
                  lea ebp, dword ptr [esp+10h]
                  sub esp, eax
                  push ebx
                  push esi
                  push edi
                  mov eax, dword ptr [0044277Ch]
                  xor dword ptr [ebp-04h], eax
                  xor eax, ebp
                  push eax
                  mov dword ptr [ebp-18h], esp
                  push dword ptr [ebp-08h]
                  mov eax, dword ptr [ebp-04h]
                  mov dword ptr [ebp-04h], FFFFFFFEh
                  mov dword ptr [ebp-08h], eax
                  lea eax, dword ptr [ebp-10h]
                  mov dword ptr fs:[00000000h], eax
                  ret
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  mov ecx, dword ptr [ebp-10h]
                  mov dword ptr fs:[00000000h], ecx
                  pop ecx
                  pop edi
                  pop edi
                  pop esi
                  pop ebx
                  mov esp, ebp
                  pop ebp
                  push ecx
                  ret
                  push ebp
                  mov ebp, esp
                  sub esp, 0Ch
                  lea ecx, dword ptr [ebp-0Ch]
                  call 00007FEE30E98AD1h
                  push 0043F388h
                  lea eax, dword ptr [ebp-0Ch]
                  push eax
                  call 00007FEE30EA8F25h
                  int3
                  jmp 00007FEE30EAADF8h
                  push ebp
                  mov ebp, esp
                  and dword ptr [00466078h], 00000000h
                  sub esp, 24h
                  or dword ptr [004427B0h], 01h
                  push 0000000Ah
                  call dword ptr [004361D0h]
                  test eax, eax
                  je 00007FEE30EA66E2h
                  and dword ptr [ebp-10h], 00000000h
                  xor eax, eax
                  push ebx
                  push esi
                  push edi
                  xor ecx, ecx
                  lea edi, dword ptr [ebp-24h]
                  Programming Language:
                  • [ C ] VS2008 SP1 build 30729
                  • [IMP] VS2008 SP1 build 30729
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x405c00x34.rdata
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x405f40x50.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x680000xdff8.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x2cb2200x2978
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x760000x255c.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x3e3b00x54.rdata
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x388b00x40.rdata
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x360000x278.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x3fa9c0x120.rdata
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x345cc0x34600b7a8b04ab2248443b05e8133fb3a9064False0.5887343377088305data6.708390817791953IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rdata0x360000xb4100xb600a418919d63b67e937555eec95d3b6bcbFalse0.45409083104395603Applesoft BASIC program data, first line number 45.215945456388312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0x420000x247580x1200d8d5c95192b51ddad1857caa38e7daa9False0.4049479166666667data4.078919796039023IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .didat0x670000x1a40x200ee74a17c4eeb586c9811481b77498b43False0.4609375data3.5194570553957747IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0x680000xdff80xe00024f6d0ec8c14a78cfe04f16467fb2928False0.6373465401785714data6.638693022127744IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x760000x255c0x2600699c6b2b1b2acad2d0f219d9328713afFalse0.783203125data6.6660836278877325IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  PNG0x686500xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlacedEnglishUnited States1.0027729636048528
                  PNG0x691980x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlacedEnglishUnited States0.9363390441839495
                  RT_ICON0x6a7480x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.47832369942196534
                  RT_ICON0x6acb00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.5410649819494585
                  RT_ICON0x6b5580xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.4933368869936034
                  RT_ICON0x6c4000x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2834 x 2834 px/mEnglishUnited States0.5390070921985816
                  RT_ICON0x6c8680x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2834 x 2834 px/mEnglishUnited States0.41393058161350843
                  RT_ICON0x6d9100x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2834 x 2834 px/mEnglishUnited States0.3479253112033195
                  RT_ICON0x6feb80x3d71PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9809269502193401
                  RT_DIALOG0x745880x286dataEnglishUnited States0.5092879256965944
                  RT_DIALOG0x743580x13adataEnglishUnited States0.60828025477707
                  RT_DIALOG0x744980xecdataEnglishUnited States0.6991525423728814
                  RT_DIALOG0x742280x12edataEnglishUnited States0.5927152317880795
                  RT_DIALOG0x73ef00x338dataEnglishUnited States0.45145631067961167
                  RT_DIALOG0x73c980x252dataEnglishUnited States0.5757575757575758
                  RT_STRING0x74f680x1e2dataEnglishUnited States0.3900414937759336
                  RT_STRING0x751500x1ccdataEnglishUnited States0.4282608695652174
                  RT_STRING0x753200x1b8dataEnglishUnited States0.45681818181818185
                  RT_STRING0x754d80x146dataEnglishUnited States0.5153374233128835
                  RT_STRING0x756200x46cdataEnglishUnited States0.3454063604240283
                  RT_STRING0x75a900x166dataEnglishUnited States0.49162011173184356
                  RT_STRING0x75bf80x152dataEnglishUnited States0.5059171597633136
                  RT_STRING0x75d500x10adataEnglishUnited States0.49624060150375937
                  RT_STRING0x75e600xbcdataEnglishUnited States0.6329787234042553
                  RT_STRING0x75f200xd6dataEnglishUnited States0.5747663551401869
                  RT_GROUP_ICON0x73c300x68dataEnglishUnited States0.7019230769230769
                  RT_MANIFEST0x748100x753XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3957333333333333
                  DLLImport
                  KERNEL32.dllGetLastError, SetLastError, FormatMessageW, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, CreateDirectoryW, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, GetCurrentProcessId, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, InterlockedDecrement, GetVersionExW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleFileNameW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, LoadResource, SizeofResource, SetCurrentDirectoryW, GetTimeFormatW, GetDateFormatW, LocalFree, GetExitCodeProcess, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetNumberFormatW, DecodePointer, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetOEMCP, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, EncodePointer, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapReAlloc, HeapAlloc, GetStringTypeW, LCMapStringW, FindFirstFileExA, FindNextFileA, IsValidCodePage
                  OLEAUT32.dllSysAllocString, SysFreeString, VariantClear
                  gdiplus.dllGdipAlloc, GdipDisposeImage, GdipCloneImage, GdipCreateBitmapFromStream, GdipCreateBitmapFromStreamICM, GdipCreateHBITMAPFromBitmap, GdiplusStartup, GdiplusShutdown, GdipFree
                  Language of compilation systemCountry where language is spokenMap
                  EnglishUnited States
                  No network behavior found
                  050100s020406080100

                  Click to jump to process

                  050100s0.001020MB

                  Click to jump to process

                  Target ID:0
                  Start time:17:23:12
                  Start date:30/01/2025
                  Path:C:\Users\user\Desktop\Office_2024_EN_64Bits.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\Office_2024_EN_64Bits.exe"
                  Imagebase:0x250000
                  File size:2'939'800 bytes
                  MD5 hash:7408133E63AA3D775BEEDBA6EA6ED3E9
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:low
                  Has exited:false
                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                  No disassembly