Edit tour

Windows Analysis Report
Keys4Us_Office_2024_DE_64Bits.exe

Overview

General Information

Sample name:Keys4Us_Office_2024_DE_64Bits.exe
Analysis ID:1670034
MD5:08ca1b53e72fc0e41fdd9a63f3c51577
SHA1:fa91f58ccaacdc2b3486834d80bc846dfaf02d72
SHA256:ca3d6db83232f9e5f79f6ba2a78263172e163da11e8233bef1c961a15da5af3f
Tags:Keys4Us_Office_2024_DE_64

Detection

Score:1
Range:0 - 100
Confidence:40%

Signatures

Allocates memory with a write watch (potentially for evading sandboxes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
PE file contains sections with non-standard names
Uses 32bit PE files

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: Keys4Us_Office_2024_DE_64Bits.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Keys4Us_Office_2024_DE_64Bits.exeStatic PE information: certificate valid
Source: Keys4Us_Office_2024_DE_64Bits.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: Keys4Us_Office_2024_DE_64Bits.exe
Source: Keys4Us_Office_2024_DE_64Bits.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: Keys4Us_Office_2024_DE_64Bits.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
Source: Keys4Us_Office_2024_DE_64Bits.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
Source: Keys4Us_Office_2024_DE_64Bits.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
Source: Keys4Us_Office_2024_DE_64Bits.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
Source: Keys4Us_Office_2024_DE_64Bits.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
Source: Keys4Us_Office_2024_DE_64Bits.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
Source: Keys4Us_Office_2024_DE_64Bits.exeString found in binary or memory: http://ocsp.comodoca.com0
Source: Keys4Us_Office_2024_DE_64Bits.exeString found in binary or memory: http://ocsp.sectigo.com0
Source: Keys4Us_Office_2024_DE_64Bits.exeString found in binary or memory: http://ocsp.sectigo.com0J
Source: Keys4Us_Office_2024_DE_64Bits.exeString found in binary or memory: https://sectigo.com/CPS0
Source: Keys4Us_Office_2024_DE_64Bits.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: clean1.winEXE@1/0@0/0
Source: Keys4Us_Office_2024_DE_64Bits.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeFile read: C:\Windows\win.iniJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeFile read: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: dxgidebug.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: ieframe.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: msiso.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: mshtml.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: msimtf.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: d2d1.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: mlang.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: uiautomationcore.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
Source: Keys4Us_Office_2024_DE_64Bits.exeStatic PE information: certificate valid
Source: Keys4Us_Office_2024_DE_64Bits.exeStatic file information: File size 2939800 > 1048576
Source: Keys4Us_Office_2024_DE_64Bits.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: Keys4Us_Office_2024_DE_64Bits.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: Keys4Us_Office_2024_DE_64Bits.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: Keys4Us_Office_2024_DE_64Bits.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Keys4Us_Office_2024_DE_64Bits.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: Keys4Us_Office_2024_DE_64Bits.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: Keys4Us_Office_2024_DE_64Bits.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Keys4Us_Office_2024_DE_64Bits.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: Keys4Us_Office_2024_DE_64Bits.exe
Source: Keys4Us_Office_2024_DE_64Bits.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: Keys4Us_Office_2024_DE_64Bits.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: Keys4Us_Office_2024_DE_64Bits.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: Keys4Us_Office_2024_DE_64Bits.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: Keys4Us_Office_2024_DE_64Bits.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: Keys4Us_Office_2024_DE_64Bits.exeStatic PE information: section name: .didat
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeMemory allocated: 7530000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeMemory allocated: 7DF0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exeWindow / User API: threadDelayed 7661Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
Virtualization/Sandbox Evasion
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
DLL Side-Loading
LSASS Memory1
Application Window Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1670034 Sample: Keys4Us_Office_2024_DE_64Bits.exe Startdate: 21/04/2025 Architecture: WINDOWS Score: 1 4 Keys4Us_Office_2024_DE_64Bits.exe 12 2->4         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Keys4Us_Office_2024_DE_64Bits.exe5%ReversingLabs
Keys4Us_Office_2024_DE_64Bits.exe1%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://ocsp.sectigo.com0J0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0Keys4Us_Office_2024_DE_64Bits.exefalse
    high
    http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tKeys4Us_Office_2024_DE_64Bits.exefalse
      high
      https://sectigo.com/CPS0Keys4Us_Office_2024_DE_64Bits.exefalse
        high
        http://ocsp.sectigo.com0JKeys4Us_Office_2024_DE_64Bits.exefalse
        • Avira URL Cloud: safe
        unknown
        http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#Keys4Us_Office_2024_DE_64Bits.exefalse
          high
          http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0Keys4Us_Office_2024_DE_64Bits.exefalse
            high
            http://ocsp.sectigo.com0Keys4Us_Office_2024_DE_64Bits.exefalse
              high
              http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#Keys4Us_Office_2024_DE_64Bits.exefalse
                high
                http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#Keys4Us_Office_2024_DE_64Bits.exefalse
                  high
                  No contacted IP infos
                  Joe Sandbox version:42.0.0 Malachite
                  Analysis ID:1670034
                  Start date and time:2025-04-21 03:24:53 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 3m 55s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Run name:Potential for more IOCs and behavior
                  Number of analysed new started processes analysed:11
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:Keys4Us_Office_2024_DE_64Bits.exe
                  Detection:CLEAN
                  Classification:clean1.winEXE@1/0@0/0
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, sppsvc.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                  • Excluded IPs from analysis (whitelisted): 184.29.183.29, 4.245.163.56, 20.190.190.195
                  • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, ctldl.windowsupdate.com, c.pki.goog, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  No simulations
                  No context
                  No context
                  No context
                  No context
                  No context
                  No created / dropped files found
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):7.9565106457565795
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:Keys4Us_Office_2024_DE_64Bits.exe
                  File size:2'939'800 bytes
                  MD5:08ca1b53e72fc0e41fdd9a63f3c51577
                  SHA1:fa91f58ccaacdc2b3486834d80bc846dfaf02d72
                  SHA256:ca3d6db83232f9e5f79f6ba2a78263172e163da11e8233bef1c961a15da5af3f
                  SHA512:5a413fb56c93e44e1b7a2e54b09e7a3afc52a87e058458b886e3d209975e6ff17ae5c2981ff643ee91e625c1a6fd4d525473b5f2d5f8b989920f8ecd9e5ddbf9
                  SSDEEP:49152:esv2dypEIJFS6G/9nQ0Ra15r80+qRnmMbYgtLg93bBhYo0Z043k17t6OXoCiR:esO4WuFSH9nQ0wF+snmMpLgdwo0ZcxVO
                  TLSH:57D52353B3C080B2D4712B315A79DA50517DBC941F72CBEF63E6A82ED6205D28B32B97
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........W...6...6...6....V..6....T.'6....U..6..)MZ..6..)M...6..)M...6..)M...6...N$..6...N4..6...6...7..'M...6..'M...6..'MX..6..'M...6.
                  Icon Hash:1515d4d4442f2d2d
                  Entrypoint:0x421d50
                  Entrypoint Section:.text
                  Digitally signed:true
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                  Time Stamp:0x651BC7F7 [Tue Oct 3 07:51:19 2023 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:5
                  OS Version Minor:1
                  File Version Major:5
                  File Version Minor:1
                  Subsystem Version Major:5
                  Subsystem Version Minor:1
                  Import Hash:75e9596d74d063246ba6f3ac7c5369a0
                  Signature Valid:true
                  Signature Issuer:CN=Sectigo Public Code Signing CA EV R36, O=Sectigo Limited, C=GB
                  Signature Validation Error:The operation completed successfully
                  Error Number:0
                  Not Before, Not After
                  • 08/02/2024 00:00:00 07/02/2025 23:59:59
                  Subject Chain
                  • CN=Technik Markt TMA e.K., O=Technik Markt TMA e.K., S=Bayern, C=DE, OID.2.5.4.15=Business Entity, OID.1.3.6.1.4.1.311.60.2.1.3=DE, SERIALNUMBER=HRA 6377
                  Version:3
                  Thumbprint MD5:3C035689BFBECA75B4597E7128821FA4
                  Thumbprint SHA-1:E727ACE05DAA6F7550AA02F639E885003F1A1538
                  Thumbprint SHA-256:5511E784533E07EF2C421E48E01E0BF724A61F3701372608B84258FDA126DE78
                  Serial:1CC828BC7B93110966A92D5F20111E7B
                  Instruction
                  call 00007FF3BCB548ABh
                  jmp 00007FF3BCB5425Dh
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  push 00424F20h
                  push dword ptr fs:[00000000h]
                  mov eax, dword ptr [esp+10h]
                  mov dword ptr [esp+10h], ebp
                  lea ebp, dword ptr [esp+10h]
                  sub esp, eax
                  push ebx
                  push esi
                  push edi
                  mov eax, dword ptr [0044277Ch]
                  xor dword ptr [ebp-04h], eax
                  xor eax, ebp
                  push eax
                  mov dword ptr [ebp-18h], esp
                  push dword ptr [ebp-08h]
                  mov eax, dword ptr [ebp-04h]
                  mov dword ptr [ebp-04h], FFFFFFFEh
                  mov dword ptr [ebp-08h], eax
                  lea eax, dword ptr [ebp-10h]
                  mov dword ptr fs:[00000000h], eax
                  ret
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  mov ecx, dword ptr [ebp-10h]
                  mov dword ptr fs:[00000000h], ecx
                  pop ecx
                  pop edi
                  pop edi
                  pop esi
                  pop ebx
                  mov esp, ebp
                  pop ebp
                  push ecx
                  ret
                  push ebp
                  mov ebp, esp
                  sub esp, 0Ch
                  lea ecx, dword ptr [ebp-0Ch]
                  call 00007FF3BCB46981h
                  push 0043F388h
                  lea eax, dword ptr [ebp-0Ch]
                  push eax
                  call 00007FF3BCB56DD5h
                  int3
                  jmp 00007FF3BCB58CA8h
                  push ebp
                  mov ebp, esp
                  and dword ptr [00466078h], 00000000h
                  sub esp, 24h
                  or dword ptr [004427B0h], 01h
                  push 0000000Ah
                  call dword ptr [004361D0h]
                  test eax, eax
                  je 00007FF3BCB54592h
                  and dword ptr [ebp-10h], 00000000h
                  xor eax, eax
                  push ebx
                  push esi
                  push edi
                  xor ecx, ecx
                  lea edi, dword ptr [ebp-24h]
                  Programming Language:
                  • [ C ] VS2008 SP1 build 30729
                  • [IMP] VS2008 SP1 build 30729
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x405c00x34.rdata
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x405f40x50.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x680000xdff8.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x2cb2200x2978
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x760000x255c.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x3e3b00x54.rdata
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x388b00x40.rdata
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x360000x278.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x3fa9c0x120.rdata
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x345cc0x34600b7a8b04ab2248443b05e8133fb3a9064False0.5887343377088305data6.708390817791953IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rdata0x360000xb4100xb600a418919d63b67e937555eec95d3b6bcbFalse0.45409083104395603Applesoft BASIC program data, first line number 45.215945456388312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0x420000x247580x1200d8d5c95192b51ddad1857caa38e7daa9False0.4049479166666667data4.078919796039023IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .didat0x670000x1a40x200ee74a17c4eeb586c9811481b77498b43False0.4609375data3.5194570553957747IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0x680000xdff80xe00024f6d0ec8c14a78cfe04f16467fb2928False0.6373465401785714data6.638693022127744IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x760000x255c0x2600699c6b2b1b2acad2d0f219d9328713afFalse0.783203125data6.6660836278877325IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  PNG0x686500xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlacedEnglishUnited States1.0027729636048528
                  PNG0x691980x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlacedEnglishUnited States0.9363390441839495
                  RT_ICON0x6a7480x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.47832369942196534
                  RT_ICON0x6acb00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.5410649819494585
                  RT_ICON0x6b5580xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.4933368869936034
                  RT_ICON0x6c4000x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2834 x 2834 px/mEnglishUnited States0.5390070921985816
                  RT_ICON0x6c8680x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2834 x 2834 px/mEnglishUnited States0.41393058161350843
                  RT_ICON0x6d9100x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2834 x 2834 px/mEnglishUnited States0.3479253112033195
                  RT_ICON0x6feb80x3d71PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9809269502193401
                  RT_DIALOG0x745880x286dataEnglishUnited States0.5092879256965944
                  RT_DIALOG0x743580x13adataEnglishUnited States0.60828025477707
                  RT_DIALOG0x744980xecdataEnglishUnited States0.6991525423728814
                  RT_DIALOG0x742280x12edataEnglishUnited States0.5927152317880795
                  RT_DIALOG0x73ef00x338dataEnglishUnited States0.45145631067961167
                  RT_DIALOG0x73c980x252dataEnglishUnited States0.5757575757575758
                  RT_STRING0x74f680x1e2dataEnglishUnited States0.3900414937759336
                  RT_STRING0x751500x1ccdataEnglishUnited States0.4282608695652174
                  RT_STRING0x753200x1b8dataEnglishUnited States0.45681818181818185
                  RT_STRING0x754d80x146dataEnglishUnited States0.5153374233128835
                  RT_STRING0x756200x46cdataEnglishUnited States0.3454063604240283
                  RT_STRING0x75a900x166dataEnglishUnited States0.49162011173184356
                  RT_STRING0x75bf80x152dataEnglishUnited States0.5059171597633136
                  RT_STRING0x75d500x10adataEnglishUnited States0.49624060150375937
                  RT_STRING0x75e600xbcdataEnglishUnited States0.6329787234042553
                  RT_STRING0x75f200xd6dataEnglishUnited States0.5747663551401869
                  RT_GROUP_ICON0x73c300x68dataEnglishUnited States0.7019230769230769
                  RT_MANIFEST0x748100x753XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3957333333333333
                  DLLImport
                  KERNEL32.dllGetLastError, SetLastError, FormatMessageW, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, CreateDirectoryW, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, GetCurrentProcessId, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, InterlockedDecrement, GetVersionExW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleFileNameW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, LoadResource, SizeofResource, SetCurrentDirectoryW, GetTimeFormatW, GetDateFormatW, LocalFree, GetExitCodeProcess, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetNumberFormatW, DecodePointer, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetOEMCP, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, EncodePointer, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapReAlloc, HeapAlloc, GetStringTypeW, LCMapStringW, FindFirstFileExA, FindNextFileA, IsValidCodePage
                  OLEAUT32.dllSysAllocString, SysFreeString, VariantClear
                  gdiplus.dllGdipAlloc, GdipDisposeImage, GdipCloneImage, GdipCreateBitmapFromStream, GdipCreateBitmapFromStreamICM, GdipCreateHBITMAPFromBitmap, GdiplusStartup, GdiplusShutdown, GdipFree
                  Language of compilation systemCountry where language is spokenMap
                  EnglishUnited States
                  No network behavior found

                  Click to jump to process

                  Click to jump to process

                  Target ID:0
                  Start time:21:25:48
                  Start date:20/04/2025
                  Path:C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\Keys4Us_Office_2024_DE_64Bits.exe"
                  Imagebase:0xe80000
                  File size:2'939'800 bytes
                  MD5 hash:08CA1B53E72FC0E41FDD9A63F3C51577
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:low
                  Has exited:false
                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                  No disassembly