Windows
Analysis Report
Grammarly.Desktop.exe
Overview
General Information
Detection
Score: | 3 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
- System is w10x64
Grammarly.Desktop.exe (PID: 6688 cmdline:
"C:\Users\ user\Deskt op\Grammar ly.Desktop .exe" MD5: E776A040444E7C0EE4701063A3795FD6) WerFault.exe (PID: 5580 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 6 688 -s 700 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0)
- cleanup
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process created: |
Source: | Static PE information: |
Source: | File read: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Process created: | ||
Source: | Process created: |
Source: | Key value queried: | Jump to behavior |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Classification label: |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 1 Virtualization/Sandbox Evasion | OS Credential Dumping | 21 Security Software Discovery | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Data Obfuscation | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Disable or Modify Tools | LSASS Memory | 1 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | 1 Process Injection | Security Account Manager | 12 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | 1 Timestomp | NTDS | 1 Remote System Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse | ||
0% | ReversingLabs |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high |
Joe Sandbox Version: | 34.0.0 Boulder Opal |
Analysis ID: | 576606 |
Start date: | 22.02.2022 |
Start time: | 17:27:46 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 6m 38s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | Grammarly.Desktop.exe |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 21 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean3.winEXE@2/5@0/0 |
EGA Information: | Failed |
HDC Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, a udiodg.exe, BackgroundTransfer Host.exe, WerFault.exe, WMIADA P.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wua pihost.exe - Excluded IPs from analysis (wh
itelisted): 52.168.117.173 - Excluded domains from analysis
(whitelisted): ris.api.iris.m icrosoft.com, onedsblobprdeus1 6.eastus.cloudapp.azure.com, l ogin.live.com, blobcollector.e vents.data.trafficmanager.net, ctldl.windowsupdate.com, disp laycatalog.mp.microsoft.com, i mg-prod-cms-rt-microsoft-com.a kamaized.net, watson.telemetry .microsoft.com, arc.msn.com - Execution Graph export aborted
for target Grammarly.Desktop. exe, PID 6688 because it is em pty - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtSetInformationFile c alls found.
Time | Type | Description |
---|---|---|
17:28:54 | API Interceptor |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.9003876251973331 |
Encrypted: | false |
SSDEEP: | 96:ezFKwuPUeNweI1yzTzzxDi5TzpXIQcQbc6YjecEPcw35n+BHUHZopAnQFdE7dlzg:AruPUiw91Y4H1Z1gayF/u7sCS274lt2 |
MD5: | 3223F015E0FF8A509A188B7299EF7367 |
SHA1: | 92345000925C4B9940A62DF25D5F3C7D06447206 |
SHA-256: | 360577C8CA6B7A38C5240C39E89F31881EFDA0530DA710A226A25E2FCF3A0D45 |
SHA-512: | 29741EB7FDE1E713AF23934B02D42C044819A1E1607C304364660B24EB6EF2E3B7165CD6182F5F1EF16941F57F4D3CBD7FD48E33A25A1FE4E534AE76EE2D13E2 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 245435 |
Entropy (8bit): | 3.35594850930805 |
Encrypted: | false |
SSDEEP: | 3072:Xfdyqg4GvTdGMqKb19eDEF0+M5L68/PZkl9c8Nv5bdF4iL:0q52TdOKQ9/PZib |
MD5: | 5C4E778CCB89C7470428284A88441628 |
SHA1: | A8CBA6C4A3DD7953547F7A92C147A7264F10FA82 |
SHA-256: | 7B232843AE3533C9A7031CC7E4B877774E398A81B3781A4E0E2060C7A5A53635 |
SHA-512: | 5374F2D4B5CF0043B2E4B1EB595E59D03032D87F9881DFFA52E8322A5089212FD3FAE1480FE525E2E89E53EE7E1151017BF1159345168435E8B2136EA7602EDA |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8762 |
Entropy (8bit): | 3.7068705113744995 |
Encrypted: | false |
SSDEEP: | 192:Rrl7r3GLNivLdg6YFjFYgmfs4aSD31HCprK89bXDdfkdm:RrlsNiDdg6YBFYgmfs4aSD3mXZfD |
MD5: | C6C426C5C25F0C63AAD48856C2B15D32 |
SHA1: | 9A395CD9F208F0541FCEA9A52C320C9FD0AE6DB2 |
SHA-256: | 19AB6A45CAAC0C529B7938BF7902247C1E12771DBFB648C5E78FE8DBE0E0F01F |
SHA-512: | 33242B5012B19FCDD04EEF58CC96CFE9E09589A4B33E908460CB488691F7B8253A194FB07FF5EA565345DAE439F9E5DC8627DEE0114154ABFFA968DEAA51F85D |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4746 |
Entropy (8bit): | 4.494169075056896 |
Encrypted: | false |
SSDEEP: | 48:cvIwSD8zsZJgtBI9MCWSC8Bi8fm8M4JdgnNFeuPyq85vgctAJQjHQd:uITfruDSN5JdgFPYgoAJQjHQd |
MD5: | C0F69A6CC1EBFD77128AB6B68E7A510C |
SHA1: | E4EAE698115D409546B4D02F78C13CD68F067FE8 |
SHA-256: | D0B82381ABB4B6F6F66642833768E207EB9C53B4B80B6460E6B8F2A40A3E9E6B |
SHA-512: | 9739E0A338464A252991077942FAA55F1BBEEB0B3D35DA0968E235AA3E365940F04611D0A9DFF4A0215494870BCA67F7CDA4DE062C872825E8E4B72AB34C7F8B |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1572864 |
Entropy (8bit): | 4.270356159744542 |
Encrypted: | false |
SSDEEP: | 12288:/WE0Th312ap8TSP5ve7dcb5GMtzr8VxmoKwPjMQ2ZlPfq+kwX2jeJ:uE0Th312ap8TSPd5 |
MD5: | 27CDE1FA60A7A9A6D8BAF5B432D9ABFC |
SHA1: | 79182FF76DCE44906DE2E0392F25BE11CEEC1F6C |
SHA-256: | 52DF7A0F0A20A2416144DF26270E69167150683C0DAD8AC3DE0E14D432E9DE01 |
SHA-512: | A484F6DC3E08ABC5996BFF7828C20737B8F39FA390ED52B51158D3F20051BA0ABE4CE2F98B2FED1805B6CB68C0DB5E5CDC4EEE1C0E02CC8C319FB0E3BF2D77D8 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 3.219769642892764 |
TrID: |
|
File name: | Grammarly.Desktop.exe |
File size: | 935408 |
MD5: | e776a040444e7c0ee4701063a3795fd6 |
SHA1: | 81e2c5a11f88660f1384b4e00d0896762b575b92 |
SHA256: | a434e9368137f7184040e62035745027ed4772f25b3715be9af0b68025500e50 |
SHA512: | 673291686b48243a71581820f39dc698fe2d4b3319ace82d295da58ea8739be4d9770cfb512ae081e7fcb55bd926f592733944a826b7b4267c062ee87c682d74 |
SSDEEP: | 3072:i203GLV//ulBNPYtHKpDdde9dde5zdeKq8xv:i2032V/e3fQfUpI8h |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0......p......R.... ........@.. ..............................e5....`................................ |
Icon Hash: | f0f0ec54c4c8d070 |
Entrypoint: | 0x49d952 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA |
Time Stamp: | 0x9BDDC3B6 [Tue Nov 12 05:27:18 2052 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | v4.0.30319 |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Signature Valid: | true |
Signature Issuer: | CN=DigiCert SHA2 Assured ID Code Signing CA, OU=www.digicert.com, O=DigiCert Inc, C=US |
Signature Validation Error: | The operation completed successfully |
Error Number: | 0 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 73D2BF9C5E1FC6966F9EDDFA2DA64763 |
Thumbprint SHA-1: | 8AE0165438CED5A689073EDE15757F8067D44DB2 |
Thumbprint SHA-256: | DA20FD8242059F887A47E3C8264EB63BB9B3EC16A22E5BCEA7F6C11B25075BC1 |
Serial: | 0F6FFE34105D3EB08ACA6233E6CE3A82 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x9d8fd | 0x4f | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x9e000 | 0x46cb8 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0xe2c00 | 0x19f0 | .rsrc |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xe6000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x9d828 | 0x38 | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x9b958 | 0x9ba00 | False | 0.0812170557229 | data | 3.31800190489 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
.rsrc | 0x9e000 | 0x46cb8 | 0x46e00 | False | 0.0445636298501 | data | 2.77396688236 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xe6000 | 0xc | 0x200 | False | 0.044921875 | data | 0.101910425663 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
RT_ICON | 0x9e160 | 0x468 | GLS_BINARY_LSB_FIRST | ||
RT_ICON | 0x9e5d8 | 0x10a8 | data | ||
RT_ICON | 0x9f690 | 0x25a8 | data | ||
RT_ICON | 0xa1c48 | 0x42028 | data | ||
RT_GROUP_ICON | 0xe3c80 | 0x3e | data | ||
RT_VERSION | 0xe3cd0 | 0x388 | data | ||
RT_MANIFEST | 0xe4068 | 0xc49 | XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Description | Data |
---|---|
Translation | 0x0000 0x04b0 |
LegalCopyright | Copyright 2009-2021 Grammarly Inc. |
Assembly Version | 1.0.3.145 |
InternalName | Grammarly.Desktop.exe |
FileVersion | 1.0.3.145 |
CompanyName | |
LegalTrademarks | |
Comments | |
ProductName | Grammarly for Windows |
ProductVersion | 1.0.3.145 |
FileDescription | Grammarly |
OriginalFilename | Grammarly.Desktop.exe |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 17:28:43 |
Start date: | 22/02/2022 |
Path: | C:\Users\user\Desktop\Grammarly.Desktop.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x23ed65f0000 |
File size: | 935408 bytes |
MD5 hash: | E776A040444E7C0EE4701063A3795FD6 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Reputation: | low |
Target ID: | 6 |
Start time: | 17:28:48 |
Start date: | 22/02/2022 |
Path: | C:\Windows\System32\WerFault.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff662520000 |
File size: | 494488 bytes |
MD5 hash: | 2AFFE478D86272288BBEF5A00BBEF6A0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Reputation: | high |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |