Windows
Analysis Report
licensecrawler_setup.exe
Overview
General Information
Detection
Score: | 12 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 60% |
Signatures
Classification
Analysis Advice
Sample drops PE files which have not been started, submit dropped PE samples for a secondary analysis to Joe Sandbox |
Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--") |
- System is w10x64
licensecrawler_setup.exe (PID: 6140 cmdline:
C:\Users\u ser\Deskto p\licensec rawler_set up.exe MD5: E7127C35FD5B4F803C83CE6CCEC56B89) licensecrawler_setup.tmp (PID: 6124 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-JON DA.tmp\lic ensecrawle r_setup.tm p" /SL5="$ 802D4,2247 177,721408 ,C:\Users\ user\Deskt op\license crawler_se tup.exe" MD5: 84DB4B4205F705DA71471DC6ECC061F5)
- cleanup
- • Compliance
- • Networking
- • System Summary
- • Data Obfuscation
- • Persistence and Installation Behavior
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Language, Device and Operating System Detection
Click to jump to signature section
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | LNK file: |
Source: | File created: | Jump to behavior |
Source: | Binary or memory string: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | String found in binary or memory: |
Source: | Classification label: |
Source: | Key value created or modified: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Key value created or modified: | Jump to behavior |
Source: | Automated click: | ||
Source: | Automated click: | ||
Source: | Automated click: | ||
Source: | Automated click: |
Source: | Window found: | Jump to behavior |
Source: | Window detected: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | Process information queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | 12 Command and Scripting Interpreter | Path Interception | 1 Process Injection | 22 Masquerading | OS Credential Dumping | 1 Security Software Discovery | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Data Obfuscation | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Process Injection | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | 1 Deobfuscate/Decode Files or Information | Security Account Manager | 2 System Owner/User Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Binary Padding | NTDS | 1 File and Directory Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | 11 System Information Discovery | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
1% | Virustotal | Browse | ||
4% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs | |||
0% | ReversingLabs | |||
4% | ReversingLabs | |||
4% | ReversingLabs | |||
0% | ReversingLabs | |||
0% | ReversingLabs | |||
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
Joe Sandbox Version: | 36.0.0 Rainbow Opal |
Analysis ID: | 753927 |
Start date and time: | 2022-11-25 16:26:13 +01:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 5m 9s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | licensecrawler_setup.exe |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 13 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean12.winEXE@3/48@0/0 |
EGA Information: | Failed |
HDC Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, S grmBroker.exe, conhost.exe, sv chost.exe - Excluded domains from analysis
(whitelisted): fs.microsoft.c om - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtOpenKeyEx calls foun d. - Report size getting too big, t
oo many NtQueryValueKey calls found.
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\is-V7MGQ.tmp\_isetup\_setup64.tmp | Get hash | malicious | Browse | ||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 3323 |
Entropy (8bit): | 5.914618261220392 |
Encrypted: | false |
SSDEEP: | 48:Q6ZVcMWLIf4zQmAiiU+osf5i5KYSm1pf1mq8s7PWz0dYIzT2o/2g1hP/fBZQeD2s:tZVcVLGm8dLs7smT2Q+m |
MD5: | 7D07F52A2A01910EB855B76CD53AAD59 |
SHA1: | A39DAF444F21440ADE97D2AC6B1333345289BBE3 |
SHA-256: | 09352FB761F19F077FC9BD59EFE868689853368C97CC0ED47444C190B4972886 |
SHA-512: | D9E1A2C7597FB8D07016FD153C56ED9A4E9D7D98456FB9EB0172E167488EB64743E6A4840FE63D08279894CF457A2344E19CC0FDCE94550323DF73D96544365F |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 2700 |
Entropy (8bit): | 6.4305364922450154 |
Encrypted: | false |
SSDEEP: | 48:QATsa2L4AI8u9aydPIyoznSJqaz9Bf/deE1W1S0oLESjvUUzaeCu1GC:NsavA6aEeSJq20AES1epuoC |
MD5: | 4282FF7E302DF8B4A0E245A3B36C279C |
SHA1: | 3FD6228D105D780D45B03D55ED68304FE7F8BB1B |
SHA-256: | 1DC0D1CEBFA30BEE5542B1C62D98B52060C83279AFDDC6836640A95A30B06566 |
SHA-512: | D268F8817256C666FB41846AF9E480E613629C4F4469E420F9170595B00ED42714D3E268808D7D19DB48A73EC16C45FA6BC161CBEEA9EB877AAA952ED0678961 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 12596 |
Entropy (8bit): | 5.441638251755029 |
Encrypted: | false |
SSDEEP: | 192:kohtoouCbfSKtzw9tzwKbZErEg0kQkTkI5CPtf2uis2Nkh+8AE7iHGhDpTJT/rQ2:kqai36R+DGtTuUiHG/tTcIT |
MD5: | 39E578C14C814A1812E95D41BAA785FE |
SHA1: | FF3B00DFBB9EA11E7718D6BA9A2C993513187A6D |
SHA-256: | F50142DEFFA6954BA54EECD19665F0DAD04F940A7AF9463069A08CDE7AE45552 |
SHA-512: | 8A477C2DDFAAD05F90D0EF2C1DEDED199EEDE9FD7E600E17F487DFA23635325684970B8459B844B37FE4BDA317AA45A8AE6F4EB8F1A1C659C2A9944DF24BB09A |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 5.4858142408234984 |
Encrypted: | false |
SSDEEP: | 48:6x05LfmBbz8El/USAY0r2i1C1ewY7Uf2D2ijc1:6y5LfmR8Y/KXh7Uf2VQ1 |
MD5: | 2C7A9CF960AC8763046DD18A61DC1D82 |
SHA1: | 917DBB2870EB0133914115D94C79CB0B4AE37EA2 |
SHA-256: | C4137FACFB7EEE4FF6CF91A5210B313F7C44D944942F5E7D5331582D353DFDD7 |
SHA-512: | 9E6B31C68483A51A2E08D0CC37CA96D1CCA49EF4F1B7076CCC51C777A665A22B1698A65BEAFC296142937C0A68F88F669A6945EF7B7B7410D34DBC7705F7EEE7 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 4549 |
Entropy (8bit): | 5.431604538714182 |
Encrypted: | false |
SSDEEP: | 48:QRirIlTBWTpLARyF1YKH5SthGxItFiDxavbJhgKUQbSIL/IA2i1N1VI3cMdYIzT3:qiYTBWuOZStMx4Oa9QQr6cBmT2QHWWj |
MD5: | 8BE2996EFB53E0DBFED3EE25BF4E0844 |
SHA1: | 19C628CC817E6EB3F8904CD254A996EF164B0D46 |
SHA-256: | 42407721E119EC66C6A644E11AA08BA18E290732EDC9BD11C391D92A0144C07D |
SHA-512: | 181C7162B44F53403198C85179F8E94A2145C2D84687871A4E6B4DE5C5078893C211934644F8CB919B259DF99F2583351B0A8664118734A648387B52F88B1C53 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 14417 |
Entropy (8bit): | 5.393111287798899 |
Encrypted: | false |
SSDEEP: | 192:nAoWy5xEidZrZ75OGTdlpBs8vxgXBvlwWIEoWuQHtssFv1Wne0z5LY5m:AUvJ5OCL27TgQH1a |
MD5: | 4CB21FD558091782110C493BDFB49177 |
SHA1: | 78D9F97B3D5BD097296A8412557C090783920652 |
SHA-256: | 529695C4C6DC098EE4493FA589EA87D08E2C18099F4779ACBA4FFC0006138121 |
SHA-512: | 31D60368325CD4E3CE3D7C15571F205270C95FD154AEA375BB0A68ED3497EF1AE2EC82A9CADF5C87248D73D556E58FC8A9B98BC3BC4D9D6B56346BF6FE17EDB3 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 9697 |
Entropy (8bit): | 5.470321147197518 |
Encrypted: | false |
SSDEEP: | 192:CV8AA/RxDnOlpP6GWPGlcB3/xEnqRn4xGSfSB6xK/XHUcqpHz:K8r1nOlpyrhB3lR4xaB6xKqpT |
MD5: | A5C3AFDE2B1043EDC740DFE04C2BF78A |
SHA1: | A1019425DD4F515B13D6C6DF300295826BC6479C |
SHA-256: | 699A77A6589415B014060D69A8DBD6FB70CD2E4864395C40F00A3961F691FEB5 |
SHA-512: | 5886A454076CC5AB1D1595405C67FD6BE04C42E18E4BAE7B21E912ABF5C1551BE313817FB8F47437F8544868CA8F8FC9D68258FB23D9A0FCEA250C1410B7172D |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 6411 |
Entropy (8bit): | 5.438413582325186 |
Encrypted: | false |
SSDEEP: | 192:qXodnk9FBf/azOEnuN5DJSh2oW9ubTlybpx:q59FBaz7ush2mTEb7 |
MD5: | 1C0D04C7D13ED6BD15CA90E9A7F0F422 |
SHA1: | F56F19A2647751889F1E73456219F1AC77690466 |
SHA-256: | DC7E0DC1758546DB3FDD937519FDE99CAEE7A91EF9842D23F1D99906F2FA27FA |
SHA-512: | 996D4DDF892E5242A5380613010E45815920C4798E69FE84942E6678C1953BF32C04F5250B70AF765C963ABDB31A3C1E2F4DB56C9010A60871740037D50A2F8D |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 2816 |
Entropy (8bit): | 5.699138169490688 |
Encrypted: | false |
SSDEEP: | 48:QBtUh79BdvsU8cQU+SS27e+Cc1k1/ZC4yMI3Qb/W/UFDRfc2:sKh79B97f54Y4rFfH |
MD5: | 486719572DDB2CE6BBFBDE65BEB415AD |
SHA1: | 95B9A31AFDF80039FED7373F1911A2B93B89528B |
SHA-256: | CBD4BCFA643CD22430FD0C7EBE89BECBCAB2EEABEC10995C452B6DB68F18FFAC |
SHA-512: | 4AF52006B5BBCC1AF9D05BBF49202ED8C89B14330908D518A68BDCCC55BF8E8FF5740B1A1595CB78F85E9E7BB48EBCD711CA0369A6A98C4829565BAF5AD2E635 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 5921 |
Entropy (8bit): | 5.329619776648303 |
Encrypted: | false |
SSDEEP: | 96:haiOI9GyhAb8qOCBOk5wDqmMhJgJPbXUO/V5mzEc3va7x0QmT2Qlo52:h3O4qOCBO7qmM8JPjU25mz0GQmT2n2 |
MD5: | 6E3A4564A97FFAC7EE61CDB33F3F0629 |
SHA1: | 5D74FE98AE636AFC05CE2DDE01BE5E5AFED76064 |
SHA-256: | B571ADDF0D5D8C9C931398D59B8E7CF13794B7C43864008BBAC762E4A3B32BE3 |
SHA-512: | D85CF064153AEB0C8C98A78AB11A183FDA8E1CF57205C014AEE0BA5011BABC12F6C146532B6F1FD1AF70BF9638A1138307F2522E74253E2A2C5D4ABD4189AE3D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 5260 |
Entropy (8bit): | 6.213140969038756 |
Encrypted: | false |
SSDEEP: | 96:N84mYnl367V4hDHEM/phvFSQoIUx4xgAuyUvnVfKhcG2QZeYZM:NqANfVUqxgNfQhR2sM |
MD5: | 86B5A98BEEE186AE79CC9E064514BAB8 |
SHA1: | D06347B735998229AA0EC44797A23481EF71533F |
SHA-256: | 12C07BE9700841E07FB8D24C274FFFB51B88ABBCC77C5391B8B1D47234F97582 |
SHA-512: | C0144C4E4149117A5AFDB1DA14E5176A1D22E682917F4856FE8225575654E46CC2CE6FAE8F7F8E4ECC5C3695A180B5DD9E0F16AE975845A7A6FF6086ECC53703 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 1115416 |
Entropy (8bit): | 5.754014151164735 |
Encrypted: | false |
SSDEEP: | 24576:GKbHrqj7wgMFeu5N/Uo8vsHbYrOXkYjsuer:dHrqj7y8mNhkYjsug |
MD5: | 5B7AD92F6EE50DF4134111EC3C652A24 |
SHA1: | EEDAD711FB3938F56B6C922B7AE28E33B2CFD092 |
SHA-256: | C0115B092F17D8356E957DD83FA7DFB8722D26097318FDF33640119CDF25B522 |
SHA-512: | 150CDF518A162D74E58487D8CA5C51A264D417F0E0A04957885E578EBA4AC0C8468405BD702D58493F6F63D5D2840CB23306A1542718AFDDC009661FB67F58D1 |
Malicious: | false |
Antivirus: |
|
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 93 |
Entropy (8bit): | 4.751750081650309 |
Encrypted: | false |
SSDEEP: | 3:XvMPAXtE/hEr3IlDBlv+GhxLE2ovktX7vn:k4XtEheIZHxrLEX+7v |
MD5: | 16C6D14345F1192FDCDC7D534F3AFB73 |
SHA1: | 77802A521D8C9EEF1CC8333C9DAAB4C49CEF1448 |
SHA-256: | 6B4491161B46F7BABD33A79139411EB909F8AD1BA52834F788A18AD1F7C9EDE1 |
SHA-512: | 24678FFDAE562593BD80F81AE2578F0C103FD0172A712BE3FD5A7FC3B83BF2C084013AD09F5818BCE0535FA32062B76FC2E6EF130C13E87283E594A84A0ECF7B |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 2622 |
Entropy (8bit): | 5.533186227439477 |
Encrypted: | false |
SSDEEP: | 48:QzYmPIrVIStT2qy2i1N1VqKSdAqSa7YB26Kkb1:0YmQrVJiqS0Y9KK1 |
MD5: | 57BE0CA4AC5B2FDEF75690BC6575071D |
SHA1: | 7A815809E67EEE38D825F5F98F5AB1414D25F097 |
SHA-256: | B2D06B0860EB329B53A9C07F4FB50E7D2C4B38CAF28D8D1FE89E3E5120D5F820 |
SHA-512: | 59A86FE7783B6AAECE3420E731F48FD5E97A19A52D6D3E50813B1A2EC11DA164EC04ECAD228E512DE17186B7FCA108B0AF387EAF0CAD3D616B990E2A0C2416D5 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 13640 |
Entropy (8bit): | 6.129876438496049 |
Encrypted: | false |
SSDEEP: | 192:4KGdfV7nyFgS+rEou/YuwhvvCA/TVwg0IDxefGLaNRNtU/OAtHvMb2t7QaDy:4KipnmoaTwhiuzpERbT |
MD5: | E236F04597FBA91F069220326E0CCA6F |
SHA1: | 3D9801A36A39B429C17583F8763E3F012AD5E1E1 |
SHA-256: | A3D7484AAC7550A887C2004B9298D3092CB6FDF995A9C7463979005D40737491 |
SHA-512: | 7CBE4ECD4E45A81974057B1C7FA33386126EC9A326DAE7F952911982BE3D4569188AFFAC61FA50DB92505290BA76A852D7220EFEDA07544687BA4BAE6187409E |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 5644 |
Entropy (8bit): | 3.8452954437582942 |
Encrypted: | false |
SSDEEP: | 96:rahfXYsnf7GuPcEdI9Xgn9lasqwepBVjuecOXlDOQgeOR32Soh5H2dppuuO0AONN:GhfTxPcsI9XArxjepBVjuecOXlDOQge0 |
MD5: | 5727841E55989227C74D2213C30564FE |
SHA1: | A97E08AFCD84BF2EA420AAD9A94FAF3E720F9AFF |
SHA-256: | 0473480ED58B378558A94F68E69D03F33E16C563523D6DB3BD0E1B20B24C0790 |
SHA-512: | 1E2E5DCF25DA0D97E6EC6388BFD9A6EF2F652FF51F572CE70E3401F5C3386E17A2A322C0C82DD749B395C9D3E2F759F88171747A1BD577149F15237A1F620E86 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 2623 |
Entropy (8bit): | 5.507897835463148 |
Encrypted: | false |
SSDEEP: | 48:QF86L3ARLQ2BMUmyMxoIc3cydy111bFdDVpVCdz4AmC8sKzf2DJrWuf1:p67ARQ2HmyMaOVHcdMr2JrWO1 |
MD5: | 49046F6685E950324DCD0C155DB5B341 |
SHA1: | BCB9963280C962C3629A494FC9E041CD2C573481 |
SHA-256: | B80E6817F5BCD0BF202CD791CCCAFE72362A655D447EF24293CFF33B75B44F56 |
SHA-512: | 701A0A240ADBC6253F19D3B0EAB168735857F8E027FA8171E92AFD59177B05E91C09DA4DDA8F08B34AB22A071473CBBC6CD11B72650C39178E57ACDB7AF9F235 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 2538 |
Entropy (8bit): | 5.6217069335888015 |
Encrypted: | false |
SSDEEP: | 48:QKBDoPFrr8NFFD0wvQfdh6MdSiPLiB1n1H4RqjRaJ49FfH6V1:/o9rr8ZD0wv+hho4AUJ8FPI1 |
MD5: | E2A4B35936E18471635C27E23C5EB8B8 |
SHA1: | DAB1D3C5E637FEC27F8FDA04FF2F782DA54E229C |
SHA-256: | B56643690505932653872CE93AC3FDFCC8133C2C7E616DEFE61E1AEC9415FBD9 |
SHA-512: | 8C8460D28B14A283FB216DC0F5C1607AFF30461602E5AA6FE0B4A00AE01CBA390630AEB6D1C7FAA3DB11863B8F5038E7317956CD8366A6984848EB4FD9DCA4DF |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 2348 |
Entropy (8bit): | 6.369098970659711 |
Encrypted: | false |
SSDEEP: | 48:QFYSCsRG3Kj454XLlvaMXLZe1i1bW0jK29Zp1:YYPsdj24XM0e29Zp1 |
MD5: | 56D9432406AFE6A13D3E5D11DC7DBAB5 |
SHA1: | 65A29E52518916B2A7A154263C08BC4ACA0F6DDB |
SHA-256: | A3C9575B34F51B106CB843ED104D7477EA90DBA62B3076F2F3677061775394A6 |
SHA-512: | CA6066A64C5865F5CE5CF11892255F59F8CEE043923AEB63D0136BBC84C26B4304536DDEDDD0551F9F5F0BBCD4B3E3F44619790EC0A444EB73BC094E35B0DE8D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 2622 |
Entropy (8bit): | 5.533186227439477 |
Encrypted: | false |
SSDEEP: | 48:QzYmPIrVIStT2qy2i1N1VqKSdAqSa7YB26Kkb1:0YmQrVJiqS0Y9KK1 |
MD5: | 57BE0CA4AC5B2FDEF75690BC6575071D |
SHA1: | 7A815809E67EEE38D825F5F98F5AB1414D25F097 |
SHA-256: | B2D06B0860EB329B53A9C07F4FB50E7D2C4B38CAF28D8D1FE89E3E5120D5F820 |
SHA-512: | 59A86FE7783B6AAECE3420E731F48FD5E97A19A52D6D3E50813B1A2EC11DA164EC04ECAD228E512DE17186B7FCA108B0AF387EAF0CAD3D616B990E2A0C2416D5 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 12596 |
Entropy (8bit): | 5.441638251755029 |
Encrypted: | false |
SSDEEP: | 192:kohtoouCbfSKtzw9tzwKbZErEg0kQkTkI5CPtf2uis2Nkh+8AE7iHGhDpTJT/rQ2:kqai36R+DGtTuUiHG/tTcIT |
MD5: | 39E578C14C814A1812E95D41BAA785FE |
SHA1: | FF3B00DFBB9EA11E7718D6BA9A2C993513187A6D |
SHA-256: | F50142DEFFA6954BA54EECD19665F0DAD04F940A7AF9463069A08CDE7AE45552 |
SHA-512: | 8A477C2DDFAAD05F90D0EF2C1DEDED199EEDE9FD7E600E17F487DFA23635325684970B8459B844B37FE4BDA317AA45A8AE6F4EB8F1A1C659C2A9944DF24BB09A |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 5.4858142408234984 |
Encrypted: | false |
SSDEEP: | 48:6x05LfmBbz8El/USAY0r2i1C1ewY7Uf2D2ijc1:6y5LfmR8Y/KXh7Uf2VQ1 |
MD5: | 2C7A9CF960AC8763046DD18A61DC1D82 |
SHA1: | 917DBB2870EB0133914115D94C79CB0B4AE37EA2 |
SHA-256: | C4137FACFB7EEE4FF6CF91A5210B313F7C44D944942F5E7D5331582D353DFDD7 |
SHA-512: | 9E6B31C68483A51A2E08D0CC37CA96D1CCA49EF4F1B7076CCC51C777A665A22B1698A65BEAFC296142937C0A68F88F669A6945EF7B7B7410D34DBC7705F7EEE7 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 13640 |
Entropy (8bit): | 6.129876438496049 |
Encrypted: | false |
SSDEEP: | 192:4KGdfV7nyFgS+rEou/YuwhvvCA/TVwg0IDxefGLaNRNtU/OAtHvMb2t7QaDy:4KipnmoaTwhiuzpERbT |
MD5: | E236F04597FBA91F069220326E0CCA6F |
SHA1: | 3D9801A36A39B429C17583F8763E3F012AD5E1E1 |
SHA-256: | A3D7484AAC7550A887C2004B9298D3092CB6FDF995A9C7463979005D40737491 |
SHA-512: | 7CBE4ECD4E45A81974057B1C7FA33386126EC9A326DAE7F952911982BE3D4569188AFFAC61FA50DB92505290BA76A852D7220EFEDA07544687BA4BAE6187409E |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 2623 |
Entropy (8bit): | 5.507897835463148 |
Encrypted: | false |
SSDEEP: | 48:QF86L3ARLQ2BMUmyMxoIc3cydy111bFdDVpVCdz4AmC8sKzf2DJrWuf1:p67ARQ2HmyMaOVHcdMr2JrWO1 |
MD5: | 49046F6685E950324DCD0C155DB5B341 |
SHA1: | BCB9963280C962C3629A494FC9E041CD2C573481 |
SHA-256: | B80E6817F5BCD0BF202CD791CCCAFE72362A655D447EF24293CFF33B75B44F56 |
SHA-512: | 701A0A240ADBC6253F19D3B0EAB168735857F8E027FA8171E92AFD59177B05E91C09DA4DDA8F08B34AB22A071473CBBC6CD11B72650C39178E57ACDB7AF9F235 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 1115416 |
Entropy (8bit): | 5.754014151164735 |
Encrypted: | false |
SSDEEP: | 24576:GKbHrqj7wgMFeu5N/Uo8vsHbYrOXkYjsuer:dHrqj7y8mNhkYjsug |
MD5: | 5B7AD92F6EE50DF4134111EC3C652A24 |
SHA1: | EEDAD711FB3938F56B6C922B7AE28E33B2CFD092 |
SHA-256: | C0115B092F17D8356E957DD83FA7DFB8722D26097318FDF33640119CDF25B522 |
SHA-512: | 150CDF518A162D74E58487D8CA5C51A264D417F0E0A04957885E578EBA4AC0C8468405BD702D58493F6F63D5D2840CB23306A1542718AFDDC009661FB67F58D1 |
Malicious: | false |
Antivirus: |
|
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 5644 |
Entropy (8bit): | 3.8452954437582942 |
Encrypted: | false |
SSDEEP: | 96:rahfXYsnf7GuPcEdI9Xgn9lasqwepBVjuecOXlDOQgeOR32Soh5H2dppuuO0AONN:GhfTxPcsI9XArxjepBVjuecOXlDOQge0 |
MD5: | 5727841E55989227C74D2213C30564FE |
SHA1: | A97E08AFCD84BF2EA420AAD9A94FAF3E720F9AFF |
SHA-256: | 0473480ED58B378558A94F68E69D03F33E16C563523D6DB3BD0E1B20B24C0790 |
SHA-512: | 1E2E5DCF25DA0D97E6EC6388BFD9A6EF2F652FF51F572CE70E3401F5C3386E17A2A322C0C82DD749B395C9D3E2F759F88171747A1BD577149F15237A1F620E86 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 9697 |
Entropy (8bit): | 5.470321147197518 |
Encrypted: | false |
SSDEEP: | 192:CV8AA/RxDnOlpP6GWPGlcB3/xEnqRn4xGSfSB6xK/XHUcqpHz:K8r1nOlpyrhB3lR4xaB6xKqpT |
MD5: | A5C3AFDE2B1043EDC740DFE04C2BF78A |
SHA1: | A1019425DD4F515B13D6C6DF300295826BC6479C |
SHA-256: | 699A77A6589415B014060D69A8DBD6FB70CD2E4864395C40F00A3961F691FEB5 |
SHA-512: | 5886A454076CC5AB1D1595405C67FD6BE04C42E18E4BAE7B21E912ABF5C1551BE313817FB8F47437F8544868CA8F8FC9D68258FB23D9A0FCEA250C1410B7172D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 2558939 |
Entropy (8bit): | 6.362256284615226 |
Encrypted: | false |
SSDEEP: | 49152:og2qPtc1e5OS7bPGoUl+x/grN4azvchYk2Fz:ovqPCnrN4azvSYt |
MD5: | 68A6B99EDFA9BC00765A964F44A684CA |
SHA1: | E42957C80F03AE93C9A4E2E415B5D1DEE8F45BCA |
SHA-256: | 42335AFF80ACD75376B9FF9096ADC40DA948ADF729ADC85DCBE6B78ECC0E5294 |
SHA-512: | B79CDDD8D3A574360DCD923FCFBF344CC63EC4B415463180F9648D67A97A83F52E236E3189A28F866D8C9FE20FEF46367F3DF304F728B58D1A11280C90C9C104 |
Malicious: | false |
Antivirus: |
|
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 2348 |
Entropy (8bit): | 6.369098970659711 |
Encrypted: | false |
SSDEEP: | 48:QFYSCsRG3Kj454XLlvaMXLZe1i1bW0jK29Zp1:YYPsdj24XM0e29Zp1 |
MD5: | 56D9432406AFE6A13D3E5D11DC7DBAB5 |
SHA1: | 65A29E52518916B2A7A154263C08BC4ACA0F6DDB |
SHA-256: | A3C9575B34F51B106CB843ED104D7477EA90DBA62B3076F2F3677061775394A6 |
SHA-512: | CA6066A64C5865F5CE5CF11892255F59F8CEE043923AEB63D0136BBC84C26B4304536DDEDDD0551F9F5F0BBCD4B3E3F44619790EC0A444EB73BC094E35B0DE8D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 14417 |
Entropy (8bit): | 5.393111287798899 |
Encrypted: | false |
SSDEEP: | 192:nAoWy5xEidZrZ75OGTdlpBs8vxgXBvlwWIEoWuQHtssFv1Wne0z5LY5m:AUvJ5OCL27TgQH1a |
MD5: | 4CB21FD558091782110C493BDFB49177 |
SHA1: | 78D9F97B3D5BD097296A8412557C090783920652 |
SHA-256: | 529695C4C6DC098EE4493FA589EA87D08E2C18099F4779ACBA4FFC0006138121 |
SHA-512: | 31D60368325CD4E3CE3D7C15571F205270C95FD154AEA375BB0A68ED3497EF1AE2EC82A9CADF5C87248D73D556E58FC8A9B98BC3BC4D9D6B56346BF6FE17EDB3 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 2813 |
Entropy (8bit): | 4.88908179064068 |
Encrypted: | false |
SSDEEP: | 48:3k2EvdD2EXMhEKsTuemYA1v6vIqUI2KcA:3+WimT+vJ |
MD5: | 79E18BC8A432F6625CBE4ECA5210AF1F |
SHA1: | F16A870D5525A84AA7C99E5270ECA7B868D3EAF6 |
SHA-256: | FD5033AA98700CE869BB02D9BE2145CCF079D41A57F20D4AF1E5FBFCD4153452 |
SHA-512: | F4E22B97D7B96F54A0F0FE4675521ADB1B08F5B8687BFA39585C5AE97B4AEECEEDA834790C8B49E6CD091EC0374E286BEFB7A786AC49A33BE9379AC8433EDB76 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 6411 |
Entropy (8bit): | 5.438413582325186 |
Encrypted: | false |
SSDEEP: | 192:qXodnk9FBf/azOEnuN5DJSh2oW9ubTlybpx:q59FBaz7ush2mTEb7 |
MD5: | 1C0D04C7D13ED6BD15CA90E9A7F0F422 |
SHA1: | F56F19A2647751889F1E73456219F1AC77690466 |
SHA-256: | DC7E0DC1758546DB3FDD937519FDE99CAEE7A91EF9842D23F1D99906F2FA27FA |
SHA-512: | 996D4DDF892E5242A5380613010E45815920C4798E69FE84942E6678C1953BF32C04F5250B70AF765C963ABDB31A3C1E2F4DB56C9010A60871740037D50A2F8D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 3323 |
Entropy (8bit): | 5.914618261220392 |
Encrypted: | false |
SSDEEP: | 48:Q6ZVcMWLIf4zQmAiiU+osf5i5KYSm1pf1mq8s7PWz0dYIzT2o/2g1hP/fBZQeD2s:tZVcVLGm8dLs7smT2Q+m |
MD5: | 7D07F52A2A01910EB855B76CD53AAD59 |
SHA1: | A39DAF444F21440ADE97D2AC6B1333345289BBE3 |
SHA-256: | 09352FB761F19F077FC9BD59EFE868689853368C97CC0ED47444C190B4972886 |
SHA-512: | D9E1A2C7597FB8D07016FD153C56ED9A4E9D7D98456FB9EB0172E167488EB64743E6A4840FE63D08279894CF457A2344E19CC0FDCE94550323DF73D96544365F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 2700 |
Entropy (8bit): | 6.4305364922450154 |
Encrypted: | false |
SSDEEP: | 48:QATsa2L4AI8u9aydPIyoznSJqaz9Bf/deE1W1S0oLESjvUUzaeCu1GC:NsavA6aEeSJq20AES1epuoC |
MD5: | 4282FF7E302DF8B4A0E245A3B36C279C |
SHA1: | 3FD6228D105D780D45B03D55ED68304FE7F8BB1B |
SHA-256: | 1DC0D1CEBFA30BEE5542B1C62D98B52060C83279AFDDC6836640A95A30B06566 |
SHA-512: | D268F8817256C666FB41846AF9E480E613629C4F4469E420F9170595B00ED42714D3E268808D7D19DB48A73EC16C45FA6BC161CBEEA9EB877AAA952ED0678961 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 2538 |
Entropy (8bit): | 5.6217069335888015 |
Encrypted: | false |
SSDEEP: | 48:QKBDoPFrr8NFFD0wvQfdh6MdSiPLiB1n1H4RqjRaJ49FfH6V1:/o9rr8ZD0wv+hho4AUJ8FPI1 |
MD5: | E2A4B35936E18471635C27E23C5EB8B8 |
SHA1: | DAB1D3C5E637FEC27F8FDA04FF2F782DA54E229C |
SHA-256: | B56643690505932653872CE93AC3FDFCC8133C2C7E616DEFE61E1AEC9415FBD9 |
SHA-512: | 8C8460D28B14A283FB216DC0F5C1607AFF30461602E5AA6FE0B4A00AE01CBA390630AEB6D1C7FAA3DB11863B8F5038E7317956CD8366A6984848EB4FD9DCA4DF |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 5260 |
Entropy (8bit): | 6.213140969038756 |
Encrypted: | false |
SSDEEP: | 96:N84mYnl367V4hDHEM/phvFSQoIUx4xgAuyUvnVfKhcG2QZeYZM:NqANfVUqxgNfQhR2sM |
MD5: | 86B5A98BEEE186AE79CC9E064514BAB8 |
SHA1: | D06347B735998229AA0EC44797A23481EF71533F |
SHA-256: | 12C07BE9700841E07FB8D24C274FFFB51B88ABBCC77C5391B8B1D47234F97582 |
SHA-512: | C0144C4E4149117A5AFDB1DA14E5176A1D22E682917F4856FE8225575654E46CC2CE6FAE8F7F8E4ECC5C3695A180B5DD9E0F16AE975845A7A6FF6086ECC53703 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 93 |
Entropy (8bit): | 4.751750081650309 |
Encrypted: | false |
SSDEEP: | 3:XvMPAXtE/hEr3IlDBlv+GhxLE2ovktX7vn:k4XtEheIZHxrLEX+7v |
MD5: | 16C6D14345F1192FDCDC7D534F3AFB73 |
SHA1: | 77802A521D8C9EEF1CC8333C9DAAB4C49CEF1448 |
SHA-256: | 6B4491161B46F7BABD33A79139411EB909F8AD1BA52834F788A18AD1F7C9EDE1 |
SHA-512: | 24678FFDAE562593BD80F81AE2578F0C103FD0172A712BE3FD5A7FC3B83BF2C084013AD09F5818BCE0535FA32062B76FC2E6EF130C13E87283E594A84A0ECF7B |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 4549 |
Entropy (8bit): | 5.431604538714182 |
Encrypted: | false |
SSDEEP: | 48:QRirIlTBWTpLARyF1YKH5SthGxItFiDxavbJhgKUQbSIL/IA2i1N1VI3cMdYIzT3:qiYTBWuOZStMx4Oa9QQr6cBmT2QHWWj |
MD5: | 8BE2996EFB53E0DBFED3EE25BF4E0844 |
SHA1: | 19C628CC817E6EB3F8904CD254A996EF164B0D46 |
SHA-256: | 42407721E119EC66C6A644E11AA08BA18E290732EDC9BD11C391D92A0144C07D |
SHA-512: | 181C7162B44F53403198C85179F8E94A2145C2D84687871A4E6B4DE5C5078893C211934644F8CB919B259DF99F2583351B0A8664118734A648387B52F88B1C53 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 5921 |
Entropy (8bit): | 5.329619776648303 |
Encrypted: | false |
SSDEEP: | 96:haiOI9GyhAb8qOCBOk5wDqmMhJgJPbXUO/V5mzEc3va7x0QmT2Qlo52:h3O4qOCBO7qmM8JPjU25mz0GQmT2n2 |
MD5: | 6E3A4564A97FFAC7EE61CDB33F3F0629 |
SHA1: | 5D74FE98AE636AFC05CE2DDE01BE5E5AFED76064 |
SHA-256: | B571ADDF0D5D8C9C931398D59B8E7CF13794B7C43864008BBAC762E4A3B32BE3 |
SHA-512: | D85CF064153AEB0C8C98A78AB11A183FDA8E1CF57205C014AEE0BA5011BABC12F6C146532B6F1FD1AF70BF9638A1138307F2522E74253E2A2C5D4ABD4189AE3D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 2816 |
Entropy (8bit): | 5.699138169490688 |
Encrypted: | false |
SSDEEP: | 48:QBtUh79BdvsU8cQU+SS27e+Cc1k1/ZC4yMI3Qb/W/UFDRfc2:sKh79B97f54Y4rFfH |
MD5: | 486719572DDB2CE6BBFBDE65BEB415AD |
SHA1: | 95B9A31AFDF80039FED7373F1911A2B93B89528B |
SHA-256: | CBD4BCFA643CD22430FD0C7EBE89BECBCAB2EEABEC10995C452B6DB68F18FFAC |
SHA-512: | 4AF52006B5BBCC1AF9D05BBF49202ED8C89B14330908D518A68BDCCC55BF8E8FF5740B1A1595CB78F85E9E7BB48EBCD711CA0369A6A98C4829565BAF5AD2E635 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 2813 |
Entropy (8bit): | 4.88908179064068 |
Encrypted: | false |
SSDEEP: | 48:3k2EvdD2EXMhEKsTuemYA1v6vIqUI2KcA:3+WimT+vJ |
MD5: | 79E18BC8A432F6625CBE4ECA5210AF1F |
SHA1: | F16A870D5525A84AA7C99E5270ECA7B868D3EAF6 |
SHA-256: | FD5033AA98700CE869BB02D9BE2145CCF079D41A57F20D4AF1E5FBFCD4153452 |
SHA-512: | F4E22B97D7B96F54A0F0FE4675521ADB1B08F5B8687BFA39585C5AE97B4AEECEEDA834790C8B49E6CD091EC0374E286BEFB7A786AC49A33BE9379AC8433EDB76 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 8124 |
Entropy (8bit): | 3.823639274562208 |
Encrypted: | false |
SSDEEP: | 96:xr1qOLxQqgisbziB/C1bcuJlEDA4MZAegL3wmtJIjgR64lAn6zavYTBICtb6VHhw:F1iqgLbziB6bP4DSUqhM1b6VHC |
MD5: | 4925A85AD3BE114D0C28938F031F3A9E |
SHA1: | 6FEB7F0ED8FDD413D492D986F3B332990E115916 |
SHA-256: | 1C1AE079886D40611CA76431008D11973B15666BA4F6E76AEF76A947AAC4C67E |
SHA-512: | 522821DD5048A98A4E5DEB42DB9C8368255C58081800A474758F84A803DAFB97D2A43658DC16C7A3C482BCA9A0EA70578433E12ADF10D828BB9159397772945A |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 2558939 |
Entropy (8bit): | 6.362256284615226 |
Encrypted: | false |
SSDEEP: | 49152:og2qPtc1e5OS7bPGoUl+x/grN4azvchYk2Fz:ovqPCnrN4azvSYt |
MD5: | 68A6B99EDFA9BC00765A964F44A684CA |
SHA1: | E42957C80F03AE93C9A4E2E415B5D1DEE8F45BCA |
SHA-256: | 42335AFF80ACD75376B9FF9096ADC40DA948ADF729ADC85DCBE6B78ECC0E5294 |
SHA-512: | B79CDDD8D3A574360DCD923FCFBF344CC63EC4B415463180F9648D67A97A83F52E236E3189A28F866D8C9FE20FEF46367F3DF304F728B58D1A11280C90C9C104 |
Malicious: | false |
Antivirus: |
|
Preview: |
Process: | C:\Users\user\Desktop\licensecrawler_setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2535424 |
Entropy (8bit): | 6.378725232145821 |
Encrypted: | false |
SSDEEP: | 49152:gg2qPtc1e5OS7bPGoUl+x/grN4azvchYk2F:gvqPCnrN4azvSY |
MD5: | 84DB4B4205F705DA71471DC6ECC061F5 |
SHA1: | B90BAC8C13A1553D58FEEF95A2C41C64118B29CF |
SHA-256: | 647983EBDE53E0501FF1AF8EF6190DFEEA5CCC64CAF7DCE808F1E3D98FB66A3C |
SHA-512: | C5803B63D33BB409433B496B83CA2A7359B4B1835815386206283B3AF5C54D7D1CB9E80244A888638C7703C4BF54E1B2C11BE6836F20B9FEA157AB92BFBF365A |
Malicious: | true |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 6144 |
Entropy (8bit): | 4.720366600008286 |
Encrypted: | false |
SSDEEP: | 96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0 |
MD5: | E4211D6D009757C078A9FAC7FF4F03D4 |
SHA1: | 019CD56BA687D39D12D4B13991C9A42EA6BA03DA |
SHA-256: | 388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95 |
SHA-512: | 17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E |
Malicious: | false |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 1152 |
Entropy (8bit): | 4.632217637970263 |
Encrypted: | false |
SSDEEP: | 24:8m0MVULdOEcmkiyAnJ4Dd5qgd5uUUPqbX7gNX7s7aB6m:8mpULdO2RJ4Dd5qgd53TXkNX1B6 |
MD5: | 46A7E74D72FC0B1949C52689D4C6FBDB |
SHA1: | D03946A058E233A2778B2252B5304C310A0BD182 |
SHA-256: | AC00CB09560974812F87AEF045301E269EA213BFE4711738B3059D23B4CBF02C |
SHA-512: | F29F4D69D9CD9FB56226FE312350846BFC60890AD318FFB6350F8A15C0E8F25BE90411B5154A259F0FB3A3E5C0F4D2587D5640BF611BB5FAF2459C611C257BCC |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 158208 |
Entropy (8bit): | 3.5990820344612815 |
Encrypted: | false |
SSDEEP: | 3072:SL+p+j4aTSpjwCUAPzh7LipZS8m5BqpeT6KmcVdS5yCF:Wp |
MD5: | A6D3757A6C38789F9AE3DE145C25843C |
SHA1: | 894BF07EBD2FEBC46113C1EE50776880506EE2CB |
SHA-256: | D906722020FC27A1A6C707F60B874304D45860431F93EB5DB0C5ECE7415EEF99 |
SHA-512: | DD45AAA1293340B28A855115DDA25DB2748340B9B5BA72D024FF79793DC313AA133730B2DAE42EDDC288CEEB366D7A5206A3E222FB0E0EBFAC719D7537DE20F5 |
Malicious: | false |
Antivirus: |
|
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 158208 |
Entropy (8bit): | 3.5990820344612815 |
Encrypted: | false |
SSDEEP: | 3072:SL+p+j4aTSpjwCUAPzh7LipZS8m5BqpeT6KmcVdS5yCF:Wp |
MD5: | A6D3757A6C38789F9AE3DE145C25843C |
SHA1: | 894BF07EBD2FEBC46113C1EE50776880506EE2CB |
SHA-256: | D906722020FC27A1A6C707F60B874304D45860431F93EB5DB0C5ECE7415EEF99 |
SHA-512: | DD45AAA1293340B28A855115DDA25DB2748340B9B5BA72D024FF79793DC313AA133730B2DAE42EDDC288CEEB366D7A5206A3E222FB0E0EBFAC719D7537DE20F5 |
Malicious: | false |
Antivirus: |
|
Preview: |
File type: | |
Entropy (8bit): | 7.822729342220669 |
TrID: |
|
File name: | licensecrawler_setup.exe |
File size: | 2954648 |
MD5: | e7127c35fd5b4f803c83ce6ccec56b89 |
SHA1: | c5e3af5f059d7d53711878b87e32d8c9c7e05dc5 |
SHA256: | d96fa064822b2a93e39dc7b1546ede38a7d578682c5551d3be47b4b6fd4f4609 |
SHA512: | 31911a1e3fd2e2d2642f3e05b6bf4632f98694f21995bbb3491950a8709b974df49c9f2571c60adc2c51e8a40150606877d40ab8e3ad977c0c93158a4a9e7f4f |
SSDEEP: | 49152:9csQ6QtOns5NibaUjJAjlTLbRzqAEJxl5hMG1Dw2hRngs9udI3WA2n5f5:91QTQsTib7jJaBfEJXsG1kEngs9udeWP |
TLSH: | BED5F127B298653EC49A27360673A01068FBB76DF416BE1676F4C48DCF761C01E3EA25 |
File Content Preview: | MZP.....................@...............................................!..L.!..This program must be run under Win32..$7....................................................................................................................................... |
Icon Hash: | a2a0b496b2caca72 |
Entrypoint: | 0x4a7ed0 |
Entrypoint Section: | .itext |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x5DA1B5ED [Sat Oct 12 11:15:57 2019 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | eb5bc6ff6263b364dfbfb78bdb48ed59 |
Signature Valid: | true |
Signature Issuer: | CN=Sectigo RSA Code Signing CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB |
Signature Validation Error: | The operation completed successfully |
Error Number: | 0 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | ABCEA3BEE3664B3E1D07451C9706EF27 |
Thumbprint SHA-1: | 12B2EC1A14FE4FFB9744F56073D5E169E9BA1561 |
Thumbprint SHA-256: | 9751B37ABABA8ED90175432F2531DABBA307BA948CA2E9AF4284CEA3E690CCE6 |
Serial: | 00EB695D55BFD3C97E89D079B7568500DD |
Instruction |
---|
push ebp |
mov ebp, esp |
add esp, FFFFFFA4h |
push ebx |
push esi |
push edi |
xor eax, eax |
mov dword ptr [ebp-3Ch], eax |
mov dword ptr [ebp-40h], eax |
mov dword ptr [ebp-5Ch], eax |
mov dword ptr [ebp-30h], eax |
mov dword ptr [ebp-38h], eax |
mov dword ptr [ebp-34h], eax |
mov dword ptr [ebp-2Ch], eax |
mov dword ptr [ebp-28h], eax |
mov dword ptr [ebp-14h], eax |
mov eax, 004A2BC4h |
call 00007F4E7CB8EE3Dh |
xor eax, eax |
push ebp |
push 004A85C2h |
push dword ptr fs:[eax] |
mov dword ptr fs:[eax], esp |
xor edx, edx |
push ebp |
push 004A857Eh |
push dword ptr fs:[edx] |
mov dword ptr fs:[edx], esp |
mov eax, dword ptr [004B0634h] |
call 00007F4E7CC22F3Bh |
call 00007F4E7CC22A92h |
lea edx, dword ptr [ebp-14h] |
xor eax, eax |
call 00007F4E7CBA4468h |
mov edx, dword ptr [ebp-14h] |
mov eax, 004B3714h |
call 00007F4E7CB896C7h |
push 00000002h |
push 00000000h |
push 00000001h |
mov ecx, dword ptr [004B3714h] |
mov dl, 01h |
mov eax, dword ptr [00423698h] |
call 00007F4E7CBA54CFh |
mov dword ptr [004B3718h], eax |
xor edx, edx |
push ebp |
push 004A852Ah |
push dword ptr fs:[edx] |
mov dword ptr fs:[edx], esp |
call 00007F4E7CC22FC3h |
mov dword ptr [004B3720h], eax |
mov eax, dword ptr [004B3720h] |
cmp dword ptr [eax+0Ch], 01h |
jne 00007F4E7CC2987Ah |
mov eax, dword ptr [004B3720h] |
mov edx, 00000028h |
call 00007F4E7CBA5DC4h |
mov edx, dword ptr [004B3720h] |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0xb6000 | 0x9a | .edata |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xb4000 | 0xf1c | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xb9000 | 0x4600 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x2cf078 | 0x2520 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0xb8000 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0xb42e0 | 0x240 | .idata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0xb5000 | 0x1a4 | .didata |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0xa50e8 | 0xa5200 | False | 0.35601136686222556 | data | 6.369284753795082 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.itext | 0xa7000 | 0x1668 | 0x1800 | False | 0.541015625 | data | 5.951810643537571 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.data | 0xa9000 | 0x37a4 | 0x3800 | False | 0.36063058035714285 | data | 5.035168539011174 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.bss | 0xad000 | 0x6778 | 0x0 | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0xb4000 | 0xf1c | 0x1000 | False | 0.36474609375 | data | 4.791610915860562 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.didata | 0xb5000 | 0x1a4 | 0x200 | False | 0.345703125 | data | 2.7458225536678693 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.edata | 0xb6000 | 0x9a | 0x200 | False | 0.2578125 | data | 1.881069204504408 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.tls | 0xb7000 | 0x18 | 0x0 | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rdata | 0xb8000 | 0x5d | 0x200 | False | 0.189453125 | data | 1.3799881252217987 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0xb9000 | 0x4600 | 0x4600 | False | 0.3229352678571429 | data | 4.442047201554272 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
RT_ICON | 0xb94c8 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 192 | Dutch | Netherlands |
RT_ICON | 0xb95f0 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 320 | Dutch | Netherlands |
RT_ICON | 0xb9b58 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 640 | Dutch | Netherlands |
RT_ICON | 0xb9e40 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 1152 | Dutch | Netherlands |
RT_STRING | 0xba6e8 | 0x360 | data | ||
RT_STRING | 0xbaa48 | 0x260 | data | ||
RT_STRING | 0xbaca8 | 0x45c | data | ||
RT_STRING | 0xbb104 | 0x40c | data | ||
RT_STRING | 0xbb510 | 0x2d4 | data | ||
RT_STRING | 0xbb7e4 | 0xb8 | data | ||
RT_STRING | 0xbb89c | 0x9c | data | ||
RT_STRING | 0xbb938 | 0x374 | data | ||
RT_STRING | 0xbbcac | 0x398 | data | ||
RT_STRING | 0xbc044 | 0x368 | data | ||
RT_STRING | 0xbc3ac | 0x2a4 | data | ||
RT_RCDATA | 0xbc650 | 0x10 | data | ||
RT_RCDATA | 0xbc660 | 0x2c4 | data | ||
RT_RCDATA | 0xbc924 | 0x2c | data | ||
RT_GROUP_ICON | 0xbc950 | 0x3e | data | English | United States |
RT_VERSION | 0xbc990 | 0x584 | data | English | United States |
RT_MANIFEST | 0xbcf14 | 0x62c | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States |
DLL | Import |
---|---|
kernel32.dll | GetACP, GetExitCodeProcess, LocalFree, CloseHandle, SizeofResource, VirtualProtect, VirtualFree, GetFullPathNameW, ExitProcess, HeapAlloc, GetCPInfoExW, RtlUnwind, GetCPInfo, GetStdHandle, GetModuleHandleW, FreeLibrary, HeapDestroy, ReadFile, CreateProcessW, GetLastError, GetModuleFileNameW, SetLastError, FindResourceW, CreateThread, CompareStringW, LoadLibraryA, ResetEvent, GetVersion, RaiseException, FormatMessageW, SwitchToThread, GetExitCodeThread, GetCurrentThread, LoadLibraryExW, LockResource, GetCurrentThreadId, UnhandledExceptionFilter, VirtualQuery, VirtualQueryEx, Sleep, EnterCriticalSection, SetFilePointer, LoadResource, SuspendThread, GetTickCount, GetFileSize, GetStartupInfoW, GetFileAttributesW, InitializeCriticalSection, GetThreadPriority, SetThreadPriority, GetCurrentProcess, VirtualAlloc, GetSystemInfo, GetCommandLineW, LeaveCriticalSection, GetProcAddress, ResumeThread, GetVersionExW, VerifyVersionInfoW, HeapCreate, GetWindowsDirectoryW, VerSetConditionMask, GetDiskFreeSpaceW, FindFirstFileW, GetUserDefaultUILanguage, lstrlenW, QueryPerformanceCounter, SetEndOfFile, HeapFree, WideCharToMultiByte, FindClose, MultiByteToWideChar, LoadLibraryW, SetEvent, CreateFileW, GetLocaleInfoW, GetSystemDirectoryW, DeleteFileW, GetLocalTime, GetEnvironmentVariableW, WaitForSingleObject, WriteFile, ExitThread, DeleteCriticalSection, TlsGetValue, GetDateFormatW, SetErrorMode, IsValidLocale, TlsSetValue, CreateDirectoryW, GetSystemDefaultUILanguage, EnumCalendarInfoW, LocalAlloc, GetUserDefaultLangID, RemoveDirectoryW, CreateEventW, SetThreadLocale, GetThreadLocale |
comctl32.dll | InitCommonControls |
version.dll | GetFileVersionInfoSizeW, VerQueryValueW, GetFileVersionInfoW |
user32.dll | CreateWindowExW, TranslateMessage, CharLowerBuffW, CallWindowProcW, CharUpperW, PeekMessageW, GetSystemMetrics, SetWindowLongW, MessageBoxW, DestroyWindow, CharNextW, MsgWaitForMultipleObjects, LoadStringW, ExitWindowsEx, DispatchMessageW |
oleaut32.dll | SysAllocStringLen, SafeArrayPtrOfIndex, VariantCopy, SafeArrayGetLBound, SafeArrayGetUBound, VariantInit, VariantClear, SysFreeString, SysReAllocStringLen, VariantChangeType, SafeArrayCreate |
netapi32.dll | NetWkstaGetInfo, NetApiBufferFree |
advapi32.dll | RegQueryValueExW, AdjustTokenPrivileges, LookupPrivilegeValueW, RegCloseKey, OpenProcessToken, RegOpenKeyExW |
Name | Ordinal | Address |
---|---|---|
TMethodImplementationIntercept | 3 | 0x453ac0 |
__dbk_fcall_wrapper | 2 | 0x40d3dc |
dbkFCallWrapperAddr | 1 | 0x4b063c |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
Dutch | Netherlands | |
English | United States |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 16:27:04 |
Start date: | 25/11/2022 |
Path: | C:\Users\user\Desktop\licensecrawler_setup.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 2954648 bytes |
MD5 hash: | E7127C35FD5B4F803C83CE6CCEC56B89 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Reputation: | low |
Target ID: | 1 |
Start time: | 16:27:05 |
Start date: | 25/11/2022 |
Path: | C:\Users\user\AppData\Local\Temp\is-JONDA.tmp\licensecrawler_setup.tmp |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 2535424 bytes |
MD5 hash: | 84DB4B4205F705DA71471DC6ECC061F5 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Reputation: | moderate |