Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1500631
MD5:171eeb8ca5c439e8af9e180a5f6a09f8
SHA1:0cd33a5c35f8c5ad98c5eab9b11946b1ff146bb3
SHA256:26de39355a5ffb112e494503f44bd63c8e2bc7dba35d58fedaaea1c84f868748
Tags:exe
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Detected potential crypto function
One or more processes crash
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 1212 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 171EEB8CA5C439E8AF9E180A5F6A09F8)
    • WerFault.exe (PID: 2732 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1212 -s 876 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: file.exeReversingLabs: Detection: 13%
Source: file.exeJoe Sandbox ML: detected
Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: \??\C:\Users\user\Desktop\file.PDB source: file.exe, 00000000.00000002.2538218295.000000000199C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: WER300C.tmp.dmp.4.dr
Source: Binary string: attachment_dddLAB.pdb source: file.exe, WER300C.tmp.dmp.4.dr
Source: Binary string: b77a5c561934e089ib.pdb source: file.exe, 00000000.00000002.2538218295.00000000019B4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.ni.pdb source: WER300C.tmp.dmp.4.dr
Source: Binary string: mDC:\Windows\attachment_dddLAB.pdb source: file.exe, 00000000.00000002.2537906085.00000000016F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: mscorlib.ni.pdbRSDS source: WER300C.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\exe\attachment_dddLAB.pdb. source: file.exe, 00000000.00000002.2538218295.0000000001A0C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\exe\attachment_dddLAB.pdbioISE source: file.exe, 00000000.00000002.2538218295.0000000001A0C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.VisualBasic.pdb source: WER300C.tmp.dmp.4.dr
Source: file.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
Source: file.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0
Source: file.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
Source: file.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
Source: file.exeString found in binary or memory: http://ocsp.sectigo.com0
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
Source: file.exeString found in binary or memory: https://aka.ms/dotnet-warnings/
Source: file.exeString found in binary or memory: https://sectigo.com/CPS0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_035892B00_2_035892B0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_035895200_2_03589520
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1212 -s 876
Source: file.exeStatic PE information: invalid certificate
Source: file.exe, 00000000.00000002.2538218295.000000000197E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs file.exe
Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal52.winEXE@2/5@0/0
Source: C:\Users\user\Desktop\file.exeMutant created: NULL
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1212
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\028b5c0f-2a54-4c31-8e31-68b308d7c494Jump to behavior
Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: file.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.87%
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: file.exeReversingLabs: Detection: 13%
Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1212 -s 876
Source: C:\Users\user\Desktop\file.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: file.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: file.exeStatic file information: File size 4643392 > 1048576
Source: file.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x3e8600
Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: \??\C:\Users\user\Desktop\file.PDB source: file.exe, 00000000.00000002.2538218295.000000000199C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: WER300C.tmp.dmp.4.dr
Source: Binary string: attachment_dddLAB.pdb source: file.exe, WER300C.tmp.dmp.4.dr
Source: Binary string: b77a5c561934e089ib.pdb source: file.exe, 00000000.00000002.2538218295.00000000019B4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.ni.pdb source: WER300C.tmp.dmp.4.dr
Source: Binary string: mDC:\Windows\attachment_dddLAB.pdb source: file.exe, 00000000.00000002.2537906085.00000000016F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: mscorlib.ni.pdbRSDS source: WER300C.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\exe\attachment_dddLAB.pdb. source: file.exe, 00000000.00000002.2538218295.0000000001A0C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\exe\attachment_dddLAB.pdbioISE source: file.exe, 00000000.00000002.2538218295.0000000001A0C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.VisualBasic.pdb source: WER300C.tmp.dmp.4.dr
Source: file.exeStatic PE information: 0x80A2A9F9 [Sat May 22 12:26:33 2038 UTC]
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0358354D push esp; retf 0002h0_2_0358354E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_03586E16 push ds; ret 0_2_03586E1D
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: 1BC0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: 37F0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: 1CF0000 memory reserve | memory write watchJump to behavior
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
2
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory2
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager11
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Timestomp
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe13%ReversingLabs
file.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
https://sectigo.com/CPS00%URL Reputationsafe
https://aka.ms/dotnet-warnings/0%URL Reputationsafe
http://ocsp.sectigo.com00%URL Reputationsafe
http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl00%Avira URL Cloudsafe
http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#0%Avira URL Cloudsafe
http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#0%Avira URL Cloudsafe
http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0file.exefalse
  • Avira URL Cloud: safe
unknown
http://upx.sf.netAmcache.hve.4.drfalse
  • URL Reputation: safe
unknown
https://sectigo.com/CPS0file.exefalse
  • URL Reputation: safe
unknown
http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#file.exefalse
  • Avira URL Cloud: safe
unknown
https://aka.ms/dotnet-warnings/file.exefalse
  • URL Reputation: safe
unknown
http://ocsp.sectigo.com0file.exefalse
  • URL Reputation: safe
unknown
http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0zfile.exefalse
  • Avira URL Cloud: safe
unknown
http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#file.exefalse
  • Avira URL Cloud: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1500631
Start date and time:2024-08-28 18:56:34 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 6m 10s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run name:Run with higher sleep bypass
Number of analysed new started processes analysed:10
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:file.exe
Detection:MAL
Classification:mal52.winEXE@2/5@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 91%
  • Number of executed functions: 11
  • Number of non-executed functions: 4
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 52.182.143.212
  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target file.exe, PID 1212 because it is empty
  • Report size getting too big, too many NtSetInformationFile calls found.
  • VT rate limit hit for: file.exe
No simulations
No context
No context
No context
No context
No context
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.8607905807155944
Encrypted:false
SSDEEP:192:G9eGpF7viSyZs0BU/b0xaGgzuiFMZ24IO8HhB:zQ/iBU/aaBzuiFMY4IO8X
MD5:A6904115820570E71CFE6CB89333F2D9
SHA1:E5BEB36717443DABC9BAD20A6EE381026228BD47
SHA-256:ED7FD768DEE0D365B4E03D893DFB42C16DC0E59C82CA52EFD72A7B62E8F6EDBC
SHA-512:6E6B1AE8DFEAED5D0010D24314D45EB4BD54BA6E1DC56987BFE7E45A360469D4C7309BC8DAECA741E27A0F98CCD6557D90D780964B36180B41190B1CAFB1599A
Malicious:true
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.9.3.3.7.8.5.3.5.9.8.1.5.3.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.9.3.3.7.8.5.4.1.6.0.6.6.1.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.3.1.6.2.0.d.d.-.3.3.0.d.-.4.5.0.a.-.b.5.3.a.-.4.1.b.5.9.f.b.4.2.6.c.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.a.b.8.5.b.a.b.-.f.b.c.b.-.4.e.2.9.-.a.7.0.3.-.0.2.6.1.5.f.6.1.6.8.f.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.f.i.l.e...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.4.b.c.-.0.0.0.1.-.0.0.1.5.-.9.e.d.f.-.e.e.5.f.6.b.f.9.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.e.4.9.2.d.7.6.8.e.7.9.7.3.1.6.2.4.b.c.d.f.2.e.7.6.1.5.f.9.1.8.0.0.0.0.f.f.f.f.!.0.0.0.0.0.c.d.3.3.a.5.c.3.5.f.8.c.5.a.d.9.8.c.5.e.a.b.9.b.1.1.9.4.6.b.1.f.f.1.4.6.b.b.3.!.f.i.l.e...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.3.8././.0.5./.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 15 streams, Wed Aug 28 16:57:33 2024, 0x1205a4 type
Category:dropped
Size (bytes):204085
Entropy (8bit):4.316557111474212
Encrypted:false
SSDEEP:3072:doeUU4Wku4uEqHz/fHLTgfUAYAgvOcwUZAdZUFj:dNUY42bzTgsAt
MD5:172CBE5A8F2450839DC069D49BFCAD37
SHA1:FFA49AE5FE5635AF03B51D380C1D0C37968500FD
SHA-256:386DFA888E1A5C32066BA23A7AD42FC7026738CE0E3EAE786959C1B69D135AB6
SHA-512:87D3CC68B970DC4EDED98FA6D17EB414FD28098BA2134FFE83F634CD8B1D7939A6BE1171E04C4D2849BF7D583B9C0759BD1EF226A82A39FDC20CE3EF97E6353A
Malicious:false
Reputation:low
Preview:MDMP..a..... ........V.f........................\...........$............$...7..........`.......8...........T............"..u.......................................................................................................eJ..............GenuineIntel............T............V.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8378
Entropy (8bit):3.6921454463737695
Encrypted:false
SSDEEP:192:R6l7wVeJICp6xL6Y2D6SUF3TFgGgmfZDc03prp89bxKsfaG7m:R6lXJR6xL6YXSUNTTgmf3Mxpfu
MD5:70C84255F3EF377A3FEDE7CE8A89C930
SHA1:B1450E8F5EFF05BF0DB023EA34BE26940A406C16
SHA-256:7F1D8FEC8F47B1B4A93D798F76864D63294DE9D34387C612B68091EFD283D446
SHA-512:704F062CB8C394F22D06F5284C55B616C285D2E4BBF2FD7E358B2B9C17E6A020C9AFE4AE66D568F8A43BFE652B521A9D3A4E55624B0C39F7AD7BD76087B99F24
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.2.1.2.<./.P.i.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4679
Entropy (8bit):4.45806655232794
Encrypted:false
SSDEEP:48:cvIwWl8zsBuJg77aI9SVWpW8VYzYm8M4Jl9B2Fo+q8vp9B8jDsd:uIjfqI78k7VDJtKKjDsd
MD5:62CADB92CA84E653A1B31AB6E72B94A3
SHA1:7EAA5195DE2BADF6D8E3F28A025CC9AEF96C4A80
SHA-256:A20060D7E5341E5CF1165C57D4318BB587619F8B3A26B37F1109D6493042E163
SHA-512:97DCABCF11DD604E24DEFDDEAC2B1AD2E7B662A0664EEFF9A188E1DD4FF983E2026F5F463FB1116BE5E559B1A5E9CA1CC5126289019338B7F8FA5096D580CF76
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="475680" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.468542828746928
Encrypted:false
SSDEEP:6144:lzZfpi6ceLPx9skLmb0frZWSP3aJG8nAgeiJRMMhA2zX4WABluuNbjDH5S:dZHtrZWOKnMM6bFp9j4
MD5:1956AE6B97FD9298C7AD75EC2D49CD00
SHA1:5C009AD3263B2478F95E28285471CA4817FDCB3E
SHA-256:C68F9F80722C537D113F0B890742FA6AF0A130BB439BE8AED94031AB6C8FA537
SHA-512:1857ABA9E6FD65E4CE9E5E3B6A011795F9E3C15B68218E89F06AA47EFA07744E68B06BDA1218966B9E0104BD6171C3FE80B76F84794B02F1F013467856BB7E47
Malicious:false
Reputation:low
Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.zT`k...............................................................................................................................................................................................................................................................................................................................................7.CT........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
Entropy (8bit):7.466268556988696
TrID:
  • Win32 Executable (generic) Net Framework (10011505/4) 49.87%
  • Win32 Executable (generic) a (10002005/4) 49.82%
  • InstallShield setup (43055/19) 0.21%
  • Windows Screen Saver (13104/52) 0.07%
  • Win16/32 Executable Delphi generic (2074/23) 0.01%
File name:file.exe
File size:4'643'392 bytes
MD5:171eeb8ca5c439e8af9e180a5f6a09f8
SHA1:0cd33a5c35f8c5ad98c5eab9b11946b1ff146bb3
SHA256:26de39355a5ffb112e494503f44bd63c8e2bc7dba35d58fedaaea1c84f868748
SHA512:82180324dac7a7c0020d7afa70a827489cafb01c98ee947d93957673e6ef72775cfd6658d06412196c12401293675712fcfb80a632cce0e6dd381295902dc8da
SSDEEP:98304:q1H0pPbGUO4gORpEYYAA9Yd9Bw0/N+2IDSu839hqt4XIr:qqz/O4gOQYTAww0/N+fSzNg
TLSH:0926BE0A3C50CE22F1194237C99D944857629B612BF2F37B3D76721E65223E7788F98E
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.........................>...........>.. ....>...@.. ........................F......-G...@................................
Icon Hash:06766e4f1e396137
Entrypoint:0x7ea52e
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Time Stamp:0x80A2A9F9 [Sat May 22 12:26:33 2038 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
Signature Valid:false
Signature Issuer:CN=(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)
Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
Error Number:-2146762487
Not Before, Not After
  • 27/08/2024 19:25:18 28/08/2034 19:25:18
Subject Chain
  • CN=(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)(^^^^^^^^^^^^)(%%%%%%%%%%%%%)(@@@@@@@@@@@@@@@@@)(//////////////////////////////)(\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\)
Version:3
Thumbprint MD5:0D68771C6FA94F678A4488FBB89CD51E
Thumbprint SHA-1:85A510C47B995445B42A12CB7A3DCD017632D157
Thumbprint SHA-256:DA706B518FD2611CE17A28ABAD04CBA0A7F36539D7B3A540A7ABA19DCA508EF6
Serial:4957F7932C80D7914AB1FDB12E11EE37
Instruction
jmp dword ptr [00402000h]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x3ea4e00x4b.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0x3ee0000x7bc6c.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x464c000x8e40
IMAGE_DIRECTORY_ENTRY_BASERELOC0x46a0000xc.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x3ea4930x1c.text
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x20000x3e85340x3e8600d37c212a32e4bbe864c9c86c596d52d9unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.sdata0x3ec0000x1f00x200e4a1a50b89c9e1c0b11a24eec6dadb85False0.876953125data6.662579920667493IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x3ee0000x7bc6c0x7be006cb8d1b5d7de7dd71da4b621b450acc2False0.45092945887991925data6.504664736026332IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x46a0000xc0x200ec6fbcdff192e4df16fd3dec833e99c6False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
AFX_DIALOG_LAYOUT0x3ef1f40x2dataJapaneseJapan5.0
AFX_DIALOG_LAYOUT0x3ef1f80x2dataJapaneseJapan5.0
AVI0x3ef1fc0xac00RIFF (little-endian) data, AVI, 95 x 57, video: uncompressed RLE 8bppJapaneseJapan0.3108421148255814
RT_CURSOR0x3f9dfc0x134dataJapaneseJapan0.33116883116883117
RT_CURSOR0x3f9f300x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"JapaneseJapan0.4805194805194805
RT_CURSOR0x3fa0640xb4Targa image data - Map 32 x 65536 x 1 +16 "\001"JapaneseJapan0.7
RT_CURSOR0x3fa1180x134Targa image data 64 x 65536 x 1 +32 "\001"JapaneseJapan0.37662337662337664
RT_CURSOR0x3fa24c0x134AmigaOS bitmap font "(", fc_YSize 4294967264, 5120 elements, 2nd "\377\360?\377\377\370\177\377\377\374\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdJapaneseJapan0.36363636363636365
RT_CURSOR0x3fa3800x134Targa image data 64 x 65536 x 1 +32 "\001"JapaneseJapan0.36688311688311687
RT_CURSOR0x3fa4b40x134dataJapaneseJapan0.37662337662337664
RT_CURSOR0x3fa5e80x134AmigaOS bitmap font "(", fc_YSize 4294966847, 3840 elements, 2nd "\377?\374\377\377\300\003\377\377\300\003\377\377\340\007\377\377\360\017\377\377\370\037\377\377\374?\377\377\376\177\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdJapaneseJapan0.5422077922077922
RT_CURSOR0x3fa71c0x134dataJapaneseJapan0.37337662337662336
RT_CURSOR0x3fa8500x134Targa image data - RGB - RLE 64 x 65536 x 1 +32 "\001"JapaneseJapan0.38636363636363635
RT_CURSOR0x3fa9840x134Targa image data - RLE 64 x 65536 x 1 +32 "\001"JapaneseJapan0.35714285714285715
RT_CURSOR0x3faab80x134Targa image data - Mono - RLE 64 x 65536 x 1 +32 "\001"JapaneseJapan0.36688311688311687
RT_CURSOR0x3fabec0x134dataJapaneseJapan0.44155844155844154
RT_CURSOR0x3fad200x134dataJapaneseJapan0.4155844155844156
RT_CURSOR0x3fae540x134dataJapaneseJapan0.2662337662337662
RT_CURSOR0x3faf880x134dataJapaneseJapan0.2824675324675325
RT_CURSOR0x3fb0bc0x134dataJapaneseJapan0.3246753246753247
RT_BITMAP0x3fb1f00x5888Device independent bitmap graphic, 600 x 36 x 8, image size 21600JapaneseJapan0.06441934345217085
RT_BITMAP0x400a780xfd48Device independent bitmap graphic, 600 x 36 x 24, image size 64800JapaneseJapan0.015021591610117211
RT_BITMAP0x4107c00x2e58Device independent bitmap graphic, 120 x 90 x 8, image size 10800, resolution 3780 x 3780 px/mJapaneseJapan0.3295684423465947
RT_BITMAP0x4136180x4b08Device independent bitmap graphic, 168 x 108 x 8, image size 18144, resolution 3780 x 3780 px/mJapaneseJapan0.29607455226988755
RT_BITMAP0x4181200xdf8Device independent bitmap graphic, 34 x 34 x 24, image size 3536JapaneseJapan0.433165548098434
RT_BITMAP0x418f180xdf8Device independent bitmap graphic, 34 x 34 x 24, image size 3536JapaneseJapan0.6031879194630873
RT_BITMAP0x419d100x4a8Device independent bitmap graphic, 15 x 24 x 24, image size 1152JapaneseJapan0.15016778523489932
RT_BITMAP0x41a1b80x4a8Device independent bitmap graphic, 15 x 24 x 24, image size 1152JapaneseJapan0.125
RT_BITMAP0x41a6600xb8Device independent bitmap graphic, 12 x 10 x 4, image size 80JapaneseJapan0.44565217391304346
RT_BITMAP0x41a7180x144Device independent bitmap graphic, 33 x 11 x 4, image size 220JapaneseJapan0.37962962962962965
RT_ICON0x41a85c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 3779 x 3779 px/mGermanSwitzerland0.46646341463414637
RT_ICON0x41b9040x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 3779 x 3779 px/mGermanSwitzerland0.3727562588568729
RT_ICON0x41fb2c0x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 3779 x 3779 px/mGermanSwitzerland0.3129066603572696
RT_ICON0x4303540x104faPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedGermanSwitzerland0.9921119592875318
RT_ICON0x4408500x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 3779 x 3779 px/mJapaneseJapan0.46646341463414637
RT_ICON0x4418f80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 3779 x 3779 px/mJapaneseJapan0.3727562588568729
RT_ICON0x445b200x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 3779 x 3779 px/mJapaneseJapan0.3129066603572696
RT_ICON0x4563480x104faPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedJapaneseJapan0.9921119592875318
RT_DIALOG0x4668440x5edataJapaneseJapan0.8617021276595744
RT_DIALOG0x4668a40x40dataJapaneseJapan0.78125
RT_DIALOG0x4668e40x100dataJapaneseJapan0.61328125
RT_DIALOG0x4669e40xd8dataJapaneseJapan0.6620370370370371
RT_DIALOG0x466abc0xd8dataJapaneseJapan0.6481481481481481
RT_DIALOG0x466b940x1a4dataJapaneseJapan0.5119047619047619
RT_DIALOG0x466d380xe4dataJapaneseJapan0.6008771929824561
RT_DIALOG0x466e1c0x140dataJapaneseJapan0.575
RT_DIALOG0x466f5c0x26cdataJapaneseJapan0.49838709677419357
RT_DIALOG0x4671c80xe8dataJapaneseJapan0.6594827586206896
RT_DIALOG0x4672b00x124dataJapaneseJapan0.5308219178082192
RT_DIALOG0x4673d40x26cdataJapaneseJapan0.4129032258064516
RT_DIALOG0x4676400x2ecdataJapaneseJapan0.30080213903743314
RT_DIALOG0x46792c0x4cdataJapaneseJapan0.8947368421052632
RT_DIALOG0x4679780x40dataJapaneseJapan0.8125
RT_DIALOG0x4679b80x114dataJapaneseJapan0.5905797101449275
RT_DIALOG0x467acc0xe0dataJapaneseJapan0.6473214285714286
RT_DIALOG0x467bac0xe8dataJapaneseJapan0.6336206896551724
RT_DIALOG0x467c940x34dataJapaneseJapan0.9038461538461539
RT_STRING0x467cc80x82StarOffice Gallery theme p, 536899072 objects, 1st nJapaneseJapan0.7153846153846154
RT_STRING0x467d4c0x2adataJapaneseJapan0.5476190476190477
RT_STRING0x467d780x184dataJapaneseJapan0.48711340206185566
RT_STRING0x467efc0x4eedataJapaneseJapan0.375594294770206
RT_STRING0x4683ec0x264dataJapaneseJapan0.3333333333333333
RT_STRING0x4686500x2dadataJapaneseJapan0.3698630136986301
RT_STRING0x46892c0x8adataJapaneseJapan0.6594202898550725
RT_STRING0x4689b80xacdataJapaneseJapan0.45348837209302323
RT_STRING0x468a640xdedataJapaneseJapan0.536036036036036
RT_STRING0x468b440x4a8dataJapaneseJapan0.3221476510067114
RT_STRING0x468fec0x228dataJapaneseJapan0.4003623188405797
RT_STRING0x4692140x2cdataJapaneseJapan0.5227272727272727
RT_STRING0x4692400x53edataJapaneseJapan0.2965722801788376
RT_GROUP_CURSOR0x4697800x14Lotus unknown worksheet or configuration, revision 0x1JapaneseJapan1.25
RT_GROUP_CURSOR0x4697940x22Lotus unknown worksheet or configuration, revision 0x2JapaneseJapan1.0
RT_GROUP_CURSOR0x4697b80x14Lotus unknown worksheet or configuration, revision 0x1JapaneseJapan1.3
RT_GROUP_CURSOR0x4697cc0x14Lotus unknown worksheet or configuration, revision 0x1JapaneseJapan1.3
RT_GROUP_CURSOR0x4697e00x14Lotus unknown worksheet or configuration, revision 0x1JapaneseJapan1.3
RT_GROUP_CURSOR0x4697f40x14Lotus unknown worksheet or configuration, revision 0x1JapaneseJapan1.3
RT_GROUP_CURSOR0x4698080x14Lotus unknown worksheet or configuration, revision 0x1JapaneseJapan1.3
RT_GROUP_CURSOR0x46981c0x14Lotus unknown worksheet or configuration, revision 0x1JapaneseJapan1.3
RT_GROUP_CURSOR0x4698300x14Lotus unknown worksheet or configuration, revision 0x1JapaneseJapan1.3
RT_GROUP_CURSOR0x4698440x14Lotus unknown worksheet or configuration, revision 0x1JapaneseJapan1.3
RT_GROUP_CURSOR0x4698580x14Lotus unknown worksheet or configuration, revision 0x1JapaneseJapan1.3
RT_GROUP_CURSOR0x46986c0x14Lotus unknown worksheet or configuration, revision 0x1JapaneseJapan1.3
RT_GROUP_CURSOR0x4698800x14Lotus unknown worksheet or configuration, revision 0x1JapaneseJapan1.3
RT_GROUP_CURSOR0x4698940x14Lotus unknown worksheet or configuration, revision 0x1JapaneseJapan1.3
RT_GROUP_CURSOR0x4698a80x14Lotus unknown worksheet or configuration, revision 0x1JapaneseJapan1.3
RT_GROUP_CURSOR0x4698bc0x14Lotus unknown worksheet or configuration, revision 0x1JapaneseJapan1.3
RT_GROUP_ICON0x4698d00x3edataGermanSwitzerland0.8064516129032258
RT_GROUP_ICON0x4699100x3edataJapaneseJapan0.8709677419354839
RT_MANIFEST0x4699500x31cXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (736), with CRLF line terminatorsEnglishUnited States0.5238693467336684
DLLImport
mscoree.dll_CorExeMain
Language of compilation systemCountry where language is spokenMap
JapaneseJapan
GermanSwitzerland
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:12:57:32
Start date:28/08/2024
Path:C:\Users\user\Desktop\file.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\file.exe"
Imagebase:0xf00000
File size:4'643'392 bytes
MD5 hash:171EEB8CA5C439E8AF9E180A5F6A09F8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:4
Start time:12:57:33
Start date:28/08/2024
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1212 -s 876
Imagebase:0x1f0000
File size:483'680 bytes
MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2538538905.0000000003580000.00000040.00000800.00020000.00000000.sdmp, Offset: 03580000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3580000_file.jbxd
    Similarity
    • API ID:
    • String ID: 4
    • API String ID: 0-4088798008
    • Opcode ID: 24fb42a199bc439ebe260d8941e957b6c6cff51843437abd163efc0da8120beb
    • Instruction ID: f3079b7163044fcde66334dab963c0d391cb3d2ea5d1462e2bc7b6ef3645b6f2
    • Opcode Fuzzy Hash: 24fb42a199bc439ebe260d8941e957b6c6cff51843437abd163efc0da8120beb
    • Instruction Fuzzy Hash: 7E51B678D002A8CFDB64EF24D998AD9BBB1EB49340F1040EAD94DA3394DBB45EC59F11
    Memory Dump Source
    • Source File: 00000000.00000002.2538757475.0000000003770000.00000040.00000800.00020000.00000000.sdmp, Offset: 03770000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3770000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: cc753ec39f904717db6d26ea3e3c44e1fe3a0fcc81a44c33b3b08c952840dc8a
    • Instruction ID: 650eb2cafb29a4bd56d8a09b512e58dbafd6689fbdf36394d03f5eef55ed8212
    • Opcode Fuzzy Hash: cc753ec39f904717db6d26ea3e3c44e1fe3a0fcc81a44c33b3b08c952840dc8a
    • Instruction Fuzzy Hash: FA51B274D00219CFDF64EFA4D858AADBBB1FF48300F20816AD519A7265EB349985DF90
    Memory Dump Source
    • Source File: 00000000.00000002.2538757475.0000000003770000.00000040.00000800.00020000.00000000.sdmp, Offset: 03770000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3770000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 38d2cf1891008091dbe925d8a8451ef07df9f8db266b20244dbd6b2ac92ff10d
    • Instruction ID: 94f0d721fa7d253765efecdff15ef3aac9d4e79cb6092489c64180b156778d69
    • Opcode Fuzzy Hash: 38d2cf1891008091dbe925d8a8451ef07df9f8db266b20244dbd6b2ac92ff10d
    • Instruction Fuzzy Hash: 4151E178D00209CFEF14DFA9D888AEEBBF5FB48300F148429E415A7260EB749945EF95
    Memory Dump Source
    • Source File: 00000000.00000002.2538757475.0000000003770000.00000040.00000800.00020000.00000000.sdmp, Offset: 03770000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3770000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 456399bf416eff47c8dfe721769f3f2e014c5e1f8295788d71fd4988a1657dca
    • Instruction ID: 66b4f31ff5101a8230f2a8e3b9b48284061433477dbea77117b2a5eb5397c36e
    • Opcode Fuzzy Hash: 456399bf416eff47c8dfe721769f3f2e014c5e1f8295788d71fd4988a1657dca
    • Instruction Fuzzy Hash: 6C211475D04209DFEF44DFA9D845AEEBBF1EF88304F048469D815A32A4EB346A06DF91
    Memory Dump Source
    • Source File: 00000000.00000002.2538538905.0000000003580000.00000040.00000800.00020000.00000000.sdmp, Offset: 03580000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3580000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 629cef6556564b9f4f00d6dc302a82f13a2dccbdd4eb2fb13df2b1a5c66b2aa5
    • Instruction ID: a0581edeafb7e027c56efa05ddbd11d5c991d8b2181c6bebe5a473a556b47a07
    • Opcode Fuzzy Hash: 629cef6556564b9f4f00d6dc302a82f13a2dccbdd4eb2fb13df2b1a5c66b2aa5
    • Instruction Fuzzy Hash: 4F010478D052A9CBEB20EF29D944BCDB6B2FB04700F0140EAA418F3291D7385A858F10
    Memory Dump Source
    • Source File: 00000000.00000002.2538757475.0000000003770000.00000040.00000800.00020000.00000000.sdmp, Offset: 03770000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3770000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 6a6e77ae0a9a3bfa9bd6d13781bd63b20614b1bd27fa9b45788628c5c1356f93
    • Instruction ID: b19699891ed6638fd73a1e8999f46b17a6a66c361c12a3af62e2f49e38474b61
    • Opcode Fuzzy Hash: 6a6e77ae0a9a3bfa9bd6d13781bd63b20614b1bd27fa9b45788628c5c1356f93
    • Instruction Fuzzy Hash: 76F06D359592498FDB50DFB8E8896A9BFF0EB0A215F1445EAC808D3211E7329545EB40
    Memory Dump Source
    • Source File: 00000000.00000002.2538757475.0000000003770000.00000040.00000800.00020000.00000000.sdmp, Offset: 03770000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3770000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 9370831aeb0934bd613a23de74c381b288bea89a724e913a827452503f518586
    • Instruction ID: 2771730619a9d0869adfb934f54b51d0ab6fa4bd086f70278811063c63bd01bf
    • Opcode Fuzzy Hash: 9370831aeb0934bd613a23de74c381b288bea89a724e913a827452503f518586
    • Instruction Fuzzy Hash: B9F03074D05249DFEB50DBB8D58975DBAF4EF04305F1585A5A808D3210F7308A40AA80
    Memory Dump Source
    • Source File: 00000000.00000002.2538757475.0000000003770000.00000040.00000800.00020000.00000000.sdmp, Offset: 03770000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3770000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: bc9a495ff099327a18e90deb898361ba72ea7bb201b8862de6174f77b69661aa
    • Instruction ID: 2d84335f69b6f3dc7df726e52fe04f5a388246e41ccd6a642d86e42a09c0b1b6
    • Opcode Fuzzy Hash: bc9a495ff099327a18e90deb898361ba72ea7bb201b8862de6174f77b69661aa
    • Instruction Fuzzy Hash: 8AF09B71D552498FDB50DFB4D8896AC7FF0EB05210F0509E6E804D3211E6319544E741
    Memory Dump Source
    • Source File: 00000000.00000002.2538757475.0000000003770000.00000040.00000800.00020000.00000000.sdmp, Offset: 03770000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3770000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: f9f1617559c5828fd1301b4ae72d998a30b7e397184a6073b7ee7505066d292b
    • Instruction ID: 0f495d75fd1e68a3d5b52ebe4fd2a7d54d3b3725ee4781ad9f7721fdb04e8090
    • Opcode Fuzzy Hash: f9f1617559c5828fd1301b4ae72d998a30b7e397184a6073b7ee7505066d292b
    • Instruction Fuzzy Hash: 97F0C974D05209DFEB50EFB9D5487AEFAF4AF08209F1484A59808E3210E7308A45AA91
    Memory Dump Source
    • Source File: 00000000.00000002.2538538905.0000000003580000.00000040.00000800.00020000.00000000.sdmp, Offset: 03580000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3580000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 2ed0149d296f4f5eb7d0b31d725687d676977de556775398a46d390feb58335f
    • Instruction ID: 487161c22fe01e461ceff2ff5e359f751e3815a1298244de0b9daef01a31558d
    • Opcode Fuzzy Hash: 2ed0149d296f4f5eb7d0b31d725687d676977de556775398a46d390feb58335f
    • Instruction Fuzzy Hash: FAF07479C4426ACFCBA0EF54D984AE8B7B1BF08751F4114E6D829A3260D7745E859F10
    Memory Dump Source
    • Source File: 00000000.00000002.2538757475.0000000003770000.00000040.00000800.00020000.00000000.sdmp, Offset: 03770000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3770000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a828a3b484c9e50e3f46ff0f2df42f2512bec656fe018a9961a4924c06307bbd
    • Instruction ID: ba972873f74b7e8dbebadb4c6ced2731c76168334721da0fd516f4eb9ca5e6ff
    • Opcode Fuzzy Hash: a828a3b484c9e50e3f46ff0f2df42f2512bec656fe018a9961a4924c06307bbd
    • Instruction Fuzzy Hash: 79C04C3090810ACBDF509E98D09966DBB71E716341F514C51D115A616AD73895849B85
    Memory Dump Source
    • Source File: 00000000.00000002.2538538905.0000000003580000.00000040.00000800.00020000.00000000.sdmp, Offset: 03580000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3580000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 93e328637efa61dea18f834524e72b63cc1974450771af2ad165117bb147794e
    • Instruction ID: 0cbd16463e23cffa1653442c3f84b25f666a37b477a2239743a3f4d4160e7338
    • Opcode Fuzzy Hash: 93e328637efa61dea18f834524e72b63cc1974450771af2ad165117bb147794e
    • Instruction Fuzzy Hash: 22511970A0420ACFDB59DFBAE85479EBBF2FF88300F04C529D055EB268EB7959058B50
    Memory Dump Source
    • Source File: 00000000.00000002.2538538905.0000000003580000.00000040.00000800.00020000.00000000.sdmp, Offset: 03580000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3580000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 49ac77b6cfabab79895d850aac937142e9daaacb9a46a880182aeb9381b8d961
    • Instruction ID: d930118f4179e23cb57524ae00ddc1a3e31614efee920c156124b7bd7d1ebc20
    • Opcode Fuzzy Hash: 49ac77b6cfabab79895d850aac937142e9daaacb9a46a880182aeb9381b8d961
    • Instruction Fuzzy Hash: 9051A271E056148BEB69CF6B8D4078AFAF7BFC4204F18C1B9D40CA7264DB704A858F51
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2538538905.0000000003580000.00000040.00000800.00020000.00000000.sdmp, Offset: 03580000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3580000_file.jbxd
    Similarity
    • API ID:
    • String ID: +$H$`$l
    • API String ID: 0-1979963692
    • Opcode ID: e9aefc970bcc34462dd4a3d353e7a8ab597dd5ad21dec07b06b618b0f9c9d362
    • Instruction ID: 80f398dd122f4962f3ba9c911fbfd30cbbe23ea7172c3e9c669cb2358026abfb
    • Opcode Fuzzy Hash: e9aefc970bcc34462dd4a3d353e7a8ab597dd5ad21dec07b06b618b0f9c9d362
    • Instruction Fuzzy Hash: 9E01DAB5D4A369CBEB60DF65DD407E9F7B1BB42704F0164E9C108B3241D7399A858F18
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2538757475.0000000003770000.00000040.00000800.00020000.00000000.sdmp, Offset: 03770000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3770000_file.jbxd
    Similarity
    • API ID:
    • String ID: /$5$s${
    • API String ID: 0-515719599
    • Opcode ID: a43bbd3bd2e09e5866d07f59aa3c882ec222a4ffe59a0ca22aa3b91d6e11abe2
    • Instruction ID: 4b16b3fadc74d687b660c75d6c9250dad788e78ce1b4d202ae077aed63c4cf10
    • Opcode Fuzzy Hash: a43bbd3bd2e09e5866d07f59aa3c882ec222a4ffe59a0ca22aa3b91d6e11abe2
    • Instruction Fuzzy Hash: 5121D374D05219CFDB61CF98C598BADBBF4BB08304F1644E5E928A7366D7349A84CF50