Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
TreeSizeFreeSetup.exe

Overview

General Information

Sample name:TreeSizeFreeSetup.exe
Analysis ID:1501919
MD5:f818f2dac2d096073210a183b91cff4e
SHA1:0d802c7f197afc4a699a2663447fd579bd4d0e12
SHA256:c685e16e86183d11c30407ee688dc5a6081e3ea1958d3b9b509bc36e3edbce07
Infos:

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Drops PE files
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64_ra
  • TreeSizeFreeSetup.exe (PID: 6396 cmdline: "C:\Users\user\Desktop\TreeSizeFreeSetup.exe" MD5: F818F2DAC2D096073210A183B91CFF4E)
    • TreeSizeFreeSetup.tmp (PID: 2760 cmdline: "C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmp" /SL5="$402BC,12766924,857088,C:\Users\user\Desktop\TreeSizeFreeSetup.exe" MD5: 8798E7889DF96CEB54B0C3D7A5E42739)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: TreeSizeFreeSetup.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: TreeSizeFreeSetup.exeStatic PE information: certificate valid
Source: TreeSizeFreeSetup.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: TreeSizeFreeSetup.exe, TreeSizeFreeSetup.tmp.0.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
Source: TreeSizeFreeSetup.exe, TreeSizeFreeSetup.tmp.0.drString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
Source: TreeSizeFreeSetup.exe, TreeSizeFreeSetup.tmp.0.drString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
Source: TreeSizeFreeSetup.exe, TreeSizeFreeSetup.tmp.0.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
Source: TreeSizeFreeSetup.exe, TreeSizeFreeSetup.tmp.0.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
Source: TreeSizeFreeSetup.exe, TreeSizeFreeSetup.tmp.0.drString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
Source: TreeSizeFreeSetup.exe, TreeSizeFreeSetup.tmp.0.drString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
Source: TreeSizeFreeSetup.exe, TreeSizeFreeSetup.tmp.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
Source: TreeSizeFreeSetup.exe, TreeSizeFreeSetup.tmp.0.drString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
Source: TreeSizeFreeSetup.exe, TreeSizeFreeSetup.tmp.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
Source: TreeSizeFreeSetup.exe, TreeSizeFreeSetup.tmp.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
Source: TreeSizeFreeSetup.exe, 00000000.00000002.2445856607.0000000002865000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.exe, 00000000.00000003.1174941114.0000000002650000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.tmp, 00000001.00000003.1179395905.0000000003692000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.tmp, 00000001.00000002.2446477363.0000000003820000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.dk-soft.org/
Source: TreeSizeFreeSetup.exe, 00000000.00000002.2443195048.0000000002347000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.exe, 00000000.00000003.1174941114.0000000002650000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.tmp, 00000001.00000002.2444046973.000000000259E000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://customers.jam-software.de/survey.php
Source: TreeSizeFreeSetup.exe, 00000000.00000002.2443195048.0000000002347000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.exe, 00000000.00000003.1174941114.0000000002650000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.tmp, 00000001.00000002.2444046973.000000000259E000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://jam-software.upvoty.com/TreeSize
Source: TreeSizeFreeSetup.exeString found in binary or memory: https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
Source: TreeSizeFreeSetup.exe, TreeSizeFreeSetup.tmp.0.drString found in binary or memory: https://www.globalsign.com/repository/0
Source: TreeSizeFreeSetup.exe, 00000000.00000003.1176516486.000000007FB50000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.exe, 00000000.00000003.1176145422.00000000029A0000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.tmp, 00000001.00000000.1177818704.0000000000401000.00000020.00000001.01000000.00000004.sdmp, TreeSizeFreeSetup.tmp.0.drString found in binary or memory: https://www.innosetup.com/
Source: TreeSizeFreeSetup.tmp, 00000001.00000003.1179395905.0000000003620000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.tmp, 00000001.00000003.1179395905.0000000003692000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.tmp, 00000001.00000002.2447941370.0000000003A4C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.jam-software.com/TreeSize/editions.shtml
Source: TreeSizeFreeSetup.tmp, 00000001.00000003.1179395905.0000000003692000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.jam-software.com/TreeSize/editions.shtml0ExplorerContextMenuItems
Source: TreeSizeFreeSetup.tmp, 00000001.00000003.1179395905.0000000003620000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.tmp, 00000001.00000002.2447941370.0000000003A4C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.jam-software.com/TreeSize/surumler.shtml
Source: TreeSizeFreeSetup.tmp, 00000001.00000003.1179395905.0000000003620000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.tmp, 00000001.00000002.2444046973.00000000025FD000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.jam-software.com/company/help-us-translate.shtml?language=EN
Source: TreeSizeFreeSetup.tmp, 00000001.00000003.1179395905.0000000003692000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.tmp, 00000001.00000002.2444046973.00000000025F4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.jam-software.com/company/privacy.shtml
Source: TreeSizeFreeSetup.tmp, 00000001.00000003.1179395905.0000000003620000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.tmp, 00000001.00000002.2444046973.000000000263F000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.jam-software.com/treesize/
Source: TreeSizeFreeSetup.exe, TreeSizeFreeSetup.tmp.0.drString found in binary or memory: https://www.jam-software.com0
Source: TreeSizeFreeSetup.tmp, 00000001.00000003.1179395905.0000000003692000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.jam-software.de/TreeSize/editions.shtml
Source: TreeSizeFreeSetup.tmp, 00000001.00000002.2444046973.0000000002540000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.jam-software.de/TreeSize/editions.shtmlPqY
Source: TreeSizeFreeSetup.tmp, 00000001.00000002.2447941370.0000000003A33000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.tmp, 00000001.00000003.1179395905.0000000003692000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.jam-software.de/company/privacy.shtml
Source: TreeSizeFreeSetup.exe, 00000000.00000002.2443195048.0000000002347000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.exe, 00000000.00000003.1174941114.0000000002650000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.tmp, 00000001.00000002.2444046973.000000000259E000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.jam-software.de/freeware/?language=
Source: TreeSizeFreeSetup.tmp, 00000001.00000003.1179395905.0000000003620000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.tmp, 00000001.00000002.2444046973.000000000263F000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.jam-software.de/treesize/
Source: TreeSizeFreeSetup.exe, 00000000.00000003.1176516486.000000007FB50000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.exe, 00000000.00000003.1176145422.00000000029A0000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.tmp, 00000001.00000000.1177818704.0000000000401000.00000020.00000001.01000000.00000004.sdmp, TreeSizeFreeSetup.tmp.0.drString found in binary or memory: https://www.remobjects.com/ps
Source: TreeSizeFreeSetup.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: TreeSizeFreeSetup.exe, 00000000.00000002.2443195048.0000000002378000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs TreeSizeFreeSetup.exe
Source: TreeSizeFreeSetup.exe, 00000000.00000003.1176516486.000000007FB50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs TreeSizeFreeSetup.exe
Source: TreeSizeFreeSetup.exe, 00000000.00000000.1174462731.00000000004C6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileName vs TreeSizeFreeSetup.exe
Source: TreeSizeFreeSetup.exe, 00000000.00000003.1176145422.00000000029A0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs TreeSizeFreeSetup.exe
Source: TreeSizeFreeSetup.exeBinary or memory string: OriginalFileName vs TreeSizeFreeSetup.exe
Source: TreeSizeFreeSetup.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: classification engineClassification label: clean1.winEXE@3/1@0/0
Source: C:\Users\user\Desktop\TreeSizeFreeSetup.exeFile created: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmpJump to behavior
Source: C:\Users\user\Desktop\TreeSizeFreeSetup.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\TreeSizeFreeSetup.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\TreeSizeFreeSetup.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: TreeSizeFreeSetup.exeString found in binary or memory: /LOADINF="filename"
Source: C:\Users\user\Desktop\TreeSizeFreeSetup.exeFile read: C:\Users\user\Desktop\TreeSizeFreeSetup.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\TreeSizeFreeSetup.exe "C:\Users\user\Desktop\TreeSizeFreeSetup.exe"
Source: C:\Users\user\Desktop\TreeSizeFreeSetup.exeProcess created: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmp "C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmp" /SL5="$402BC,12766924,857088,C:\Users\user\Desktop\TreeSizeFreeSetup.exe"
Source: C:\Users\user\Desktop\TreeSizeFreeSetup.exeProcess created: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmp "C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmp" /SL5="$402BC,12766924,857088,C:\Users\user\Desktop\TreeSizeFreeSetup.exe" Jump to behavior
Source: C:\Users\user\Desktop\TreeSizeFreeSetup.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\TreeSizeFreeSetup.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\TreeSizeFreeSetup.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\TreeSizeFreeSetup.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\TreeSizeFreeSetup.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmpSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmpSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmpSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmpSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmpSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmpSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmpSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmpSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmpSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmpSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmpSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmpSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmpSection loaded: mscms.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmpSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmpSection loaded: coloradapterclient.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmpSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmpSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmpWindow found: window name: TSelectLanguageFormJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: TreeSizeFreeSetup.exeStatic PE information: certificate valid
Source: TreeSizeFreeSetup.exeStatic file information: File size 13832808 > 1048576
Source: TreeSizeFreeSetup.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: TreeSizeFreeSetup.exeStatic PE information: section name: .didata
Source: TreeSizeFreeSetup.tmp.0.drStatic PE information: section name: .didata
Source: C:\Users\user\Desktop\TreeSizeFreeSetup.exeFile created: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmpJump to dropped file
Source: C:\Users\user\Desktop\TreeSizeFreeSetup.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Process Injection
OS Credential Dumping1
System Information Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
DLL Side-Loading
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1501919 Sample: TreeSizeFreeSetup.exe Startdate: 30/08/2024 Architecture: WINDOWS Score: 1 5 TreeSizeFreeSetup.exe 2 2->5         started        file3 10 C:\Users\user\...\TreeSizeFreeSetup.tmp, PE32 5->10 dropped 8 TreeSizeFreeSetup.tmp 5->8         started        process4

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
TreeSizeFreeSetup.exe0%ReversingLabs
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmp0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://www.remobjects.com/ps0%URL Reputationsafe
https://www.innosetup.com/0%URL Reputationsafe
http://www.dk-soft.org/0%URL Reputationsafe
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU0%Avira URL Cloudsafe
https://www.jam-software.com00%Avira URL Cloudsafe
https://www.jam-software.com/TreeSize/surumler.shtml0%Avira URL Cloudsafe
https://www.jam-software.de/TreeSize/editions.shtml0%Avira URL Cloudsafe
https://www.jam-software.de/freeware/?language=0%Avira URL Cloudsafe
https://www.jam-software.de/TreeSize/editions.shtmlPqY0%Avira URL Cloudsafe
https://www.jam-software.de/treesize/0%Avira URL Cloudsafe
https://www.jam-software.com/company/help-us-translate.shtml?language=EN0%Avira URL Cloudsafe
https://www.jam-software.com/TreeSize/editions.shtml0%Avira URL Cloudsafe
https://www.jam-software.com/company/privacy.shtml0%Avira URL Cloudsafe
https://www.jam-software.com/treesize/0%Avira URL Cloudsafe
https://www.jam-software.de/company/privacy.shtml0%Avira URL Cloudsafe
https://jam-software.upvoty.com/TreeSize0%Avira URL Cloudsafe
https://customers.jam-software.de/survey.php0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://www.jam-software.de/treesize/TreeSizeFreeSetup.tmp, 00000001.00000003.1179395905.0000000003620000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.tmp, 00000001.00000002.2444046973.000000000263F000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUTreeSizeFreeSetup.exefalse
  • Avira URL Cloud: safe
unknown
https://www.jam-software.com/TreeSize/surumler.shtmlTreeSizeFreeSetup.tmp, 00000001.00000003.1179395905.0000000003620000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.tmp, 00000001.00000002.2447941370.0000000003A4C000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://www.jam-software.de/TreeSize/editions.shtmlTreeSizeFreeSetup.tmp, 00000001.00000003.1179395905.0000000003692000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://www.jam-software.com/TreeSize/editions.shtmlTreeSizeFreeSetup.tmp, 00000001.00000003.1179395905.0000000003620000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.tmp, 00000001.00000003.1179395905.0000000003692000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.tmp, 00000001.00000002.2447941370.0000000003A4C000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://www.jam-software.de/freeware/?language=TreeSizeFreeSetup.exe, 00000000.00000002.2443195048.0000000002347000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.exe, 00000000.00000003.1174941114.0000000002650000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.tmp, 00000001.00000002.2444046973.000000000259E000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://www.remobjects.com/psTreeSizeFreeSetup.exe, 00000000.00000003.1176516486.000000007FB50000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.exe, 00000000.00000003.1176145422.00000000029A0000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.tmp, 00000001.00000000.1177818704.0000000000401000.00000020.00000001.01000000.00000004.sdmp, TreeSizeFreeSetup.tmp.0.drfalse
  • URL Reputation: safe
unknown
https://www.jam-software.com/company/help-us-translate.shtml?language=ENTreeSizeFreeSetup.tmp, 00000001.00000003.1179395905.0000000003620000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.tmp, 00000001.00000002.2444046973.00000000025FD000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://www.jam-software.com0TreeSizeFreeSetup.exe, TreeSizeFreeSetup.tmp.0.drfalse
  • Avira URL Cloud: safe
unknown
https://www.innosetup.com/TreeSizeFreeSetup.exe, 00000000.00000003.1176516486.000000007FB50000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.exe, 00000000.00000003.1176145422.00000000029A0000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.tmp, 00000001.00000000.1177818704.0000000000401000.00000020.00000001.01000000.00000004.sdmp, TreeSizeFreeSetup.tmp.0.drfalse
  • URL Reputation: safe
unknown
https://www.jam-software.com/company/privacy.shtmlTreeSizeFreeSetup.tmp, 00000001.00000003.1179395905.0000000003692000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.tmp, 00000001.00000002.2444046973.00000000025F4000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://www.jam-software.de/TreeSize/editions.shtmlPqYTreeSizeFreeSetup.tmp, 00000001.00000002.2444046973.0000000002540000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://www.jam-software.com/treesize/TreeSizeFreeSetup.tmp, 00000001.00000003.1179395905.0000000003620000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.tmp, 00000001.00000002.2444046973.000000000263F000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://www.jam-software.de/company/privacy.shtmlTreeSizeFreeSetup.tmp, 00000001.00000002.2447941370.0000000003A33000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.tmp, 00000001.00000003.1179395905.0000000003692000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://customers.jam-software.de/survey.phpTreeSizeFreeSetup.exe, 00000000.00000002.2443195048.0000000002347000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.exe, 00000000.00000003.1174941114.0000000002650000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.tmp, 00000001.00000002.2444046973.000000000259E000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://jam-software.upvoty.com/TreeSizeTreeSizeFreeSetup.exe, 00000000.00000002.2443195048.0000000002347000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.exe, 00000000.00000003.1174941114.0000000002650000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.tmp, 00000001.00000002.2444046973.000000000259E000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.dk-soft.org/TreeSizeFreeSetup.exe, 00000000.00000002.2445856607.0000000002865000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.exe, 00000000.00000003.1174941114.0000000002650000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.tmp, 00000001.00000003.1179395905.0000000003692000.00000004.00001000.00020000.00000000.sdmp, TreeSizeFreeSetup.tmp, 00000001.00000002.2446477363.0000000003820000.00000004.00001000.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1501919
Start date and time:2024-08-30 18:42:22 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 51s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultwindowsinteractivecookbook.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:14
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:TreeSizeFreeSetup.exe
Detection:CLEAN
Classification:clean1.winEXE@3/1@0/0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, login.live.com, settings-win.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: TreeSizeFreeSetup.exe
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\TreeSizeFreeSetup.exe
File Type:PE32 executable (GUI) Intel 80386, for MS Windows
Category:dropped
Size (bytes):3102424
Entropy (8bit):6.454071479999857
Encrypted:false
SSDEEP:49152:3LJwSihjOb6GLb4SKEs3DyOMC2DlUt0+yO3A32ASNTvBl4:1wSi0b67zeCzt0+yO3kSW
MD5:8798E7889DF96CEB54B0C3D7A5E42739
SHA1:2B396A65F3BB14F355726D954EEDE208AB56E2FC
SHA-256:4B4D635DCB0EC100F81F1F211AD48FD4183C12AE6680B5994547A320F357ACFB
SHA-512:B0A4376EDC20AEB0E63A410FDB54F22B2374B04FCB379F3DD104D7EE14641A5407D6BB2FF3584A2E8A11DC0312C43D671A19D9A654118C50AF8669963FA9EE35
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Reputation:low
Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...p.._.................$,.........P6,......@,...@...........................0......20...@......@....................-......`-.49....-..#...........(/.......................................-......................i-.......-......................text...P.+.......+................. ..`.itext..t(....,..*....+............. ..`.data.......@,......(,.............@....bss.....x....,..........................idata..49...`-..:....,.............@....didata.......-.......,.............@....edata........-.......-.............@..@.tls....L.....-..........................rdata..].....-.......-.............@..@.rsrc....#....-..$....-.............@..@......................-.............@..@........................................................
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):7.982448715222885
TrID:
  • Win32 Executable (generic) a (10002005/4) 98.45%
  • Inno Setup installer (109748/4) 1.08%
  • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
  • Win16/32 Executable Delphi generic (2074/23) 0.02%
  • Generic Win/DOS Executable (2004/3) 0.02%
File name:TreeSizeFreeSetup.exe
File size:13'832'808 bytes
MD5:f818f2dac2d096073210a183b91cff4e
SHA1:0d802c7f197afc4a699a2663447fd579bd4d0e12
SHA256:c685e16e86183d11c30407ee688dc5a6081e3ea1958d3b9b509bc36e3edbce07
SHA512:beacaff59b753d65a7b65a692292466a4ded6b8223871a82983ca23461e04a0e9ac30c8f92ff7d56414817b787e83bfd655470378adcb2ae06aed6d3dbbb3e21
SSDEEP:196608:6zId/Nfd8KMl21OfWoNeHe++IQUtzqmlEEjyyDStdGxoTjqcKdKHhiSfJwvfsf6Y:NNf+DfWoNewIQCq+OfQvSavq
TLSH:3DD6333FB26CA93FD5BA0B3245739260587BBA61A90B8C1A17F4480CCF765B11F3B615
File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
Icon Hash:3b6120282c4c5a1f
Entrypoint:0x4b5eec
Entrypoint Section:.itext
Digitally signed:true
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x5FB0F96E [Sun Nov 15 09:48:30 2020 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:1
File Version Major:6
File Version Minor:1
Subsystem Version Major:6
Subsystem Version Minor:1
Import Hash:5a594319a0d69dbc452e748bcf05892e
Signature Valid:true
Signature Issuer:CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE
Signature Validation Error:The operation completed successfully
Error Number:0
Not Before, Not After
  • 31/07/2023 16:42:20 31/07/2026 16:42:20
Subject Chain
  • CN=JAM Software GmbH, O=JAM Software GmbH, STREET=Am Wissenschaftspark 26, L=Trier, S=Rheinland-Pfalz, C=DE, OID.1.3.6.1.4.1.311.60.2.1.1=Wittlich, OID.1.3.6.1.4.1.311.60.2.1.2=Rheinland-Pfalz, OID.1.3.6.1.4.1.311.60.2.1.3=DE, SERIALNUMBER=HRB 4920, OID.2.5.4.15=Private Organization
Version:3
Thumbprint MD5:8143E70ABDEFCF484D991A798A1A18F8
Thumbprint SHA-1:CEA9DA931176CA5325DA7ABD5E049F0967C9284A
Thumbprint SHA-256:B1B175283E9D93D9E7E2914480002624E20D4A040D1530348BBF401D2242BE92
Serial:29E0933DC5FF421623CB6DC4
Instruction
push ebp
mov ebp, esp
add esp, FFFFFFA4h
push ebx
push esi
push edi
xor eax, eax
mov dword ptr [ebp-3Ch], eax
mov dword ptr [ebp-40h], eax
mov dword ptr [ebp-5Ch], eax
mov dword ptr [ebp-30h], eax
mov dword ptr [ebp-38h], eax
mov dword ptr [ebp-34h], eax
mov dword ptr [ebp-2Ch], eax
mov dword ptr [ebp-28h], eax
mov dword ptr [ebp-14h], eax
mov eax, 004B10F0h
call 00007F0E6C76E5C5h
xor eax, eax
push ebp
push 004B65E2h
push dword ptr fs:[eax]
mov dword ptr fs:[eax], esp
xor edx, edx
push ebp
push 004B659Eh
push dword ptr fs:[edx]
mov dword ptr fs:[edx], esp
mov eax, dword ptr [004BE634h]
call 00007F0E6C810CEFh
call 00007F0E6C810842h
lea edx, dword ptr [ebp-14h]
xor eax, eax
call 00007F0E6C784038h
mov edx, dword ptr [ebp-14h]
mov eax, 004C1D84h
call 00007F0E6C7691B7h
push 00000002h
push 00000000h
push 00000001h
mov ecx, dword ptr [004C1D84h]
mov dl, 01h
mov eax, dword ptr [004237A4h]
call 00007F0E6C78509Fh
mov dword ptr [004C1D88h], eax
xor edx, edx
push ebp
push 004B654Ah
push dword ptr fs:[edx]
mov dword ptr fs:[edx], esp
call 00007F0E6C810D77h
mov dword ptr [004C1D90h], eax
mov eax, dword ptr [004C1D90h]
cmp dword ptr [eax+0Ch], 01h
jne 00007F0E6C81735Ah
mov eax, dword ptr [004C1D90h]
mov edx, 00000028h
call 00007F0E6C785994h
mov edx, dword ptr [004C1D90h]
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0xc40000x9a.edata
IMAGE_DIRECTORY_ENTRY_IMPORT0xc20000xf36.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x1714c.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0xd2e3900x2ed8
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0xc60000x18.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0xc22e40x244.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0xc30000x1a4.didata
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xb361c0xb3800ad6e46e3a3acdb533eb6a077f6d065afFalse0.3448639341051532data6.356058204328091IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.itext0xb50000x16880x1800d40fc822339d01f2abcc5493ac101c94False0.544921875data5.972750055221053IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0xb70000x37a40x38004c195d5591f6d61265df08a3733de3a2False0.36097935267857145data5.044400562007734IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.bss0xbb0000x6de80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata0xc20000xf360x1000a73d686f1e8b9bb06ec767721135e397False0.3681640625data4.8987046479600425IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.didata0xc30000x1a40x20041b8ce23dd243d14beebc71771885c89False0.345703125data2.7563628682496506IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.edata0xc40000x9a0x20037c1a5c63717831863e018c0f51dabb7False0.2578125data1.8722228665884297IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.tls0xc50000x180x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rdata0xc60000x5d0x2008f2f090acd9622c88a6a852e72f94e96False0.189453125data1.3838943752217987IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0xc70000x1714c0x17200f815060b15547c6c3372da65ee3a2a2eFalse0.7861803209459459data7.248156807381293IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0xc75e80x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.3225609756097561
RT_ICON0xc7c500x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.41263440860215056
RT_ICON0xc7f380x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.5574324324324325
RT_ICON0xc80600xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.6223347547974414
RT_ICON0xc8f080x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.7369133574007221
RT_ICON0xc97b00x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.3829479768786127
RT_ICON0xc9d180xd9d2PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0004662673505254
RT_ICON0xd76ec0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5300829875518672
RT_ICON0xd9c940x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.6137429643527205
RT_ICON0xdad3c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.425531914893617
RT_STRING0xdb1a40x360data0.34375
RT_STRING0xdb5040x260data0.3256578947368421
RT_STRING0xdb7640x45cdata0.4068100358422939
RT_STRING0xdbbc00x40cdata0.3754826254826255
RT_STRING0xdbfcc0x2d4data0.39226519337016574
RT_STRING0xdc2a00xb8data0.6467391304347826
RT_STRING0xdc3580x9cdata0.6410256410256411
RT_STRING0xdc3f40x374data0.4230769230769231
RT_STRING0xdc7680x398data0.3358695652173913
RT_STRING0xdcb000x368data0.3795871559633027
RT_STRING0xdce680x2a4data0.4275147928994083
RT_RCDATA0xdd10c0x10data1.5
RT_RCDATA0xdd11c0x2c4data0.6384180790960452
RT_RCDATA0xdd3e00x2cdata1.25
RT_GROUP_ICON0xdd40c0x92dataEnglishUnited States0.6438356164383562
RT_VERSION0xdd4a00x584dataEnglishUnited States0.29957507082152973
RT_MANIFEST0xdda240x726XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4005464480874317
DLLImport
kernel32.dllGetACP, GetExitCodeProcess, LocalFree, CloseHandle, SizeofResource, VirtualProtect, VirtualFree, GetFullPathNameW, ExitProcess, HeapAlloc, GetCPInfoExW, RtlUnwind, GetCPInfo, GetStdHandle, GetModuleHandleW, FreeLibrary, HeapDestroy, ReadFile, CreateProcessW, GetLastError, GetModuleFileNameW, SetLastError, FindResourceW, CreateThread, CompareStringW, LoadLibraryA, ResetEvent, GetVersion, RaiseException, FormatMessageW, SwitchToThread, GetExitCodeThread, GetCurrentThread, LoadLibraryExW, LockResource, GetCurrentThreadId, UnhandledExceptionFilter, VirtualQuery, VirtualQueryEx, Sleep, EnterCriticalSection, SetFilePointer, LoadResource, SuspendThread, GetTickCount, GetFileSize, GetStartupInfoW, GetFileAttributesW, InitializeCriticalSection, GetThreadPriority, SetThreadPriority, GetCurrentProcess, VirtualAlloc, GetSystemInfo, GetCommandLineW, LeaveCriticalSection, GetProcAddress, ResumeThread, GetVersionExW, VerifyVersionInfoW, HeapCreate, GetWindowsDirectoryW, VerSetConditionMask, GetDiskFreeSpaceW, FindFirstFileW, GetUserDefaultUILanguage, lstrlenW, QueryPerformanceCounter, SetEndOfFile, HeapFree, WideCharToMultiByte, FindClose, MultiByteToWideChar, LoadLibraryW, SetEvent, CreateFileW, GetLocaleInfoW, GetSystemDirectoryW, DeleteFileW, GetLocalTime, GetEnvironmentVariableW, WaitForSingleObject, WriteFile, ExitThread, DeleteCriticalSection, TlsGetValue, GetDateFormatW, SetErrorMode, IsValidLocale, TlsSetValue, CreateDirectoryW, GetSystemDefaultUILanguage, EnumCalendarInfoW, LocalAlloc, GetUserDefaultLangID, RemoveDirectoryW, CreateEventW, SetThreadLocale, GetThreadLocale
comctl32.dllInitCommonControls
version.dllGetFileVersionInfoSizeW, VerQueryValueW, GetFileVersionInfoW
user32.dllCreateWindowExW, TranslateMessage, CharLowerBuffW, CallWindowProcW, CharUpperW, PeekMessageW, GetSystemMetrics, SetWindowLongW, MessageBoxW, DestroyWindow, CharUpperBuffW, CharNextW, MsgWaitForMultipleObjects, LoadStringW, ExitWindowsEx, DispatchMessageW
oleaut32.dllSysAllocStringLen, SafeArrayPtrOfIndex, VariantCopy, SafeArrayGetLBound, SafeArrayGetUBound, VariantInit, VariantClear, SysFreeString, SysReAllocStringLen, VariantChangeType, SafeArrayCreate
netapi32.dllNetWkstaGetInfo, NetApiBufferFree
advapi32.dllRegQueryValueExW, AdjustTokenPrivileges, LookupPrivilegeValueW, RegCloseKey, OpenProcessToken, RegOpenKeyExW
NameOrdinalAddress
TMethodImplementationIntercept30x454060
__dbk_fcall_wrapper20x40d0a0
dbkFCallWrapperAddr10x4be63c
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:12:42:52
Start date:30/08/2024
Path:C:\Users\user\Desktop\TreeSizeFreeSetup.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\TreeSizeFreeSetup.exe"
Imagebase:0x400000
File size:13'832'808 bytes
MD5 hash:F818F2DAC2D096073210A183B91CFF4E
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Reputation:low
Has exited:false

Target ID:1
Start time:12:42:53
Start date:30/08/2024
Path:C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmp
Wow64 process (32bit):true
Commandline:"C:\Users\user\AppData\Local\Temp\is-B6GD7.tmp\TreeSizeFreeSetup.tmp" /SL5="$402BC,12766924,857088,C:\Users\user\Desktop\TreeSizeFreeSetup.exe"
Imagebase:0x400000
File size:3'102'424 bytes
MD5 hash:8798E7889DF96CEB54B0C3D7A5E42739
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Antivirus matches:
  • Detection: 0%, ReversingLabs
Reputation:low
Has exited:false

No disassembly