Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1521609
MD5:9d958b1b7187937c564f3a9e1c2f3541
SHA1:93022628e0119f86c3571dc8e585b37bb46cfc0e
SHA256:02773e1e5b99fb93addb1bb5278cf5e969127dd8b18a301dc5f556985f630193
Tags:exex64user-jstrosch
Infos:

Detection

Score:23
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

PE file contains section with special chars
Creates a DirectInput object (often for capturing keystrokes)
Entry point lies outside standard sections
PE file contains more sections than normal
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 6280 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 9D958B1B7187937C564F3A9E1C2F3541)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: file.exeStatic PE information: certificate valid
Source: file.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: file.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: file.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: file.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: file.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: file.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: file.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: file.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: file.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: file.exeString found in binary or memory: http://ocsp.digicert.com0
Source: file.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: file.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: file.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: file.exeString found in binary or memory: http://www.cabal.com0/
Source: file.exeString found in binary or memory: http://www.digicert.com/CPS0
Source: file.exeBinary or memory string: DirectInput8Create

System Summary

barindex
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: Number of sections : 11 > 10
Source: file.exe, 00000000.00000002.2922449901.00000001412FF000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSnake.exeD vs file.exe
Source: file.exeBinary or memory string: OriginalFilenameSnake.exeD vs file.exe
Source: classification engineClassification label: sus23.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: dinput8.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: d3dx9_43.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: libogg.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: libvorbis.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: fmod64.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: file.exeStatic PE information: certificate valid
Source: file.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: file.exeStatic file information: File size 10156848 > 1048576
Source: file.exeStatic PE information: Raw size of is bigger than: 0x100000 < 0x47ca00
Source: file.exeStatic PE information: Raw size of .boot is bigger than: 0x100000 < 0x415a00
Source: initial sampleStatic PE information: section where entry point is pointing to: .boot
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name:
Source: file.exeStatic PE information: section name: .themida
Source: file.exeStatic PE information: section name: .boot
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000000014127B103 push rdx; retf 0_2_000000014127B10E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000000014127A54E push rdi; retf 0_2_000000014127A556
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000000141279955 push FFFFFFE8h; retf 0_2_000000014127995A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000000014127BD27 push rsp; retf 0_2_000000014127BD36
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000000014127A92D push rdx; retf 0_2_000000014127A92E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000000141278588 push rdi; ret 0_2_000000014127858E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000000014127998B push rdi; retf 0_2_000000014127999A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000000141279961 push rcx; retf 0_2_0000000141279962
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000000141277D75 push rdi; retf 0_2_0000000141277D76
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000000014127B571 push rdi; retf 0_2_000000014127B572
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00000001412771C3 push rdi; retf 0_2_00000001412771C6
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000000014127BDCF push FFFFFFA8h; ret 0_2_000000014127BDD6
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000000014127A1A3 pushfq ; ret 0_2_000000014127A1A8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000000014127BDB7 pushfq ; ret 0_2_000000014127BDBE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000000141277DC0 push rdi; retf 0_2_0000000141277DC1
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000000014127A3E5 push rax; retf 0_2_000000014127A3E6
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000000014127B7E9 push rdi; retf 0_2_000000014127B7EA
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000000014127B43B push D74EDD55h; retf 0_2_000000014127B441
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000000014127886C pushfq ; ret 0_2_0000000141278886
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000000014127907B push rax; retf 0_2_0000000141279082
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00000001412794CF push rcx; retf 0_2_00000001412794DE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000000014127B0D7 push rdi; retf 0_2_000000014127B0E6
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00000001412770D3 push FFFFFF85h; retf 0_2_00000001412770E2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000000014127A712 push rcx; retf 0_2_000000014127A716
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00000001412776FF push rdi; retf 0_2_0000000141277702
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000000141278F4E push rbp; ret 0_2_0000000141278F4F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000000141278F55 push rdx; retf 0_2_0000000141278F82
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000000014127AB55 push rbx; ret 0_2_000000014127AB56
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000000014127B35D push rdx; retf 0_2_000000014127B35E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000000014127AB35 push rcx; retf 0_2_000000014127AB3A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000000014127BF39 push rdx; retf 0_2_000000014127BF42
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
1
Input Capture
1
System Information Discovery
Remote Services1
Input Capture
Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Obfuscated Files or Information
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.cabal.com0/file.exefalse
    unknown
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1521609
    Start date and time:2024-09-29 01:06:00 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 58s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:5
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:file.exe
    Detection:SUS
    Classification:sus23.winEXE@1/0@0/0
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target file.exe, PID 6280 because there are no executed function
    • Not all processes where analyzed, report is missing behavior information
    • VT rate limit hit for: file.exe
    No simulations
    No context
    No context
    No context
    No context
    No context
    No created / dropped files found
    File type:PE32+ executable (GUI) x86-64, for MS Windows
    Entropy (8bit):7.985872838106877
    TrID:
    • Win64 Executable GUI (202006/5) 92.65%
    • Win64 Executable (generic) (12005/4) 5.51%
    • Generic Win/DOS Executable (2004/3) 0.92%
    • DOS Executable Generic (2002/1) 0.92%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:file.exe
    File size:10'156'848 bytes
    MD5:9d958b1b7187937c564f3a9e1c2f3541
    SHA1:93022628e0119f86c3571dc8e585b37bb46cfc0e
    SHA256:02773e1e5b99fb93addb1bb5278cf5e969127dd8b18a301dc5f556985f630193
    SHA512:e45e53120589adb685b4142e47bedd45bc6d8d0e34b67b3e081aab681a30ab1dc27d5767c702842ff6268735b3b1f1dc1f9935f9628ed3f0bdaddc147f7ee9b5
    SSDEEP:196608:bfLVWfspDtlxWa7/NhQLf+45PNEbYCELNJsCZkRbM6rXdN+NZeloyodUpY:PAsDtlVNh+PNJ/RP+xpjyGpgb
    TLSH:43A6331647683DA3ECCB09F995F0E461165B1B884DA06DBEA6973CF72D5F001ABCE48C
    File Content Preview:MZ......................@...................................x...........!..L.!This program cannot be run in DOS mode....$........................................|}.....................Dmf..............2q....................................................
    Icon Hash:4f072b0d2d33050f
    Entrypoint:0x1419da058
    Entrypoint Section:.boot
    Digitally signed:true
    Imagebase:0x140000000
    Subsystem:windows gui
    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:HIGH_ENTROPY_VA, TERMINAL_SERVER_AWARE
    Time Stamp:0x66DF97E9 [Tue Sep 10 00:50:49 2024 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:46f08dad0fe65de8b9bb7e3676c8e397
    Signature Valid:true
    Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
    Signature Validation Error:The operation completed successfully
    Error Number:0
    Not Before, Not After
    • 07/02/2024 00:00:00 25/03/2026 23:59:59
    Subject Chain
    • CN=ESTgames Corp., O=ESTgames Corp., L=Seocho-gu, S=Seoul, C=KR
    Version:3
    Thumbprint MD5:AC5AB13D33755EBBEB45C3EA2D4FABDD
    Thumbprint SHA-1:DB4545F4F6F51A55C4F6C2DDAE49A476A9A6C02B
    Thumbprint SHA-256:F967C9BB12C539DB91FA4BF618BDEC5BC9959716FD36EA14F4BF2F8AD8059763
    Serial:095A199BF2065A7B5C44A6093BA2322D
    Instruction
    call 00007F9AF92698F7h
    inc ecx
    push edx
    dec ecx
    mov edx, esp
    inc ecx
    push edx
    dec ecx
    mov esi, dword ptr [edx+10h]
    dec ecx
    mov edi, dword ptr [edx+20h]
    cld
    mov dl, 80h
    mov al, byte ptr [esi]
    dec eax
    inc esi
    mov byte ptr [edi], al
    dec eax
    inc edi
    mov ebx, 00000002h
    add dl, dl
    jne 00007F9AF9269779h
    mov dl, byte ptr [esi]
    dec eax
    inc esi
    adc dl, dl
    jnc 00007F9AF9269756h
    add dl, dl
    jne 00007F9AF9269779h
    mov dl, byte ptr [esi]
    dec eax
    inc esi
    adc dl, dl
    jnc 00007F9AF92697D0h
    xor eax, eax
    add dl, dl
    jne 00007F9AF9269779h
    mov dl, byte ptr [esi]
    dec eax
    inc esi
    adc dl, dl
    jnc 00007F9AF9269878h
    add dl, dl
    jne 00007F9AF9269779h
    mov dl, byte ptr [esi]
    dec eax
    inc esi
    adc dl, dl
    adc eax, eax
    add dl, dl
    jne 00007F9AF9269779h
    mov dl, byte ptr [esi]
    dec eax
    inc esi
    adc dl, dl
    adc eax, eax
    add dl, dl
    jne 00007F9AF9269779h
    mov dl, byte ptr [esi]
    dec eax
    inc esi
    adc dl, dl
    adc eax, eax
    add dl, dl
    jne 00007F9AF9269779h
    mov dl, byte ptr [esi]
    dec eax
    inc esi
    adc dl, dl
    adc eax, eax
    je 00007F9AF926977Bh
    push edi
    mov eax, eax
    dec eax
    sub edi, eax
    mov al, byte ptr [edi]
    pop edi
    mov byte ptr [edi], al
    dec eax
    inc edi
    mov ebx, 00000002h
    jmp 00007F9AF92696FAh
    mov eax, 00000001h
    add dl, dl
    jne 00007F9AF9269779h
    mov dl, byte ptr [esi]
    dec eax
    inc esi
    adc dl, dl
    adc eax, eax
    add dl, dl
    jne 00007F9AF9269779h
    mov dl, byte ptr [esi]
    dec eax
    inc esi
    adc dl, dl
    jc 00007F9AF9269758h
    sub eax, ebx
    mov ebx, 00000001h
    jne 00007F9AF92697A0h
    mov ecx, 00000001h
    Programming Language:
    • [IMP] VS2012 UPD4 build 61030
    • [IMP] VS2005 build 50727
    • [IMP] VS2008 SP1 build 30729
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x12fd2c40x358.idata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x12ff0000x4f20.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1930a2c0x7f2f0.themida
    IMAGE_DIRECTORY_ENTRY_SECURITY0x9ad2000x2930
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x12fe0180x28.tls
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    0x10000xb1fb540x47ca000b5c5fa715ee65f401908252f3413c23unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    0xb210000x263b280xb86005ae9a83b9c8a0923211eaa28d632a732unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    0xd850000x4f15100x94005778f03dad6bc574d5a9d2519e2e18c4unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    0x12770000x7f2d80x50200553dc38a7a460a6474b2b2f633d4ba4fFalse0.9502425409516381data7.610813716335416IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    0x12f70000x940x200177b1840f39f637bb80cab0164d9b175False0.87109375data6.201769694338365IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    0x12f80000x4f780x30005c115ee8007af39fbe7ecab381814164False0.966552734375data7.85492178904316IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .idata0x12fd0000x10000x800df46b5b20f59d45bab9d66427015eb70False0.33447265625data3.4655979529148304IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .tls0x12fe0000x10000x2002850e14769b1d98d01edea1e48b35b9cFalse0.0625data0.28456851570206254IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rsrc0x12ff0000x50000x5000a469833a922582e2db54b2d39f3947c8False0.5798828125data6.049390747037397IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .themida0x13040000x6d60000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .boot0x19da0000x415a000x415a00bfaf92c3747689bef61b7534c0d7fe42unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_ICON0x12ff1800x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishUnited States0.8429602888086642
    RT_ICON0x12ffa380x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishUnited States0.6755780346820809
    RT_ICON0x12fffb00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.553941908713693
    RT_ICON0x13025680x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.6463414634146342
    RT_ICON0x13036200x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.4104609929078014
    RT_GROUP_ICON0x1303a980x4cdataEnglishUnited States0.7631578947368421
    RT_VERSION0x1303af40x290MS Windows COFF PA-RISC object fileKoreanNorth Korea0.5060975609756098
    RT_VERSION0x1303af40x290MS Windows COFF PA-RISC object fileKoreanSouth Korea0.5060975609756098
    RT_MANIFEST0x1303d940x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
    DLLImport
    kernel32.dllGetModuleHandleA
    DINPUT8.dllDirectInput8Create
    d3dx9_43.dllD3DXSaveSurfaceToFileInMemory
    d3d9.dllDirect3DCreate9
    WINMM.dllwaveOutClose
    IMM32.dllImmSetOpenStatus
    VERSION.dllVerQueryValueA
    urlmon.dllURLDownloadToFileA
    WININET.dllInternetOpenA
    USER32.dllLoadIconA
    GDI32.dllAddFontResourceA
    ADVAPI32.dllRegOpenKeyExA
    SHELL32.dllShellExecuteA
    ole32.dllOleLockRunning
    OLEAUT32.dllSysStringLen
    SHLWAPI.dllPathFileExistsA
    WS2_32.dllbind
    MSWSOCK.dllAcceptEx
    WINHTTP.dllWinHttpCloseHandle
    imagehlp.dllCheckSumMappedFile
    libogg.dllogg_stream_packetin
    libvorbis.dllvorbis_analysis_buffer
    fmod64.dll?getNumChannels@ChannelGroup@FMOD@@QEAA?AW4FMOD_RESULT@@PEAH@Z
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    KoreanNorth Korea
    KoreanSouth Korea
    TimestampSource PortDest PortSource IPDest IP
    Sep 29, 2024 01:07:12.472438097 CEST53588441.1.1.1192.168.2.4

    Click to jump to process

    Click to jump to process

    Target ID:0
    Start time:19:06:49
    Start date:28/09/2024
    Path:C:\Users\user\Desktop\file.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\file.exe"
    Imagebase:0x140000000
    File size:10'156'848 bytes
    MD5 hash:9D958B1B7187937C564F3A9E1C2F3541
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    No disassembly