Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
VALUESearch.exe

Overview

General Information

Sample name:VALUESearch.exe
Analysis ID:1546343
MD5:bf8e1edfd9c8b66f2056d400a532e53d
SHA1:c71fc958d8d1bc031b85426de97e214926799f9c
SHA256:7e0ab1acded8fb3a35517e2a9a59192a6d29e6b58fb547b20864b47444f0f6c2
Infos:

Detection

Score:4
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

JA3 SSL client fingerprint seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Sigma detected: Office Autorun Keys Modification
Sigma detected: Potential Persistence Via Visual Studio Tools for Office
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files

Classification

  • System is w10x64
  • VALUESearch.exe (PID: 3092 cmdline: "C:\Users\user\Desktop\VALUESearch.exe" MD5: BF8E1EDFD9C8B66F2056D400A532E53D)
  • cleanup
No configs have been found
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: , EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\VALUESearch.exe, ProcessId: 3092, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Excel\Addins\VALUESearch.XLL\LibraryVersion
Source: Registry Key setAuthor: Bhabesh Raj: Data: Details: , EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\VALUESearch.exe, ProcessId: 3092, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Excel\Addins\VALUESearch.XLL\LibraryVersion
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-10-31T19:44:46.565850+010020229301A Network Trojan was detected52.149.20.212443192.168.2.549705TCP
2024-10-31T19:45:18.289136+010020229301A Network Trojan was detected52.149.20.212443192.168.2.560823TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-10-31T19:44:29.263045+010020283713Unknown Traffic192.168.2.5497043.39.130.246443TCP

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: VALUESearch.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 3.39.130.246:443 -> 192.168.2.5:49704 version: TLS 1.2
Source: VALUESearch.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49704 -> 3.39.130.246:443
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.5:49705
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.5:60823
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /files/publish/xlllibver.txt HTTP/1.1Connection: Keep-AliveAccept: application/jsonAccept-Charset: utf-8Accept-Language: ko-KRUser-Agent: Zewus AgentHost: valuesearch.co.kr
Source: global trafficDNS traffic detected: DNS query: valuesearch.co.kr
Source: VALUESearch.exe, 00000000.00000002.3283829238.0000000000B1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://valuesearch.co.kr/8
Source: VALUESearch.exeString found in binary or memory: https://valuesearch.co.kr/files/publish/
Source: VALUESearch.exeString found in binary or memory: https://valuesearch.co.kr/files/publish/VALUESearchUpdater.exe
Source: VALUESearch.exeString found in binary or memory: https://valuesearch.co.kr/files/publish/xlllibver.txt
Source: VALUESearch.exe, 00000000.00000002.3283829238.0000000000B25000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://valuesearch.co.kr:443/files/publish/xlllibver.txt
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownHTTPS traffic detected: 3.39.130.246:443 -> 192.168.2.5:49704 version: TLS 1.2
Source: VALUESearch.exeStatic PE information: Resource name: RT_STRING type: DOS executable (COM, 0x8C-variant)
Source: VALUESearch.exeStatic PE information: Number of sections : 11 > 10
Source: VALUESearch.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: clean4.winEXE@1/0@1/1
Source: C:\Users\user\Desktop\VALUESearch.exeMutant created: \Sessions\1\BaseNamedObjects\VS
Source: C:\Users\user\Desktop\VALUESearch.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: VALUESearch.exeString found in binary or memory: ;application/vnd.adobe.air-application-installer-package+zip
Source: VALUESearch.exeString found in binary or memory: application/vnd.groove-help
Source: VALUESearch.exeString found in binary or memory: "application/x-install-instructions
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: olepro32.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Excel\AddIns\VALUESearch.XLL\Jump to behavior
Source: VALUESearch.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: VALUESearch.exeStatic file information: File size 3837952 > 1048576
Source: VALUESearch.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x2e0200
Source: VALUESearch.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: VALUESearch.exeStatic PE information: section name: .didata
Source: C:\Users\user\Desktop\VALUESearch.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\VALUESearch.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: VALUESearch.exe, 00000000.00000002.3283829238.0000000000B25000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: VALUESearch.exe, 00000000.00000002.3283829238.0000000000AC7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0v
Source: C:\Users\user\Desktop\VALUESearch.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping1
Query Registry
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager3
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
VALUESearch.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
valuesearch.co.kr
3.39.130.246
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://valuesearch.co.kr/files/publish/xlllibver.txtfalse
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://valuesearch.co.kr/8VALUESearch.exe, 00000000.00000002.3283829238.0000000000B1B000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        https://valuesearch.co.kr/files/publish/VALUESearchUpdater.exeVALUESearch.exefalse
          unknown
          https://valuesearch.co.kr:443/files/publish/xlllibver.txtVALUESearch.exe, 00000000.00000002.3283829238.0000000000B25000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            https://valuesearch.co.kr/files/publish/VALUESearch.exefalse
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              3.39.130.246
              valuesearch.co.krUnited States
              8987AMAZONEXPANSIONGBfalse
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1546343
              Start date and time:2024-10-31 19:43:36 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 4m 11s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:5
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:VALUESearch.exe
              Detection:CLEAN
              Classification:clean4.winEXE@1/0@1/1
              EGA Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • VT rate limit hit for: VALUESearch.exe
              No simulations
              No context
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              AMAZONEXPANSIONGBFw Message from Kevin - Update on Coles Supply Chain Modernisation 31-10-24.emlGet hashmaliciousUnknownBrowse
              • 3.33.220.150
              Indocount Invoice Amendment.exeGet hashmaliciousFormBookBrowse
              • 3.33.130.190
              Statement Cargomind 2024-09-12 (K07234).exeGet hashmaliciousFormBookBrowse
              • 3.33.130.190
              SWIFT.exeGet hashmaliciousFormBookBrowse
              • 3.33.130.190
              HT9324-25 1x40HC LDHFCLDEHAM29656 MRSU5087674.exeGet hashmaliciousFormBookBrowse
              • 3.33.130.190
              http://www.thearchiterra.gr/Get hashmaliciousUnknownBrowse
              • 52.223.34.155
              Order SO311180.exeGet hashmaliciousFormBookBrowse
              • 3.33.130.190
              http://www.thearchiterra.gr/Get hashmaliciousUnknownBrowse
              • 52.223.34.155
              #10302024.exeGet hashmaliciousFormBookBrowse
              • 3.33.130.190
              http://www.thearchiterra.gr/Get hashmaliciousUnknownBrowse
              • 52.223.34.155
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
              • 3.39.130.246
              file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
              • 3.39.130.246
              file.exeGet hashmaliciousLummaCBrowse
              • 3.39.130.246
              Lana_Rhoades_Photoos.jsGet hashmaliciousUnknownBrowse
              • 3.39.130.246
              file.exeGet hashmaliciousLummaCBrowse
              • 3.39.130.246
              file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, XWormBrowse
              • 3.39.130.246
              a.htaGet hashmaliciousDarkComet, DarkTortilla, NeshtaBrowse
              • 3.39.130.246
              file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
              • 3.39.130.246
              file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
              • 3.39.130.246
              Set-Up.exeGet hashmaliciousLummaCBrowse
              • 3.39.130.246
              No context
              No created / dropped files found
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):6.669964233328979
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.10%
              • InstallShield setup (43055/19) 0.43%
              • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
              • Win16/32 Executable Delphi generic (2074/23) 0.02%
              • Generic Win/DOS Executable (2004/3) 0.02%
              File name:VALUESearch.exe
              File size:3'837'952 bytes
              MD5:bf8e1edfd9c8b66f2056d400a532e53d
              SHA1:c71fc958d8d1bc031b85426de97e214926799f9c
              SHA256:7e0ab1acded8fb3a35517e2a9a59192a6d29e6b58fb547b20864b47444f0f6c2
              SHA512:cf919407be9b8291ebdad8b9b6fe734f743e731a069b400b5ec6167c329ac002625ec3d49c312d039dadb0abdee8e3d41fe5c56a6aa63b2a63dc7f64b837da81
              SSDEEP:49152:kgiMlpKhJOqb2v56SJht9b1+O+Hv+E7mgL7HeAX9H6O1vm3L:kgiMnKhbbaBEqgLVZ
              TLSH:A8068E53B684757EE06F1F3E5827A6F2583F7A6025468C1BE7E0089C8E397802D366D7
              File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
              Icon Hash:1bc96c6c39318797
              Entrypoint:0x6e4210
              Entrypoint Section:.itext
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Time Stamp:0x667CFCE0 [Thu Jun 27 05:47:12 2024 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:6
              OS Version Minor:0
              File Version Major:6
              File Version Minor:0
              Subsystem Version Major:6
              Subsystem Version Minor:0
              Import Hash:ef95d5d70956c16b718ca7889076cf7c
              Instruction
              push ebp
              mov ebp, esp
              add esp, FFFFFFF0h
              mov eax, 006D8754h
              call 00007F3C9C903EC9h
              push 006E42B4h
              push FFFFFFFFh
              push 00000000h
              call 00007F3C9C9085FFh
              mov dword ptr [006F8384h], eax
              cmp dword ptr [006F8384h], 00000000h
              je 00007F3C9CBD6292h
              call 00007F3C9C908724h
              test eax, eax
              jnbe 00007F3C9CBD6289h
              mov eax, dword ptr [006F06FCh]
              mov eax, dword ptr [eax]
              call 00007F3C9CAF0754h
              mov eax, dword ptr [006F06FCh]
              mov eax, dword ptr [eax]
              mov edx, 006E42C8h
              call 00007F3C9CAF017Bh
              mov eax, dword ptr [006F06FCh]
              mov eax, dword ptr [eax]
              mov dl, 01h
              call 00007F3C9CAF2721h
              mov ecx, dword ptr [006F052Ch]
              mov eax, dword ptr [006F06FCh]
              mov eax, dword ptr [eax]
              mov edx, dword ptr [006D53D4h]
              call 00007F3C9CAF0735h
              mov ecx, dword ptr [006F00CCh]
              mov eax, dword ptr [006F06FCh]
              mov eax, dword ptr [eax]
              mov edx, dword ptr [006D3B60h]
              call 00007F3C9CAF071Dh
              mov eax, dword ptr [006F06FCh]
              mov eax, dword ptr [eax]
              call 00007F3C9CAF0871h
              call 00007F3C9C8FBFF4h
              add byte ptr [eax], al
              add byte ptr [esi+00h], dl
              push ebx
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax-00FFFDFCh], dh
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x2fe0000x74.edata
              IMAGE_DIRECTORY_ENTRY_IMPORT0x2f90000x3dbe.idata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x33f0000x77e00.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x3010000x3d8b8.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x3000000x18.rdata
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x2f9aa80x968.idata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x2fd0000xee8.didata
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x2e01c00x2e020001f80e93a3d9f02870a8faab07449581unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .itext0x2e20000x22f80x2400ed210fdcaa6a057abfd3ab40c21c4fc6False0.5364583333333334data6.30721935317524IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .data0x2e50000xba880xbc00c5a00a9a0c47acff9ab297682c17a940False0.5461893284574468data6.132885221948647IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .bss0x2f10000x73880x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .idata0x2f90000x3dbe0x3e00556fa6ff022429b8cca966ec36014567False0.32963709677419356data5.288407720305398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .didata0x2fd0000xee80x1000d91d917a6a4d20632f0dcba685f6f8a7False0.33154296875data4.319654426366936IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .edata0x2fe0000x740x20007e5b1207f7b698114650030a3a89381False0.185546875data1.3895298976923918IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .tls0x2ff0000x5c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rdata0x3000000x5d0x200dac9ee4757740a04a4ccf872642eab8bFalse0.189453125data1.3509693655806156IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x3010000x3d8b80x3da004687272bfd9718bfce4d7045ef07ec87False0.575894555020284data6.723036441335IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              .rsrc0x33f0000x77e000x77e003a0d3ec343a23beb826deff46fa475d3False0.26712395724713245data6.46199750703396IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_CURSOR0x340c240x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
              RT_CURSOR0x340d580x134dataEnglishUnited States0.4642857142857143
              RT_CURSOR0x340e8c0x134dataEnglishUnited States0.4805194805194805
              RT_CURSOR0x340fc00x134dataEnglishUnited States0.38311688311688313
              RT_CURSOR0x3410f40x134dataEnglishUnited States0.36038961038961037
              RT_CURSOR0x3412280x134dataEnglishUnited States0.4090909090909091
              RT_CURSOR0x34135c0x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4967532467532468
              RT_BITMAP0x3414900x6e8Device independent bitmap graphic, 24 x 24 x 24, image size 1728, resolution 3780 x 3780 px/mEnglishUnited States0.04242081447963801
              RT_ICON0x341b780x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.46365248226950356
              RT_ICON0x341fe00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States0.3422131147540984
              RT_ICON0x3429680x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.2896341463414634
              RT_ICON0x343a100x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.21141078838174274
              RT_ICON0x345fb80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States0.17123287671232876
              RT_ICON0x34a1e00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736EnglishUnited States0.16848428835489834
              RT_ICON0x34f6680x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States0.14993693504309438
              RT_ICON0x358b100x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States0.13972849875783747
              RT_ICON0x3693380x5b29PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9978574795389296
              RT_STRING0x36ee640x628DOS executable (COM, 0x8C-variant)0.35406091370558374
              RT_STRING0x36f48c0xb60data0.24553571428571427
              RT_STRING0x36ffec0x464data0.33807829181494664
              RT_STRING0x3704500x3e8data0.364
              RT_STRING0x3708380x440data0.36672794117647056
              RT_STRING0x370c780x498data0.37670068027210885
              RT_STRING0x3711100x358data0.3107476635514019
              RT_STRING0x3714680x428data0.40883458646616544
              RT_STRING0x3718900x134data0.5974025974025974
              RT_STRING0x3719c40xd0data0.6778846153846154
              RT_STRING0x371a940x120data0.6041666666666666
              RT_STRING0x371bb40x32cdata0.4248768472906404
              RT_STRING0x371ee00x3dcdata0.3937246963562753
              RT_STRING0x3722bc0x3dcdata0.3815789473684211
              RT_STRING0x3726980x464data0.39234875444839856
              RT_STRING0x372afc0x4ecdata0.3119047619047619
              RT_STRING0x372fe80x300data0.3580729166666667
              RT_STRING0x3732e80x334data0.3804878048780488
              RT_STRING0x37361c0x3f8data0.4074803149606299
              RT_STRING0x373a140x4b0data0.3491666666666667
              RT_STRING0x373ec40x45cdata0.3906810035842294
              RT_STRING0x3743200x4b4data0.3239202657807309
              RT_STRING0x3747d40x364data0.39400921658986177
              RT_STRING0x374b380x3ecdata0.34462151394422313
              RT_STRING0x374f240x3d8data0.3546747967479675
              RT_STRING0x3752fc0xf4data0.5491803278688525
              RT_STRING0x3753f00xc4data0.6275510204081632
              RT_STRING0x3754b40x25cdata0.49503311258278143
              RT_STRING0x3757100x414data0.34674329501915707
              RT_STRING0x375b240x37cdata0.3744394618834081
              RT_STRING0x375ea00x2dcdata0.38114754098360654
              RT_STRING0x37617c0x340data0.3485576923076923
              RT_RCDATA0x3764bc0xd5dPNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0032154340836013
              RT_RCDATA0x37721c0xd57PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.003221083455344
              RT_RCDATA0x377f740xcfcPNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.003309265944645
              RT_RCDATA0x378c700xcd9PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0033444816053512
              RT_RCDATA0x37994c0xd5dPNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0032154340836013
              RT_RCDATA0x37a6ac0xd57PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.003221083455344
              RT_RCDATA0x37b4040xc4ePNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0034920634920634
              RT_RCDATA0x37c0540xc4ePNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0034920634920634
              RT_RCDATA0x37cca40xcb5PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0033814940055334
              RT_RCDATA0x37d95c0xcb0PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0033866995073892
              RT_RCDATA0x37e60c0xd56PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0032220269478618
              RT_RCDATA0x37f3640xd47PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0032362459546926
              RT_RCDATA0x3800ac0xdc2PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0031232254400908
              RT_RCDATA0x380e700xdc5PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0031205673758865
              RT_RCDATA0x381c380xcf3PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.003318250377074
              RT_RCDATA0x38292c0xcedPNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0033242671501965
              RT_RCDATA0x38361c0xda9PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0031455533314269
              RT_RCDATA0x3843c80xda6PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0031482541499714
              RT_RCDATA0x3851700xcf3PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.003318250377074
              RT_RCDATA0x385e640xcedPNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0033242671501965
              RT_RCDATA0x386b540xbfePNG image data, 15 x 15, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0035830618892507
              RT_RCDATA0x3877540xd04PNG image data, 30 x 30, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0033013205282113
              RT_RCDATA0x3884580xc0ePNG image data, 15 x 15, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0035644847699288
              RT_RCDATA0x3890680xc1bPNG image data, 15 x 15, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0035495321071313
              RT_RCDATA0x389c840xd36PNG image data, 30 x 30, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0032525133057362
              RT_RCDATA0x38a9bc0xd0fPNG image data, 30 x 30, 8-bit/color RGBA, non-interlacedEnglishUnited States1.003290457672749
              RT_RCDATA0x38b6cc0xb07PNG image data, 15 x 15, 8-bit/color RGBA, non-interlacedEnglishUnited States1.003896563939072
              RT_RCDATA0x38c1d40xb29PNG image data, 30 x 30, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0038501925096255
              RT_RCDATA0x38cd000xb7bPNG image data, 15 x 15, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0037427696495407
              RT_RCDATA0x38d87c0xbd4PNG image data, 30 x 30, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0036327608982827
              RT_RCDATA0x38e4500xb8dPNG image data, 15 x 15, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0037199864727764
              RT_RCDATA0x38efe00xc13PNG image data, 30 x 30, 8-bit/color RGBA, non-interlacedEnglishUnited States1.00355871886121
              RT_RCDATA0x38fbf40xb1dPNG image data, 15 x 15, 8-bit/color RGBA, non-interlacedEnglishUnited States1.003866432337434
              RT_RCDATA0x3907140xb45PNG image data, 30 x 30, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0038128249566725
              RT_RCDATA0x39125c0xb86PNG image data, 15 x 15, 8-bit/color RGBA, non-interlacedEnglishUnited States1.003728813559322
              RT_RCDATA0x391de40xc00PNG image data, 30 x 30, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0035807291666667
              RT_RCDATA0x3929e40xb7aPNG image data, 15 x 15, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0037440435670524
              RT_RCDATA0x3935600xbf6PNG image data, 30 x 30, 8-bit/color RGBA, non-interlacedEnglishUnited States1.003592423252776
              RT_RCDATA0x3941580xbebPNG image data, 15 x 15, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0036053752867913
              RT_RCDATA0x394d440xc85PNG image data, 30 x 30, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0034321372854915
              RT_RCDATA0x3959cc0xb83PNG image data, 15 x 15, 8-bit/color RGBA, non-interlacedEnglishUnited States1.003732609433322
              RT_RCDATA0x3965500xc03PNG image data, 30 x 30, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0035772357723578
              RT_RCDATA0x3971540xc2cPNG image data, 15 x 15, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0035301668806162
              RT_RCDATA0x397d800xd45PNG image data, 30 x 30, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0032381513099793
              RT_RCDATA0x398ac80x10data1.5
              RT_RCDATA0x398ad80x148bPNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0020916524054002
              RT_RCDATA0x399f640x111ePNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0025102692834322
              RT_RCDATA0x39b0840xd8cPNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0031718569780854
              RT_RCDATA0x39be100x9b0data0.5
              RT_RCDATA0x39c7c00x4dataEnglishUnited States3.0
              RT_RCDATA0x39c7c40x43d1Delphi compiled form 'TfmAlert'0.9073210068544438
              RT_RCDATA0x3a0b980x456eDelphi compiled form 'TfmLaunch'0.8883200180038258
              RT_RCDATA0x3a51080x10400Delphi compiled form 'TfmMain'0.3766376201923077
              RT_RCDATA0x3b55080x31cDelphi compiled form 'TfmProc'0.6407035175879398
              RT_RCDATA0x3b58240x488Delphi compiled form 'TLoginDialog'0.4879310344827586
              RT_RCDATA0x3b5cac0x3c4Delphi compiled form 'TPasswordDialog'0.4678423236514523
              RT_GROUP_CURSOR0x3b60700x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
              RT_GROUP_CURSOR0x3b60840x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
              RT_GROUP_CURSOR0x3b60980x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
              RT_GROUP_CURSOR0x3b60ac0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
              RT_GROUP_CURSOR0x3b60c00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
              RT_GROUP_CURSOR0x3b60d40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
              RT_GROUP_CURSOR0x3b60e80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
              RT_GROUP_ICON0x3b60fc0x84dataEnglishUnited States0.7196969696969697
              RT_VERSION0x3b61800x20cdataEnglishUnited States0.517175572519084
              RT_MANIFEST0x3b638c0x76dXML 1.0 document, ASCII text, with CRLF, LF line terminatorsEnglishUnited States0.39189900052603893
              RT_MANIFEST0x3b6afc0x154XML 1.0 document, ASCII text, with CRLF line terminatorsKoreanNorth Korea0.6088235294117647
              RT_MANIFEST0x3b6afc0x154XML 1.0 document, ASCII text, with CRLF line terminatorsKoreanSouth Korea0.6088235294117647
              DLLImport
              winspool.drvDocumentPropertiesW, ClosePrinter, OpenPrinterW, GetDefaultPrinterW, EnumPrintersW
              comctl32.dllImageList_GetImageInfo, FlatSB_SetScrollInfo, InitCommonControls, ImageList_DragMove, ImageList_Destroy, _TrackMouseEvent, ImageList_DragShowNolock, ImageList_Add, FlatSB_SetScrollProp, ImageList_GetDragImage, ImageList_Create, ImageList_EndDrag, ImageList_DrawEx, ImageList_SetImageCount, FlatSB_GetScrollPos, FlatSB_SetScrollPos, InitializeFlatSB, ImageList_Copy, FlatSB_GetScrollInfo, ImageList_Write, ImageList_DrawIndirect, ImageList_SetBkColor, ImageList_GetBkColor, ImageList_BeginDrag, ImageList_GetIcon, ImageList_Replace, ImageList_GetImageCount, ImageList_DragEnter, ImageList_GetIconSize, ImageList_SetIconSize, ImageList_Read, ImageList_DragLeave, ImageList_LoadImageW, ImageList_Draw, ImageList_Remove, ImageList_ReplaceIcon, ImageList_SetOverlayImage
              shell32.dllSHGetFolderPathW, Shell_NotifyIconW, SHAppBarMessage, SHFileOperationW, ShellExecuteExW
              user32.dllCopyImage, CreateWindowExW, GetMenuItemInfoW, SetMenuItemInfoW, DefFrameProcW, GetDCEx, PeekMessageW, MonitorFromWindow, GetDlgCtrlID, GetUpdateRect, SetTimer, WindowFromPoint, BeginPaint, RegisterClipboardFormatW, FrameRect, MapVirtualKeyW, OffsetRect, IsWindowUnicode, RegisterWindowMessageW, FillRect, GetMenuStringW, DispatchMessageW, CreateAcceleratorTableW, SendMessageA, DefMDIChildProcW, EnumWindows, GetClassInfoW, ShowOwnedPopups, GetSystemMenu, GetScrollRange, GetScrollPos, SetScrollPos, GetActiveWindow, SetActiveWindow, DrawEdge, GetKeyboardLayoutList, LoadBitmapW, DrawFocusRect, EnumChildWindows, GetScrollBarInfo, ReleaseCapture, UnhookWindowsHookEx, LoadCursorW, GetCapture, SetCapture, CreatePopupMenu, ScrollWindow, ShowCaret, GetMenuItemID, GetLastActivePopup, CharLowerBuffW, GetSystemMetrics, SetWindowLongW, PostMessageW, DrawMenuBar, SetParent, IsZoomed, CharUpperBuffW, GetClientRect, IsChild, ClientToScreen, GetClipboardData, SetClipboardData, SetWindowPlacement, IsIconic, CallNextHookEx, GetMonitorInfoW, ShowWindow, CheckMenuItem, CharUpperW, DefWindowProcW, GetForegroundWindow, SetForegroundWindow, GetWindowTextW, EnableWindow, DestroyWindow, IsDialogMessageW, EndMenu, RegisterClassW, CharNextW, GetWindowThreadProcessId, RedrawWindow, GetDC, GetFocus, SetFocus, EndPaint, ReleaseDC, MsgWaitForMultipleObjectsEx, LoadKeyboardLayoutW, GetClassLongW, ActivateKeyboardLayout, GetParent, DrawTextW, SetScrollRange, MonitorFromRect, InsertMenuItemW, PeekMessageA, GetPropW, SetClassLongW, MessageBoxW, MessageBeep, SetPropW, RemovePropW, UpdateWindow, GetSubMenu, MsgWaitForMultipleObjects, DestroyMenu, DestroyIcon, SetWindowsHookExW, EmptyClipboard, IsWindowVisible, DispatchMessageA, UnregisterClassW, GetTopWindow, SendMessageW, AdjustWindowRectEx, DrawIcon, IsWindow, EnumThreadWindows, GetMessageTime, InvalidateRect, GetKeyboardState, DrawFrameControl, ScreenToClient, SetCursor, CreateIcon, CreateMenu, LoadStringW, CharLowerW, SetWindowPos, SetWindowRgn, GetMenuItemCount, RemoveMenu, GetSysColorBrush, GetKeyboardLayoutNameW, GetWindowDC, TranslateMessage, OpenClipboard, DrawTextExW, MapWindowPoints, EnumDisplayMonitors, CallWindowProcW, CloseClipboard, DestroyCursor, GetScrollInfo, SetWindowTextW, GetMessageExtraInfo, EnableScrollBar, GetSysColor, TrackPopupMenu, CopyIcon, DrawIconEx, PostQuitMessage, GetClassNameW, ShowScrollBar, EnableMenuItem, GetIconInfo, GetMessagePos, SetScrollInfo, GetKeyNameTextW, GetDesktopWindow, GetCursorPos, SetCursorPos, HideCaret, GetMenu, GetMenuState, SetMenu, SetRect, GetKeyState, FindWindowExW, MonitorFromPoint, ValidateRect, SystemParametersInfoW, LoadIconW, GetCursor, GetWindow, GetWindowLongW, GetWindowRect, InsertMenuW, KillTimer, WaitMessage, IsWindowEnabled, IsDialogMessageA, TranslateMDISysAccel, GetWindowPlacement, CreateIconIndirect, FindWindowW, DeleteMenu, GetKeyboardLayout
              version.dllGetFileVersionInfoSizeW, VerQueryValueW, GetFileVersionInfoW
              oleaut32.dllSafeArrayPutElement, GetErrorInfo, VariantInit, VariantClear, SysFreeString, SafeArrayAccessData, SysReAllocStringLen, SafeArrayCreate, SafeArrayGetElement, SysAllocStringLen, SafeArrayUnaccessData, SafeArrayPtrOfIndex, VariantCopy, SafeArrayGetUBound, SafeArrayGetLBound, VariantCopyInd, VariantChangeType
              WTSAPI32.DLLWTSUnRegisterSessionNotification, WTSRegisterSessionNotification
              advapi32.dllRegSetValueExW, RegConnectRegistryW, OpenThreadToken, RegQueryInfoKeyW, RegUnLoadKeyW, RegSaveKeyW, IsValidSid, EqualSid, RegReplaceKeyW, GetSidSubAuthority, GetTokenInformation, RegCreateKeyExW, GetSidSubAuthorityCount, RegLoadKeyW, RegEnumKeyExW, GetSidIdentifierAuthority, RegDeleteKeyW, RegOpenKeyExW, OpenProcessToken, AllocateAndInitializeSid, FreeSid, RegDeleteValueW, RegFlushKey, RegEnumValueW, RegQueryValueExW, RegCloseKey, RegRestoreKeyW
              msvcrt.dllmemcpy, memset
              winhttp.dllWinHttpGetIEProxyConfigForCurrentUser, WinHttpSetTimeouts, WinHttpSetStatusCallback, WinHttpConnect, WinHttpReceiveResponse, WinHttpQueryAuthSchemes, WinHttpGetProxyForUrl, WinHttpReadData, WinHttpCloseHandle, WinHttpQueryHeaders, WinHttpOpenRequest, WinHttpAddRequestHeaders, WinHttpOpen, WinHttpWriteData, WinHttpSetCredentials, WinHttpQueryDataAvailable, WinHttpSetOption, WinHttpSendRequest, WinHttpQueryOption
              kernel32.dllSetFileAttributesW, SetFileTime, QueryDosDeviceW, GetACP, GetExitCodeProcess, CloseHandle, LocalFree, GetCurrentProcessId, SizeofResource, TerminateThread, QueryPerformanceFrequency, IsDebuggerPresent, FindNextFileW, GetFullPathNameW, VirtualFree, GetProcessHeap, ExitProcess, HeapAlloc, GetCPInfoExW, GlobalSize, GetBinaryTypeW, RtlUnwind, GetCPInfo, EnumSystemLocalesW, GetStdHandle, GetTimeZoneInformation, FileTimeToLocalFileTime, SystemTimeToTzSpecificLocalTime, GetModuleHandleW, FreeLibrary, TryEnterCriticalSection, HeapDestroy, FileTimeToDosDateTime, ReadFile, GetUserDefaultLCID, CreateProcessW, GetLastError, GetModuleFileNameW, SetLastError, GlobalAlloc, GlobalUnlock, FindResourceW, CreateThread, CompareStringW, CopyFileW, MapViewOfFile, CreateMutexW, LoadLibraryA, GetVolumeInformationW, ResetEvent, MulDiv, FreeResource, GetDriveTypeW, GetVersion, RaiseException, MoveFileW, GlobalAddAtomW, FormatMessageW, OpenProcess, SwitchToThread, GetExitCodeThread, GetCurrentThread, GetLogicalDrives, GetFileAttributesExW, LoadLibraryExW, TerminateProcess, LockResource, FileTimeToSystemTime, GetCurrentThreadId, UnhandledExceptionFilter, VirtualQuery, GlobalFindAtomW, VirtualQueryEx, GlobalFree, Sleep, EnterCriticalSection, SetFilePointer, LoadResource, SuspendThread, GetTickCount, GetFileSize, GlobalDeleteAtom, GetStartupInfoW, GetFileAttributesW, InitializeCriticalSection, GetThreadPriority, GetCurrentProcess, SetThreadPriority, GlobalLock, VirtualAlloc, GetCommandLineW, GetSystemInfo, LeaveCriticalSection, GetProcAddress, ResumeThread, GetLogicalDriveStringsW, GetVersionExW, VerifyVersionInfoW, HeapCreate, LCMapStringW, GetDiskFreeSpaceW, VerSetConditionMask, FindFirstFileW, GetUserDefaultUILanguage, UnmapViewOfFile, lstrlenW, QueryPerformanceCounter, SetEndOfFile, HeapFree, WideCharToMultiByte, FindClose, MultiByteToWideChar, LoadLibraryW, SetEvent, CreateFileW, GetLocaleInfoW, SystemTimeToFileTime, EnumResourceNamesW, DeleteFileW, GetLocalTime, WaitForSingleObject, GetOEMCP, WriteFile, CreateFileMappingW, ExitThread, DeleteCriticalSection, GetDateFormatW, TlsGetValue, SetErrorMode, TzSpecificLocalTimeToSystemTime, IsValidLocale, TlsSetValue, CreateDirectoryW, GetSystemDefaultUILanguage, EnumCalendarInfoW, LocalAlloc, RemoveDirectoryW, CreateEventW, WaitForMultipleObjectsEx, GetThreadLocale, SetThreadLocale
              SHFolder.dllSHGetFolderPathW
              gdiplus.dllGdipFillPath, GdipDrawArc, GdipCreateFromHDC, GdipDeletePen, GdiplusShutdown, GdipCreateSolidFill, GdipDeleteGraphics, GdipDrawPath, GdipAlloc, GdiplusStartup, GdipFree, GdipDeletePath, GdipAddPathArc, GdipAddPathLine, GdipCreatePath, GdipCreatePen1, GdipDrawLine, GdipSetSmoothingMode
              ole32.dllOleRegEnumVerbs, IsAccelerator, CoCreateInstance, CoUninitialize, IsEqualGUID, CreateStreamOnHGlobal, OleInitialize, CLSIDFromProgID, CoInitializeEx, OleUninitialize, CoGetClassObject, CoInitialize, CoTaskMemFree, OleDraw, CoTaskMemAlloc, OleSetMenuDescriptor, StringFromCLSID
              gdi32.dllPie, SetBkMode, CreateCompatibleBitmap, GetEnhMetaFileHeader, CloseEnhMetaFile, RectVisible, AngleArc, ResizePalette, SetAbortProc, SetTextColor, StretchBlt, RoundRect, SelectClipRgn, RestoreDC, SetRectRgn, GetTextMetricsW, GetWindowOrgEx, CreatePalette, PolyBezierTo, CreateICW, CreateDCW, GetStockObject, CreateSolidBrush, Polygon, MoveToEx, PlayEnhMetaFile, Ellipse, StartPage, GetBitmapBits, StartDocW, AbortDoc, GetSystemPaletteEntries, GetEnhMetaFileBits, GetEnhMetaFilePaletteEntries, CreatePenIndirect, SetMapMode, CreateFontIndirectW, PolyBezier, LPtoDP, EndDoc, GetObjectW, GetWinMetaFileBits, SetROP2, GetEnhMetaFileDescriptionW, ArcTo, CreateEnhMetaFileW, Arc, SelectPalette, ExcludeClipRect, MaskBlt, SetWindowOrgEx, EndPage, DeleteEnhMetaFile, Chord, SetDIBits, SetViewportOrgEx, CreateRectRgn, RealizePalette, SetDIBColorTable, GetDIBColorTable, CreateBrushIndirect, PatBlt, SetEnhMetaFileBits, Rectangle, SaveDC, DeleteDC, BitBlt, FrameRgn, GetDeviceCaps, GetTextExtentPoint32W, GetClipBox, IntersectClipRect, Polyline, CreateBitmap, CombineRgn, SetWinMetaFileBits, GetStretchBltMode, CreateDIBitmap, SetStretchBltMode, GetDIBits, CreateDIBSection, LineTo, GetRgnBox, EnumFontsW, CreateHalftonePalette, SelectObject, DeleteObject, ExtFloodFill, UnrealizeObject, CopyEnhMetaFileW, SetBkColor, CreateCompatibleDC, GetBrushOrgEx, GetCurrentPositionEx, GetNearestPaletteIndex, GetTextExtentPointW, ExtTextOutW, SetBrushOrgEx, GetPixel, GdiFlush, SetPixel, EnumFontFamiliesExW, StretchDIBits, GetPaletteEntries
              NameOrdinalAddress
              __dbk_fcall_wrapper20x411d98
              dbkFCallWrapperAddr10x6f4648
              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States
              KoreanNorth Korea
              KoreanSouth Korea
              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
              2024-10-31T19:44:29.263045+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.5497043.39.130.246443TCP
              2024-10-31T19:44:46.565850+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.549705TCP
              2024-10-31T19:45:18.289136+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.560823TCP
              TimestampSource PortDest PortSource IPDest IP
              Oct 31, 2024 19:44:28.288239002 CET49704443192.168.2.53.39.130.246
              Oct 31, 2024 19:44:28.288371086 CET443497043.39.130.246192.168.2.5
              Oct 31, 2024 19:44:28.288465023 CET49704443192.168.2.53.39.130.246
              Oct 31, 2024 19:44:28.289691925 CET49704443192.168.2.53.39.130.246
              Oct 31, 2024 19:44:28.289729118 CET443497043.39.130.246192.168.2.5
              Oct 31, 2024 19:44:29.262907982 CET443497043.39.130.246192.168.2.5
              Oct 31, 2024 19:44:29.263045073 CET49704443192.168.2.53.39.130.246
              Oct 31, 2024 19:44:29.266860962 CET49704443192.168.2.53.39.130.246
              Oct 31, 2024 19:44:29.266905069 CET443497043.39.130.246192.168.2.5
              Oct 31, 2024 19:44:29.267170906 CET443497043.39.130.246192.168.2.5
              Oct 31, 2024 19:44:29.318259001 CET49704443192.168.2.53.39.130.246
              Oct 31, 2024 19:44:29.566907883 CET49704443192.168.2.53.39.130.246
              Oct 31, 2024 19:44:29.607367039 CET443497043.39.130.246192.168.2.5
              Oct 31, 2024 19:44:29.874156952 CET443497043.39.130.246192.168.2.5
              Oct 31, 2024 19:44:29.874774933 CET443497043.39.130.246192.168.2.5
              Oct 31, 2024 19:44:29.874846935 CET49704443192.168.2.53.39.130.246
              Oct 31, 2024 19:44:29.876523018 CET49704443192.168.2.53.39.130.246
              Oct 31, 2024 19:44:29.876560926 CET443497043.39.130.246192.168.2.5
              Oct 31, 2024 19:44:29.876589060 CET49704443192.168.2.53.39.130.246
              Oct 31, 2024 19:44:29.876621962 CET443497043.39.130.246192.168.2.5
              TimestampSource PortDest PortSource IPDest IP
              Oct 31, 2024 19:44:27.729260921 CET5029353192.168.2.51.1.1.1
              Oct 31, 2024 19:44:28.281595945 CET53502931.1.1.1192.168.2.5
              Oct 31, 2024 19:44:49.326895952 CET53611321.1.1.1192.168.2.5
              Oct 31, 2024 19:44:50.966552973 CET53493201.1.1.1192.168.2.5
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Oct 31, 2024 19:44:27.729260921 CET192.168.2.51.1.1.10x1580Standard query (0)valuesearch.co.krA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Oct 31, 2024 19:44:28.281595945 CET1.1.1.1192.168.2.50x1580No error (0)valuesearch.co.kr3.39.130.246A (IP address)IN (0x0001)false
              Oct 31, 2024 19:44:28.281595945 CET1.1.1.1192.168.2.50x1580No error (0)valuesearch.co.kr3.36.251.235A (IP address)IN (0x0001)false
              • valuesearch.co.kr
              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.5497043.39.130.2464433092C:\Users\user\Desktop\VALUESearch.exe
              TimestampBytes transferredDirectionData
              2024-10-31 18:44:29 UTC192OUTGET /files/publish/xlllibver.txt HTTP/1.1
              Connection: Keep-Alive
              Accept: application/json
              Accept-Charset: utf-8
              Accept-Language: ko-KR
              User-Agent: Zewus Agent
              Host: valuesearch.co.kr
              2024-10-31 18:44:29 UTC256INHTTP/1.1 200 OK
              Date: Thu, 31 Oct 2024 18:44:29 GMT
              Content-Type: text/plain; charset=utf-8
              Content-Length: 8
              Connection: close
              Expires: Sat, 30 Nov 2024 18:44:29 GMT
              Last-Modified: Wed, 30 Oct 2024 08:11:11 GMT
              Server: VALUESearch - 1.95.0.1581
              2024-10-31 18:44:29 UTC8INData Raw: 3e 31 2e 31 2e 36 2e 34
              Data Ascii: >1.1.6.4


              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Target ID:0
              Start time:14:44:26
              Start date:31/10/2024
              Path:C:\Users\user\Desktop\VALUESearch.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\VALUESearch.exe"
              Imagebase:0xc00000
              File size:3'837'952 bytes
              MD5 hash:BF8E1EDFD9C8B66F2056D400A532E53D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:Borland Delphi
              Reputation:low
              Has exited:false

              No disassembly