Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
apprun.exe

Overview

General Information

Sample Name:apprun.exe
Analysis ID:635356
MD5:7e13c6a35ac8ce03ece66e1d65b0601e
SHA1:a7c70afdd8ca0aae7fb7689d01c0c574aee85875
SHA256:d189bd389b7b442c31e1d009f958ab67d1361b75383b4dcdd53944970cf3fe0f

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Uses 32bit PE files
PE file contains strange resources
Tries to load missing DLLs
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Contains functionality to check if a connection to the internet is available
Contains functionality which may be used to detect a debugger (GetProcessHeap)
PE file contains executable resources (Code or Archives)
Program does not show much activity (idle)

Classification

  • System is w10x64
  • apprun.exe (PID: 5160 cmdline: "C:\Users\user\Desktop\apprun.exe" MD5: 7E13C6A35AC8CE03ECE66E1D65B0601E)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: apprun.exeVirustotal: Detection: 42%Perma Link
Source: apprun.exeReversingLabs: Detection: 29%
Source: apprun.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: apprun.exeStatic PE information: certificate valid
Source: apprun.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: C:\git\modular-installer\Release\kernel.pdbVV$2GCTL source: apprun.exe
Source: Binary string: C:\git\modular-installer\Release\kernel.pdb source: apprun.exe
Source: C:\Users\user\Desktop\apprun.exeCode function: 0_2_011449B5 ___std_fs_close_handle@4,FindFirstFileExW,GetLastError,FindFirstFileExW,GetLastError,
Source: C:\Users\user\Desktop\apprun.exeCode function: 0_2_01144A15 GetFileAttributesExW,GetLastError,___std_fs_open_handle@16,GetLastError,GetFileInformationByHandle,FindFirstFileExW,FindClose,___std_fs_close_handle@4,
Source: C:\Users\user\Desktop\apprun.exeCode function: 0_2_0113193D __EH_prolog3_GS,memset,InternetCheckConnectionW,MessageBoxW,
Source: apprun.exeString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
Source: apprun.exeString found in binary or memory: http://crl.globalsign.com/gsextendcodesignsha2g3.crl0
Source: apprun.exeString found in binary or memory: http://crl.globalsign.com/root-r3.crl0b
Source: apprun.exeString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
Source: apprun.exeString found in binary or memory: http://ocsp2.globalsign.com/gsextendcodesignsha2g30U
Source: apprun.exeString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
Source: apprun.exeString found in binary or memory: http://ocsp2.globalsign.com/rootr306
Source: apprun.exeString found in binary or memory: http://secure.globalsign.com/cacert/gsextendcodesignsha2g3ocsp.crt0
Source: apprun.exeString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
Source: apprun.exeString found in binary or memory: http://www.google.com
Source: apprun.exeString found in binary or memory: http://www.google.comUninstallUninstall
Source: apprun.exeString found in binary or memory: https://www.globalsign.com/repository/0
Source: apprun.exeString found in binary or memory: https://www.globalsign.com/repository/06
Source: apprun.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: apprun.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: C:\Users\user\Desktop\apprun.exeSection loaded: libcurl.dll
Source: C:\Users\user\Desktop\apprun.exeCode function: 0_2_01139394
Source: C:\Users\user\Desktop\apprun.exeCode function: 0_2_01127275
Source: C:\Users\user\Desktop\apprun.exeCode function: 0_2_01135533
Source: C:\Users\user\Desktop\apprun.exeCode function: 0_2_0113C562
Source: C:\Users\user\Desktop\apprun.exeCode function: 0_2_0113A4AA
Source: C:\Users\user\Desktop\apprun.exeCode function: 0_2_0112EF1A
Source: C:\Users\user\Desktop\apprun.exeCode function: String function: 01143D5D appears 107 times
Source: C:\Users\user\Desktop\apprun.exeCode function: String function: 011298AC appears 261 times
Source: C:\Users\user\Desktop\apprun.exeCode function: String function: 011436A0 appears 53 times
Source: C:\Users\user\Desktop\apprun.exeCode function: String function: 01143D91 appears 103 times
Source: C:\Users\user\Desktop\apprun.exeCode function: String function: 0112BA2B appears 52 times
Source: apprun.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
Source: apprun.exeVirustotal: Detection: 42%
Source: apprun.exeReversingLabs: Detection: 29%
Source: apprun.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\apprun.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Users\user\Desktop\apprun.exeCode function: 0_2_01142060 __EH_prolog3_GS,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,
Source: C:\Users\user\Desktop\apprun.exeCommand line argument: -tasks
Source: C:\Users\user\Desktop\apprun.exeCommand line argument: -install
Source: C:\Users\user\Desktop\apprun.exeCommand line argument: -updatesched
Source: C:\Users\user\Desktop\apprun.exeCommand line argument: -updatestartup
Source: C:\Users\user\Desktop\apprun.exeCommand line argument: -uninstall
Source: C:\Users\user\Desktop\apprun.exeCommand line argument: -resetsearch
Source: C:\Users\user\Desktop\apprun.exeCommand line argument: -version
Source: C:\Users\user\Desktop\apprun.exeCommand line argument: -install
Source: apprun.exeString found in binary or memory: C:\git\modular-installer\kernel\kernel.cpp
Source: apprun.exeString found in binary or memory: C:\git\modular-installer\kernel\InstallerConfiguration.cpp
Source: apprun.exeString found in binary or memory: api/report/install
Source: apprun.exeString found in binary or memory: C:\git\modular-installer\kernel\IPCService.cpp
Source: apprun.exeString found in binary or memory: C:\git\modular-installer\kernel\Action.cpp
Source: apprun.exeString found in binary or memory: -install
Source: apprun.exeString found in binary or memory: v2/install
Source: apprun.exeString found in binary or memory: C:\git\modular-installer\kernel\Action.cpp
Source: apprun.exeString found in binary or memory: space673ae6306d8266a780df868d6772aab3b9662e0f1248KernelActionmimeTypedefaultJumpconfigurationfile\$cwdidcustomJumpjumpTableFailed to split URL "Downloading DLL "int __thiscall InstPC::Action::run(void)C:\git\modular-installer\kernel\Action.cppError occurred creating unique filenamewb+Could not open new temporary file
Source: apprun.exeString found in binary or memory: api/report/install
Source: apprun.exeString found in binary or memory: @Unknown exceptioninvalid string positionstring too longcodelabeldescription: "", "create_directorytemp_directory_pathreport_urlaipcrepcsearch_offerupdate_logupdate_actionuninstall_logUpdateisUpdatedfalseupdateUrlzoremov.combi.api/report/installapplift.exewb+UPDATEEntered updateStart (update_log) - -installunordered_map/set too longinvalid hash bucket count
Source: apprun.exeString found in binary or memory: @Unknown exceptioninvalid string positionstring too longcodelabeldescription: "", "create_directorytemp_directory_pathreport_urlaipcrepcsearch_offerupdate_logupdate_actionuninstall_logUpdateisUpdatedfalseupdateUrlzoremov.combi.api/report/installapplift.exewb+UPDATEEntered updateStart (update_log) - -installunordered_map/set too longinvalid hash bucket count
Source: apprun.exeString found in binary or memory: C:\git\modular-installer\kernel\InstallerConfiguration.cpp
Source: apprun.exeString found in binary or memory: @UNKNOWNedgeInstallerConfigurationactionsRunning actions - startvoid __thiscall InstPC::InstallerConfiguration::run(void)C:\git\modular-installer\kernel\InstallerConfiguration.cppRunning actions - module Running actions - module Running actions - module finished with return code Running actions - module finished with return code nextRunning actions - next module Running actions - next module Running actions - finishinvalid vector<T> subscript
Source: apprun.exeString found in binary or memory: C:\git\modular-installer\kernel\IPCService.cpp
Source: apprun.exeString found in binary or memory: v2/install
Source: apprun.exeString found in binary or memory: -install
Source: apprun.exeString found in binary or memory: C:\git\modular-installer\kernel\kernel.cpp
Source: apprun.exeString found in binary or memory: !A\.*directory_iterator::directory_iteratordirectory_iterator::operator++copy_fileexistsstatusIPCService1582447612575780--Failed to acquire size of buffer needed to store network adapters. Error: Failed to Network adapters data. Error: Select ProcessorId From Win32_processorProcessorIdSELECT Caption FROM Win32_OperatingSystemCaptionSOFTWARE\WOW6432Node\Clients\StartMenuInternetSOFTWARE\Clients\StartMenuInternetabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789. ,AppDirectoryAppX3xxs313wwkfjhythsb8q46xdsq8d2cvvAppX7rm9drdg8sk7vqndwj3sdjw11x96jc0yFriendlyTypeNameffSOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\firefox.exeedge_chromeSoftware\Microsoft\Edge\BlBeaconversionSoftware\Microsoft\Edge\PreferenceMACs\DefaultGS_ABE_LABS_LTD_SIGNATUREzoremov-updateinstallerEMPTYUpdate was triggered from: Requesting class Networking::Response __thiscall InstPC::IPCService::configurationImplementation(class Networking::Request)C:\git\modular-installer\kernel\IPCService.cpptotalTimenameLookupTimeconnectTimeappConnectTimepreTransferTimestartTransferTimeredirectTimeredirectCountResponse Info /emidapp_idv2/installinstall.jsonv2/uninstalluninstall.jsonCould not fetch installation configurationapplift.exeFinalizing update flowvoid __thiscall InstPC::IPCService::install(void)Entered updateComplete (update_log) - Fetching install actionsalg.Got install configuration Installer configuration readyFinished running configuration No install actions waitingFetching update actionsvoid __thiscall InstPC::IPCService::update(void)srv.up/update/checkeacbnEntered Check update needed (update_log) - Got update configuration Starting updateUpdate completedNo update actions waitingFetching tasksvoid __thiscall InstPC::IPCService::tasks(void)CHECK_TASKEntered 'Check task' flowEntered ReportUpdateAction - task-forSOME_ACTIONGot task configuration No tasks found.No task actions waitingFetching uninstall actionsvoid __thiscall InstPC::IPCService::uninstall(void)Got unintall configuration Uninstall configuration readyNo uninstall actions waitinghttp://www.google.comUninstallUninstall requires an internet connection. Please check your network connection and retry uninstall.Version Is >>>>>><<<<<< Start of program. Process ID: -tasks-install-updatesched-updatestartup-uninstall-resetsearch-versionElapsed run time: int __stdcall wWinMain(struct HINSTANCE__ *,struct HINSTANCE__ *,wchar_t *,int)C:\git\modular-installer\kernel\kernel.cppMFC error: exception: %fFailed to initialize cURLMETHOD not supported://curl_multi_wait() failed, code %d.
Source: apprun.exeString found in binary or memory: !A\.*directory_iterator::directory_iteratordirectory_iterator::operator++copy_fileexistsstatusIPCService1582447612575780--Failed to acquire size of buffer needed to store network adapters. Error: Failed to Network adapters data. Error: Select ProcessorId From Win32_processorProcessorIdSELECT Caption FROM Win32_OperatingSystemCaptionSOFTWARE\WOW6432Node\Clients\StartMenuInternetSOFTWARE\Clients\StartMenuInternetabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789. ,AppDirectoryAppX3xxs313wwkfjhythsb8q46xdsq8d2cvvAppX7rm9drdg8sk7vqndwj3sdjw11x96jc0yFriendlyTypeNameffSOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\firefox.exeedge_chromeSoftware\Microsoft\Edge\BlBeaconversionSoftware\Microsoft\Edge\PreferenceMACs\DefaultGS_ABE_LABS_LTD_SIGNATUREzoremov-updateinstallerEMPTYUpdate was triggered from: Requesting class Networking::Response __thiscall InstPC::IPCService::configurationImplementation(class Networking::Request)C:\git\modular-installer\kernel\IPCService.cpptotalTimenameLookupTimeconnectTimeappConnectTimepreTransferTimestartTransferTimeredirectTimeredirectCountResponse Info /emidapp_idv2/installinstall.jsonv2/uninstalluninstall.jsonCould not fetch installation configurationapplift.exeFinalizing update flowvoid __thiscall InstPC::IPCService::install(void)Entered updateComplete (update_log) - Fetching install actionsalg.Got install configuration Installer configuration readyFinished running configuration No install actions waitingFetching update actionsvoid __thiscall InstPC::IPCService::update(void)srv.up/update/checkeacbnEntered Check update needed (update_log) - Got update configuration Starting updateUpdate completedNo update actions waitingFetching tasksvoid __thiscall InstPC::IPCService::tasks(void)CHECK_TASKEntered 'Check task' flowEntered ReportUpdateAction - task-forSOME_ACTIONGot task configuration No tasks found.No task actions waitingFetching uninstall actionsvoid __thiscall InstPC::IPCService::uninstall(void)Got unintall configuration Uninstall configuration readyNo uninstall actions waitinghttp://www.google.comUninstallUninstall requires an internet connection. Please check your network connection and retry uninstall.Version Is >>>>>><<<<<< Start of program. Process ID: -tasks-install-updatesched-updatestartup-uninstall-resetsearch-versionElapsed run time: int __stdcall wWinMain(struct HINSTANCE__ *,struct HINSTANCE__ *,wchar_t *,int)C:\git\modular-installer\kernel\kernel.cppMFC error: exception: %fFailed to initialize cURLMETHOD not supported://curl_multi_wait() failed, code %d.
Source: apprun.exeString found in binary or memory: C:\git\modular-installer\Release\kernel.pdb
Source: apprun.exeString found in binary or memory: C:\git\modular-installer\Release\kernel.pdbVV$2GCTL
Source: classification engineClassification label: mal48.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\apprun.exeCode function: 0_2_01142822 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z,__EH_prolog3,CoInitializeEx,CoInitializeSecurity,#1511,CoCreateInstance,#1511,#2,#6,#1511,#1511,_CxxThrowException,
Source: apprun.exeStatic PE information: certificate valid
Source: apprun.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: apprun.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: apprun.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: apprun.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: apprun.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: apprun.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: apprun.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: apprun.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\git\modular-installer\Release\kernel.pdbVV$2GCTL source: apprun.exe
Source: Binary string: C:\git\modular-installer\Release\kernel.pdb source: apprun.exe
Source: apprun.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: apprun.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: apprun.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: apprun.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: apprun.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\apprun.exeCode function: 0_2_01143D26 push ecx; ret
Source: C:\Users\user\Desktop\apprun.exeCode function: 0_2_01144F78 push ecx; ret
Source: C:\Users\user\Desktop\apprun.exeCode function: 0_2_01143E86 push ecx; ret
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\apprun.exeCode function: 0_2_011449B5 ___std_fs_close_handle@4,FindFirstFileExW,GetLastError,FindFirstFileExW,GetLastError,
Source: C:\Users\user\Desktop\apprun.exeCode function: 0_2_01144A15 GetFileAttributesExW,GetLastError,___std_fs_open_handle@16,GetLastError,GetFileInformationByHandle,FindFirstFileExW,FindClose,___std_fs_close_handle@4,
Source: C:\Users\user\Desktop\apprun.exeCode function: 0_2_01144036 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Users\user\Desktop\apprun.exeCode function: 0_2_0112E69C __EH_prolog3_GS,GetAdaptersAddresses,GetAdaptersAddresses,GetProcessHeap,HeapAlloc,GetAdaptersAddresses,GetProcessHeap,HeapFree,#1511,GetProcessHeap,HeapFree,#1511,_CxxThrowException,
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\apprun.exeCode function: 0_2_011441C9 SetUnhandledExceptionFilter,
Source: C:\Users\user\Desktop\apprun.exeCode function: 0_2_01144036 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Users\user\Desktop\apprun.exeCode function: 0_2_01143B2B SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\Users\user\Desktop\apprun.exeCode function: 0_2_01144276 cpuid
Source: C:\Users\user\Desktop\apprun.exeCode function: 0_2_01143F29 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts3
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
DLL Side-Loading
LSASS Memory2
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)2
Obfuscated Files or Information
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDS1
File and Directory Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets22
System Information Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials1
System Network Connections Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
apprun.exe42%VirustotalBrowse
apprun.exe5%MetadefenderBrowse
apprun.exe29%ReversingLabsWin32.Adware.Zoremov
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.google.comUninstallUninstall0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.google.comapprun.exefalse
    high
    http://www.google.comUninstallUninstallapprun.exefalse
    • Avira URL Cloud: safe
    unknown
    No contacted IP infos
    Joe Sandbox Version:34.0.0 Boulder Opal
    Analysis ID:635356
    Start date and time: 27/05/202220:05:342022-05-27 20:05:34 +02:00
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 5m 20s
    Hypervisor based Inspection enabled:false
    Report type:light
    Sample file name:apprun.exe
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
    Number of analysed new started processes analysed:21
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal48.winEXE@1/0@0/0
    EGA Information:Failed
    HDC Information:
    • Successful, ratio: 100% (good quality ratio 90.5%)
    • Quality average: 48.6%
    • Quality standard deviation: 29.1%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Adjust boot time
    • Enable AMSI
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
    • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
    • Execution Graph export aborted for target apprun.exe, PID 5160 because there are no executed function
    • Not all processes where analyzed, report is missing behavior information
    No simulations
    No context
    No context
    No context
    No context
    No context
    No created / dropped files found
    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):6.803912712702834
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:apprun.exe
    File size:447688
    MD5:7e13c6a35ac8ce03ece66e1d65b0601e
    SHA1:a7c70afdd8ca0aae7fb7689d01c0c574aee85875
    SHA256:d189bd389b7b442c31e1d009f958ab67d1361b75383b4dcdd53944970cf3fe0f
    SHA512:942387b39722a0984e0c2b612f8aebd5e115dc424d74f3ed800ee7e2c5a8013251f5eec488f554b95e6b4a301c6c8f0874e2afa912943478ad853fa701dba567
    SSDEEP:12288:GQT0zUhy5R+ESoDVI+8/S0fBmymkh5k9E5kJk7H:GQsR+Em+8/5fBvhnH
    TLSH:B7949E23BB43C8FAD633D276269F16B4A9BE69361531004333D3531A9C6D5F38836A27
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........./.F.A.F.A.F.A.O...R.A...G.D.A...E.H.A...B.J.A...D.d.A...@.@.A...@.T.A.F.@...A.p.@.E.A.p.H.b.A.p...G.A.F...G.A.p.C.G.A.RichF.A
    Icon Hash:f8e2f0b83c8ecce0
    Entrypoint:0x423685
    Entrypoint Section:.text
    Digitally signed:true
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
    DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Time Stamp:0x5E562496 [Wed Feb 26 07:56:06 2020 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:0bd9b07a33347e2b039b76c20ede51ba
    Signature Valid:true
    Signature Issuer:CN=GlobalSign Extended Validation CodeSigning CA - SHA256 - G3, O=GlobalSign nv-sa, C=BE
    Signature Validation Error:The operation completed successfully
    Error Number:0
    Not Before, Not After
    • 3/21/2019 5:29:15 AM 3/21/2022 5:29:15 AM
    Subject Chain
    • CN=ABE Labs LTD, O=ABE Labs LTD, L=Tel Aviv, S=Tel Aviv, C=IL, OID.1.3.6.1.4.1.311.60.2.1.3=IL, SERIALNUMBER=515530624, OID.2.5.4.15=Private Organization
    Version:3
    Thumbprint MD5:3A64583937F31A6298780405E2FFC24A
    Thumbprint SHA-1:7EBF03C1556ABCEBF72822D370A72314CFA8E717
    Thumbprint SHA-256:C897A6CBEFCCD1802AA8591A5C3BCAA862BEFDCD7E2B086EEA88FB0CDBED64CE
    Serial:65D62F620FE9922CF2891D2C
    Instruction
    call 00007FA020C3B231h
    jmp 00007FA020C3A7BFh
    cmp ecx, dword ptr [0043A014h]
    jne 00007FA020C3A945h
    ret
    jmp 00007FA020C3ADF9h
    push ebp
    mov ebp, esp
    push dword ptr [ebp+08h]
    call 00007FA020C3A5F3h
    pop ecx
    pop ebp
    ret
    push ebp
    mov ebp, esp
    test byte ptr [ebp+08h], 00000001h
    push esi
    mov esi, ecx
    mov dword ptr [esi], 0042B5F0h
    je 00007FA020C3A94Ch
    push 0000000Ch
    push esi
    call 00007FA020C3A91Dh
    pop ecx
    pop ecx
    mov eax, esi
    pop esi
    pop ebp
    retn 0004h
    call 00007FA020C3A967h
    push 00000000h
    call 00007FA020C3ABF1h
    pop ecx
    test al, al
    je 00007FA020C3A950h
    push 0042377Ah
    call 00007FA020C3AD6Fh
    pop ecx
    xor eax, eax
    ret
    push 00000007h
    call 00007FA020C3B284h
    int3
    push esi
    push edi
    push 00000FA0h
    push 0043B04Ch
    call dword ptr [0042B0BCh]
    push 0042EE88h
    call dword ptr [0042B070h]
    mov esi, eax
    test esi, esi
    jne 00007FA020C3A953h
    push 0042B5F4h
    call dword ptr [0042B070h]
    mov esi, eax
    test esi, esi
    je 00007FA020C3A988h
    push 0042B610h
    push esi
    call dword ptr [0042B050h]
    push 0042B62Ch
    push esi
    mov edi, eax
    call dword ptr [0042B050h]
    test edi, edi
    je 00007FA020C3A954h
    test eax, eax
    Programming Language:
    • [IMP] VS2008 SP1 build 30729
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x361740x1cc.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x3c0000x304a0.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x6b8000x1cc8
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x6d0000x29a0.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x2f9700x70.rdata
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x2fa840x18.rdata
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2f9e00x40.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x2b0000x51c.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x291c40x29200False0.586186835106data6.58926946423IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    .rdata0x2b0000xe0a60xe200False0.392180586283data5.12026048955IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x3a0000x16600x1000False0.186767578125data4.28770125555IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
    .rsrc0x3c0000x304a00x30600False0.543079780362data6.68559108831IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x6d0000x29a00x2a00False0.741164434524data6.61714684998IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountry
    RT_ICON0x3c2800x468GLS_BINARY_LSB_FIRSTEnglishUnited States
    RT_ICON0x3c6e80x988dataEnglishUnited States
    RT_ICON0x3d0700x10a8dataEnglishUnited States
    RT_ICON0x3e1180x25a8dataEnglishUnited States
    RT_ICON0x406c00x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 0, next used block 0EnglishUnited States
    RT_ICON0x448e80x94a8dataEnglishUnited States
    RT_ICON0x4dd900x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
    RT_ICON0x5e5b80xd98aPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_GROUP_ICON0x6bf480x76dataEnglishUnited States
    RT_VERSION0x6bfc00x2b8COM executable for DOSEnglishUnited States
    RT_MANIFEST0x6c2780x224XML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminatorsEnglishUnited States
    DLLImport
    libcurl.dllcurl_easy_cleanup, curl_global_init, curl_global_cleanup, curl_multi_remove_handle, curl_easy_setopt, curl_multi_perform, curl_multi_wait, curl_easy_init, curl_multi_add_handle, curl_easy_perform, curl_easy_strerror, curl_easy_getinfo, curl_slist_free_all, curl_slist_append, curl_multi_init
    VERSION.dllGetFileVersionInfoSizeW, VerQueryValueW, GetFileVersionInfoW
    mfc140u.dll
    KERNEL32.dllAreFileApisANSI, CopyFileW, GetFileInformationByHandle, GetFileAttributesExW, GetFileAttributesW, FindNextFileW, FindFirstFileExW, FindClose, CreateFileW, CreateDirectoryW, LoadLibraryW, GetLastError, GetProcAddress, FreeLibrary, GetModuleFileNameW, ExitProcess, HeapAlloc, GetProcessHeap, HeapFree, GetCommandLineW, GetModuleHandleW, MultiByteToWideChar, DeleteCriticalSection, GetCurrentProcessId, LocalFree, WideCharToMultiByte, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, GetCurrentThreadId, OutputDebugStringW, Process32FirstW, TerminateProcess, CloseHandle, Process32NextW, CreateProcessW, GetCurrentProcess, LocalAlloc, SetLastError, InitializeCriticalSectionAndSpinCount, SetEvent, ResetEvent, WaitForSingleObjectEx, CreateEventW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsProcessorFeaturePresent, QueryPerformanceCounter, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetTempPathW, InitializeCriticalSectionEx, CreateToolhelp32Snapshot
    USER32.dllMessageBoxW
    ADVAPI32.dllRegOpenKeyExW, RegEnumKeyExW, RegQueryInfoKeyW, RegCloseKey, RegGetValueW
    SHELL32.dllSHGetFolderPathW, CommandLineToArgvW, SHGetKnownFolderPath
    ole32.dllCoCreateInstance, CoUninitialize, CoTaskMemFree, CoInitializeSecurity, CoInitializeEx
    OLEAUT32.dllVariantClear, VariantInit, SysFreeString, SysAllocString
    MSVCP140.dll?_Gndec@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@IAEPA_WXZ, ?snextc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QAEGXZ, ??0?$basic_istream@_WU?$char_traits@_W@std@@@std@@QAE@PAV?$basic_streambuf@_WU?$char_traits@_W@std@@@1@_N@Z, ?_Init@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@IAEXXZ, ?getloc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QBE?AVlocale@2@XZ, ?_Ipfx@?$basic_istream@_WU?$char_traits@_W@std@@@std@@QAE_N_N@Z, ?_Fiopen@std@@YAPAU_iobuf@@PBDHH@Z, ?clear@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QAEXH_N@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H@Z, ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAVios_base@1@AAV21@@Z@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QAEAAV01@J@Z, ?_Getcat@?$codecvt@_WDU_Mbstatet@@@std@@SAIPAPBVfacet@locale@2@PBV42@@Z, ?unshift@?$codecvt@_WDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PAD1AAPAD@Z, ?always_noconv@codecvt_base@std@@QBE_NXZ, ??1?$basic_istream@_WU?$char_traits@_W@std@@@std@@UAE@XZ, ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPAD_J@Z, ?sbumpc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QAEGXZ, ?sgetc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QAEGXZ, ?_Xlength_error@std@@YAXPBD@Z, ?_Xout_of_range@std@@YAXPBD@Z, ?_Xbad_alloc@std@@YAXXZ, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ??1?$basic_ios@_WU?$char_traits@_W@std@@@std@@UAE@XZ, ?_Decref@facet@locale@std@@UAEPAV_Facet_base@3@XZ, ??1facet@locale@std@@MAE@XZ, ?_Init@locale@std@@CAPAV_Locimp@12@_N@Z, ??1?$basic_ostream@_WU?$char_traits@_W@std@@@std@@UAE@XZ, ?gbump@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@IAEXH@Z, ?_Pninc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@IAEPA_WXZ, ??1?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@UAE@XZ, ?_Incref@facet@locale@std@@UAEXXZ, ??1_Locinfo@std@@QAE@XZ, ??1_Lockit@std@@QAE@XZ, ??0_Locinfo@std@@QAE@PBD@Z, ??0_Lockit@std@@QAE@H@Z, ??0facet@locale@std@@IAE@I@Z, ?uncaught_exception@std@@YA_NXZ, ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QAEG_W@Z, ?_Getgloballocale@locale@std@@CAPAV_Locimp@12@XZ, ??Bid@locale@std@@QAEIXZ, ?_Getcat@?$ctype@D@std@@SAIPAPBVfacet@locale@2@PBV42@@Z, ?id@?$ctype@D@std@@2V0locale@2@A, ?_Unlock@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@UAEXXZ, ?_Lock@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@UAEXXZ, ?sync@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@MAEHXZ, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z, ?id@?$collate@D@std@@2V0locale@2@A, ?xsputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@MAE_JPB_W_J@Z, _Strxfrm, _Strcoll, ?_Getcoll@_Locinfo@std@@QBE?AU_Collvec@@XZ, ?_Xregex_error@std@@YAXW4error_type@regex_constants@1@@Z, ?tolower@?$ctype@D@std@@QBEDD@Z, ?tolower@?$ctype@D@std@@QBEPBDPADPBD@Z, ?showmanyc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@MAE_JXZ, ?uflow@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@MAEGXZ, ?xsgetn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@MAE_JPA_W_J@Z, ?setbuf@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@MAEPAV12@PA_W_J@Z, ?imbue@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@MAEXABVlocale@2@@Z, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDD@Z, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@D@Z, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ, ?sputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QAE_JPB_W_J@Z, ?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QAEAAV12@_W@Z, ?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QBE_WD@Z, ??0?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@IAE@XZ, ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QAEXXZ, ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QAEAAV12@XZ, ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QAEXH_N@Z, ??0?$basic_ios@_WU?$char_traits@_W@std@@@std@@IAE@XZ, ??0?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QAE@PAV?$basic_streambuf@_WU?$char_traits@_W@std@@@1@_N@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QAEAAV01@K@Z, ?_Syserror_map@std@@YAPBDH@Z, ?_Execute_once@std@@YAHAAUonce_flag@1@P6GHPAX1PAPAX@Z1@Z, ?_Winerror_map@std@@YAHH@Z, ?_Winerror_message@std@@YAKKPADK@Z, ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ, ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UAE@XZ, ?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEPADXZ, ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE@XZ, ?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ, ?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ, ?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ, ?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ, ?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JXZ, ?id@?$codecvt@_WDU_Mbstatet@@@std@@2V0locale@2@A, ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPBD_J@Z, ?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEPAV12@PAD_J@Z, ?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEXABVlocale@2@@Z, ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ, ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IAE@XZ, ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z, ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV01@AAI@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QAEAAV01@H@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QAEAAV01@I@Z, _Query_perf_frequency, _Query_perf_counter, ?__ExceptionPtrCreate@@YAXPAX@Z, ?__ExceptionPtrDestroy@@YAXPAX@Z, ?__ExceptionPtrToBool@@YA_NPBX@Z, ?__ExceptionPtrAssign@@YAXPAXPBX@Z, ?__ExceptionPtrCopy@@YAXPAXPBX@Z, ?__ExceptionPtrCurrentException@@YAXPAX@Z, ?__ExceptionPtrRethrow@@YAXPBX@Z, _Xtime_get_ticks, _Thrd_sleep, ?_Getcat@?$ctype@_W@std@@SAIPAPBVfacet@locale@2@PBV42@@Z, ?id@?$ctype@_W@std@@2V0locale@2@A, ?getloc@ios_base@std@@QBE?AVlocale@2@XZ, ?widen@?$ctype@_W@std@@QBE_WD@Z, ??1?$basic_iostream@_WU?$char_traits@_W@std@@@std@@UAE@XZ, ??0?$basic_iostream@_WU?$char_traits@_W@std@@@std@@QAE@PAV?$basic_streambuf@_WU?$char_traits@_W@std@@@1@@Z, ??1?$codecvt@_WDU_Mbstatet@@@std@@MAE@XZ, ?out@?$codecvt@_WDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PB_W1AAPB_WPAD3AAPAD@Z, ?in@?$codecvt@_WDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PBD1AAPBDPA_W3AAPA_W@Z, ??0?$codecvt@_WDU_Mbstatet@@@std@@QAE@I@Z, ??4?$_Yarn@D@std@@QAEAAV01@PBD@Z, ?_New_Locimp@_Locimp@locale@std@@CAPAV123@ABV123@@Z, ?_Addfac@_Locimp@locale@std@@AAEXPAVfacet@23@I@Z
    WININET.dllInternetCrackUrlW, InternetCheckConnectionW
    IPHLPAPI.DLLGetAdaptersAddresses
    VCRUNTIME140.dllmemset, _except_handler4_common, memmove, __CxxFrameHandler3, strchr, __std_terminate, __std_exception_destroy, __std_exception_copy, _CxxThrowException, memchr, memcmp, memcpy
    api-ms-win-crt-runtime-l1-1-0.dll_crt_atexit, exit, _invalid_parameter_noinfo_noreturn, _register_thread_local_exe_atexit_callback, _c_exit, _cexit, _exit, _initterm_e, _initterm, _get_wide_winmain_command_line, _initialize_wide_environment, _configure_wide_argv, _set_app_type, _seh_filter_exe, terminate, _initialize_onexit_table, _controlfp_s, _register_onexit_function
    api-ms-win-crt-stdio-l1-1-0.dllfclose, _wfopen_s, fwrite, fputwc, fopen_s, ungetwc, ungetc, fgetc, fgetwc, fgetpos, _fseeki64, _set_fmode, fsetpos, setvbuf, fflush, tmpnam_s, __stdio_common_vsprintf_s, __p__commode, __stdio_common_vsprintf
    api-ms-win-crt-filesystem-l1-1-0.dll_unlock_file, _lock_file, remove
    api-ms-win-crt-heap-l1-1-0.dll_set_new_mode, realloc, free, calloc, malloc, _recalloc
    api-ms-win-crt-time-l1-1-0.dll_time64
    api-ms-win-crt-string-l1-1-0.dll_wcsnicmp, isspace, tolower, towupper
    api-ms-win-crt-utility-l1-1-0.dllsrand, rand
    api-ms-win-crt-math-l1-1-0.dllceil, __setusermatherr
    api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale, ___lc_codepage_func
    DescriptionData
    LegalCopyrightCopyright (C) 2019
    InternalNamekernel.exe
    FileVersion1.0.0.2
    CompanyNameTODO: <Company name>
    ProductNameAppRun
    ProductVersion1.0.0.2
    FileDescriptionAppRun
    OriginalFilenameAppRun.exe
    Translation0x0409 0x04b0
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    No network behavior found
    No statistics
    Target ID:0
    Start time:20:06:35
    Start date:27/05/2022
    Path:C:\Users\user\Desktop\apprun.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\apprun.exe"
    Imagebase:0x1120000
    File size:447688 bytes
    MD5 hash:7E13C6A35AC8CE03ECE66E1D65B0601E
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low

    No disassembly