Edit tour

Windows Analysis Report
OpenHardwareMonitor.exe

Overview

General Information

Sample name:OpenHardwareMonitor.exe
Analysis ID:1389415
MD5:ce8385fcf4f140846b5cfbb8c466079d
SHA1:1a20f20c5deff72819bdc69d6a8d566991a642f9
SHA256:f377194a4b8b5eacf8a7ecd715c57caaf6049a494dd615d29c387d11bc4cf22e
Infos:

Detection

Score:2
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
May sleep (evasive loops) to hinder dynamic analysis
Tries to load missing DLLs
Uses 32bit PE files

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious

Analysis Advice

Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--")
  • System is w10x64
  • OpenHardwareMonitor.exe (PID: 7088 cmdline: C:\Users\user\Desktop\OpenHardwareMonitor.exe MD5: CE8385FCF4F140846B5CFBB8C466079D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: OpenHardwareMonitor.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_88e266cb2fac7c0d\MSVCR80.dllJump to behavior
Source: OpenHardwareMonitor.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: OpenHardwareMonitor.exeString found in binary or memory: http://docs.jquery.com/UI
Source: OpenHardwareMonitor.exeString found in binary or memory: http://docs.jquery.com/UI/Button
Source: OpenHardwareMonitor.exeString found in binary or memory: http://docs.jquery.com/UI/Button#theming
Source: OpenHardwareMonitor.exeString found in binary or memory: http://docs.jquery.com/UI/Mouse
Source: OpenHardwareMonitor.exeString found in binary or memory: http://docs.jquery.com/UI/Slider
Source: OpenHardwareMonitor.exeString found in binary or memory: http://docs.jquery.com/UI/Slider#theming
Source: OpenHardwareMonitor.exeString found in binary or memory: http://docs.jquery.com/UI/Theming/API
Source: OpenHardwareMonitor.exeString found in binary or memory: http://docs.jquery.com/UI/Widget
Source: OpenHardwareMonitor.exeString found in binary or memory: http://github.com/jquery/jquery-tmpl
Source: OpenHardwareMonitor.exeString found in binary or memory: http://jquery.org/license
Source: OpenHardwareMonitor.exeString found in binary or memory: http://jqueryui.com/about)
Source: OpenHardwareMonitor.exeString found in binary or memory: http://jqueryui.com/themeroller/?ctl=themeroller
Source: OpenHardwareMonitor.exeString found in binary or memory: http://knockoutjs.com/
Source: OpenHardwareMonitor.exeString found in binary or memory: http://ludo.cubicphuse.nl/jquery-plugins/treeTable/doc/
Source: OpenHardwareMonitor.exeString found in binary or memory: http://mozilla.org/MPL/2.0/.
Source: OpenHardwareMonitor.exeString found in binary or memory: http://openhardwaremonitor.org
Source: OpenHardwareMonitor.exeString found in binary or memory: http://openhardwaremonitor.org/report.php
Source: OpenHardwareMonitor.exeString found in binary or memory: http://www.json.org/json2.js
Source: OpenHardwareMonitor.exeString found in binary or memory: http://www.opensource.org/licenses/mit-license.php)
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeSection loaded: wintypes.dllJump to behavior
Source: OpenHardwareMonitor.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: OpenHardwareMonitor.exe, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
Source: OpenHardwareMonitor.exe, StartupManager.csTask registration methods: 'CreateSchedulerTask'
Source: classification engineClassification label: clean2.winEXE@1/1@0/0
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v2.0Jump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeMutant created: NULL
Source: OpenHardwareMonitor.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: OpenHardwareMonitor.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: OpenHardwareMonitor.exeString found in binary or memory: "radio"){var a=this.element.parents().filter(":last"),c="label[for='"+this.element.attr("id")+"']";this.buttonElement=a.find(c);if(!this.buttonElement.length){a=a.length?a.siblings():this.element.siblings();this.buttonElement=a.filter(c);if(!this.buttonElement.length)this.buttonElement=a.find(c)}this.element.addClass("ui-helper-hidden-accessible");(a=this.element.is(":checked"))&&this.buttonElement.addClass("ui-state-active");this.buttonElement.attr("aria-pressed",a)}else this.buttonElement=this.element},
Source: OpenHardwareMonitor.exeString found in binary or memory: widget:function(){return this.buttonElement},destroy:function(){this.element.removeClass("ui-helper-hidden-accessible");this.buttonElement.removeClass("ui-button ui-widget ui-state-default ui-corner-all ui-state-hover ui-state-active ui-button-icons-only ui-button-icon-only ui-button-text-icons ui-button-text-icon-primary ui-button-text-icon-secondary ui-button-text-only").removeAttr("role").removeAttr("aria-pressed").html(this.buttonElement.find(".ui-button-text").html());this.hasTitle||this.buttonElement.removeAttr("title");
Source: OpenHardwareMonitor.exeString found in binary or memory: (function(a){function j(c){var d=c[0].className.split(" ");for(var e=0;e<d.length;e++)if(d[e].match(b.childPrefix))return a(c).siblings("#"+d[e].substring(b.childPrefix.length));return null}function i(b,c){b.insertAfter(c),e(b).reverse().each(function(){i(a(this),b[0])})}function h(c){if(!c.hasClass("initialized")){c.addClass("initialized");var d=e(c);!c.hasClass("parent")&&d.length>0&&c.addClass("parent");if(c.hasClass("parent")){var g=a(c.children("td")[b.treeColumn]),h=f(g)+b.indent;d.each(function(){a(this).children("td")[b.treeColumn].style.paddingLeft=h+"px"});if(b.expandable){g.prepend('<span style="margin-left: -'+b.indent+"px; padding-left: "+b.indent+'px" class="expander"></span>'),a(g[0].firstChild).click(function(){c.toggleBranch()}),b.clickableNodeNames&&(g[0].style.cursor="pointer",a(g).click(function(a){a.target.className!="expander"&&c.toggleBranch()}));if(b.persist){var i=b.persistCookiePrefix+c.attr("id");a.cookie(i)=="true"&&c.addClass("expanded")}!c.hasClass("expanded")&&!c.hasClass("collapsed")&&c.addClass(b.initialState),c.hasClass("expanded")&&c.expand()}}}}function g(c,d){var h=a(c.children("td")[b.treeColumn]);h[0].style.paddingLeft=f(h)+d+"px",e(c).each(function(){g(a(this),d)})}function f(a){var b=parseInt(a[0].style.paddingLeft,10);return isNaN(b)?c:b}function e(c){return a(c).siblings("tr."+b.childPrefix+c[0].id)}function d(a){var b=[];while(a=j(a))b[b.length]=a[0];return b}var b,c;a.fn.treeTable=function(d){b=a.extend({},a.fn.treeTable.defaults,d);return this.each(function(){a(this).addClass("treeTable").find("tbody tr").each(function(){if(!a(this).hasClass("initialized")){var d=a(this)[0].className.search(b.childPrefix)==-1;d&&isNaN(c)&&(c=parseInt(a(a(this).children("td")[b.treeColumn]).css("padding-left"),10)),!d&&b.expandable&&b.initialState=="collapsed"&&a(this).addClass("ui-helper-hidden"),(!b.expandable||d)&&h(a(this))}})})},a.fn.treeTable.defaults={childPrefix:"child-of-",clickableNodeNames:!1,expandable:!0,indent:19,initialState:"collapsed",onNodeShow:null,treeColumn:0,persist:!1,persistCookiePrefix:"treeTable_"},a.fn.collapse=function(){a(this).addClass("collapsed"),e(a(this)).each(function(){a(this).hasClass("collapsed")||a(this).collapse(),a(this).addClass("ui-helper-hidden")});return this},a.fn.expand=function(){a(this).removeClass("collapsed").addClass("expanded"),e(a(this)).each(function(){h(a(this)),a(this).is(".expanded.parent")&&a(this).expand(),a(this).removeClass("ui-helper-hidden"),a.isFunction(b.onNodeShow)&&b.onNodeShow.call()});return this},a.fn.reveal=function(){a(d(a(this)).reverse()).each(function(){h(a(this)),a(this).expand().show()});return this},a.fn.appendBranchTo=function(c){var e=a(this),f=j(e),h=a.map(d(a(c)),function(a){return a.id});a.inArray(e[0].id,h)==-1&&(!f||c.id!=f[0].id)&&c.id!=e[0].id&&(g(e,d(e).length*b.indent*-1),f&&e.removeClass(b.childPrefix+f[0].id),e.addClass(b.childPrefix+c.id),i(e,c),g(e,d(e).length*b.indent));return this},a.fn.reverse=function(){return this.pushSta
Source: OpenHardwareMonitor.exeString found in binary or memory: .ui-helper-hidden { display: none; }
Source: OpenHardwareMonitor.exeString found in binary or memory: .ui-helper-hidden-accessible { position: absolute !important; clip: rect(1px 1px 1px 1px); clip: rect(1px,1px,1px,1px); }
Source: OpenHardwareMonitor.exeString found in binary or memory: .ui-helper-reset { margin: 0; padding: 0; border: 0; outline: 0; line-height: 1.3; text-decoration: none; font-size: 100%; list-style: none; }
Source: OpenHardwareMonitor.exeString found in binary or memory: .ui-helper-clearfix:after { content: "."; display: block; height: 0; clear: both; visibility: hidden; }
Source: OpenHardwareMonitor.exeString found in binary or memory: .ui-helper-clearfix { display: inline-block; }
Source: OpenHardwareMonitor.exeString found in binary or memory: * html .ui-helper-clearfix { height:1%; }
Source: OpenHardwareMonitor.exeString found in binary or memory: .ui-helper-clearfix { display:block; }
Source: OpenHardwareMonitor.exeString found in binary or memory: .ui-helper-zfix { width: 100%; height: 100%; top: 0; left: 0; position: absolute; opacity: 0; filter:Alpha(Opacity=0); }
Source: OpenHardwareMonitor.exeString found in binary or memory: .ui-icon-help { background-position: -48px -144px; }
Source: OpenHardwareMonitor.exeString found in binary or memory: .ui-icon-seek-start { background-position: -80px -160px; }
Source: OpenHardwareMonitor.exeString found in binary or memory: /* ui-icon-seek-first is deprecated, use ui-icon-seek-start instead */
Source: OpenHardwareMonitor.exeString found in binary or memory: .ui-icon-stop { background-position: -96px -160px; }
Source: OpenHardwareMonitor.exeString found in binary or memory: AboutQUpdating the auto-startup option failed.
Source: OpenHardwareMonitor.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_88e266cb2fac7c0d\MSVCR80.dllJump to behavior
Source: OpenHardwareMonitor.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeMemory allocated: 1560000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeMemory allocated: 34C0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeMemory allocated: 1B4C0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exe TID: 5468Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\OpenHardwareMonitor.exeMemory allocated: page read and write | page guardJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
Scheduled Task/Job
1
Scheduled Task/Job
1
Masquerading
OS Credential Dumping31
Virtualization/Sandbox Evasion
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Scheduled Task/Job
1
DLL Side-Loading
1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
Virtualization/Sandbox Evasion
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1389415 Sample: OpenHardwareMonitor.exe Startdate: 08/02/2024 Architecture: WINDOWS Score: 2 4 OpenHardwareMonitor.exe 5 2->4         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
OpenHardwareMonitor.exe5%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://ludo.cubicphuse.nl/jquery-plugins/treeTable/doc/0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://github.com/jquery/jquery-tmplOpenHardwareMonitor.exefalse
    high
    http://docs.jquery.com/UI/Slider#themingOpenHardwareMonitor.exefalse
      high
      http://www.opensource.org/licenses/mit-license.php)OpenHardwareMonitor.exefalse
        high
        http://jquery.org/licenseOpenHardwareMonitor.exefalse
          high
          http://ludo.cubicphuse.nl/jquery-plugins/treeTable/doc/OpenHardwareMonitor.exefalse
          • Avira URL Cloud: safe
          unknown
          http://docs.jquery.com/UI/MouseOpenHardwareMonitor.exefalse
            high
            http://docs.jquery.com/UIOpenHardwareMonitor.exefalse
              high
              http://docs.jquery.com/UI/Theming/APIOpenHardwareMonitor.exefalse
                high
                http://docs.jquery.com/UI/WidgetOpenHardwareMonitor.exefalse
                  high
                  http://jqueryui.com/about)OpenHardwareMonitor.exefalse
                    high
                    http://openhardwaremonitor.orgOpenHardwareMonitor.exefalse
                      high
                      http://docs.jquery.com/UI/Button#themingOpenHardwareMonitor.exefalse
                        high
                        http://jqueryui.com/themeroller/?ctl=themerollerOpenHardwareMonitor.exefalse
                          high
                          http://knockoutjs.com/OpenHardwareMonitor.exefalse
                            high
                            http://openhardwaremonitor.org/report.phpOpenHardwareMonitor.exefalse
                              high
                              http://docs.jquery.com/UI/ButtonOpenHardwareMonitor.exefalse
                                high
                                http://docs.jquery.com/UI/SliderOpenHardwareMonitor.exefalse
                                  high
                                  http://www.json.org/json2.jsOpenHardwareMonitor.exefalse
                                    high
                                    http://mozilla.org/MPL/2.0/.OpenHardwareMonitor.exefalse
                                      high
                                      No contacted IP infos
                                      Joe Sandbox version:40.0.0 Tourmaline
                                      Analysis ID:1389415
                                      Start date and time:2024-02-08 20:00:06 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 2m 1s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:1
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:OpenHardwareMonitor.exe
                                      Detection:CLEAN
                                      Classification:clean2.winEXE@1/1@0/0
                                      EGA Information:Failed
                                      HCA Information:
                                      • Successful, ratio: 100%
                                      • Number of executed functions: 2
                                      • Number of non-executed functions: 0
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Stop behavior analysis, all processes terminated
                                      • Execution Graph export aborted for target OpenHardwareMonitor.exe, PID 7088 because it is empty
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • VT rate limit hit for: OpenHardwareMonitor.exe
                                      No simulations
                                      No context
                                      No context
                                      No context
                                      No context
                                      No context
                                      Process:C:\Users\user\Desktop\OpenHardwareMonitor.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):388
                                      Entropy (8bit):5.231548808556929
                                      Encrypted:false
                                      SSDEEP:6:Q3LadLC1HWN9Lx+OLC/7gc5+71OiOLCMM3RY9EZv47WsM3RLWJiv:Q3LaJVV+0kZs1B01ku9EZv4hk7v
                                      MD5:11F78114B13D9C013EFFDD3DB6E13A77
                                      SHA1:B825E7CB313B6FCF64148A9F51100D7CF37BB2C0
                                      SHA-256:5585A0FED240074DC15D53D03E7118D715DC8F66DEB6E902DA2912E715F2CF20
                                      SHA-512:A16ED34677239D7DC55950EAC38E72224A0BC548541707A46D6750F3A3D6C2A2EE24A6D982F43A9B742FA8F2FC10D373BEBB30859DFE3F5724A205E5C0610DA5
                                      Malicious:false
                                      Reputation:low
                                      Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_64\System\60bcd4094a2a6aa9ef85662f2bad1392\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_64\System.Drawing\4bbfa2b2d090d47bd2f1e96192ff5526\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_64\System.Windows.Forms\cb818943a42d691b19f93868cb8bd2f5\System.Windows.Forms.ni.dll",0..
                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Entropy (8bit):6.621682283631601
                                      TrID:
                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                      • Win32 Executable (generic) a (10002005/4) 49.75%
                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                      • Windows Screen Saver (13104/52) 0.07%
                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                      File name:OpenHardwareMonitor.exe
                                      File size:494'592 bytes
                                      MD5:ce8385fcf4f140846b5cfbb8c466079d
                                      SHA1:1a20f20c5deff72819bdc69d6a8d566991a642f9
                                      SHA256:f377194a4b8b5eacf8a7ecd715c57caaf6049a494dd615d29c387d11bc4cf22e
                                      SHA512:02550badda5972b13eb64573c001f6aee0254bf53f45cfcb70f871551a661001763d9b78d345cf2503c266418202457f5eec7182d1d4cb52d48203cdde0275ec
                                      SSDEEP:12288:j4IOmYYd+GCWpYAyvC3Rpo6vMeXwnq4t:jvOAyvCBiMwdt
                                      TLSH:34B48C5933956123E7BFA378507B1142F332A986F40DCE29B48894EC1EB5B848167F7B
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....W.X.................B...H......^a... ........@.. ....................................@................................
                                      Icon Hash:bffcfcfcfcfcddff
                                      Entrypoint:0x47615e
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x581F570B [Sun Nov 6 16:15:07 2016 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                      Instruction
                                      jmp dword ptr [00402000h]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x761080x53.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x780000x4550.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x7e0000xc.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x20000x741640x74200cdedf2d7bba8dde704c09bcbe5d265caFalse0.3872443487621098data6.6146429322052445IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rsrc0x780000x45500x46004f22617b86fe04af2c6d0d9f57cc28f0False0.40072544642857144data5.904026784276777IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0x7e0000xc0x2003044296b67f48cbe94381f6805152cb6False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_ICON0x784c80x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.8147163120567376
                                      RT_ICON0x789300x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.47373358348968103
                                      RT_ICON0x799d80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.35217842323651455
                                      RT_GROUP_ICON0x7bf800x30data0.9166666666666666
                                      RT_VERSION0x781900x338data0.4223300970873786
                                      RT_MANIFEST0x7bfb00x599XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.4054431263084438
                                      DLLImport
                                      mscoree.dll_CorExeMain
                                      No network behavior found
                                      0246810s020406080100

                                      Click to jump to process

                                      0246810s0.00102030MB

                                      Click to jump to process

                                      • File
                                      • Registry

                                      Click to dive into process behavior distribution

                                      Target ID:0
                                      Start time:20:00:52
                                      Start date:08/02/2024
                                      Path:C:\Users\user\Desktop\OpenHardwareMonitor.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Users\user\Desktop\OpenHardwareMonitor.exe
                                      Imagebase:0xdb0000
                                      File size:494'592 bytes
                                      MD5 hash:CE8385FCF4F140846B5CFBB8C466079D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:true

                                      Executed Functions

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1691669771.00007FFD9B8D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd9b8d0000_OpenHardwareMonitor.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9ffc7f9c9ed8c70129e7addb3e45fd6e7e2920f76f83efbe4fd2791cfde3bac6
                                      • Instruction ID: 5323b9c758b05474add8c8b9e21b5730b9596832e02a42c44fdd470ecf82467b
                                      • Opcode Fuzzy Hash: 9ffc7f9c9ed8c70129e7addb3e45fd6e7e2920f76f83efbe4fd2791cfde3bac6
                                      • Instruction Fuzzy Hash: 9B511351A1E7CA0FDB179B780C761A43FB09F57640B0A06EBE499CB1F3D91C6A098362
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1691669771.00007FFD9B8D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd9b8d0000_OpenHardwareMonitor.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4d99b864d21a3c9bb421492e92a344ecf4dc52fba4d0cbc1fb69ab6c8b7dff75
                                      • Instruction ID: 39073b766b97d5769fd8cc477ea6c4b62edded1988806c1d1cdc951114dd341e
                                      • Opcode Fuzzy Hash: 4d99b864d21a3c9bb421492e92a344ecf4dc52fba4d0cbc1fb69ab6c8b7dff75
                                      • Instruction Fuzzy Hash: 8821F301F1E68E0FEB59A37C143567826D2AF9A200B4405FBE49DCB2EBDC1CA9019301
                                      Uniqueness

                                      Uniqueness Score: -1.00%