Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
YLDUi7gQi7.exe

Overview

General Information

Sample name:YLDUi7gQi7.exe
renamed because original name is a hash value
Original sample name:e8d13a972f91936870dc5d2e8830dc10a00e499b1bc25cc88ec4570cf7dbfd66.exe
Analysis ID:1586670
MD5:6742e36ad0679bf1bdaa1fef3afa43b8
SHA1:ec4291aa8a4c42074af5d24194e859138650a192
SHA256:e8d13a972f91936870dc5d2e8830dc10a00e499b1bc25cc88ec4570cf7dbfd66
Tags:exeuser-adrian__luca
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • YLDUi7gQi7.exe (PID: 7288 cmdline: "C:\Users\user\Desktop\YLDUi7gQi7.exe" MD5: 6742E36AD0679BF1BDAA1FEF3AFA43B8)
    • WerFault.exe (PID: 7860 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7288 -s 1608 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: YLDUi7gQi7.exeAvira: detected
Source: YLDUi7gQi7.exeReversingLabs: Detection: 79%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: YLDUi7gQi7.exeJoe Sandbox ML: detected
Source: YLDUi7gQi7.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: YLDUi7gQi7.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: System.Drawing.pdbMZ@ source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: System.Xml.ni.pdb source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: ImageViewer.pdb source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: C:\Windows\System.pdbpdbtem.pdb source: YLDUi7gQi7.exe, 00000000.00000002.2646544849.0000000000A31000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Accessibility.pdb source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: System.ni.pdbRSDS source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: System.pdb, source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: Microsoft.CSharp.pdb source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: ImageViewer.pdb& source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: C:\Users\Administrator\Desktop\ImageViewer\ImageViewer\obj\Debug\ImageViewer.pdb source: YLDUi7gQi7.exe
Source: Binary string: n8C:\Windows\ImageViewer.pdb source: YLDUi7gQi7.exe, 00000000.00000002.2645927139.00000000005B7000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Configuration.ni.pdb source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: mscorlib.ni.pdbRSDS source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: System.Configuration.pdb source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: \??\C:\Windows\System.pdb source: YLDUi7gQi7.exe, 00000000.00000002.2646809448.0000000000AEB000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\System.pdbM source: YLDUi7gQi7.exe, 00000000.00000002.2646809448.0000000000AEB000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Configuration.pdbp source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: System.Xml.pdb source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: System.pdb source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: System.Xml.ni.pdbRSDS# source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: nC:\Users\user\Desktop\ImageViewer.pdb source: YLDUi7gQi7.exe, 00000000.00000002.2645927139.00000000005B7000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Core.ni.pdb source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: System.Windows.Forms.pdb source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: System.Windows.Forms.pdb( source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: mscorlib.pdb source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: \??\C:\Windows\ImageViewer.pdb source: YLDUi7gQi7.exe, 00000000.00000002.2646544849.0000000000A31000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Accessibility.pdbD source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: C:\Users\Administrator\Desktop\ImageViewer\ImageViewer\obj\Debug\ImageViewer.pdbesktop\YLDUi7gQi7.PDB source: YLDUi7gQi7.exe, 00000000.00000002.2645927139.00000000005B7000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Drawing.pdb source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: mscorlib.ni.pdb source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: Microsoft.CSharp.pdb4 source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: esktop\ImageViewer\ImageViewer\obj\Debug\ImageViewer.pdb- source: YLDUi7gQi7.exe, 00000000.00000002.2656405063.00000000062E0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdb source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: YLDUi7gQi7.exe, 00000000.00000002.2646544849.0000000000A31000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: esktop\ImageViewer\ImageViewer\obj\Debug\ImageViewer.pdb source: YLDUi7gQi7.exe, 00000000.00000002.2656405063.00000000062E0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: YLDUi7gQi7.exe, 00000000.00000002.2646544849.0000000000A31000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\Administrator\Desktop\ImageViewer\ImageViewer\obj\Debug\ImageViewer.pdb- source: YLDUi7gQi7.exe
Source: Binary string: [symbols\exe\ImageViewer.pdb source: YLDUi7gQi7.exe, 00000000.00000002.2645927139.00000000005B7000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdbH source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: System.ni.pdb source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: \??\C:\Windows\dll\System.pdbY78 source: YLDUi7gQi7.exe, 00000000.00000002.2646544849.0000000000A31000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.ni.pdbRSDS source: WERFAEA.tmp.dmp.5.dr
Source: global trafficTCP traffic: 192.168.2.5:58538 -> 1.1.1.1:53
Source: global trafficHTTP traffic detected: GET /file/1524 HTTP/1.1Host: 94.154.37.129Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /file/1524 HTTP/1.1Host: 94.154.37.129Connection: Keep-Alive
Source: unknownDNS traffic detected: query: mdfile24.theworkpc.com replaycode: Name error (3)
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.37.129
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.37.129
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.37.129
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.37.129
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.37.129
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.37.129
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.37.129
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.37.129
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.37.129
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.37.129
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /file/1524 HTTP/1.1Host: 94.154.37.129Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /file/1524 HTTP/1.1Host: 94.154.37.129Connection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: mdfile24.theworkpc.com
Source: YLDUi7gQi7.exe, 00000000.00000002.2647411596.000000000275E000.00000004.00000800.00020000.00000000.sdmp, YLDUi7gQi7.exe, 00000000.00000002.2647411596.0000000002772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://94.154.37.129
Source: YLDUi7gQi7.exe, 00000000.00000002.2647411596.00000000026F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://94.154.37.129/file/1524
Source: YLDUi7gQi7.exeString found in binary or memory: http://94.154.37.129/file/1524Ohttp://mdfile24.theworkpc.com/file/1524
Source: YLDUi7gQi7.exe, 00000000.00000002.2647411596.00000000026F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://94.154.37.129/file/1524P
Source: YLDUi7gQi7.exe, 00000000.00000002.2647411596.0000000002788000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mdfile24.theworkpc.com
Source: YLDUi7gQi7.exe, 00000000.00000002.2647411596.00000000026F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mdfile24.theworkpc.com/file/1524
Source: YLDUi7gQi7.exe, 00000000.00000002.2647411596.0000000002788000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mdfile24.theworkpc.com/file/1524d
Source: YLDUi7gQi7.exe, 00000000.00000002.2647411596.000000000275E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeCode function: 0_2_00C63E280_2_00C63E28
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7288 -s 1608
Source: YLDUi7gQi7.exe, 00000000.00000002.2646544849.00000000009FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs YLDUi7gQi7.exe
Source: YLDUi7gQi7.exe, 00000000.00000000.1992405495.000000000041A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameImageViewer.exe8 vs YLDUi7gQi7.exe
Source: YLDUi7gQi7.exeBinary or memory string: OriginalFilenameImageViewer.exe8 vs YLDUi7gQi7.exe
Source: YLDUi7gQi7.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal64.winEXE@2/5@1/1
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeMutant created: NULL
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7288
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\4df49421-c91b-41b4-b71c-d618c656f60dJump to behavior
Source: YLDUi7gQi7.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: YLDUi7gQi7.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: YLDUi7gQi7.exeReversingLabs: Detection: 79%
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeFile read: C:\Users\user\Desktop\YLDUi7gQi7.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\YLDUi7gQi7.exe "C:\Users\user\Desktop\YLDUi7gQi7.exe"
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7288 -s 1608
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: YLDUi7gQi7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: YLDUi7gQi7.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: YLDUi7gQi7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: System.Drawing.pdbMZ@ source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: System.Xml.ni.pdb source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: ImageViewer.pdb source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: C:\Windows\System.pdbpdbtem.pdb source: YLDUi7gQi7.exe, 00000000.00000002.2646544849.0000000000A31000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Accessibility.pdb source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: System.ni.pdbRSDS source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: System.pdb, source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: Microsoft.CSharp.pdb source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: ImageViewer.pdb& source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: C:\Users\Administrator\Desktop\ImageViewer\ImageViewer\obj\Debug\ImageViewer.pdb source: YLDUi7gQi7.exe
Source: Binary string: n8C:\Windows\ImageViewer.pdb source: YLDUi7gQi7.exe, 00000000.00000002.2645927139.00000000005B7000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Configuration.ni.pdb source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: mscorlib.ni.pdbRSDS source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: System.Configuration.pdb source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: \??\C:\Windows\System.pdb source: YLDUi7gQi7.exe, 00000000.00000002.2646809448.0000000000AEB000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\System.pdbM source: YLDUi7gQi7.exe, 00000000.00000002.2646809448.0000000000AEB000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Configuration.pdbp source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: System.Xml.pdb source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: System.pdb source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: System.Xml.ni.pdbRSDS# source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: nC:\Users\user\Desktop\ImageViewer.pdb source: YLDUi7gQi7.exe, 00000000.00000002.2645927139.00000000005B7000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Core.ni.pdb source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: System.Windows.Forms.pdb source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: System.Windows.Forms.pdb( source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: mscorlib.pdb source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: \??\C:\Windows\ImageViewer.pdb source: YLDUi7gQi7.exe, 00000000.00000002.2646544849.0000000000A31000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Accessibility.pdbD source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: C:\Users\Administrator\Desktop\ImageViewer\ImageViewer\obj\Debug\ImageViewer.pdbesktop\YLDUi7gQi7.PDB source: YLDUi7gQi7.exe, 00000000.00000002.2645927139.00000000005B7000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Drawing.pdb source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: mscorlib.ni.pdb source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: Microsoft.CSharp.pdb4 source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: esktop\ImageViewer\ImageViewer\obj\Debug\ImageViewer.pdb- source: YLDUi7gQi7.exe, 00000000.00000002.2656405063.00000000062E0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdb source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: YLDUi7gQi7.exe, 00000000.00000002.2646544849.0000000000A31000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: esktop\ImageViewer\ImageViewer\obj\Debug\ImageViewer.pdb source: YLDUi7gQi7.exe, 00000000.00000002.2656405063.00000000062E0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: YLDUi7gQi7.exe, 00000000.00000002.2646544849.0000000000A31000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\Administrator\Desktop\ImageViewer\ImageViewer\obj\Debug\ImageViewer.pdb- source: YLDUi7gQi7.exe
Source: Binary string: [symbols\exe\ImageViewer.pdb source: YLDUi7gQi7.exe, 00000000.00000002.2645927139.00000000005B7000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdbH source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: System.ni.pdb source: WERFAEA.tmp.dmp.5.dr
Source: Binary string: \??\C:\Windows\dll\System.pdbY78 source: YLDUi7gQi7.exe, 00000000.00000002.2646544849.0000000000A31000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.ni.pdbRSDS source: WERFAEA.tmp.dmp.5.dr
Source: YLDUi7gQi7.exeStatic PE information: 0xE3B04AF9 [Thu Jan 18 17:59:21 2091 UTC]
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeCode function: 0_2_00C6A689 pushfd ; ret 0_2_00C6A696
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeCode function: 0_2_00C64659 push edx; retn 0004h0_2_00C6465A
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeCode function: 0_2_00C647B1 push esi; retn 0004h0_2_00C647B2
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeCode function: 0_2_00C64778 push ebp; retn 0004h0_2_00C6477A
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeCode function: 0_2_00C6CA71 pushfd ; ret 0_2_00C6CA7E
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeCode function: 0_2_00C6D381 push cs; ret 0_2_00C6D38E
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeCode function: 0_2_00C6D4C0 push cs; ret 0_2_00C6D4CE
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeCode function: 0_2_00C6D469 push cs; ret 0_2_00C6D476
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeCode function: 0_2_00C6D5E8 push es; ret 0_2_00C6D5F6
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeCode function: 0_2_00C6BD08 push edx; ret 0_2_00C6BD17
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeCode function: 0_2_00C65E93 pushfd ; ret 0_2_00C65F26
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeMemory allocated: C40000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeMemory allocated: 26F0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeMemory allocated: 46F0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 600000Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 599875Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 599766Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 599641Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 599531Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 599422Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 599313Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 599188Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 599063Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 598953Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 598844Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 598719Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 598610Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 598485Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 598371Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 598221Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 598078Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 597954Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 597766Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 597638Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 597516Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 597391Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 597266Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 597156Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 597047Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 596938Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 596813Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 596688Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 596578Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 596469Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 596344Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 596233Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 596125Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 596016Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 595906Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 595797Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 595664Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 595547Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 595437Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 595328Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 595135Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 595015Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 594904Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 594766Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 594468Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 594357Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 594235Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 594110Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 593985Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 593860Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 593735Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeWindow / User API: threadDelayed 7444Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeWindow / User API: threadDelayed 2392Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep count: 33 > 30Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -30437127721620741s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -600000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -599875s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7668Thread sleep count: 7444 > 30Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7668Thread sleep count: 2392 > 30Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -599766s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -599641s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -599531s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -599422s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -599313s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -599188s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -599063s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -598953s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -598844s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -598719s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -598610s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -598485s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -598371s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -598221s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -598078s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -597954s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -597766s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -597638s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -597516s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -597391s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -597266s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -597156s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -597047s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -596938s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -596813s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -596688s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -596578s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -596469s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -596344s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -596233s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -596125s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -596016s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -595906s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -595797s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -595664s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -595547s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -595437s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -595328s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -595135s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -595015s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -594904s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -594766s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -594468s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -594357s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -594235s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -594110s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -593985s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -593860s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 7660Thread sleep time: -593735s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 600000Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 599875Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 599766Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 599641Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 599531Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 599422Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 599313Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 599188Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 599063Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 598953Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 598844Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 598719Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 598610Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 598485Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 598371Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 598221Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 598078Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 597954Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 597766Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 597638Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 597516Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 597391Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 597266Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 597156Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 597047Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 596938Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 596813Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 596688Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 596578Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 596469Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 596344Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 596233Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 596125Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 596016Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 595906Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 595797Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 595664Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 595547Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 595437Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 595328Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 595135Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 595015Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 594904Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 594766Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 594468Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 594357Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 594235Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 594110Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 593985Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 593860Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 593735Jump to behavior
Source: Amcache.hve.5.drBinary or memory string: VMware
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: YLDUi7gQi7.exe, 00000000.00000002.2646544849.0000000000A31000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlle
Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: vmci.sys
Source: Amcache.hve.5.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: VMware20,1
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeQueries volume information: C:\Users\user\Desktop\YLDUi7gQi7.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Disable or Modify Tools
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
41
Virtualization/Sandbox Evasion
LSASS Memory41
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS12
System Information Discovery
Distributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Timestomp
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
YLDUi7gQi7.exe79%ReversingLabsWin32.Trojan.Acll
YLDUi7gQi7.exe100%AviraHEUR/AGEN.1351365
YLDUi7gQi7.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://94.154.37.129/file/1524P0%Avira URL Cloudsafe
http://mdfile24.theworkpc.com/file/1524d0%Avira URL Cloudsafe
http://mdfile24.theworkpc.com/file/15240%Avira URL Cloudsafe
http://94.154.37.1290%Avira URL Cloudsafe
http://94.154.37.129/file/15240%Avira URL Cloudsafe
http://mdfile24.theworkpc.com0%Avira URL Cloudsafe
http://94.154.37.129/file/1524Ohttp://mdfile24.theworkpc.com/file/15240%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
mdfile24.theworkpc.com
unknown
unknownfalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    http://94.154.37.129/file/1524false
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://94.154.37.129YLDUi7gQi7.exe, 00000000.00000002.2647411596.000000000275E000.00000004.00000800.00020000.00000000.sdmp, YLDUi7gQi7.exe, 00000000.00000002.2647411596.0000000002772000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://upx.sf.netAmcache.hve.5.drfalse
      high
      http://94.154.37.129/file/1524Ohttp://mdfile24.theworkpc.com/file/1524YLDUi7gQi7.exefalse
      • Avira URL Cloud: safe
      unknown
      http://94.154.37.129/file/1524PYLDUi7gQi7.exe, 00000000.00000002.2647411596.00000000026F1000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://mdfile24.theworkpc.comYLDUi7gQi7.exe, 00000000.00000002.2647411596.0000000002788000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameYLDUi7gQi7.exe, 00000000.00000002.2647411596.000000000275E000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://mdfile24.theworkpc.com/file/1524dYLDUi7gQi7.exe, 00000000.00000002.2647411596.0000000002788000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://mdfile24.theworkpc.com/file/1524YLDUi7gQi7.exe, 00000000.00000002.2647411596.00000000026F1000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        94.154.37.129
        unknownUkraine
        12695DINET-ASRUfalse
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1586670
        Start date and time:2025-01-09 13:36:06 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 4m 18s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:8
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:YLDUi7gQi7.exe
        renamed because original name is a hash value
        Original Sample Name:e8d13a972f91936870dc5d2e8830dc10a00e499b1bc25cc88ec4570cf7dbfd66.exe
        Detection:MAL
        Classification:mal64.winEXE@2/5@1/1
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 98%
        • Number of executed functions: 11
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 20.42.73.29, 4.175.87.197, 13.107.246.45, 20.190.159.2
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
        • Report size getting too big, too many NtQueryValueKey calls found.
        • Report size getting too big, too many NtReadVirtualMemory calls found.
        • Report size getting too big, too many NtSetInformationFile calls found.
        • VT rate limit hit for: YLDUi7gQi7.exe
        TimeTypeDescription
        07:37:13API Interceptor192x Sleep call for process: YLDUi7gQi7.exe modified
        07:37:57API Interceptor1x Sleep call for process: WerFault.exe modified
        No context
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        DINET-ASRUmmbasic.exeGet hashmaliciousUnknownBrowse
        • 89.208.236.251
        https://klickskydd.skolverket.org/?url=https%3A%2F%2Fwww.gazeta.ru%2Fpolitics%2Fnews%2F2024%2F12%2F22%2F24684722.shtml&id=71de&rcpt=upplysningstjansten@skolverket.se&tss=1735469857&msgid=b53e7603-c5d3-11ef-8a2e-0050569b0508&html=1&h=ded85c63Get hashmaliciousHTMLPhisherBrowse
        • 95.163.84.7
        https://www.gazeta.ru/politics/news/2024/12/22/24684722.shtmlGet hashmaliciousHTMLPhisherBrowse
        • 95.163.84.7
        https://www.gazeta.ru/politics/news/2024/12/22/24684854.shtmlGet hashmaliciousHTMLPhisherBrowse
        • 95.163.84.7
        nsharm7.elfGet hashmaliciousMiraiBrowse
        • 213.248.5.162
        https://img10.reactor.cc/pics/post/full/Sakimichan-artist-Iono-(Pokemon)-Pok%c3%a9mon-7823638.jpegGet hashmaliciousHTMLPhisherBrowse
        • 213.248.44.211
        jew.m68k.elfGet hashmaliciousUnknownBrowse
        • 85.192.49.117
        bot.spc.elfGet hashmaliciousMiraiBrowse
        • 85.196.7.237
        mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
        • 45.151.37.25
        https://link.mail.beehiiv.com/ls/click?upn=u001.R74aO5UQ-2FrUOGP4XJV77OKQT1NAU9BwQ6OP1zvOna2j3qRTjcdTYAqprTXNbU1vrKPOdnlpDlbO1ohrNKAkzUmdLI4l19yBq8cKvYb8dsNKK6IsO0404WADpCgMHJK-2BM7ePj1I7t27EBUyeaiqRuwqngyTjrFDMwzKEm6VF8ExY0iFbvMWKjDk4Y7upRdq5sSY4nXTsFeij7Q5E2ydkS65V1Y39RLDjY80Udth17NgVFYK9r3RCAH09UYk2CIjxFd5I9_j6TOopR0rmB-2FAe-2FAtMIxxpgCP1uVymDZ2Ai3kvTmy94R9Cva2dqhTbcrX0jwqqIbWEZoY75Qxv0d-2Fi-2BJ58G8TpFK32hJ3Y6KvVmw024fgWikUvw7JSpe1p1AxJouHIwzH-2B4WSy6DMsQxGcoT2TOfGxh3ObD4vtK9CAXwy7Cjhf2-2FwG571nv3bia-2F44CMLr9lsCQcs3SwvYIDQ24Nq6VfvIfUFJ9nNyI7I5MS5J8-2Bg5rLnAjlWoLmJBScJaNhqffuqYHWE3BYOKju8i7o1wD6Pw-2Fs92sFC2Mh7Oi9oheY1ZKD714qAu5jG5ZYhyhfMgCcuyNvp15ZI4Srd3AOfDL686JQJNBXoqAuLGHc3y6muY0dxN9oNJrp8vksovnjs-2Be8S30MoUUfcAPp8UPZjIomKd3EBkrVIa3k8AgkBS-2BZFp3F1x23PdTLWCU-2BZmxkQxWtGet hashmaliciousUnknownBrowse
        • 79.137.248.152
        No context
        No context
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):65536
        Entropy (8bit):1.1135940497329162
        Encrypted:false
        SSDEEP:192:C0o85NxZ0BU/6aGOJo5e9zuiFciXZ24IO8EH:loKNcBU/6ahwazuiFciXY4IO8EH
        MD5:55376C24A5C13BCABF68BA9FBFB5DA6E
        SHA1:F6761F8FA77C2DF947374A5C4D61BABF7336B6B4
        SHA-256:0F8E6419B7AA04E91056DA4FBBBEF0F9A232FEFDBFA2CC2E175E09B6FFE666B7
        SHA-512:382577656F572A5CF6B12265A8950326EE1F46A902EB4D179DE0C9BF8DE450A23999A6F0955C8D8972BAF73342DBADED772C0EE331D5F30DB1EB9D3CDD9C8C62
        Malicious:true
        Reputation:low
        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.0.8.9.9.8.5.7.7.2.6.4.2.2.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.0.8.9.9.8.5.8.2.7.3.2.8.8.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.0.c.9.8.9.6.1.-.f.5.8.c.-.4.c.b.1.-.8.3.d.1.-.f.8.4.2.b.f.8.9.3.c.1.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.2.8.9.7.c.f.8.-.d.e.a.2.-.4.c.d.b.-.9.2.4.0.-.d.2.7.7.7.1.0.5.7.1.a.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.Y.L.D.U.i.7.g.Q.i.7...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.I.m.a.g.e.V.i.e.w.e.r...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.7.8.-.0.0.0.1.-.0.0.1.4.-.6.6.3.d.-.a.e.2.8.9.3.6.2.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.6.c.2.c.4.b.4.a.0.7.f.6.2.6.e.7.5.f.b.7.7.d.1.2.5.f.b.1.b.e.9.8.0.0.0.0.0.0.0.0.!.0.0.0.0.e.c.4.2.9.1.a.a.8.a.4.c.4.2.0.7.4.a.f.5.d.2.4.1.9.4.e.8.5.9.1.3.8.
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Mini DuMP crash report, 15 streams, Thu Jan 9 12:37:38 2025, 0x1205a4 type
        Category:dropped
        Size (bytes):322255
        Entropy (8bit):3.6892628275874704
        Encrypted:false
        SSDEEP:3072:kygo5IzGyM4uEqtXDnqLTgX85DamCxpk5wkL:kygoEGyM4+XDITghmQ
        MD5:01AFAA56CEB31FC77EA3A2D21360C47E
        SHA1:7CE1B2735A36D291CA1BD21623D1CABD8F7D63DA
        SHA-256:EBEC74ADCC62F5BA3E5AD9310E5A2D8163CCADA821AEF04D5DE2D85A49579D7B
        SHA-512:43DC8C65D0ED0B6D1D7BF67EDCB8A9E9743C8652A5323CB40765BBDAE7409C3D926767F122CCBAABEB1FFE7C90F41C31D3C3451A14215A8EBCBDB8AF554AC3B4
        Malicious:false
        Reputation:low
        Preview:MDMP..a..... ..........g........................p...........<....%.......(..0`..........`.......8...........T............?..............%...........'..............................................................................eJ......H(......GenuineIntel............T.......x......g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):8410
        Entropy (8bit):3.6961208436422943
        Encrypted:false
        SSDEEP:192:R6l7wVeJ+W6TTLoe6YEImSUN07gmfZdV0prg89bzNsfPRm:R6lXJH6TZ6YEpSUC7gmfp0zGfE
        MD5:2F2567AF52BC5425F14138DA6AACA5B0
        SHA1:D290627D1759D8B38E1E6E823C8A4730C1FCE3F7
        SHA-256:E9659C1E0CE1A5DF67C78D65F669C9E784F6BBD7248E1D965F97A2A2F1551745
        SHA-512:B03C778B2FDC6D48F8D020D0C3D3A77C5539C1B69E7B622323A6283D68F6DB732EFDE6FD9263FD34B80A641A6B19C4594198F8B774CDD09CF5FE5528D33C5F81
        Malicious:false
        Reputation:low
        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.2.8.8.<./.P.i.
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):4748
        Entropy (8bit):4.476909567197126
        Encrypted:false
        SSDEEP:48:cvIwWl8zsLJg77aI91CWpW8VY/YYm8M4JanFL+q8vSbcn0jMNcd:uIjflI7LD7VAJAKPbNcd
        MD5:C4179D69655526C05A9D04635CCCDDFE
        SHA1:99E089374EFA7F226B855E9A05BA32A334EC44DF
        SHA-256:B14984E77B3739B77CC9BD990D6C90DCF29570DC20C10745D1626A149E6197C9
        SHA-512:60F58E298C4C56DD70C01678663278A9B203F6F01FE9A1D8F93701FD775D77008D760061CB70E5FCBB17AEAF1A31F4D27ECB10DE2B36B6D900B3AC6D09773373
        Malicious:false
        Reputation:low
        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="668380" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:MS Windows registry file, NT/2000 or above
        Category:dropped
        Size (bytes):1835008
        Entropy (8bit):4.421710268909629
        Encrypted:false
        SSDEEP:6144:WSvfpi6ceLP/9skLmb0OTYWSPHaJG8nAgeMZMMhA2fX4WABlEnN70uhiTw:1vloTYW+EZMM6DFy503w
        MD5:B011C1D4267656F22C9896CC6C449121
        SHA1:D5842F5B384A35D93D2FBF9E69725C8A1E36F57E
        SHA-256:960022BBBED22F05CAC26182581C7611330F08D05A41AF5A6D948B2D85130D8B
        SHA-512:9D91E42E5F574B105567C58C9B81270D0479181AB4855FCD9E2FA42E45DB48B68B25F52C8B5E1A8F5E5AE9C1D624855426A168BC586A0548FECE8BE7E4B8EDD7
        Malicious:false
        Reputation:low
        Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.).C.b................................................................................................................................................................................................................................................................................................................................................w........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
        Entropy (8bit):6.660844052428411
        TrID:
        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
        • Win32 Executable (generic) a (10002005/4) 49.78%
        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
        • Generic Win/DOS Executable (2004/3) 0.01%
        • DOS Executable Generic (2002/1) 0.01%
        File name:YLDUi7gQi7.exe
        File size:44'032 bytes
        MD5:6742e36ad0679bf1bdaa1fef3afa43b8
        SHA1:ec4291aa8a4c42074af5d24194e859138650a192
        SHA256:e8d13a972f91936870dc5d2e8830dc10a00e499b1bc25cc88ec4570cf7dbfd66
        SHA512:3545a3e003c6683aa503af4128ec91f3ba8e22435ca4ade2d73aa8a7261b4e97df2b352f319d13a211ff841de7081c7e212ccc8c17efc538e2715447835a135b
        SSDEEP:768:aZTnFLYzyaPVzlIFfSCoojXAD5MeEsw8PfgGqpIP:aZDatzlmuCYIGqpC
        TLSH:50136C1222EC4325C23A2BF338A36B211731AD4DD997D75894CAEBED39E378047427E5
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....J................0..d...F......Z.... ........@.. ....................... ............`................................
        Icon Hash:5da4ed8cb48d540d
        Entrypoint:0x40825a
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Time Stamp:0xE3B04AF9 [Thu Jan 18 17:59:21 2091 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
        Instruction
        jmp dword ptr [00402000h]
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x82050x4f.text
        IMAGE_DIRECTORY_ENTRY_RESOURCE0xa0000x43b8.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x100000xc.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x81640x38.text
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x20000x62600x6400f04f7fb00e3f50183ef1be6fbd8eb9c9False0.404609375data5.4751341010778125IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rsrc0xa0000x43b80x4400a211b975f7747e74ce91b1cb5890cb6aFalse0.9281939338235294data7.820911984198312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .reloc0x100000xc0x200136ff3f80437692287283b25d52d3e6cFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_ICON0xa1000x3d56PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.977009298178576
        RT_GROUP_ICON0xde680x14data1.05
        RT_VERSION0xde8c0x32cdata0.4236453201970443
        RT_MANIFEST0xe1c80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
        DLLImport
        mscoree.dll_CorExeMain
        TimestampSource PortDest PortSource IPDest IP
        Jan 9, 2025 13:36:52.885409117 CET4970480192.168.2.594.154.37.129
        Jan 9, 2025 13:36:52.890642881 CET804970494.154.37.129192.168.2.5
        Jan 9, 2025 13:36:52.890739918 CET4970480192.168.2.594.154.37.129
        Jan 9, 2025 13:36:52.891304016 CET4970480192.168.2.594.154.37.129
        Jan 9, 2025 13:36:52.896208048 CET804970494.154.37.129192.168.2.5
        Jan 9, 2025 13:37:14.304671049 CET804970494.154.37.129192.168.2.5
        Jan 9, 2025 13:37:14.304845095 CET4970480192.168.2.594.154.37.129
        Jan 9, 2025 13:37:14.313514948 CET4970480192.168.2.594.154.37.129
        Jan 9, 2025 13:37:14.315821886 CET4970980192.168.2.594.154.37.129
        Jan 9, 2025 13:37:14.318973064 CET804970494.154.37.129192.168.2.5
        Jan 9, 2025 13:37:14.321268082 CET804970994.154.37.129192.168.2.5
        Jan 9, 2025 13:37:14.321355104 CET4970980192.168.2.594.154.37.129
        Jan 9, 2025 13:37:14.321470976 CET4970980192.168.2.594.154.37.129
        Jan 9, 2025 13:37:14.326776981 CET804970994.154.37.129192.168.2.5
        Jan 9, 2025 13:37:20.453860998 CET5853853192.168.2.51.1.1.1
        Jan 9, 2025 13:37:20.458741903 CET53585381.1.1.1192.168.2.5
        Jan 9, 2025 13:37:20.458816051 CET5853853192.168.2.51.1.1.1
        Jan 9, 2025 13:37:20.463804007 CET53585381.1.1.1192.168.2.5
        Jan 9, 2025 13:37:20.929866076 CET5853853192.168.2.51.1.1.1
        Jan 9, 2025 13:37:20.934884071 CET53585381.1.1.1192.168.2.5
        Jan 9, 2025 13:37:20.934958935 CET5853853192.168.2.51.1.1.1
        Jan 9, 2025 13:37:35.694808960 CET804970994.154.37.129192.168.2.5
        Jan 9, 2025 13:37:35.694889069 CET4970980192.168.2.594.154.37.129
        Jan 9, 2025 13:37:35.695065022 CET4970980192.168.2.594.154.37.129
        Jan 9, 2025 13:37:35.699929953 CET804970994.154.37.129192.168.2.5
        TimestampSource PortDest PortSource IPDest IP
        Jan 9, 2025 13:37:20.451123953 CET53532951.1.1.1192.168.2.5
        Jan 9, 2025 13:37:35.713650942 CET6159253192.168.2.51.1.1.1
        Jan 9, 2025 13:37:35.999577045 CET53615921.1.1.1192.168.2.5
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Jan 9, 2025 13:37:35.713650942 CET192.168.2.51.1.1.10x2c43Standard query (0)mdfile24.theworkpc.comA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Jan 9, 2025 13:37:35.999577045 CET1.1.1.1192.168.2.50x2c43Name error (3)mdfile24.theworkpc.comnonenoneA (IP address)IN (0x0001)false
        • 94.154.37.129
        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        0192.168.2.54970494.154.37.129807288C:\Users\user\Desktop\YLDUi7gQi7.exe
        TimestampBytes transferredDirectionData
        Jan 9, 2025 13:36:52.891304016 CET72OUTGET /file/1524 HTTP/1.1
        Host: 94.154.37.129
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        1192.168.2.54970994.154.37.129807288C:\Users\user\Desktop\YLDUi7gQi7.exe
        TimestampBytes transferredDirectionData
        Jan 9, 2025 13:37:14.321470976 CET72OUTGET /file/1524 HTTP/1.1
        Host: 94.154.37.129
        Connection: Keep-Alive


        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:07:36:51
        Start date:09/01/2025
        Path:C:\Users\user\Desktop\YLDUi7gQi7.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\YLDUi7gQi7.exe"
        Imagebase:0x410000
        File size:44'032 bytes
        MD5 hash:6742E36AD0679BF1BDAA1FEF3AFA43B8
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Target ID:5
        Start time:07:37:36
        Start date:09/01/2025
        Path:C:\Windows\SysWOW64\WerFault.exe
        Wow64 process (32bit):true
        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7288 -s 1608
        Imagebase:0x890000
        File size:483'680 bytes
        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Reset < >

          Execution Graph

          Execution Coverage:6.7%
          Dynamic/Decrypted Code Coverage:100%
          Signature Coverage:0%
          Total number of Nodes:33
          Total number of Limit Nodes:1
          execution_graph 14277 c64668 14278 c6467a 14277->14278 14279 c64686 14278->14279 14281 c64783 14278->14281 14282 c6479d 14281->14282 14286 c64883 14282->14286 14290 c64888 14282->14290 14288 c64888 14286->14288 14287 c6498c 14288->14287 14294 c644b0 14288->14294 14292 c648af 14290->14292 14291 c6498c 14292->14291 14293 c644b0 CreateActCtxA 14292->14293 14293->14291 14295 c65918 CreateActCtxA 14294->14295 14297 c659db 14295->14297 14298 c6bc08 14299 c6bc17 14298->14299 14301 c6c0f9 14298->14301 14302 c6c119 14301->14302 14303 c6c13c 14301->14303 14302->14303 14304 c6c340 GetModuleHandleW 14302->14304 14303->14299 14305 c6c36d 14304->14305 14305->14299 14306 c6e0b8 14307 c6e0fe 14306->14307 14311 c6e298 14307->14311 14314 c6e289 14307->14314 14308 c6e1eb 14312 c6e2c6 14311->14312 14317 c6c0e8 14311->14317 14312->14308 14315 c6c0e8 DuplicateHandle 14314->14315 14316 c6e2c6 14315->14316 14316->14308 14318 c6e708 DuplicateHandle 14317->14318 14319 c6e79e 14318->14319 14319->14312

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 317 c63e28-c66fcb 320 c66fd2-c67044 call c65cc4 317->320 321 c66fcd 317->321 328 c6704d-c670fc 320->328 321->320 333 c67843-c6784a 328->333 334 c67852-c678db 333->334 335 c6784c-c6784d 333->335 336 c678e6-c6790c 334->336 335->336 338 c67925-c67a0b 336->338 339 c6790e-c67920 336->339 340 c67a11-c67a5e 338->340 339->340 343 c67a60-c67a9c 340->343 344 c67aa1-c67b9d 340->344 345 c67ba3-c67c25 343->345 344->345 358 c67101-c67109 345->358 359 c67c2b-c67c3d 345->359 363 c67111-c67222 358->363 364 c6710b-c6710c 358->364 371 c67c45-c67d42 359->371 372 c67c3f-c67c40 359->372 365 c6722d-c67292 363->365 364->365 373 c67294-c672c4 365->373 374 c672c9-c67388 365->374 376 c67d4d-c67da7 371->376 372->376 378 c6738e-c673ea 373->378 374->378 401 c67daf-c67eae 376->401 402 c67da9-c67daa 376->402 381 c673ec-c67434 378->381 382 c67439-c67573 378->382 387 c67579-c675ed 381->387 382->387 388 c67654-c67796 387->388 389 c675ef-c6764f 387->389 394 c6779c-c67840 388->394 389->394 394->333 407 c67eb9-c67fab call c65cd4 401->407 402->407
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.2647107131.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_c60000_YLDUi7gQi7.jbxd
          Similarity
          • API ID:
          • String ID: *$S
          • API String ID: 0-3373398988
          • Opcode ID: 2a01ab4ad6d038cb953c9fee98febab5f11f94b83742055853d625e97f15dc6a
          • Instruction ID: 95b8b45f3fdf79201b4a79d53110c51a457f677adba9ab8994cde0966bb26974
          • Opcode Fuzzy Hash: 2a01ab4ad6d038cb953c9fee98febab5f11f94b83742055853d625e97f15dc6a
          • Instruction Fuzzy Hash: 12925178D012298FDB65DF69D984B9DBBB2FB88300F1081EA990DA7355DB315E81DF40

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 465 c6c0f9-c6c117 466 c6c143-c6c147 465->466 467 c6c119-c6c126 call c6ac7c 465->467 468 c6c15b-c6c19c 466->468 469 c6c149-c6c153 466->469 474 c6c13c 467->474 475 c6c128 467->475 476 c6c19e-c6c1a6 468->476 477 c6c1a9-c6c1b7 468->477 469->468 474->466 522 c6c12e call c6c3a0 475->522 523 c6c12e call c6c39f 475->523 476->477 479 c6c1db-c6c1dd 477->479 480 c6c1b9-c6c1be 477->480 478 c6c134-c6c136 478->474 481 c6c278-c6c338 478->481 482 c6c1e0-c6c1e7 479->482 483 c6c1c0-c6c1c7 call c6ac88 480->483 484 c6c1c9 480->484 515 c6c340-c6c36b GetModuleHandleW 481->515 516 c6c33a-c6c33d 481->516 486 c6c1f4-c6c1fb 482->486 487 c6c1e9-c6c1f1 482->487 485 c6c1cb-c6c1d9 483->485 484->485 485->482 490 c6c1fd-c6c205 486->490 491 c6c208-c6c211 call c6ac98 486->491 487->486 490->491 496 c6c213-c6c21b 491->496 497 c6c21e-c6c223 491->497 496->497 498 c6c225-c6c22c 497->498 499 c6c241-c6c245 497->499 498->499 501 c6c22e-c6c23e call c6aca8 call c6bcf4 498->501 520 c6c248 call c6c6a0 499->520 521 c6c248 call c6c670 499->521 501->499 503 c6c24b-c6c24e 506 c6c250-c6c26e 503->506 507 c6c271-c6c277 503->507 506->507 517 c6c374-c6c388 515->517 518 c6c36d-c6c373 515->518 516->515 518->517 520->503 521->503 522->478 523->478
          APIs
          • GetModuleHandleW.KERNELBASE(00000000), ref: 00C6C35E
          Memory Dump Source
          • Source File: 00000000.00000002.2647107131.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_c60000_YLDUi7gQi7.jbxd
          Similarity
          • API ID: HandleModule
          • String ID:
          • API String ID: 4139908857-0
          • Opcode ID: 8941bfb2a090f183057d53abba38999cb3d137150c72675150916661466cbd66
          • Instruction ID: 2d9887e3c19f8e0a1ff458f8a5ce274b826e62e05745353f1e10bbdf552b6fd4
          • Opcode Fuzzy Hash: 8941bfb2a090f183057d53abba38999cb3d137150c72675150916661466cbd66
          • Instruction Fuzzy Hash: B68145B0A00B458FD724CF69D49076ABBF1FF88300F008A2DD49AD7A51D775EA45CB90

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 524 c644b0-c659d9 CreateActCtxA 527 c659e2-c65a3c 524->527 528 c659db-c659e1 524->528 535 c65a3e-c65a41 527->535 536 c65a4b-c65a4f 527->536 528->527 535->536 537 c65a60 536->537 538 c65a51-c65a5d 536->538 540 c65a61 537->540 538->537 540->540
          APIs
          • CreateActCtxA.KERNEL32(?), ref: 00C659C9
          Memory Dump Source
          • Source File: 00000000.00000002.2647107131.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_c60000_YLDUi7gQi7.jbxd
          Similarity
          • API ID: Create
          • String ID:
          • API String ID: 2289755597-0
          • Opcode ID: 1f6f3a30b333862071a9d84db6b3606755de99f1a9345feea43512c0b1217366
          • Instruction ID: b01da0c4083ac85b49565b685f943917beff411e262523ce994281410ac8f7d1
          • Opcode Fuzzy Hash: 1f6f3a30b333862071a9d84db6b3606755de99f1a9345feea43512c0b1217366
          • Instruction Fuzzy Hash: 2A41C2B1D0071DCBDB24CFA9C884B9DBBF5BF49304F20816AD409AB255DBB56946CF90

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 541 c65913 542 c6591c-c659d9 CreateActCtxA 541->542 544 c659e2-c65a3c 542->544 545 c659db-c659e1 542->545 552 c65a3e-c65a41 544->552 553 c65a4b-c65a4f 544->553 545->544 552->553 554 c65a60 553->554 555 c65a51-c65a5d 553->555 557 c65a61 554->557 555->554 557->557
          APIs
          • CreateActCtxA.KERNEL32(?), ref: 00C659C9
          Memory Dump Source
          • Source File: 00000000.00000002.2647107131.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_c60000_YLDUi7gQi7.jbxd
          Similarity
          • API ID: Create
          • String ID:
          • API String ID: 2289755597-0
          • Opcode ID: d8ff998c575a3fda60288749af583350237d0bff5b6805103b19796a0f8d58ee
          • Instruction ID: 1f12dbde4c8f4ec9aa2514b82ca3dc0adf02f4818dacf4729c968cec89f37652
          • Opcode Fuzzy Hash: d8ff998c575a3fda60288749af583350237d0bff5b6805103b19796a0f8d58ee
          • Instruction Fuzzy Hash: 8541E0B0C0071DCBDB24CFA9C884B9DBBF5BF48304F24816AD418AB255DBB5694ACF50

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 558 c6c0e8-c6e79c DuplicateHandle 560 c6e7a5-c6e7c2 558->560 561 c6e79e-c6e7a4 558->561 561->560
          APIs
          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00C6E2C6,?,?,?,?,?), ref: 00C6E78F
          Memory Dump Source
          • Source File: 00000000.00000002.2647107131.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_c60000_YLDUi7gQi7.jbxd
          Similarity
          • API ID: DuplicateHandle
          • String ID:
          • API String ID: 3793708945-0
          • Opcode ID: 3b6b612e413dfe566883b1bbd733cf7a34dd8b0abfd4438f9ad3d02fdd1e3dbc
          • Instruction ID: 1383b0a5c01669954e3e0842022709f6c3a13c6871da1f27f0e642adc285815a
          • Opcode Fuzzy Hash: 3b6b612e413dfe566883b1bbd733cf7a34dd8b0abfd4438f9ad3d02fdd1e3dbc
          • Instruction Fuzzy Hash: C721E4B5900248AFDB10CF9AD984AEEBFF8FB48320F14841AE914A7310D374A954DFA4

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 564 c6e700-c6e79c DuplicateHandle 565 c6e7a5-c6e7c2 564->565 566 c6e79e-c6e7a4 564->566 566->565
          APIs
          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00C6E2C6,?,?,?,?,?), ref: 00C6E78F
          Memory Dump Source
          • Source File: 00000000.00000002.2647107131.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_c60000_YLDUi7gQi7.jbxd
          Similarity
          • API ID: DuplicateHandle
          • String ID:
          • API String ID: 3793708945-0
          • Opcode ID: 79c320913cfae53e02b73c7104a002493f1b70faa5d7b28e5c2b84b02ffd7885
          • Instruction ID: ba75642f80180755365726b6e5331adc1b053b78f1777300b77f3ed9eef5a07e
          • Opcode Fuzzy Hash: 79c320913cfae53e02b73c7104a002493f1b70faa5d7b28e5c2b84b02ffd7885
          • Instruction Fuzzy Hash: 5921F5B9900249DFDB10CFA9D584ADEBFF5FB48320F14841AE918A3350D378AA54CF65

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 569 c6c2f8-c6c338 570 c6c340-c6c36b GetModuleHandleW 569->570 571 c6c33a-c6c33d 569->571 572 c6c374-c6c388 570->572 573 c6c36d-c6c373 570->573 571->570 573->572
          APIs
          • GetModuleHandleW.KERNELBASE(00000000), ref: 00C6C35E
          Memory Dump Source
          • Source File: 00000000.00000002.2647107131.0000000000C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_c60000_YLDUi7gQi7.jbxd
          Similarity
          • API ID: HandleModule
          • String ID:
          • API String ID: 4139908857-0
          • Opcode ID: 652f8fcfe641814750a0b14dc30c2b428046e1d95c71b73aafd80aadca3c9300
          • Instruction ID: 85bc54a84ae3ec8bbb73a94b87b6a10b74386bb7ae68fc6954f6744727d5ca8f
          • Opcode Fuzzy Hash: 652f8fcfe641814750a0b14dc30c2b428046e1d95c71b73aafd80aadca3c9300
          • Instruction Fuzzy Hash: 6911D2B6C006498FCB20CF9AC484ADEFBF4EB88324F14C52AD469A7210C379A545CFA5
          Memory Dump Source
          • Source File: 00000000.00000002.2646521648.00000000009ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 009ED000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_9ed000_YLDUi7gQi7.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: a81f6a4392fe2442055a0ac85390bbb912d08a65c65345bb367f59f0a46b0885
          • Instruction ID: ba3a0d8df60c15f3ec6cce92d1b97ff6591a1511456640126fdfae947dffe11c
          • Opcode Fuzzy Hash: a81f6a4392fe2442055a0ac85390bbb912d08a65c65345bb367f59f0a46b0885
          • Instruction Fuzzy Hash: FB214B71104284DFDB02DF04C9C0B16BF65FBA8324F20C568D8090B2E6D33AEC06C6A1
          Memory Dump Source
          • Source File: 00000000.00000002.2646943974.0000000000BFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BFD000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_bfd000_YLDUi7gQi7.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 404246078fa47bd317a72c07ea05bbcea5f8d88aa38381ee228588f7329a2734
          • Instruction ID: 3dcb32e2f78a66cce8a7429734c60240c0d9a2cfc0f2fa3baf428eaf04570fe6
          • Opcode Fuzzy Hash: 404246078fa47bd317a72c07ea05bbcea5f8d88aa38381ee228588f7329a2734
          • Instruction Fuzzy Hash: 4A213771504208DFCB15DF24D9D0B26BBA6FB84314F20C5ADDA094B346CB3BD80BCA61
          Memory Dump Source
          • Source File: 00000000.00000002.2646943974.0000000000BFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BFD000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_bfd000_YLDUi7gQi7.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 49dde6073b165799a9488490471c5dcf3f012446b7295ac9eeb78fd9b8589e3f
          • Instruction ID: 7a0a0038a5e9835c80c09744d66c4ef6c77b5842cf44d1309472b689103a8ba2
          • Opcode Fuzzy Hash: 49dde6073b165799a9488490471c5dcf3f012446b7295ac9eeb78fd9b8589e3f
          • Instruction Fuzzy Hash: E821C6755093848FCB06CF20D594715BFB2EB46314F28C5EAD9498B297C33AD80ACB62
          Memory Dump Source
          • Source File: 00000000.00000002.2646521648.00000000009ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 009ED000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_9ed000_YLDUi7gQi7.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
          • Instruction ID: 064580762b0e923a6f9073d9524068d70a86677b9d42b783fac12c0bceefb5d0
          • Opcode Fuzzy Hash: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
          • Instruction Fuzzy Hash: D4112976404280DFDB02CF00D5C4B16BF71FBA4324F24C2A9D8090B2A6C33AD856CB91