Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
YLDUi7gQi7.exe

Overview

General Information

Sample name:YLDUi7gQi7.exe
renamed because original name is a hash value
Original sample name:e8d13a972f91936870dc5d2e8830dc10a00e499b1bc25cc88ec4570cf7dbfd66.exe
Analysis ID:1586670
MD5:6742e36ad0679bf1bdaa1fef3afa43b8
SHA1:ec4291aa8a4c42074af5d24194e859138650a192
SHA256:e8d13a972f91936870dc5d2e8830dc10a00e499b1bc25cc88ec4570cf7dbfd66
Tags:exeuser-adrian__luca
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Enables debug privileges
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files

Classification

  • System is w10x64
  • YLDUi7gQi7.exe (PID: 6672 cmdline: "C:\Users\user\Desktop\YLDUi7gQi7.exe" MD5: 6742E36AD0679BF1BDAA1FEF3AFA43B8)
    • WerFault.exe (PID: 2260 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6672 -s 1564 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: YLDUi7gQi7.exeAvira: detected
Source: YLDUi7gQi7.exeReversingLabs: Detection: 79%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
Source: YLDUi7gQi7.exeJoe Sandbox ML: detected
Source: YLDUi7gQi7.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: YLDUi7gQi7.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: System.Xml.ni.pdb source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: ImageViewer.pdb source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: \??\C:\Windows\ImageViewer.pdbI source: YLDUi7gQi7.exe, 00000000.00000002.3939528596.00000000009BC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\Desktop\ImageViewer.pdb source: YLDUi7gQi7.exe, 00000000.00000002.3939528596.0000000000951000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Accessibility.pdb source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: Accessibility.pdb& source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: System.ni.pdbRSDS source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: Microsoft.CSharp.pdb source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: \??\C:\Windows\symbols\exe\ImageViewer.pdbp source: YLDUi7gQi7.exe, 00000000.00000002.3939528596.00000000009BC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\Administrator\Desktop\ImageViewer\ImageViewer\obj\Debug\ImageViewer.pdb source: YLDUi7gQi7.exe
Source: Binary string: System.Configuration.ni.pdb source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: mscorlib.ni.pdbRSDS source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: System.Configuration.pdb source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: \??\C:\Windows\System.pdb source: YLDUi7gQi7.exe, 00000000.00000002.3939528596.0000000000951000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Xml.pdb source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: System.pdb source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: C:\Users\Administrator\Desktop\ImageViewer\ImageViewer\obj\Debug\ImageViewer.pdb\Desktop\YLDUi7gQi7.PDB source: YLDUi7gQi7.exe, 00000000.00000002.3939503115.00000000008F7000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Xml.ni.pdbRSDS# source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: \??\C:\Windows\symbols\exe\ImageViewer.pdb source: YLDUi7gQi7.exe, 00000000.00000002.3939528596.00000000009BC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.ni.pdb source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: System.Windows.Forms.pdb source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: \??\C:\Windows\dll\System.pdb source: YLDUi7gQi7.exe, 00000000.00000002.3939528596.00000000009BC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: \??\C:\Windows\ImageViewer.pdb source: YLDUi7gQi7.exe, 00000000.00000002.3939528596.00000000009BC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: HP<o8C:\Windows\ImageViewer.pdb source: YLDUi7gQi7.exe, 00000000.00000002.3939503115.00000000008F7000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Drawing.pdb source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: symbols\exe\ImageViewer.pdb source: YLDUi7gQi7.exe, 00000000.00000002.3939503115.00000000008F7000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: YLDUi7gQi7.exe, 00000000.00000002.3939528596.00000000009BC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.ni.pdb source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: \??\C:\Windows\exe\ImageViewer.pdbn5 source: YLDUi7gQi7.exe, 00000000.00000002.3939528596.00000000009EE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdb source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: System.pdb4 source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: \??\C:\Windows\exe\ImageViewer.pdb\g source: YLDUi7gQi7.exe, 00000000.00000002.3939528596.00000000009EE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\System.pdbX source: YLDUi7gQi7.exe, 00000000.00000002.3939528596.00000000009BC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdbn source: YLDUi7gQi7.exe, 00000000.00000002.3939528596.00000000009BC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\System.pdbpdbtem.pdbne source: YLDUi7gQi7.exe, 00000000.00000002.3939528596.00000000009EE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: ?HoC:\Users\user\Desktop\ImageViewer.pdb source: YLDUi7gQi7.exe, 00000000.00000002.3939503115.00000000008F7000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: C:\Users\Administrator\Desktop\ImageViewer\ImageViewer\obj\Debug\ImageViewer.pdb- source: YLDUi7gQi7.exe
Source: Binary string: System.ni.pdb source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WERBDC9.tmp.dmp.6.dr
Source: global trafficTCP traffic: 192.168.2.6:63564 -> 1.1.1.1:53
Source: global trafficHTTP traffic detected: GET /file/1524 HTTP/1.1Host: 94.154.37.129Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /file/1524 HTTP/1.1Host: 94.154.37.129Connection: Keep-Alive
Source: unknownDNS traffic detected: query: mdfile24.theworkpc.com replaycode: Name error (3)
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.37.129
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.37.129
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.37.129
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.37.129
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.37.129
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.37.129
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.37.129
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.37.129
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.37.129
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.37.129
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /file/1524 HTTP/1.1Host: 94.154.37.129Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /file/1524 HTTP/1.1Host: 94.154.37.129Connection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: mdfile24.theworkpc.com
Source: YLDUi7gQi7.exe, 00000000.00000002.3940875770.000000000285E000.00000004.00000800.00020000.00000000.sdmp, YLDUi7gQi7.exe, 00000000.00000002.3940875770.0000000002872000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://94.154.37.129
Source: YLDUi7gQi7.exe, 00000000.00000002.3940875770.00000000027F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://94.154.37.129/file/1524
Source: YLDUi7gQi7.exeString found in binary or memory: http://94.154.37.129/file/1524Ohttp://mdfile24.theworkpc.com/file/1524
Source: YLDUi7gQi7.exe, 00000000.00000002.3940875770.00000000027F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://94.154.37.129/file/1524P
Source: YLDUi7gQi7.exe, 00000000.00000002.3940875770.0000000002887000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mdfile24.theworkpc.com
Source: YLDUi7gQi7.exe, 00000000.00000002.3940875770.00000000027F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mdfile24.theworkpc.com/file/1524
Source: YLDUi7gQi7.exe, 00000000.00000002.3940875770.0000000002887000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mdfile24.theworkpc.com/file/1524d
Source: YLDUi7gQi7.exe, 00000000.00000002.3940875770.000000000285E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeCode function: 0_2_00E43E280_2_00E43E28
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeCode function: 0_2_04E106A00_2_04E106A0
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeCode function: 0_2_04E110600_2_04E11060
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeCode function: 0_2_04E110530_2_04E11053
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6672 -s 1564
Source: YLDUi7gQi7.exe, 00000000.00000002.3939528596.000000000091E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs YLDUi7gQi7.exe
Source: YLDUi7gQi7.exe, 00000000.00000000.2086468577.00000000004CA000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameImageViewer.exe8 vs YLDUi7gQi7.exe
Source: YLDUi7gQi7.exeBinary or memory string: OriginalFilenameImageViewer.exe8 vs YLDUi7gQi7.exe
Source: YLDUi7gQi7.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal64.winEXE@2/5@1/1
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeMutant created: NULL
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6672
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\ec993c01-a449-4ead-a0c5-f15cf7c4680fJump to behavior
Source: YLDUi7gQi7.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: YLDUi7gQi7.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: YLDUi7gQi7.exeReversingLabs: Detection: 79%
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeFile read: C:\Users\user\Desktop\YLDUi7gQi7.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\YLDUi7gQi7.exe "C:\Users\user\Desktop\YLDUi7gQi7.exe"
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6672 -s 1564
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: YLDUi7gQi7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: YLDUi7gQi7.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: YLDUi7gQi7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: System.Xml.ni.pdb source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: ImageViewer.pdb source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: \??\C:\Windows\ImageViewer.pdbI source: YLDUi7gQi7.exe, 00000000.00000002.3939528596.00000000009BC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\Desktop\ImageViewer.pdb source: YLDUi7gQi7.exe, 00000000.00000002.3939528596.0000000000951000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Accessibility.pdb source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: Accessibility.pdb& source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: System.ni.pdbRSDS source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: Microsoft.CSharp.pdb source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: \??\C:\Windows\symbols\exe\ImageViewer.pdbp source: YLDUi7gQi7.exe, 00000000.00000002.3939528596.00000000009BC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\Administrator\Desktop\ImageViewer\ImageViewer\obj\Debug\ImageViewer.pdb source: YLDUi7gQi7.exe
Source: Binary string: System.Configuration.ni.pdb source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: mscorlib.ni.pdbRSDS source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: System.Configuration.pdb source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: \??\C:\Windows\System.pdb source: YLDUi7gQi7.exe, 00000000.00000002.3939528596.0000000000951000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Xml.pdb source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: System.pdb source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: C:\Users\Administrator\Desktop\ImageViewer\ImageViewer\obj\Debug\ImageViewer.pdb\Desktop\YLDUi7gQi7.PDB source: YLDUi7gQi7.exe, 00000000.00000002.3939503115.00000000008F7000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Xml.ni.pdbRSDS# source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: \??\C:\Windows\symbols\exe\ImageViewer.pdb source: YLDUi7gQi7.exe, 00000000.00000002.3939528596.00000000009BC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.ni.pdb source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: System.Windows.Forms.pdb source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: \??\C:\Windows\dll\System.pdb source: YLDUi7gQi7.exe, 00000000.00000002.3939528596.00000000009BC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: \??\C:\Windows\ImageViewer.pdb source: YLDUi7gQi7.exe, 00000000.00000002.3939528596.00000000009BC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: HP<o8C:\Windows\ImageViewer.pdb source: YLDUi7gQi7.exe, 00000000.00000002.3939503115.00000000008F7000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Drawing.pdb source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: symbols\exe\ImageViewer.pdb source: YLDUi7gQi7.exe, 00000000.00000002.3939503115.00000000008F7000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: YLDUi7gQi7.exe, 00000000.00000002.3939528596.00000000009BC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.ni.pdb source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: \??\C:\Windows\exe\ImageViewer.pdbn5 source: YLDUi7gQi7.exe, 00000000.00000002.3939528596.00000000009EE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdb source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: System.pdb4 source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: \??\C:\Windows\exe\ImageViewer.pdb\g source: YLDUi7gQi7.exe, 00000000.00000002.3939528596.00000000009EE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\System.pdbX source: YLDUi7gQi7.exe, 00000000.00000002.3939528596.00000000009BC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdbn source: YLDUi7gQi7.exe, 00000000.00000002.3939528596.00000000009BC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\System.pdbpdbtem.pdbne source: YLDUi7gQi7.exe, 00000000.00000002.3939528596.00000000009EE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: ?HoC:\Users\user\Desktop\ImageViewer.pdb source: YLDUi7gQi7.exe, 00000000.00000002.3939503115.00000000008F7000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: C:\Users\Administrator\Desktop\ImageViewer\ImageViewer\obj\Debug\ImageViewer.pdb- source: YLDUi7gQi7.exe
Source: Binary string: System.ni.pdb source: WERBDC9.tmp.dmp.6.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WERBDC9.tmp.dmp.6.dr
Source: YLDUi7gQi7.exeStatic PE information: 0xE3B04AF9 [Thu Jan 18 17:59:21 2091 UTC]
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeMemory allocated: E40000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeMemory allocated: 27F0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeMemory allocated: 47F0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 600000Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 4440Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exe TID: 4440Thread sleep time: -600000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeThread delayed: delay time: 600000Jump to behavior
Source: Amcache.hve.6.drBinary or memory string: VMware
Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.6.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: YLDUi7gQi7.exe, 00000000.00000002.3939528596.0000000000951000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll5
Source: Amcache.hve.6.drBinary or memory string: vmci.sys
Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.6.drBinary or memory string: VMware20,1
Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeQueries volume information: C:\Users\user\Desktop\YLDUi7gQi7.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\YLDUi7gQi7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Disable or Modify Tools
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
41
Virtualization/Sandbox Evasion
LSASS Memory41
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager12
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Timestomp
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
YLDUi7gQi7.exe79%ReversingLabsWin32.Trojan.Acll
YLDUi7gQi7.exe100%AviraHEUR/AGEN.1351365
YLDUi7gQi7.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://94.154.37.1290%Avira URL Cloudsafe
http://mdfile24.theworkpc.com/file/15240%Avira URL Cloudsafe
http://mdfile24.theworkpc.com0%Avira URL Cloudsafe
http://mdfile24.theworkpc.com/file/1524d0%Avira URL Cloudsafe
http://94.154.37.129/file/1524Ohttp://mdfile24.theworkpc.com/file/15240%Avira URL Cloudsafe
http://94.154.37.129/file/1524P0%Avira URL Cloudsafe
http://94.154.37.129/file/15240%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
mdfile24.theworkpc.com
unknown
unknownfalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    http://94.154.37.129/file/1524false
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://94.154.37.129YLDUi7gQi7.exe, 00000000.00000002.3940875770.000000000285E000.00000004.00000800.00020000.00000000.sdmp, YLDUi7gQi7.exe, 00000000.00000002.3940875770.0000000002872000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://upx.sf.netAmcache.hve.6.drfalse
      high
      http://94.154.37.129/file/1524Ohttp://mdfile24.theworkpc.com/file/1524YLDUi7gQi7.exefalse
      • Avira URL Cloud: safe
      unknown
      http://94.154.37.129/file/1524PYLDUi7gQi7.exe, 00000000.00000002.3940875770.00000000027F1000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://mdfile24.theworkpc.comYLDUi7gQi7.exe, 00000000.00000002.3940875770.0000000002887000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameYLDUi7gQi7.exe, 00000000.00000002.3940875770.000000000285E000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://mdfile24.theworkpc.com/file/1524dYLDUi7gQi7.exe, 00000000.00000002.3940875770.0000000002887000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://mdfile24.theworkpc.com/file/1524YLDUi7gQi7.exe, 00000000.00000002.3940875770.00000000027F1000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        94.154.37.129
        unknownUkraine
        12695DINET-ASRUfalse
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1586670
        Start date and time:2025-01-09 13:40:54 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 5m 22s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Run name:Run with higher sleep bypass
        Number of analysed new started processes analysed:8
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:YLDUi7gQi7.exe
        renamed because original name is a hash value
        Original Sample Name:e8d13a972f91936870dc5d2e8830dc10a00e499b1bc25cc88ec4570cf7dbfd66.exe
        Detection:MAL
        Classification:mal64.winEXE@2/5@1/1
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 12
        • Number of non-executed functions: 3
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
        • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
        • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 20.42.73.29, 13.107.246.45, 4.175.87.197, 20.190.160.14
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
        • Report size getting too big, too many NtQueryValueKey calls found.
        • Report size getting too big, too many NtReadVirtualMemory calls found.
        • Report size getting too big, too many NtSetInformationFile calls found.
        • VT rate limit hit for: YLDUi7gQi7.exe
        No simulations
        No context
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        DINET-ASRUmmbasic.exeGet hashmaliciousUnknownBrowse
        • 89.208.236.251
        https://klickskydd.skolverket.org/?url=https%3A%2F%2Fwww.gazeta.ru%2Fpolitics%2Fnews%2F2024%2F12%2F22%2F24684722.shtml&id=71de&rcpt=upplysningstjansten@skolverket.se&tss=1735469857&msgid=b53e7603-c5d3-11ef-8a2e-0050569b0508&html=1&h=ded85c63Get hashmaliciousHTMLPhisherBrowse
        • 95.163.84.7
        https://www.gazeta.ru/politics/news/2024/12/22/24684722.shtmlGet hashmaliciousHTMLPhisherBrowse
        • 95.163.84.7
        https://www.gazeta.ru/politics/news/2024/12/22/24684854.shtmlGet hashmaliciousHTMLPhisherBrowse
        • 95.163.84.7
        nsharm7.elfGet hashmaliciousMiraiBrowse
        • 213.248.5.162
        https://img10.reactor.cc/pics/post/full/Sakimichan-artist-Iono-(Pokemon)-Pok%c3%a9mon-7823638.jpegGet hashmaliciousHTMLPhisherBrowse
        • 213.248.44.211
        jew.m68k.elfGet hashmaliciousUnknownBrowse
        • 85.192.49.117
        bot.spc.elfGet hashmaliciousMiraiBrowse
        • 85.196.7.237
        mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
        • 45.151.37.25
        No context
        No context
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):65536
        Entropy (8bit):1.1139417607423476
        Encrypted:false
        SSDEEP:192:36UQVoiV5NxZ0BU/KaGOJo5e9zuiFciQZ24IO8EH:AoYNcBU/KahwazuiFciQY4IO8EH
        MD5:1A7F9072EF484570BB8C12F8EEFF9259
        SHA1:CF5740C9962E067039106AD6B7855373D343BFF9
        SHA-256:485A4088176A34BF7D150E9CC2FD2B899886C71DB86927C09763D59D18C92C57
        SHA-512:22C1C48A69B2DC1C95967AA28C23E16BC517FC696AF6826BAD3C3F4B6D6FA1338A87BAE969DB6485F82CF2CD88F5DCE911860616063AA12732E0EA9E3FAB7E7A
        Malicious:true
        Reputation:low
        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.0.9.0.0.1.4.5.8.6.6.2.9.5.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.0.9.0.0.1.4.6.3.5.0.6.7.1.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.a.f.2.1.d.7.d.-.7.9.1.6.-.4.8.2.6.-.a.8.8.0.-.9.2.a.c.e.6.6.3.c.7.4.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.d.f.f.c.f.6.d.-.6.1.e.0.-.4.e.2.a.-.8.c.1.d.-.7.f.8.1.c.4.2.b.5.a.8.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.Y.L.D.U.i.7.g.Q.i.7...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.I.m.a.g.e.V.i.e.w.e.r...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.1.0.-.0.0.0.1.-.0.0.1.5.-.0.0.d.7.-.5.9.d.5.9.3.6.2.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.6.c.2.c.4.b.4.a.0.7.f.6.2.6.e.7.5.f.b.7.7.d.1.2.5.f.b.1.b.e.9.8.0.0.0.0.0.0.0.0.!.0.0.0.0.e.c.4.2.9.1.a.a.8.a.4.c.4.2.0.7.4.a.f.5.d.2.4.1.9.4.e.8.5.9.1.3.8.
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Mini DuMP crash report, 15 streams, Thu Jan 9 12:42:26 2025, 0x1205a4 type
        Category:dropped
        Size (bytes):301691
        Entropy (8bit):3.796103941268842
        Encrypted:false
        SSDEEP:3072:5dDecYJnVAjT8ZFJ62ji4uEqRFOV64eLTgwsYpyk:59e1n+fqNi4WTgrYpy
        MD5:C4FA5FAC1BB24BCFC9DB94FE7A50D3EA
        SHA1:B513AB9AA3BB84225E501F7914A74532486B6245
        SHA-256:DF1C9FF0BCD6FB5FA8D82A4196FC163A03D4D6BF9E977BC265988A0C44AD5532
        SHA-512:FE7C5BE2DEECFA4B629856DE36AE76AA48BAA1785BC9FFB93747E6D0BCC50A6AF9094F37EE7336B5D1BDAD3FB90D3ED410240951FF1877C680A38D563E852635
        Malicious:false
        Reputation:low
        Preview:MDMP..a..... .......2..g............t...........p...........<....$.......(..<W..........`.......8...........T...........x=...]..........4%.......... '..............................................................................eJ.......'......GenuineIntel............T..............g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):8396
        Entropy (8bit):3.6969674842478906
        Encrypted:false
        SSDEEP:192:R6l7wVeJe66D6Y2D2SU9yC7gmfZdVRprG89b2+sfFUXSm:R6lXJ76D6YLSU9yOgmfpz29fo
        MD5:A29720E32E5B1F16189F8493E0A1A597
        SHA1:DFE88D26110E1DF9347C464A4A43A0C27AEC5070
        SHA-256:00B0D6B2B101F088AD03BD928C7957DB14BE8C2A90D6E088FB601A9469CC09C8
        SHA-512:FC812C8F5373D7FA52AD35CED6D908D216DE0E85C5C4812FC2F7E5A7A446C73D33332A4CFE0619E49A488C5857F57780F5731D84334852FDD83D2F6E913BF74F
        Malicious:false
        Reputation:low
        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.6.7.2.<./.P.i.
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):4748
        Entropy (8bit):4.477348135046788
        Encrypted:false
        SSDEEP:48:cvIwWl8zsgJg77aI94rWpW8VYlYm8M4JanFVC+q8vSvJWl0jMNtd:uIjfmI76a7VhJPKW6bNtd
        MD5:068B860C5B42D79EF4243AC02CA3EC36
        SHA1:CD1EEAF6DB944FE0E569078BCC40633AADC65499
        SHA-256:478C4A5CAEAFB29C359AAE70C6A03031B5713656754AE1EA9212B4721CE5427B
        SHA-512:FAA1E16E02A4E6292828C54F774ECA94B3D2808737A2B7A9AD17978880A1B640BC314CDC6BA8506D7DE96D76689E9BA65DE87B261F24FF67DBE5BEB4C1C036E1
        Malicious:false
        Reputation:low
        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="668385" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:MS Windows registry file, NT/2000 or above
        Category:dropped
        Size (bytes):1835008
        Entropy (8bit):4.468825699473966
        Encrypted:false
        SSDEEP:6144:HzZfpi6ceLPx9skLmb0fHZWSP3aJG8nAgeiJRMMhA2zX4WABluuN/jDH5S:TZHtHZWOKnMM6bFpBj4
        MD5:0E52EF9829A8C0A4766A7C07B371EBB1
        SHA1:34A7C53F4F5831A9E076FE3EBD757050797EC532
        SHA-256:F61DBB7AE96570838762BB213DBF44D63169ED9A20FEBA45C509B827CE37D43A
        SHA-512:CAF57BE14DA7CA7F340C4BD155D15E26A9477C42E5B1AA1783F2F56EC4B6806CE1B16246E79EFF75930B69D9E68CE767B68A761BBE40AF66606BD6E32745B6DD
        Malicious:false
        Reputation:low
        Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..k.b................................................................................................................................................................................................................................................................................................................................................}.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
        Entropy (8bit):6.660844052428411
        TrID:
        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
        • Win32 Executable (generic) a (10002005/4) 49.78%
        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
        • Generic Win/DOS Executable (2004/3) 0.01%
        • DOS Executable Generic (2002/1) 0.01%
        File name:YLDUi7gQi7.exe
        File size:44'032 bytes
        MD5:6742e36ad0679bf1bdaa1fef3afa43b8
        SHA1:ec4291aa8a4c42074af5d24194e859138650a192
        SHA256:e8d13a972f91936870dc5d2e8830dc10a00e499b1bc25cc88ec4570cf7dbfd66
        SHA512:3545a3e003c6683aa503af4128ec91f3ba8e22435ca4ade2d73aa8a7261b4e97df2b352f319d13a211ff841de7081c7e212ccc8c17efc538e2715447835a135b
        SSDEEP:768:aZTnFLYzyaPVzlIFfSCoojXAD5MeEsw8PfgGqpIP:aZDatzlmuCYIGqpC
        TLSH:50136C1222EC4325C23A2BF338A36B211731AD4DD997D75894CAEBED39E378047427E5
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....J................0..d...F......Z.... ........@.. ....................... ............`................................
        Icon Hash:5da4ed8cb48d540d
        Entrypoint:0x40825a
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Time Stamp:0xE3B04AF9 [Thu Jan 18 17:59:21 2091 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
        Instruction
        jmp dword ptr [00402000h]
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x82050x4f.text
        IMAGE_DIRECTORY_ENTRY_RESOURCE0xa0000x43b8.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x100000xc.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x81640x38.text
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x20000x62600x6400f04f7fb00e3f50183ef1be6fbd8eb9c9False0.404609375data5.4751341010778125IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rsrc0xa0000x43b80x4400a211b975f7747e74ce91b1cb5890cb6aFalse0.9281939338235294data7.820911984198312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .reloc0x100000xc0x200136ff3f80437692287283b25d52d3e6cFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_ICON0xa1000x3d56PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.977009298178576
        RT_GROUP_ICON0xde680x14data1.05
        RT_VERSION0xde8c0x32cdata0.4236453201970443
        RT_MANIFEST0xe1c80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
        DLLImport
        mscoree.dll_CorExeMain
        TimestampSource PortDest PortSource IPDest IP
        Jan 9, 2025 13:41:42.591397047 CET4969980192.168.2.694.154.37.129
        Jan 9, 2025 13:41:42.600421906 CET804969994.154.37.129192.168.2.6
        Jan 9, 2025 13:41:42.600507975 CET4969980192.168.2.694.154.37.129
        Jan 9, 2025 13:41:42.601305962 CET4969980192.168.2.694.154.37.129
        Jan 9, 2025 13:41:42.609411955 CET804969994.154.37.129192.168.2.6
        Jan 9, 2025 13:41:58.994854927 CET6356453192.168.2.61.1.1.1
        Jan 9, 2025 13:41:58.999768019 CET53635641.1.1.1192.168.2.6
        Jan 9, 2025 13:41:58.999849081 CET6356453192.168.2.61.1.1.1
        Jan 9, 2025 13:41:59.005160093 CET53635641.1.1.1192.168.2.6
        Jan 9, 2025 13:41:59.523751974 CET6356453192.168.2.61.1.1.1
        Jan 9, 2025 13:41:59.528758049 CET53635641.1.1.1192.168.2.6
        Jan 9, 2025 13:41:59.528826952 CET6356453192.168.2.61.1.1.1
        Jan 9, 2025 13:42:03.982379913 CET804969994.154.37.129192.168.2.6
        Jan 9, 2025 13:42:03.982538939 CET4969980192.168.2.694.154.37.129
        Jan 9, 2025 13:42:04.004610062 CET4969980192.168.2.694.154.37.129
        Jan 9, 2025 13:42:04.006855011 CET6359680192.168.2.694.154.37.129
        Jan 9, 2025 13:42:04.009497881 CET804969994.154.37.129192.168.2.6
        Jan 9, 2025 13:42:04.011739016 CET806359694.154.37.129192.168.2.6
        Jan 9, 2025 13:42:04.011848927 CET6359680192.168.2.694.154.37.129
        Jan 9, 2025 13:42:04.011951923 CET6359680192.168.2.694.154.37.129
        Jan 9, 2025 13:42:04.016707897 CET806359694.154.37.129192.168.2.6
        Jan 9, 2025 13:42:25.383426905 CET806359694.154.37.129192.168.2.6
        Jan 9, 2025 13:42:25.383724928 CET6359680192.168.2.694.154.37.129
        Jan 9, 2025 13:42:25.383821011 CET6359680192.168.2.694.154.37.129
        Jan 9, 2025 13:42:25.388638973 CET806359694.154.37.129192.168.2.6
        TimestampSource PortDest PortSource IPDest IP
        Jan 9, 2025 13:41:58.994543076 CET53582151.1.1.1192.168.2.6
        Jan 9, 2025 13:42:25.398686886 CET6519253192.168.2.61.1.1.1
        Jan 9, 2025 13:42:25.522814035 CET53651921.1.1.1192.168.2.6
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Jan 9, 2025 13:42:25.398686886 CET192.168.2.61.1.1.10x5d60Standard query (0)mdfile24.theworkpc.comA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Jan 9, 2025 13:42:25.522814035 CET1.1.1.1192.168.2.60x5d60Name error (3)mdfile24.theworkpc.comnonenoneA (IP address)IN (0x0001)false
        • 94.154.37.129
        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        0192.168.2.64969994.154.37.129806672C:\Users\user\Desktop\YLDUi7gQi7.exe
        TimestampBytes transferredDirectionData
        Jan 9, 2025 13:41:42.601305962 CET72OUTGET /file/1524 HTTP/1.1
        Host: 94.154.37.129
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        1192.168.2.66359694.154.37.129806672C:\Users\user\Desktop\YLDUi7gQi7.exe
        TimestampBytes transferredDirectionData
        Jan 9, 2025 13:42:04.011951923 CET72OUTGET /file/1524 HTTP/1.1
        Host: 94.154.37.129
        Connection: Keep-Alive


        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:07:41:41
        Start date:09/01/2025
        Path:C:\Users\user\Desktop\YLDUi7gQi7.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\YLDUi7gQi7.exe"
        Imagebase:0x4c0000
        File size:44'032 bytes
        MD5 hash:6742E36AD0679BF1BDAA1FEF3AFA43B8
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        Target ID:6
        Start time:07:42:25
        Start date:09/01/2025
        Path:C:\Windows\SysWOW64\WerFault.exe
        Wow64 process (32bit):true
        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6672 -s 1564
        Imagebase:0x3a0000
        File size:483'680 bytes
        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Reset < >

          Execution Graph

          Execution Coverage:9%
          Dynamic/Decrypted Code Coverage:100%
          Signature Coverage:2.1%
          Total number of Nodes:145
          Total number of Limit Nodes:9
          execution_graph 19817 cad01c 19818 cad034 19817->19818 19819 cad08e 19818->19819 19824 4e10454 19818->19824 19834 4e12ac8 19818->19834 19838 4e13818 19818->19838 19849 4e12ab7 19818->19849 19825 4e1045f 19824->19825 19826 4e13889 19825->19826 19828 4e13879 19825->19828 19879 4e1057c 19826->19879 19854 4e139b0 19828->19854 19859 4e13a7c 19828->19859 19865 4e13a58 19828->19865 19873 4e139a3 19828->19873 19829 4e13887 19835 4e12aee 19834->19835 19836 4e10454 CallWindowProcW 19835->19836 19837 4e12b0f 19836->19837 19837->19819 19839 4e137ef 19838->19839 19840 4e1381f 19838->19840 19839->19819 19840->19839 19841 4e13889 19840->19841 19843 4e13879 19840->19843 19842 4e1057c CallWindowProcW 19841->19842 19844 4e13887 19842->19844 19845 4e139b0 CallWindowProcW 19843->19845 19846 4e139a3 CallWindowProcW 19843->19846 19847 4e13a58 CallWindowProcW 19843->19847 19848 4e13a7c CallWindowProcW 19843->19848 19845->19844 19846->19844 19847->19844 19848->19844 19850 4e12a93 19849->19850 19851 4e12ac3 19849->19851 19850->19819 19852 4e10454 CallWindowProcW 19851->19852 19853 4e12b0f 19852->19853 19853->19819 19856 4e139c4 19854->19856 19855 4e13a50 19855->19829 19858 4e13a58 CallWindowProcW 19856->19858 19883 4e13a68 19856->19883 19858->19855 19860 4e13a3a 19859->19860 19861 4e13a8a 19859->19861 19863 4e13a68 CallWindowProcW 19860->19863 19864 4e13a58 CallWindowProcW 19860->19864 19862 4e13a50 19862->19829 19863->19862 19864->19862 19866 4e13a2b 19865->19866 19867 4e13a5b 19865->19867 19869 4e13a68 CallWindowProcW 19866->19869 19870 4e13a58 CallWindowProcW 19866->19870 19871 4e13a79 19867->19871 19872 4e14eae CallWindowProcW 19867->19872 19868 4e13a50 19868->19829 19869->19868 19870->19868 19871->19829 19872->19871 19874 4e1397b 19873->19874 19876 4e139ab 19873->19876 19874->19829 19875 4e13a50 19875->19829 19877 4e13a68 CallWindowProcW 19876->19877 19878 4e13a58 CallWindowProcW 19876->19878 19877->19875 19878->19875 19880 4e10587 19879->19880 19881 4e14f6a CallWindowProcW 19880->19881 19882 4e14f19 19880->19882 19881->19882 19882->19829 19884 4e13a79 19883->19884 19886 4e14eae 19883->19886 19884->19855 19887 4e1057c CallWindowProcW 19886->19887 19888 4e14eba 19887->19888 19888->19884 19889 e4e0b8 19890 e4e0fe 19889->19890 19894 e4e298 19890->19894 19897 e4e289 19890->19897 19891 e4e1eb 19895 e4e2c6 19894->19895 19900 e4c0e8 19894->19900 19895->19891 19898 e4c0e8 DuplicateHandle 19897->19898 19899 e4e2c6 19898->19899 19899->19891 19901 e4e708 DuplicateHandle 19900->19901 19902 e4e79e 19901->19902 19902->19895 19903 e44668 19904 e4467a 19903->19904 19905 e44686 19904->19905 19909 e44778 19904->19909 19914 e43e28 19905->19914 19907 e446a5 19910 e4479d 19909->19910 19918 e44888 19910->19918 19922 e44878 19910->19922 19915 e43e33 19914->19915 19930 e45cc4 19915->19930 19917 e4702a 19917->19907 19919 e448af 19918->19919 19920 e4498c 19919->19920 19926 e444b0 19919->19926 19924 e448af 19922->19924 19923 e4498c 19924->19923 19925 e444b0 CreateActCtxA 19924->19925 19925->19923 19927 e45918 CreateActCtxA 19926->19927 19929 e459db 19927->19929 19931 e45ccf 19930->19931 19934 e45ce4 19931->19934 19933 e4804d 19933->19917 19935 e45cef 19934->19935 19938 e45d14 19935->19938 19937 e48122 19937->19933 19939 e45d1f 19938->19939 19942 e45d44 19939->19942 19941 e48225 19941->19937 19944 e45d4f 19942->19944 19943 e49569 19943->19941 19944->19943 19947 e4dcc0 19944->19947 19952 e4dcd0 19944->19952 19949 e4dcf1 19947->19949 19948 e4dd15 19948->19943 19949->19948 19957 e4dfa0 19949->19957 19961 e4df91 19949->19961 19953 e4dcf1 19952->19953 19954 e4dd15 19953->19954 19955 e4dfa0 2 API calls 19953->19955 19956 e4df91 2 API calls 19953->19956 19954->19943 19955->19954 19956->19954 19958 e4dfad 19957->19958 19959 e4dfe7 19958->19959 19965 e4c020 19958->19965 19959->19948 19962 e4dfad 19961->19962 19963 e4dfe7 19962->19963 19964 e4c020 2 API calls 19962->19964 19963->19948 19964->19963 19967 e4c02b 19965->19967 19966 e4ed00 19967->19966 19969 e4e34c 19967->19969 19970 e4e357 19969->19970 19971 e45d44 2 API calls 19970->19971 19972 e4ed6f 19971->19972 19976 4e10b88 19972->19976 19982 4e10b70 19972->19982 19973 e4eda9 19973->19966 19978 4e10cb9 19976->19978 19979 4e10bb9 19976->19979 19977 4e10bc5 19977->19973 19978->19973 19979->19977 19980 4e119e0 CreateWindowExW CreateWindowExW 19979->19980 19981 4e119d0 CreateWindowExW CreateWindowExW 19979->19981 19980->19978 19981->19978 19984 4e10cb9 19982->19984 19985 4e10bb9 19982->19985 19983 4e10bc5 19983->19973 19984->19973 19985->19983 19986 4e119e0 CreateWindowExW CreateWindowExW 19985->19986 19987 4e119d0 CreateWindowExW CreateWindowExW 19985->19987 19986->19984 19987->19984 19988 e4bc08 19989 e4bc17 19988->19989 19991 e4c0fb 19988->19991 19992 e4c13c 19991->19992 19993 e4c119 19991->19993 19992->19989 19993->19992 19994 e4c340 GetModuleHandleW 19993->19994 19995 e4c36d 19994->19995 19995->19989

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 215 e43e28-e46fcb 218 e46fd2-e47035 call e45cc4 215->218 219 e46fcd 215->219 365 e4703b call 4e171e0 218->365 366 e4703b call 4e171d0 218->366 219->218 225 e47041-e47044 363 e47047 call 4e17628 225->363 364 e47047 call 4e17638 225->364 226 e4704d-e470fc 231 e47843-e4784a 226->231 232 e47852-e478db 231->232 233 e4784c-e4784d 231->233 234 e478e6-e4790c 232->234 233->234 236 e47925-e47a0b 234->236 237 e4790e-e47920 234->237 238 e47a11-e47a5e 236->238 237->238 241 e47a60-e47a9c 238->241 242 e47aa1-e47b9d 238->242 243 e47ba3-e47c25 241->243 242->243 258 e47101-e47109 243->258 259 e47c2b-e47c3d 243->259 261 e47111-e47222 258->261 262 e4710b-e4710c 258->262 269 e47c45-e47d42 259->269 270 e47c3f-e47c40 259->270 266 e4722d-e47292 261->266 262->266 271 e47294-e472c4 266->271 272 e472c9-e47388 266->272 275 e47d4d-e47da7 269->275 270->275 276 e4738e-e473ea 271->276 272->276 301 e47daf-e47eae 275->301 302 e47da9-e47daa 275->302 280 e473ec-e47434 276->280 281 e47439-e47573 276->281 285 e47579-e475ed 280->285 281->285 289 e47654-e47796 285->289 290 e475ef-e4764f 285->290 293 e4779c-e47840 289->293 290->293 293->231 305 e47eb9-e47fab call e45cd4 301->305 302->305 363->226 364->226 365->225 366->225
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3940288628.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_e40000_YLDUi7gQi7.jbxd
          Similarity
          • API ID:
          • String ID: *$S
          • API String ID: 0-3373398988
          • Opcode ID: 47122b001bfeee2fadd0b589ce55715a828e26216eeb55184b51c6a9007a850b
          • Instruction ID: 3a7b15e94a2c14fe71eebffe91a26e4c2bd54c80475008cd7794eb01de3967ae
          • Opcode Fuzzy Hash: 47122b001bfeee2fadd0b589ce55715a828e26216eeb55184b51c6a9007a850b
          • Instruction Fuzzy Hash: 0F927F78E012298FDB65DF69D884BD9BBB2FB88300F1081EAD909A7355DB715E81DF40

          Control-flow Graph

          APIs
          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04E12A22
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3941403129.0000000004E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_4e10000_YLDUi7gQi7.jbxd
          Similarity
          • API ID: CreateWindow
          • String ID: I&G>$I&G>
          • API String ID: 716092398-2218362689
          • Opcode ID: 6ce4d713780180992b0d17e9195048a4458a19e4afba306b41eedb4908e0ac15
          • Instruction ID: 5c054ea455555d535de0132b43778743e7611cf6bbca80bd0b0cc9ce1d0582a9
          • Opcode Fuzzy Hash: 6ce4d713780180992b0d17e9195048a4458a19e4afba306b41eedb4908e0ac15
          • Instruction Fuzzy Hash: 3E51BFB1D00209EFDF15CF99D884ADEBBB5FF48314F24916AE918AB220D771A945CF90

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 21 4e10428-4e12976 23 4e12981-4e12988 21->23 24 4e12978-4e1297e 21->24 25 4e12993-4e12a32 CreateWindowExW 23->25 26 4e1298a-4e12990 23->26 24->23 28 4e12a34-4e12a3a 25->28 29 4e12a3b-4e12a73 25->29 26->25 28->29 33 4e12a80 29->33 34 4e12a75-4e12a78 29->34 35 4e12a81 33->35 34->33 35->35
          APIs
          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04E12A22
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3941403129.0000000004E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_4e10000_YLDUi7gQi7.jbxd
          Similarity
          • API ID: CreateWindow
          • String ID: I&G>$I&G>
          • API String ID: 716092398-2218362689
          • Opcode ID: 7f8f7bbfea4c89aa876b9648772d7b570c281b3d1b1415152b5f4d3769c2ae71
          • Instruction ID: d1cd4d653da0db53403bd97a68ee7b48aa54870ecb0e19acae3a2fbb2aae1e3b
          • Opcode Fuzzy Hash: 7f8f7bbfea4c89aa876b9648772d7b570c281b3d1b1415152b5f4d3769c2ae71
          • Instruction Fuzzy Hash: 6651EFB1D00309DFDB14CF9AD884ADEBBB5BF48310F24916AE919AB220D771A941CF90

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 91 e4c0fb-e4c117 92 e4c143-e4c147 91->92 93 e4c119-e4c126 call e4ac7c 91->93 94 e4c149-e4c153 92->94 95 e4c15b-e4c19c 92->95 100 e4c13c 93->100 101 e4c128 93->101 94->95 102 e4c19e-e4c1a6 95->102 103 e4c1a9-e4c1b7 95->103 100->92 148 e4c12e call e4c3a0 101->148 149 e4c12e call e4c390 101->149 102->103 104 e4c1b9-e4c1be 103->104 105 e4c1db-e4c1dd 103->105 108 e4c1c0-e4c1c7 call e4ac88 104->108 109 e4c1c9 104->109 107 e4c1e0-e4c1e7 105->107 106 e4c134-e4c136 106->100 110 e4c278-e4c338 106->110 111 e4c1f4-e4c1fb 107->111 112 e4c1e9-e4c1f1 107->112 114 e4c1cb-e4c1d9 108->114 109->114 141 e4c340-e4c36b GetModuleHandleW 110->141 142 e4c33a-e4c33d 110->142 115 e4c1fd-e4c205 111->115 116 e4c208-e4c211 call e4ac98 111->116 112->111 114->107 115->116 122 e4c213-e4c21b 116->122 123 e4c21e-e4c223 116->123 122->123 124 e4c225-e4c22c 123->124 125 e4c241-e4c245 123->125 124->125 127 e4c22e-e4c23e call e4aca8 call e4bcf4 124->127 146 e4c248 call e4c6a0 125->146 147 e4c248 call e4c670 125->147 127->125 128 e4c24b-e4c24e 131 e4c250-e4c26e 128->131 132 e4c271-e4c277 128->132 131->132 143 e4c374-e4c388 141->143 144 e4c36d-e4c373 141->144 142->141 144->143 146->128 147->128 148->106 149->106
          APIs
          • GetModuleHandleW.KERNELBASE(00000000), ref: 00E4C35E
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3940288628.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_e40000_YLDUi7gQi7.jbxd
          Similarity
          • API ID: HandleModule
          • String ID: I&G>
          • API String ID: 4139908857-2244032144
          • Opcode ID: 89747f97012ddb793c3e1e265d1c8e9912fcaa5abfc9791f3c8ef4ae083494d4
          • Instruction ID: d8de88c43996300fc2b43278aceb068448d7d466613975bca3bcd4c6afc80199
          • Opcode Fuzzy Hash: 89747f97012ddb793c3e1e265d1c8e9912fcaa5abfc9791f3c8ef4ae083494d4
          • Instruction Fuzzy Hash: F28154B0A01B018FDB64CF6AE44175ABBF1FF88304F109A2DD48AE7A51DB74E845CB95

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 150 e4590c-e4598c 152 e4598f-e459d9 CreateActCtxA 150->152 154 e459e2-e45a3c 152->154 155 e459db-e459e1 152->155 162 e45a3e-e45a41 154->162 163 e45a4b-e45a4f 154->163 155->154 162->163 164 e45a60 163->164 165 e45a51-e45a5d 163->165 167 e45a61 164->167 165->164 167->167
          APIs
          • CreateActCtxA.KERNEL32(?), ref: 00E459C9
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3940288628.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_e40000_YLDUi7gQi7.jbxd
          Similarity
          • API ID: Create
          • String ID: I&G>
          • API String ID: 2289755597-2244032144
          • Opcode ID: 5102254a06fc37947b27514e95f6e1cd0512f04baa625c0d9b6db3b38ac2ca54
          • Instruction ID: b64196d20346503a8f9c218da2624f067e0d01bffc452e106c161a5ce4c4303a
          • Opcode Fuzzy Hash: 5102254a06fc37947b27514e95f6e1cd0512f04baa625c0d9b6db3b38ac2ca54
          • Instruction Fuzzy Hash: 8B41E0B1C0071DCBDB24CFAAD98479DBBB5BF88304F60816AD418BB251DBB56945CF90

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 168 4e1057c-4e14f0c 171 4e14f12-4e14f17 168->171 172 4e14fbc-4e14fdc call 4e10454 168->172 174 4e14f19-4e14f50 171->174 175 4e14f6a-4e14fa2 CallWindowProcW 171->175 179 4e14fdf-4e14fec 172->179 181 4e14f52-4e14f58 174->181 182 4e14f59-4e14f68 174->182 177 4e14fa4-4e14faa 175->177 178 4e14fab-4e14fba 175->178 177->178 178->179 181->182 182->179
          APIs
          • CallWindowProcW.USER32(?,?,?,?,?), ref: 04E14F91
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3941403129.0000000004E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_4e10000_YLDUi7gQi7.jbxd
          Similarity
          • API ID: CallProcWindow
          • String ID: I&G>
          • API String ID: 2714655100-2244032144
          • Opcode ID: 051f5eda7afec6df0578e5f628bd4a6b5ce95ad8931d01f779b2d517a38204d6
          • Instruction ID: 95d65096d8410315a3ff8ea31bba4f7f28a32db39bb898e95e7296c769025dc1
          • Opcode Fuzzy Hash: 051f5eda7afec6df0578e5f628bd4a6b5ce95ad8931d01f779b2d517a38204d6
          • Instruction Fuzzy Hash: 50414AB5900309DFDB14CF99C488BAABBF5FF88318F249449E519AB361D774B840CBA0

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 185 e444b0-e459d9 CreateActCtxA 189 e459e2-e45a3c 185->189 190 e459db-e459e1 185->190 197 e45a3e-e45a41 189->197 198 e45a4b-e45a4f 189->198 190->189 197->198 199 e45a60 198->199 200 e45a51-e45a5d 198->200 202 e45a61 199->202 200->199 202->202
          APIs
          • CreateActCtxA.KERNEL32(?), ref: 00E459C9
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3940288628.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_e40000_YLDUi7gQi7.jbxd
          Similarity
          • API ID: Create
          • String ID: I&G>
          • API String ID: 2289755597-2244032144
          • Opcode ID: 8cf0c669f22b77a7a874ab017f5c51d62fdca6bb0acbc625eee60b30fec8613c
          • Instruction ID: c0fd251904f5a19a8f321820ea461873ca7856caf786aaa5e96d908da24c7536
          • Opcode Fuzzy Hash: 8cf0c669f22b77a7a874ab017f5c51d62fdca6bb0acbc625eee60b30fec8613c
          • Instruction Fuzzy Hash: 5041E2B1C0071DCBEB24CFAAC844B9DBBB5BF88304F60816AD508BB251DBB16945CF90

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 203 e4c0e8-e4e79c DuplicateHandle 205 e4e7a5-e4e7c2 203->205 206 e4e79e-e4e7a4 203->206 206->205
          APIs
          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00E4E2C6,?,?,?,?,?), ref: 00E4E78F
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3940288628.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_e40000_YLDUi7gQi7.jbxd
          Similarity
          • API ID: DuplicateHandle
          • String ID: I&G>
          • API String ID: 3793708945-2244032144
          • Opcode ID: 0c4211aa24e507960e40d45f097ca751b84bcc052b8957ce70c7afc49f29ca2b
          • Instruction ID: 4708fe7e45405795f6b2db42fdf74eec81b0b51c49135d2d8377ed5622e1fd84
          • Opcode Fuzzy Hash: 0c4211aa24e507960e40d45f097ca751b84bcc052b8957ce70c7afc49f29ca2b
          • Instruction Fuzzy Hash: 1121E3B5900249EFDB10CF9AD984AEEBBF4FB48320F14841AE914B7310D378A950CFA4

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 209 e4c2f8-e4c338 210 e4c340-e4c36b GetModuleHandleW 209->210 211 e4c33a-e4c33d 209->211 212 e4c374-e4c388 210->212 213 e4c36d-e4c373 210->213 211->210 213->212
          APIs
          • GetModuleHandleW.KERNELBASE(00000000), ref: 00E4C35E
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3940288628.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_e40000_YLDUi7gQi7.jbxd
          Similarity
          • API ID: HandleModule
          • String ID: I&G>
          • API String ID: 4139908857-2244032144
          • Opcode ID: e11b051487b345515f2e24d0a9f585bc556aea6c8764a5bf98348d4e64e066b7
          • Instruction ID: ed2a4277622f5dd07a4bec55301e169a410b2870700cb5c6a75f1c038baa7c14
          • Opcode Fuzzy Hash: e11b051487b345515f2e24d0a9f585bc556aea6c8764a5bf98348d4e64e066b7
          • Instruction Fuzzy Hash: 67110FB6C016498FCB10CF9AD444ADEFBF4AF88724F20845AD429B7210D3B9A545CFA5

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 367 e45a84-e45b14
          Memory Dump Source
          • Source File: 00000000.00000002.3940288628.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_e40000_YLDUi7gQi7.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 16c2a4761f6004160ff2bf5eaf76a9ae067c1896fedd84f5a2867af3ea66a76d
          • Instruction ID: b1033b5aa200601302f0b22ae28be9171052d8b66a20df5e92a383ae8c38201e
          • Opcode Fuzzy Hash: 16c2a4761f6004160ff2bf5eaf76a9ae067c1896fedd84f5a2867af3ea66a76d
          • Instruction Fuzzy Hash: 8A31AA72804B49CFDF11CFA8E8457EDBBB1EF85318F60928AC015AB252C775A94ACF41
          Memory Dump Source
          • Source File: 00000000.00000002.3940071080.0000000000CAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CAD000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_cad000_YLDUi7gQi7.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: ce80d6669402d1f74492d430a3e9ffde4751510be511d59a98ac3db3046a38c6
          • Instruction ID: 2270b801153fe77ba21ed0700fc779e0e4499f7e8c90dfdc5348f11db5c80fc4
          • Opcode Fuzzy Hash: ce80d6669402d1f74492d430a3e9ffde4751510be511d59a98ac3db3046a38c6
          • Instruction Fuzzy Hash: 13213475604305EFCB14DF24D9C0B26BB61FB89318F20C56DE90B4B692C77AD807CA61
          Memory Dump Source
          • Source File: 00000000.00000002.3940071080.0000000000CAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CAD000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_cad000_YLDUi7gQi7.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 680a5b72e3e838f3293456342564a8a65f3751287558be64fe2014920599865a
          • Instruction ID: 59a0d96cded6b06de17b1c3bbe307c59121f735d317782255933e1abb23ec600
          • Opcode Fuzzy Hash: 680a5b72e3e838f3293456342564a8a65f3751287558be64fe2014920599865a
          • Instruction Fuzzy Hash: 522153755093C08FCB12CF24D594715BF71EB46318F28C5DAD84A8F6A7C33A990ACB62
          Memory Dump Source
          • Source File: 00000000.00000002.3941403129.0000000004E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_4e10000_YLDUi7gQi7.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: d287fb54dc73dbd2365a080bce2522b0e29918d8f1057b1df0e06d4b6a109839
          • Instruction ID: a6f7d7f7f18388e7b7d6f1c5090e4f066871306766900d72965934c30dbcbe64
          • Opcode Fuzzy Hash: d287fb54dc73dbd2365a080bce2522b0e29918d8f1057b1df0e06d4b6a109839
          • Instruction Fuzzy Hash: CD1283B0C81745CAE318CF65F94C28D7BA1F745318FD06A89DA622A2E1D7B415EECF48
          Memory Dump Source
          • Source File: 00000000.00000002.3941403129.0000000004E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_4e10000_YLDUi7gQi7.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 6f61e6f4aa9a2241e90e0ba9c1ad739cb9756c518568d4125b473cea93b32a1b
          • Instruction ID: 9c90881bc66a552420e085e36cf9149045ad8b8c0bca34cf9a7f8376a24c6fc7
          • Opcode Fuzzy Hash: 6f61e6f4aa9a2241e90e0ba9c1ad739cb9756c518568d4125b473cea93b32a1b
          • Instruction Fuzzy Hash: A1A16B32E002198FCF09DFB4D84059EB7B2FF85304B1595AAE905BB265DB71E955CF80
          Memory Dump Source
          • Source File: 00000000.00000002.3941403129.0000000004E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_4e10000_YLDUi7gQi7.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 4919b01bab7db24d8a8acd974934eac28ff10cf333f8715ad415748fb91b2080
          • Instruction ID: 0ac069657033280af0f3aab2e77b1c78dc859cacd247090a8f770ff706b51b00
          • Opcode Fuzzy Hash: 4919b01bab7db24d8a8acd974934eac28ff10cf333f8715ad415748fb91b2080
          • Instruction Fuzzy Hash: 14C1E6B0C81745CAE718DF25F84828D7BB1BB85314F916B89D9626B2D0DBB414EECF48