Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Axvn7Hegxc.exe

Overview

General Information

Sample name:Axvn7Hegxc.exe
renamed because original name is a hash value
Original sample name:02d5c3456cc7e6523c1a20ebe02048b48aab2e3de995ab4659f2d0517e0541ef.exe
Analysis ID:1587673
MD5:97207c093826146294a7254517321fd7
SHA1:d1e21d118df6bcc24b1acf7a235bbd9394abcbe2
SHA256:02d5c3456cc7e6523c1a20ebe02048b48aab2e3de995ab4659f2d0517e0541ef
Tags:exeuser-adrian__luca
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Detected potential crypto function
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Axvn7Hegxc.exe (PID: 7416 cmdline: "C:\Users\user\Desktop\Axvn7Hegxc.exe" MD5: 97207C093826146294A7254517321FD7)
    • WerFault.exe (PID: 7896 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7416 -s 1468 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Axvn7Hegxc.exeVirustotal: Detection: 61%Perma Link
Source: Axvn7Hegxc.exeReversingLabs: Detection: 82%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: Axvn7Hegxc.exeJoe Sandbox ML: detected
Source: Axvn7Hegxc.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Axvn7Hegxc.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: Axvn7Hegxc.exe, 00000000.00000002.2096160527.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Xml.ni.pdb source: WER56A3.tmp.dmp.6.dr
Source: Binary string: C:\Users\user\Desktop\Axvn7Hegxc.PDB source: Axvn7Hegxc.exe, 00000000.00000002.2095977999.00000000009D7000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: Axvn7Hegxc.exe, 00000000.00000002.2096160527.0000000000E2C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Accessibility.pdb source: WER56A3.tmp.dmp.6.dr
Source: Binary string: System.ni.pdbRSDS source: WER56A3.tmp.dmp.6.dr
Source: Binary string: System.Windows.Forms.pdbMZ@ source: WER56A3.tmp.dmp.6.dr
Source: Binary string: Accessibility.pdb\ source: WER56A3.tmp.dmp.6.dr
Source: Binary string: System.Configuration.ni.pdb source: WER56A3.tmp.dmp.6.dr
Source: Binary string: mscorlib.pdbAccessibility.dllMZ@ source: WER56A3.tmp.dmp.6.dr
Source: Binary string: mscorlib.ni.pdbRSDS source: WER56A3.tmp.dmp.6.dr
Source: Binary string: System.Configuration.pdb source: WER56A3.tmp.dmp.6.dr
Source: Binary string: System.Xml.pdb source: WER56A3.tmp.dmp.6.dr
Source: Binary string: System.pdb source: WER56A3.tmp.dmp.6.dr
Source: Binary string: System.Xml.ni.pdbRSDS# source: WER56A3.tmp.dmp.6.dr
Source: Binary string: System.Core.ni.pdb source: WER56A3.tmp.dmp.6.dr
Source: Binary string: HPXo0C:\Windows\mscorlib.pdb source: Axvn7Hegxc.exe, 00000000.00000002.2095977999.00000000009D7000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Windows.Forms.pdb source: WER56A3.tmp.dmp.6.dr
Source: Binary string: \??\C:\Users\user\Desktop\Axvn7Hegxc.PDB> source: Axvn7Hegxc.exe, 00000000.00000002.2099974569.000000000708F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: Axvn7Hegxc.exe, 00000000.00000002.2099974569.0000000007072000.00000004.00000020.00020000.00000000.sdmp, WER56A3.tmp.dmp.6.dr
Source: Binary string: System.Drawing.pdb source: WER56A3.tmp.dmp.6.dr
Source: Binary string: mscorlib.ni.pdb source: WER56A3.tmp.dmp.6.dr
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb* source: Axvn7Hegxc.exe, 00000000.00000002.2096160527.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\mscorlib.pdb source: Axvn7Hegxc.exe, 00000000.00000002.2099974569.0000000007072000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdb source: WER56A3.tmp.dmp.6.dr
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbl source: Axvn7Hegxc.exe, 00000000.00000002.2096160527.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\mscorlib.pdb{d source: Axvn7Hegxc.exe, 00000000.00000002.2099974569.0000000007072000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER56A3.tmp.dmp.6.dr
Source: Binary string: System.ni.pdb source: WER56A3.tmp.dmp.6.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WER56A3.tmp.dmp.6.dr
Source: Binary string: System.Drawing.pdb( source: WER56A3.tmp.dmp.6.dr
Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
Source: Axvn7Hegxc.exeString found in binary or memory: http://www.modestarcade.com
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeCode function: 0_2_02A8D4440_2_02A8D444
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7416 -s 1468
Source: Axvn7Hegxc.exe, 00000000.00000002.2099788367.0000000007010000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs Axvn7Hegxc.exe
Source: Axvn7Hegxc.exe, 00000000.00000002.2096160527.0000000000D8E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Axvn7Hegxc.exe
Source: Axvn7Hegxc.exe, 00000000.00000000.1358950617.0000000000838000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameJtJ.exe@ vs Axvn7Hegxc.exe
Source: Axvn7Hegxc.exe, 00000000.00000002.2098315114.0000000003C79000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs Axvn7Hegxc.exe
Source: Axvn7Hegxc.exe, 00000000.00000002.2098315114.0000000003CB9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs Axvn7Hegxc.exe
Source: Axvn7Hegxc.exeBinary or memory string: OriginalFilenameJtJ.exe@ vs Axvn7Hegxc.exe
Source: Axvn7Hegxc.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Axvn7Hegxc.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: classification engineClassification label: mal56.winEXE@2/5@0/0
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeMutant created: NULL
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7416
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\0a44fddd-c6b0-472f-b41b-81a20a36dd00Jump to behavior
Source: Axvn7Hegxc.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: Axvn7Hegxc.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Axvn7Hegxc.exeVirustotal: Detection: 61%
Source: Axvn7Hegxc.exeReversingLabs: Detection: 82%
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeFile read: C:\Users\user\Desktop\Axvn7Hegxc.exe:Zone.IdentifierJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\Axvn7Hegxc.exe "C:\Users\user\Desktop\Axvn7Hegxc.exe"
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7416 -s 1468
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeSection loaded: iconcodecservice.dllJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: Axvn7Hegxc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: Axvn7Hegxc.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: Axvn7Hegxc.exe, 00000000.00000002.2096160527.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Xml.ni.pdb source: WER56A3.tmp.dmp.6.dr
Source: Binary string: C:\Users\user\Desktop\Axvn7Hegxc.PDB source: Axvn7Hegxc.exe, 00000000.00000002.2095977999.00000000009D7000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: Axvn7Hegxc.exe, 00000000.00000002.2096160527.0000000000E2C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Accessibility.pdb source: WER56A3.tmp.dmp.6.dr
Source: Binary string: System.ni.pdbRSDS source: WER56A3.tmp.dmp.6.dr
Source: Binary string: System.Windows.Forms.pdbMZ@ source: WER56A3.tmp.dmp.6.dr
Source: Binary string: Accessibility.pdb\ source: WER56A3.tmp.dmp.6.dr
Source: Binary string: System.Configuration.ni.pdb source: WER56A3.tmp.dmp.6.dr
Source: Binary string: mscorlib.pdbAccessibility.dllMZ@ source: WER56A3.tmp.dmp.6.dr
Source: Binary string: mscorlib.ni.pdbRSDS source: WER56A3.tmp.dmp.6.dr
Source: Binary string: System.Configuration.pdb source: WER56A3.tmp.dmp.6.dr
Source: Binary string: System.Xml.pdb source: WER56A3.tmp.dmp.6.dr
Source: Binary string: System.pdb source: WER56A3.tmp.dmp.6.dr
Source: Binary string: System.Xml.ni.pdbRSDS# source: WER56A3.tmp.dmp.6.dr
Source: Binary string: System.Core.ni.pdb source: WER56A3.tmp.dmp.6.dr
Source: Binary string: HPXo0C:\Windows\mscorlib.pdb source: Axvn7Hegxc.exe, 00000000.00000002.2095977999.00000000009D7000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Windows.Forms.pdb source: WER56A3.tmp.dmp.6.dr
Source: Binary string: \??\C:\Users\user\Desktop\Axvn7Hegxc.PDB> source: Axvn7Hegxc.exe, 00000000.00000002.2099974569.000000000708F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: Axvn7Hegxc.exe, 00000000.00000002.2099974569.0000000007072000.00000004.00000020.00020000.00000000.sdmp, WER56A3.tmp.dmp.6.dr
Source: Binary string: System.Drawing.pdb source: WER56A3.tmp.dmp.6.dr
Source: Binary string: mscorlib.ni.pdb source: WER56A3.tmp.dmp.6.dr
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb* source: Axvn7Hegxc.exe, 00000000.00000002.2096160527.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\mscorlib.pdb source: Axvn7Hegxc.exe, 00000000.00000002.2099974569.0000000007072000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdb source: WER56A3.tmp.dmp.6.dr
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbl source: Axvn7Hegxc.exe, 00000000.00000002.2096160527.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\mscorlib.pdb{d source: Axvn7Hegxc.exe, 00000000.00000002.2099974569.0000000007072000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER56A3.tmp.dmp.6.dr
Source: Binary string: System.ni.pdb source: WER56A3.tmp.dmp.6.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WER56A3.tmp.dmp.6.dr
Source: Binary string: System.Drawing.pdb( source: WER56A3.tmp.dmp.6.dr
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeCode function: 0_2_02A8D198 push ebx; retn 0002h0_2_02A8D1AA
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeCode function: 0_2_06F0136F push eax; ret 0_2_06F01370
Source: Axvn7Hegxc.exeStatic PE information: section name: .text entropy: 7.710384569553251
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeMemory allocated: 1160000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeMemory allocated: 2C70000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeMemory allocated: 2AA0000 memory reserve | memory write watchJump to behavior
Source: Amcache.hve.6.drBinary or memory string: VMware
Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.6.drBinary or memory string: vmci.sys
Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.6.drBinary or memory string: VMware20,1
Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.6.drBinary or memory string: VMware-42 27 c7 3b 45 a3 e4 a4-61 bc 19 7c 28 5c 10 19
Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeQueries volume information: C:\Users\user\Desktop\Axvn7Hegxc.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Axvn7Hegxc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
2
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory2
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Software Packing
Security Account Manager12
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Axvn7Hegxc.exe61%VirustotalBrowse
Axvn7Hegxc.exe83%ReversingLabsByteCode-MSIL.Backdoor.FormBook
Axvn7Hegxc.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
s-part-0017.t-0009.t-msedge.net
13.107.246.45
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    http://upx.sf.netAmcache.hve.6.drfalse
      high
      http://www.modestarcade.comAxvn7Hegxc.exefalse
        high
        No contacted IP infos
        Joe Sandbox version:42.0.0 Malachite
        Analysis ID:1587673
        Start date and time:2025-01-10 16:46:52 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 6m 8s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Run name:Run with higher sleep bypass
        Number of analysed new started processes analysed:13
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:Axvn7Hegxc.exe
        renamed because original name is a hash value
        Original Sample Name:02d5c3456cc7e6523c1a20ebe02048b48aab2e3de995ab4659f2d0517e0541ef.exe
        Detection:MAL
        Classification:mal56.winEXE@2/5@0/0
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 97%
        • Number of executed functions: 21
        • Number of non-executed functions: 1
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
        • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 52.168.117.173, 13.107.246.45, 184.28.90.27, 52.149.20.212, 20.190.160.20
        • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, blobcollector.events.data.trafficmanager.net, azureedge-t-prod.trafficmanager.net, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtSetInformationFile calls found.
        No simulations
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        s-part-0017.t-0009.t-msedge.nettx4pkcHL9o.exeGet hashmaliciousMassLogger RATBrowse
        • 13.107.246.45
        raq4ttncJF.exeGet hashmaliciousFormBookBrowse
        • 13.107.246.45
        WF2DL1l7E8.exeGet hashmaliciousFormBookBrowse
        • 13.107.246.45
        Play_VM-NowTingrammAudiowav011.htmlGet hashmaliciousUnknownBrowse
        • 13.107.246.45
        launcher.exe.bin.exeGet hashmaliciousPureLog Stealer, Xmrig, zgRATBrowse
        • 13.107.246.45
        FGTFTj8GLM.exeGet hashmaliciousFormBookBrowse
        • 13.107.246.45
        30562134305434372.jsGet hashmaliciousStrela DownloaderBrowse
        • 13.107.246.45
        Mmm7GmDcR4.exeGet hashmaliciousLummaCBrowse
        • 13.107.246.45
        https://na4.docusign.net/Signing/EmailStart.aspx?a=ffa78034-d960-4bb3-b2a2-bb62a1fc4a65&etti=24&acct=86dab687-685e-40aa-af52-e5c3fc07b508&er=04714c6d-cc25-4a21-be91-01e1c43a5f3fGet hashmaliciousHTMLPhisherBrowse
        • 13.107.246.45
        hCkkM0lH0P.exeGet hashmaliciousAgentTeslaBrowse
        • 13.107.246.45
        No context
        No context
        No context
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):65536
        Entropy (8bit):1.1895006959948902
        Encrypted:false
        SSDEEP:192:TNtlq4Lkd0BU/HUHamOJo1ZruGJFzuiFfZ24IO8vnn:Znq4AeBU/aaBWFzuiFfY4IO8/n
        MD5:2CA2DA7ED45E41E8B8563DED598D8474
        SHA1:78A68A67B8EADAC57D85E8A1408E26A8B63AD3E5
        SHA-256:3B4FC15DE980ECC89C769F04B12A3B011BDB7AF7898BE72E70B3755A9BF54591
        SHA-512:675B1D300E4E5BF7D302CE519AB5CF835C66F612317AC9551EE126D1EFC91738653DCA9E078011CAC167C36FFA5257A3FEC1FEDAD6B5B24A991C6A9C607625C7
        Malicious:true
        Reputation:low
        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.0.9.9.7.6.8.4.2.5.0.6.1.3.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.0.9.9.7.6.8.6.2.1.9.3.5.8.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.4.1.5.5.a.0.4.-.6.f.c.c.-.4.c.3.b.-.8.1.2.3.-.2.8.b.5.f.2.b.f.7.c.0.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.7.d.7.d.c.d.9.-.e.8.0.4.-.4.b.f.1.-.b.0.9.1.-.e.f.4.0.0.c.1.7.6.7.b.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.A.x.v.n.7.H.e.g.x.c...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.J.t.J...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.f.8.-.0.0.0.1.-.0.0.1.4.-.6.c.7.0.-.d.1.f.e.7.6.6.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.c.4.d.4.2.7.8.a.1.f.6.9.a.f.5.b.4.1.c.e.c.2.7.6.7.5.9.3.7.2.4.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.1.e.2.1.d.1.1.8.d.f.6.b.c.c.2.4.b.1.a.c.f.7.a.2.3.5.b.b.d.9.3.9.4.a.b.c.b.e.2.!.
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Mini DuMP crash report, 15 streams, Fri Jan 10 15:48:05 2025, 0x1205a4 type
        Category:dropped
        Size (bytes):293762
        Entropy (8bit):4.241160272934346
        Encrypted:false
        SSDEEP:3072:sfitn9lTT6RV7hHo8+gVmAo34uEqCBGyRdSLTggU3+:sfitn9l/CV7hz+ORo34xGyRdATgFO
        MD5:9E1C9A81CEFA905AB8CBE3A93A31003F
        SHA1:A1622813E4CF1BEDCD2A97AE713854D4D011DE5C
        SHA-256:6A16443735CBC2ED96B438DF3BAFD2BC335A6A11DAD56792D874C30DF87F6F7E
        SHA-512:3C6449D7F7E393F34163976ADDB4DF84AED8210CD0E075090FC9085C0D3F3C0EB32CF90AEE69805643EC09DEF12CC8DB88C36672ED146FD1C431C1BE94B047A5
        Malicious:false
        Reputation:low
        Preview:MDMP..a..... .......5A.g....................................$....&.......4..@Q..........`.......8...........T............9...A...........'...........)..............................................................................eJ.......)......GenuineIntel............T..........."A.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):8428
        Entropy (8bit):3.706901928699196
        Encrypted:false
        SSDEEP:192:R6l7wVeJCe696YcD8SU9HCHgmfZ9YEprR489b6vMWsfStP+m:R6lXJj696Y7SU9HCHgmfjYmF6vM1fSd
        MD5:01A291392AFB19428797E5B653CB7881
        SHA1:BBC554575A818F3E177AA0A9E816A1A73F2C6302
        SHA-256:AE48A97FDEA1767172DACC7122189F53B90A30FBD35ACD24DA88D5A41D23508A
        SHA-512:DAF8B4BBA6AABB596262D15E3F4F8E8945ACF63C7C2A09A46572942D053AD5CD3B89856E48003911A9A3317FB751C36B083624C4904DB4CD26112793E38E852C
        Malicious:false
        Reputation:low
        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.4.1.6.<./.P.i.
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):4764
        Entropy (8bit):4.507907128128352
        Encrypted:false
        SSDEEP:48:cvIwWl8zs30Jg77aI9W5WpW8VYxOYm8M4J2et2FG1+q8vUtfTu0QlKvzmSvkd:uIjfCI78I7V8JXKCTuDMzm0kd
        MD5:D8520DCFC38C04F34661AAB7E2CCE5EC
        SHA1:A987E5104233DC8E4C4D73ACD97B77AF224B55DB
        SHA-256:A28DD228D1172EC9BD5F9AA408F983B94ABA24778FF1FACCA357082063692A2B
        SHA-512:FDA50EEECAD8694180DBEFD7DF063ADF719B1964C38FEF63E832C56AA1F1A8EACEBF7A5349837D708FAA24EE943CD69844838C90EF209C3FB86CC8B9C4CDA17A
        Malicious:false
        Reputation:low
        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="670010" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:MS Windows registry file, NT/2000 or above
        Category:dropped
        Size (bytes):1835008
        Entropy (8bit):4.394177585398623
        Encrypted:false
        SSDEEP:6144:wl4fiJoH0ncNXiUjt10q0G/gaocYGBoaUMMhA2NX4WABlBuNAcOBSqa:I4vF0MYQUMM6VFYScU
        MD5:AB1B93772551385849DB060DA30378B8
        SHA1:76A2341F976257FD3CFAEF99952DDF5DA1D8AAA2
        SHA-256:F839E15BA31BAC11611765EDCCAA97C017F79B2FC6465C89ED7290E443C624E0
        SHA-512:CDFF7A2530975C9B026042787859F0E06C802BAD787E713D313BF4F0D2F2AE35DFC8A81250EBA96E4A3B2D067F614E0791F68511CB63686B6CF10FC29EECBB2D
        Malicious:false
        Reputation:low
        Preview:regfG...G....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmJn..wc.................................................................................................................................................................................................................................................................................................................................................<........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
        Entropy (8bit):7.685536996478897
        TrID:
        • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
        • Win32 Executable (generic) a (10002005/4) 49.75%
        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
        • Windows Screen Saver (13104/52) 0.07%
        • Generic Win/DOS Executable (2004/3) 0.01%
        File name:Axvn7Hegxc.exe
        File size:841'216 bytes
        MD5:97207c093826146294a7254517321fd7
        SHA1:d1e21d118df6bcc24b1acf7a235bbd9394abcbe2
        SHA256:02d5c3456cc7e6523c1a20ebe02048b48aab2e3de995ab4659f2d0517e0541ef
        SHA512:4bbbdce811f389a06215ff95f0af1a2285ca1f0ed4ba8b883751a22e627ff3e8e1cc45a0cee9b6e25ac0c9e5b4ffb78216181346ea264ad6f3e91d45a9ca275f
        SSDEEP:24576:8PUwFOthNRdAG2KkRSEL0sdkvduq2g+0RSFB:EwLRSRcsyvduquV
        TLSH:8605E054F749D407C41616F05E62FBBD226C2F9CA816C2537EFA7EAF78B5AA10810E43
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Wg..............0..P...........n... ........@.. .......................@............@................................
        Icon Hash:83356d4d454d2986
        Entrypoint:0x4c6e1e
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Time Stamp:0x6757A3EB [Tue Dec 10 02:14:03 2024 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
        Instruction
        jmp dword ptr [00402000h]
        push ebx
        add byte ptr [ecx+00h], bh
        jnc 00007F7F35119912h
        je 00007F7F35119912h
        add byte ptr [ebp+00h], ch
        add byte ptr [ecx+00h], al
        arpl word ptr [eax], ax
        je 00007F7F35119912h
        imul eax, dword ptr [eax], 00610076h
        je 00007F7F35119912h
        outsd
        add byte ptr [edx+00h], dh
        push ebx
        add byte ptr [ecx+00h], bh
        jnc 00007F7F35119912h
        je 00007F7F35119912h
        add byte ptr [ebp+00h], ch
        add byte ptr [edx+00h], dl
        add byte ptr [esi+00h], ah
        insb
        add byte ptr [ebp+00h], ah
        arpl word ptr [eax], ax
        je 00007F7F35119912h
        imul eax, dword ptr [eax], 006E006Fh
        add byte ptr [ecx+00h], al
        jnc 00007F7F35119912h
        jnc 00007F7F35119912h
        add byte ptr [ebp+00h], ch
        bound eax, dword ptr [eax]
        insb
        add byte ptr [ecx+00h], bh
        add byte ptr [eax], al
        add byte ptr [eax], al
        dec esp
        add byte ptr [edi+00h], ch
        popad
        add byte ptr [eax+eax+00h], ah
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0xc6dcc0x4f.text
        IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x8128.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0xd20000xc.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x20000xc4e840xc5000a9b8511ff21a76ac07aa548d2ad562baFalse0.9019285870082487data7.710384569553251IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rsrc0xc80000x81280x82001435c60b16d94ee65369feb76ea7eda2False0.5307391826923077data6.332609767301961IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .reloc0xd20000xc0x200b34d699b8bde0d8f48d1496e62902469False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_ICON0xc81d80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 5669 x 5669 px/m0.36436170212765956
        RT_ICON0xc86400x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304, resolution 5669 x 5669 px/m0.24385245901639344
        RT_ICON0xc8fc80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 5669 x 5669 px/m0.1845684803001876
        RT_ICON0xca0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 5669 x 5669 px/m0.13526970954356846
        RT_ICON0xcc6180x3750PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9771186440677966
        RT_GROUP_ICON0xcfd680x4cdata0.75
        RT_GROUP_ICON0xcfdb40x14data1.05
        RT_VERSION0xcfdc80x360data0.42824074074074076
        DLLImport
        mscoree.dll_CorExeMain
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Jan 10, 2025 16:47:43.949282885 CET1.1.1.1192.168.2.90x10a6No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
        Jan 10, 2025 16:47:43.949282885 CET1.1.1.1192.168.2.90x10a6No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false

        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:10:47:47
        Start date:10/01/2025
        Path:C:\Users\user\Desktop\Axvn7Hegxc.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\Axvn7Hegxc.exe"
        Imagebase:0x770000
        File size:841'216 bytes
        MD5 hash:97207C093826146294A7254517321FD7
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Target ID:6
        Start time:10:48:03
        Start date:10/01/2025
        Path:C:\Windows\SysWOW64\WerFault.exe
        Wow64 process (32bit):true
        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7416 -s 1468
        Imagebase:0x420000
        File size:483'680 bytes
        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Reset < >

          Execution Graph

          Execution Coverage:8.7%
          Dynamic/Decrypted Code Coverage:100%
          Signature Coverage:0%
          Total number of Nodes:29
          Total number of Limit Nodes:4
          execution_graph 14381 2a84668 14382 2a84672 14381->14382 14384 2a84758 14381->14384 14385 2a8477d 14384->14385 14389 2a84868 14385->14389 14393 2a84859 14385->14393 14390 2a8488f 14389->14390 14391 2a8496c 14390->14391 14397 2a844f0 14390->14397 14395 2a8488f 14393->14395 14394 2a8496c 14394->14394 14395->14394 14396 2a844f0 CreateActCtxA 14395->14396 14396->14394 14398 2a858f8 CreateActCtxA 14397->14398 14400 2a859bb 14398->14400 14403 2a8d518 14404 2a8d55e GetCurrentProcess 14403->14404 14406 2a8d5a9 14404->14406 14407 2a8d5b0 GetCurrentThread 14404->14407 14406->14407 14408 2a8d5ed GetCurrentProcess 14407->14408 14409 2a8d5e6 14407->14409 14410 2a8d623 14408->14410 14409->14408 14411 2a8d64b GetCurrentThreadId 14410->14411 14412 2a8d67c 14411->14412 14413 2a8b078 14414 2a8b0ba 14413->14414 14415 2a8b0c0 GetModuleHandleW 14413->14415 14414->14415 14416 2a8b0ed 14415->14416 14401 2a8d760 DuplicateHandle 14402 2a8d7f6 14401->14402

          Control-flow Graph

          APIs
          • GetCurrentProcess.KERNEL32 ref: 02A8D596
          • GetCurrentThread.KERNEL32 ref: 02A8D5D3
          • GetCurrentProcess.KERNEL32 ref: 02A8D610
          • GetCurrentThreadId.KERNEL32 ref: 02A8D669
          Memory Dump Source
          • Source File: 00000000.00000002.2096951074.0000000002A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A80000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2a80000_Axvn7Hegxc.jbxd
          Similarity
          • API ID: Current$ProcessThread
          • String ID:
          • API String ID: 2063062207-0
          • Opcode ID: ab23971c232803ba17f6e3231b5715a817ca05ad4b8cd9d5ef57dc316ab7e446
          • Instruction ID: 2414a2f19ff6b70878c0ba4d9edc7969012a6c9aa11b8dda0aad6f51f0a8393a
          • Opcode Fuzzy Hash: ab23971c232803ba17f6e3231b5715a817ca05ad4b8cd9d5ef57dc316ab7e446
          • Instruction Fuzzy Hash: 4B5179B0900609CFDB54DFA9D588BEEBBF1EF48314F208569E049A7391DB349984CF65

          Control-flow Graph

          APIs
          • GetCurrentProcess.KERNEL32 ref: 02A8D596
          • GetCurrentThread.KERNEL32 ref: 02A8D5D3
          • GetCurrentProcess.KERNEL32 ref: 02A8D610
          • GetCurrentThreadId.KERNEL32 ref: 02A8D669
          Memory Dump Source
          • Source File: 00000000.00000002.2096951074.0000000002A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A80000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2a80000_Axvn7Hegxc.jbxd
          Similarity
          • API ID: Current$ProcessThread
          • String ID:
          • API String ID: 2063062207-0
          • Opcode ID: 13f5a730056e0a75b106c617fa7f2e7eca14f50227789d000e167e1399f8d0c2
          • Instruction ID: 76899e4e94f6b97f85912a34ccb441076e3819655f170ef82e67ae7b2f18d901
          • Opcode Fuzzy Hash: 13f5a730056e0a75b106c617fa7f2e7eca14f50227789d000e167e1399f8d0c2
          • Instruction Fuzzy Hash: 045167B0900709CFDB44DFAAD588BDEBBF1EF48314F208569E049A7291DB749984CF65

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 126 2a844f0-2a859b9 CreateActCtxA 129 2a859bb-2a859c1 126->129 130 2a859c2-2a85a1c 126->130 129->130 137 2a85a2b-2a85a2f 130->137 138 2a85a1e-2a85a21 130->138 139 2a85a40 137->139 140 2a85a31-2a85a3d 137->140 138->137 142 2a85a41 139->142 140->139 142->142
          APIs
          • CreateActCtxA.KERNEL32(?), ref: 02A859A9
          Memory Dump Source
          • Source File: 00000000.00000002.2096951074.0000000002A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A80000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2a80000_Axvn7Hegxc.jbxd
          Similarity
          • API ID: Create
          • String ID:
          • API String ID: 2289755597-0
          • Opcode ID: 76c47aad15c741e8c1145787fdf61a6447dc72ff7837a0a30b8e34c7f479ae1c
          • Instruction ID: 75298b6cd2c5c63f0f5a1e3a2d0b09a4162f0ae0f391fa03f3f44a8ffdaa4f92
          • Opcode Fuzzy Hash: 76c47aad15c741e8c1145787fdf61a6447dc72ff7837a0a30b8e34c7f479ae1c
          • Instruction Fuzzy Hash: AA41E5B0C00719CBDB24DFA9C884B9EFBB5BF49304F60806AD519AB255DBB16949CF90

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 143 2a858ed-2a859b9 CreateActCtxA 145 2a859bb-2a859c1 143->145 146 2a859c2-2a85a1c 143->146 145->146 153 2a85a2b-2a85a2f 146->153 154 2a85a1e-2a85a21 146->154 155 2a85a40 153->155 156 2a85a31-2a85a3d 153->156 154->153 158 2a85a41 155->158 156->155 158->158
          APIs
          • CreateActCtxA.KERNEL32(?), ref: 02A859A9
          Memory Dump Source
          • Source File: 00000000.00000002.2096951074.0000000002A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A80000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2a80000_Axvn7Hegxc.jbxd
          Similarity
          • API ID: Create
          • String ID:
          • API String ID: 2289755597-0
          • Opcode ID: 7e025846ab2e47c3814b8135a0a60d01419aaa3429f1afd7dffafebac1eccb37
          • Instruction ID: 0bc6c578cef3853c190785f90d816c164d2bdf509e837a6c2fc20d63cf34e2db
          • Opcode Fuzzy Hash: 7e025846ab2e47c3814b8135a0a60d01419aaa3429f1afd7dffafebac1eccb37
          • Instruction Fuzzy Hash: B841E2B0C00719CBEB24DFA9C8847DEFBB1BF49304F60806AD409AB255DB756949CF90

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 159 2a8d758-2a8d7f4 DuplicateHandle 160 2a8d7fd-2a8d81a 159->160 161 2a8d7f6-2a8d7fc 159->161 161->160
          APIs
          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02A8D7E7
          Memory Dump Source
          • Source File: 00000000.00000002.2096951074.0000000002A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A80000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2a80000_Axvn7Hegxc.jbxd
          Similarity
          • API ID: DuplicateHandle
          • String ID:
          • API String ID: 3793708945-0
          • Opcode ID: 1c0a91b88b143a4d9b2cbc1dde44d6abba1d089573fbefd40a687d5d1d4e4762
          • Instruction ID: 3ddeb6d391e2167f582ca87738e036cafb2dbfcc62f8906ad9f7b3a9210a3b46
          • Opcode Fuzzy Hash: 1c0a91b88b143a4d9b2cbc1dde44d6abba1d089573fbefd40a687d5d1d4e4762
          • Instruction Fuzzy Hash: 5A21E2B5D00248DFDB10CFAAD485AEEFBF5EB48320F14802AE958A7350C778A955CF60

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 164 2a8d760-2a8d7f4 DuplicateHandle 165 2a8d7fd-2a8d81a 164->165 166 2a8d7f6-2a8d7fc 164->166 166->165
          APIs
          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02A8D7E7
          Memory Dump Source
          • Source File: 00000000.00000002.2096951074.0000000002A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A80000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2a80000_Axvn7Hegxc.jbxd
          Similarity
          • API ID: DuplicateHandle
          • String ID:
          • API String ID: 3793708945-0
          • Opcode ID: fcff42d0a45ad38f7558a912ba63d5a9584040eee360bd3cb751b27757966f00
          • Instruction ID: 4aad95c13a268ac82725037bee3ff235ecee41415a4a930fad2a095a9609c8a7
          • Opcode Fuzzy Hash: fcff42d0a45ad38f7558a912ba63d5a9584040eee360bd3cb751b27757966f00
          • Instruction Fuzzy Hash: 9221E2B5900208DFDB10CFAAD884ADEFBF8EB48310F14802AE958A3350C774A954CFA1

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 169 2a8b078-2a8b0b8 170 2a8b0ba-2a8b0bd 169->170 171 2a8b0c0-2a8b0eb GetModuleHandleW 169->171 170->171 172 2a8b0ed-2a8b0f3 171->172 173 2a8b0f4-2a8b108 171->173 172->173
          APIs
          • GetModuleHandleW.KERNELBASE(00000000), ref: 02A8B0DE
          Memory Dump Source
          • Source File: 00000000.00000002.2096951074.0000000002A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A80000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2a80000_Axvn7Hegxc.jbxd
          Similarity
          • API ID: HandleModule
          • String ID:
          • API String ID: 4139908857-0
          • Opcode ID: 464ae81b06ce8ae736bcf37648800356d51017ac95642a2fa0d31e930ffee44f
          • Instruction ID: d42852f6c75ada3c10227156ddca28fa6a436aab8b401531810ef16adeefc7ef
          • Opcode Fuzzy Hash: 464ae81b06ce8ae736bcf37648800356d51017ac95642a2fa0d31e930ffee44f
          • Instruction Fuzzy Hash: 33110FB5C006498FCB10DF9AC444BDEFBF4AB88318F10842AD868A7210D775A545CFA1

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 591 6f005b6 592 6f005bb-6f005be 591->592 593 6f005d0-6f005d7 592->593 594 6f005c0 592->594 605 6f00603 593->605 606 6f005d9-6f005e5 593->606 594->593 595 6f00981-6f00998 594->595 596 6f00891-6f008ef 594->596 597 6f00914-6f00955 594->597 598 6f006b4-6f006cd 594->598 599 6f00848-6f0085b 594->599 600 6f0088a-6f0088c 594->600 601 6f0074a-6f00783 594->601 602 6f0099b-6f009a4 594->602 603 6f0083b-6f00843 594->603 604 6f0079f-6f007b2 594->604 675 6f008f1-6f008f9 596->675 676 6f00907-6f0090f 596->676 680 6f00957-6f00964 597->680 681 6f0097a-6f0097f 597->681 620 6f006e9 598->620 621 6f006cf-6f006e7 598->621 622 6f00883-6f00888 599->622 623 6f0085d-6f0086a 599->623 600->592 626 6f009fa-6f00a3a 601->626 639 6f00789-6f0079a 601->639 603->592 625 6f007b8-6f007c3 604->625 604->626 609 6f00609-6f0060b 605->609 607 6f005e7-6f005ed 606->607 608 6f005ef-6f005ff 606->608 615 6f00601 607->615 608->615 618 6f00623-6f00643 609->618 619 6f0060d-6f00613 609->619 615->609 640 6f00645-6f00651 618->640 641 6f0066f 618->641 628 6f00615 619->628 629 6f00617-6f00621 619->629 630 6f006ef-6f006f6 620->630 621->630 635 6f0087e 622->635 623->626 634 6f00870-6f00879 623->634 636 6f007c5-6f007d1 625->636 637 6f007ef 625->637 628->618 629->618 642 6f00720 630->642 643 6f006f8-6f00704 630->643 634->635 635->592 645 6f007d3-6f007d9 636->645 646 6f007db-6f007eb 636->646 649 6f007f5-6f007f7 637->649 639->592 656 6f00653-6f00659 640->656 657 6f0065b-6f0066b 640->657 658 6f00675-6f0069c 641->658 655 6f00726-6f00745 642->655 652 6f00706-6f0070c 643->652 653 6f0070e-6f00714 643->653 659 6f007ed 645->659 646->659 650 6f00815 649->650 651 6f007f9-6f007ff 649->651 664 6f00817-6f00819 650->664 661 6f00801-6f00803 651->661 662 6f00805-6f00811 651->662 665 6f0071e 652->665 653->665 655->592 663 6f0066d 656->663 657->663 686 6f006a4-6f006af 658->686 659->649 667 6f00813 661->667 662->667 663->658 668 6f00827-6f00836 664->668 669 6f0081b-6f00821 664->669 665->655 667->664 668->592 678 6f00823 669->678 679 6f00825 669->679 675->676 678->668 679->668 680->626 684 6f0096a-6f00970 680->684 685 6f00975 681->685 684->685 685->592 686->592
          Memory Dump Source
          • Source File: 00000000.00000002.2099749949.0000000006F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F00000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_6f00000_Axvn7Hegxc.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: b5379cb246905f6585d9cc471f1cfd2f30f62993328563e24ef05ac7fdf112d0
          • Instruction ID: c5f30ab0b943dfae82f79afb7c40b2993bd52231f2fdecb85adce0932635e800
          • Opcode Fuzzy Hash: b5379cb246905f6585d9cc471f1cfd2f30f62993328563e24ef05ac7fdf112d0
          • Instruction Fuzzy Hash: 90B16235F14228DFFBA48B58C844BAA73B7BB85315F1480A5D50AAB384CF719D82DF91
          Memory Dump Source
          • Source File: 00000000.00000002.2096146474.0000000000D7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D7D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d7d000_Axvn7Hegxc.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 4470388fdd6777841b9458b383dd29f3d2be1d7115c6687f851ce3c4aed64f27
          • Instruction ID: 703a9cab71272d0425483bf451d046e89be87ef8cd3b85a622bc89f87303f5b6
          • Opcode Fuzzy Hash: 4470388fdd6777841b9458b383dd29f3d2be1d7115c6687f851ce3c4aed64f27
          • Instruction Fuzzy Hash: 222103B2504204DFDB04DF10D9C0B26BB76FF98328F24C169E84D0B256D336E856CAB2
          Memory Dump Source
          • Source File: 00000000.00000002.2096146474.0000000000D7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D7D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d7d000_Axvn7Hegxc.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 10087c1cbe855eea2c1986f2a0b381a217fbb58f5bcbd3374339fd57e98234f7
          • Instruction ID: ae91b6c143ebf60b5c8c589c73bc652615f68bc5db1130e8958d381ff6d7aca9
          • Opcode Fuzzy Hash: 10087c1cbe855eea2c1986f2a0b381a217fbb58f5bcbd3374339fd57e98234f7
          • Instruction Fuzzy Hash: CB21FFB2504240DFDB05DF10D980B26BF76FF88328F24C669E8490A256D336D856CAB2
          Memory Dump Source
          • Source File: 00000000.00000002.2099749949.0000000006F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F00000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_6f00000_Axvn7Hegxc.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 91406b16b1332bb1e5d238009e6af9e4fb34af73bf0dc1afc27e90c8138e0de9
          • Instruction ID: ff0998b573aa7131513bfcf498f1c9c10269e67061a10b42626a865d2970c380
          • Opcode Fuzzy Hash: 91406b16b1332bb1e5d238009e6af9e4fb34af73bf0dc1afc27e90c8138e0de9
          • Instruction Fuzzy Hash: 0E21D531B41328EFE7544A649C14FF73B66BB46351F044494F54957282CE704E86DFE1
          Memory Dump Source
          • Source File: 00000000.00000002.2096526160.0000000000ECD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ECD000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_ecd000_Axvn7Hegxc.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: ba4bfef6a49bb96cdfd91554cda626e4411317063ed7561bfb15dcd50b281d7b
          • Instruction ID: 469d0a26d3226d0d184473d39a4200b760d0cce8d38ec1b7786abb7082f295a1
          • Opcode Fuzzy Hash: ba4bfef6a49bb96cdfd91554cda626e4411317063ed7561bfb15dcd50b281d7b
          • Instruction Fuzzy Hash: 8721D071608300DFDB14DF18DA85F26BBA6EB88318F20C57DD84A5B296C337D857CA62
          Memory Dump Source
          • Source File: 00000000.00000002.2096526160.0000000000ECD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ECD000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_ecd000_Axvn7Hegxc.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 072bf42d5439fd1de38b91682a816af177f604c75f9aa40061ee0b8d458d570b
          • Instruction ID: d576efe8f8affee84fa4e6a3671796f2d9272b977c8e37b5890db0d9520584ff
          • Opcode Fuzzy Hash: 072bf42d5439fd1de38b91682a816af177f604c75f9aa40061ee0b8d458d570b
          • Instruction Fuzzy Hash: FB21BDB1508204AFDB09DF50DA80F26BBA5EB88318F24C57DE8495A2A2C237D856CA61
          Memory Dump Source
          • Source File: 00000000.00000002.2096526160.0000000000ECD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ECD000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_ecd000_Axvn7Hegxc.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 56544b6491d84402ebf40d26fa51b11a6e28af1a130642d062a5ddc3439dce7a
          • Instruction ID: 88a68055f278798ca430e315e4691100e36ae4fc7bd9d70290e0dfa8e0d1f1fd
          • Opcode Fuzzy Hash: 56544b6491d84402ebf40d26fa51b11a6e28af1a130642d062a5ddc3439dce7a
          • Instruction Fuzzy Hash: 1A2160755093808FD702CF24D994B15BF71AB46214F28C5EAD8498B6A7C33B980ACB62
          Memory Dump Source
          • Source File: 00000000.00000002.2096146474.0000000000D7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D7D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d7d000_Axvn7Hegxc.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 8a9223d17f0c59b9928f2445ae754a3689dedab5288f4c6dbc5edc2f4224d076
          • Instruction ID: d67e6f6d9ab1bae83637de971e76afb1fa53be50a4869aff9cda3ee74bab12b4
          • Opcode Fuzzy Hash: 8a9223d17f0c59b9928f2445ae754a3689dedab5288f4c6dbc5edc2f4224d076
          • Instruction Fuzzy Hash: 2511D376504240DFCB15CF10D5C4B16BF72FF94328F28C6A9D8490B656C33AE85ACBA1
          Memory Dump Source
          • Source File: 00000000.00000002.2096146474.0000000000D7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D7D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d7d000_Axvn7Hegxc.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 8a9223d17f0c59b9928f2445ae754a3689dedab5288f4c6dbc5edc2f4224d076
          • Instruction ID: 11634930fa4040c2db7a3d99a25740c8b3989dbad43717bf68496b109f9c334d
          • Opcode Fuzzy Hash: 8a9223d17f0c59b9928f2445ae754a3689dedab5288f4c6dbc5edc2f4224d076
          • Instruction Fuzzy Hash: D411E676504280CFCB15CF10D5C4B16BF72FF94328F28C6A9D8490B656C336D85ACBA1
          Memory Dump Source
          • Source File: 00000000.00000002.2096526160.0000000000ECD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ECD000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_ecd000_Axvn7Hegxc.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 04b342587f02f4df216fd9fa4589941a60fabf0b5787ec5e4e812599987ae7f8
          • Instruction ID: 718000a4a500fee78c6741fcc91ddeade32008660cf7bad90436dfb27b8304af
          • Opcode Fuzzy Hash: 04b342587f02f4df216fd9fa4589941a60fabf0b5787ec5e4e812599987ae7f8
          • Instruction Fuzzy Hash: 42118B76508280DFCB15CF50DAC4B15BBA1FB84318F24C6AED8494B6A6C33BD85ACB61
          Memory Dump Source
          • Source File: 00000000.00000002.2096146474.0000000000D7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D7D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d7d000_Axvn7Hegxc.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: a6f3e1d52fd55d004ed9b71e1ba34712afb4bb16cacb0a533442c5587a416339
          • Instruction ID: c5a0e6de6b4d2c5814447bf672267480ebcd041a0eb682fffb529128da83e62a
          • Opcode Fuzzy Hash: a6f3e1d52fd55d004ed9b71e1ba34712afb4bb16cacb0a533442c5587a416339
          • Instruction Fuzzy Hash: 7C01DB31008344DBF7285F65CD84B66FBA9DF51324F18C52AED5E0E286E679DC40CAB1
          Memory Dump Source
          • Source File: 00000000.00000002.2096146474.0000000000D7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D7D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d7d000_Axvn7Hegxc.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 44a40e344638b5f78239a78d593f6a014151ff15a6a515e9572fa53c015d2201
          • Instruction ID: e30c167cc8bf79cbd93664b1e640bfaccbd743fb5c1dce1d65c4fb3fdadab83d
          • Opcode Fuzzy Hash: 44a40e344638b5f78239a78d593f6a014151ff15a6a515e9572fa53c015d2201
          • Instruction Fuzzy Hash: 6CF06D72408344AEE7148E1ADD88B62FBA8EF91734F18C45AED4D4A286D6799C44CAB1
          Memory Dump Source
          • Source File: 00000000.00000002.2099749949.0000000006F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F00000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_6f00000_Axvn7Hegxc.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: c943183bd264161ed44b5577edcd355a36fbfe37f1cbcbcc30db564941847543
          • Instruction ID: dca61e02a72609e4f197e638503d672f440805d87de81a4ca11a9368188d1971
          • Opcode Fuzzy Hash: c943183bd264161ed44b5577edcd355a36fbfe37f1cbcbcc30db564941847543
          • Instruction Fuzzy Hash: E0F05E30B04308EFFB909F65D844B6A3772FB85214F2085A5E64AAA2C0DE704A86DB52
          Memory Dump Source
          • Source File: 00000000.00000002.2099749949.0000000006F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F00000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_6f00000_Axvn7Hegxc.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 8f26945f1f40f29974439da83b291e2bd90fb249f7033c4dcae2e21108dfb311
          • Instruction ID: 92ef23b6a74296fa88d101c2716cc6b416813c09cc5d1fcd936be1d32461256e
          • Opcode Fuzzy Hash: 8f26945f1f40f29974439da83b291e2bd90fb249f7033c4dcae2e21108dfb311
          • Instruction Fuzzy Hash: A4F06531F14318EFFBE04F64DC44F6933B6FB45614F1085A5A54AA62C0DD708A85DF92
          Memory Dump Source
          • Source File: 00000000.00000002.2096951074.0000000002A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A80000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2a80000_Axvn7Hegxc.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: dff37e8a9505d641940385298d941e127cec06aee29b403a6c598708098cd8c6
          • Instruction ID: 016d04d7de9e6e886a0e0d050ad86f57f7bf00796e0ee5bee7315346056a70c3
          • Opcode Fuzzy Hash: dff37e8a9505d641940385298d941e127cec06aee29b403a6c598708098cd8c6
          • Instruction Fuzzy Hash: 84A14C36E0020A8FCF05EFB4C9805AEB7B2FF85304B55856AE905EB265EF71D956CB40