Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
7bAMuw5ono.exe

Overview

General Information

Sample name:7bAMuw5ono.exe
renamed because original name is a hash value
Original sample name:f8beab3976bee6380664f93b76a6c31d918159d685ba32bba27c95453f020fe1.exe
Analysis ID:1588109
MD5:003805e3cba7f0629cf016d9da9c0ac2
SHA1:70615044c2125c271ad2f09b44f3c9d1c0d8ea81
SHA256:f8beab3976bee6380664f93b76a6c31d918159d685ba32bba27c95453f020fe1
Tags:exeFormbookuser-adrian__luca
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Sample uses process hollowing technique
Switches to a custom stack to bypass stack traces
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
One or more processes crash
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files

Classification

  • System is w10x64
  • 7bAMuw5ono.exe (PID: 7588 cmdline: "C:\Users\user\Desktop\7bAMuw5ono.exe" MD5: 003805E3CBA7F0629CF016D9DA9C0AC2)
    • svchost.exe (PID: 7732 cmdline: "C:\Users\user\Desktop\7bAMuw5ono.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • WerFault.exe (PID: 7828 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7732 -s 32 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\7bAMuw5ono.exe", CommandLine: "C:\Users\user\Desktop\7bAMuw5ono.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\7bAMuw5ono.exe", ParentImage: C:\Users\user\Desktop\7bAMuw5ono.exe, ParentProcessId: 7588, ParentProcessName: 7bAMuw5ono.exe, ProcessCommandLine: "C:\Users\user\Desktop\7bAMuw5ono.exe", ProcessId: 7732, ProcessName: svchost.exe
Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\7bAMuw5ono.exe", CommandLine: "C:\Users\user\Desktop\7bAMuw5ono.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\7bAMuw5ono.exe", ParentImage: C:\Users\user\Desktop\7bAMuw5ono.exe, ParentProcessId: 7588, ParentProcessName: 7bAMuw5ono.exe, ProcessCommandLine: "C:\Users\user\Desktop\7bAMuw5ono.exe", ProcessId: 7732, ProcessName: svchost.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 7bAMuw5ono.exeVirustotal: Detection: 68%Perma Link
Source: 7bAMuw5ono.exeReversingLabs: Detection: 73%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: 7bAMuw5ono.exeJoe Sandbox ML: detected
Source: 7bAMuw5ono.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net

System Summary

barindex
Source: 7bAMuw5ono.exe, 00000000.00000000.1306036831.0000000000934000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_25b5631c-a
Source: 7bAMuw5ono.exe, 00000000.00000000.1306036831.0000000000934000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_ccc01fb9-6
Source: 7bAMuw5ono.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_0b7cd488-4
Source: 7bAMuw5ono.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_c4b24ae8-5
Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7732 -s 32
Source: 7bAMuw5ono.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: classification engineClassification label: mal76.evad.winEXE@4/7@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7732
Source: C:\Users\user\Desktop\7bAMuw5ono.exeFile created: C:\Users\user~1\AppData\Local\Temp\autBFEE.tmpJump to behavior
Source: 7bAMuw5ono.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\7bAMuw5ono.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 7bAMuw5ono.exeVirustotal: Detection: 68%
Source: 7bAMuw5ono.exeReversingLabs: Detection: 73%
Source: unknownProcess created: C:\Users\user\Desktop\7bAMuw5ono.exe "C:\Users\user\Desktop\7bAMuw5ono.exe"
Source: C:\Users\user\Desktop\7bAMuw5ono.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\7bAMuw5ono.exe"
Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7732 -s 32
Source: C:\Users\user\Desktop\7bAMuw5ono.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\7bAMuw5ono.exe"Jump to behavior
Source: C:\Users\user\Desktop\7bAMuw5ono.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\7bAMuw5ono.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\7bAMuw5ono.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\7bAMuw5ono.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\7bAMuw5ono.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\7bAMuw5ono.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\7bAMuw5ono.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\7bAMuw5ono.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\7bAMuw5ono.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\7bAMuw5ono.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\7bAMuw5ono.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\7bAMuw5ono.exeSection loaded: ntmarta.dllJump to behavior
Source: 7bAMuw5ono.exeStatic file information: File size 1209344 > 1048576
Source: 7bAMuw5ono.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: 7bAMuw5ono.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: 7bAMuw5ono.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: 7bAMuw5ono.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: 7bAMuw5ono.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: 7bAMuw5ono.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: 7bAMuw5ono.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: 7bAMuw5ono.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: 7bAMuw5ono.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: 7bAMuw5ono.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: 7bAMuw5ono.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: 7bAMuw5ono.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\7bAMuw5ono.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\7bAMuw5ono.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\7bAMuw5ono.exeAPI/Special instruction interceptor: Address: 195B414
Source: Amcache.hve.6.drBinary or memory string: VMware
Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.6.drBinary or memory string: vmci.sys
Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.6.drBinary or memory string: VMware20,1
Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.6.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\7bAMuw5ono.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
Source: C:\Users\user\Desktop\7bAMuw5ono.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: 410000Jump to behavior
Source: C:\Users\user\Desktop\7bAMuw5ono.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2C86008Jump to behavior
Source: C:\Users\user\Desktop\7bAMuw5ono.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\7bAMuw5ono.exe"Jump to behavior
Source: 7bAMuw5ono.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Shared Modules
1
DLL Side-Loading
312
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping121
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
312
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS11
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
7bAMuw5ono.exe69%VirustotalBrowse
7bAMuw5ono.exe74%ReversingLabsWin32.Trojan.AutoitInject
7bAMuw5ono.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.210.172
truefalse
    high
    default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
    217.20.57.18
    truefalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://upx.sf.netAmcache.hve.6.drfalse
        high
        No contacted IP infos
        Joe Sandbox version:42.0.0 Malachite
        Analysis ID:1588109
        Start date and time:2025-01-10 21:29:19 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 5m 9s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:12
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:7bAMuw5ono.exe
        renamed because original name is a hash value
        Original Sample Name:f8beab3976bee6380664f93b76a6c31d918159d685ba32bba27c95453f020fe1.exe
        Detection:MAL
        Classification:mal76.evad.winEXE@4/7@0/0
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 88.221.110.91, 2.16.100.168, 13.89.179.12, 199.232.210.172, 13.107.246.45, 20.190.159.2, 172.202.163.200
        • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, time.windows.com, a767.dspw65.akamai.net, onedsblobprdcus17.centralus.cloudapp.azure.com, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net, login.live.com, blobcollector.events.data.trafficmanager.net, umwatson.events.data.microsoft.com, wu-b-net.trafficmanager.net
        • Not all processes where analyzed, report is missing behavior information
        TimeTypeDescription
        17:18:40API Interceptor1x Sleep call for process: WerFault.exe modified
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com741645402364914803.jsGet hashmaliciousStrela DownloaderBrowse
        • 84.201.210.36
        533625797193620143.jsGet hashmaliciousStrela DownloaderBrowse
        • 84.201.210.21
        Bontrageroutdoors_Project_Update_202557516.pdfGet hashmaliciousUnknownBrowse
        • 217.20.57.42
        18444172742706830592.jsGet hashmaliciousStrela DownloaderBrowse
        • 217.20.57.19
        1882131031120212290.jsGet hashmaliciousStrela DownloaderBrowse
        • 217.20.57.35
        1861217272584230862.jsGet hashmaliciousStrela DownloaderBrowse
        • 84.201.210.20
        Message 2.emlGet hashmaliciousUnknownBrowse
        • 84.201.210.39
        naebalovo.dll.dllGet hashmaliciousUnknownBrowse
        • 217.20.57.36
        3090182781939528365.jsGet hashmaliciousStrela DownloaderBrowse
        • 84.201.210.21
        WSJ25F.batGet hashmaliciousUnknownBrowse
        • 84.201.210.39
        bg.microsoft.map.fastly.net27321191142887719888.jsGet hashmaliciousStrela DownloaderBrowse
        • 199.232.210.172
        27962100941450914990.jsGet hashmaliciousStrela DownloaderBrowse
        • 199.232.210.172
        42173378525889.jsGet hashmaliciousStrela DownloaderBrowse
        • 199.232.214.172
        24928193762733825739.jsGet hashmaliciousStrela DownloaderBrowse
        • 199.232.210.172
        24108325173196611859.jsGet hashmaliciousStrela DownloaderBrowse
        • 199.232.214.172
        19321276562420914470.jsGet hashmaliciousStrela DownloaderBrowse
        • 199.232.214.172
        2091470502273216855.jsGet hashmaliciousStrela DownloaderBrowse
        • 199.232.210.172
        2906816133204732533.jsGet hashmaliciousStrela DownloaderBrowse
        • 199.232.210.172
        741645402364914803.jsGet hashmaliciousStrela DownloaderBrowse
        • 199.232.214.172
        18444172742706830592.jsGet hashmaliciousStrela DownloaderBrowse
        • 199.232.210.172
        No context
        No context
        No context
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:modified
        Size (bytes):65536
        Entropy (8bit):0.5815080266059288
        Encrypted:false
        SSDEEP:96:BBFYCcUIUsQhMov7JYqQXIDcQ4c6fcE+cw3tZAX/d5FMT2SlPkpXmTA/f/VXT5Nm:3WC1IUk0WbkQzuiFnZ24IO8b
        MD5:648C51754CF83F1FEA0B479EBEE67650
        SHA1:5677754277BE9D6061E71C7941D0CEF7F87FE1BE
        SHA-256:C07ABDA010264E33E3195E745D57DD884DA47F31C7C533D7B8FBEACBE84DF544
        SHA-512:6F382D984807F64EA7855AF45E7B275F1C3BC11B3EC0D1B802A4703046EA394EF270B6F098E9BFB598AFA3D206DA1E0D446FED7D568EA6B06AC461EE59BC3861
        Malicious:false
        Reputation:low
        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.0.1.4.6.2.6.4.1.9.4.9.4.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.1.0.1.4.6.3.0.7.6.3.2.3.5.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.c.c.0.d.f.2.5.-.d.f.1.4.-.4.1.f.c.-.a.a.8.f.-.a.a.d.f.e.a.2.7.2.6.9.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.0.7.b.a.b.e.a.-.8.8.7.b.-.4.9.d.4.-.9.9.3.5.-.5.f.7.e.6.5.f.1.8.9.8.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.b.a.d._.m.o.d.u.l.e._.i.n.f.o.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.e.3.4.-.0.0.0.1.-.0.0.1.4.-.5.e.5.9.-.d.e.7.a.9.e.6.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.3.1.9.6.f.4.5.b.2.6.9.a.6.1.4.a.3.9.2.6.e.f.c.0.3.2.f.c.9.d.7.5.0.1.7.f.2.7.e.8.!.s.v.c.h.o.s.t...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):8224
        Entropy (8bit):3.673902535229365
        Encrypted:false
        SSDEEP:192:R6l7wVeJm56x6YQp6CqgmfUMpx789b9qsfxv/m:R6lXJ46x6YO6vgmfU39Jf8
        MD5:F3E8814E9774F24861656D2B73339C7A
        SHA1:16C2AEA31E45838A29B6E0814DBBBE8E9B2989D7
        SHA-256:C871713F7E17EBB04F0555A4F53FB18E68D386AAAEE25611D6B5983717B47408
        SHA-512:46BF812F2ECA462BC15E69BED5DACB5173800338BD7ED06C2B7F47DD08827CAA55DB9AB44C5D56EC0A3081D87E56886D912B325775ACFB483A27B7F42EFCDEC4
        Malicious:false
        Reputation:low
        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.7.3.2.<./.P.i.
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):4572
        Entropy (8bit):4.435421779544648
        Encrypted:false
        SSDEEP:48:cvIwWl8zs/Jg77aI9jAWpW8VYDYm8M4JTHFsB+q87ZkcnD3trd:uIjfhI7h57V3JmBoD3trd
        MD5:7F925CA741C430B5A3F253834F8853B7
        SHA1:939CC55DCE6E4CBA655A9A1406EE80AC5A05C48B
        SHA-256:B61F12FD687D3A96E2ACB6A57C688AA9C5C0A6D76FD75E9B8C8A2EEEC8485448
        SHA-512:6D4AB5D64E6571784A6A62A10C8562A3C49619306A6EC5D556DAE592F08AD6E0F9EBC7D86E1EE3580F2FC66FB700FC8A30DA8444DFEDB7592FFE010E7E465937
        Malicious:false
        Reputation:low
        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="670293" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
        Process:C:\Users\user\Desktop\7bAMuw5ono.exe
        File Type:data
        Category:modified
        Size (bytes):287232
        Entropy (8bit):7.994158002979748
        Encrypted:true
        SSDEEP:6144:qJUOeikpQZ5t0yMYcpiugbke87OE4emsmA50d+IIUP0x6FsALun34R6:SB5xMYkDgg4VvAif0Ys8O
        MD5:0815F80BC6F17A79D47246556D257A21
        SHA1:5780811D42C1471786F0FEDE89FCB76F3DD03B96
        SHA-256:F027DEB7E5AABFFB7D967E49BFC88F39DA2C1BFBD6DE573F2672443192261D11
        SHA-512:C110650175916C2C0A706644CA34D3566D9859FA388700FF1B75AEDBE87880A5306231F6318388E318A317EBA011EB216DE584E402839051900352367BA466E2
        Malicious:false
        Reputation:low
        Preview:u..WBF62@4B4..00.ZH6ZU8F.WAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00.ZH6TJ.HU.H...Ex...)YCd*:Y='Y+u4 (X]0. Qb3E^d3&...kf88%#.?I>f4BA00DZ17S..&2.|&Q.yT%.X..~:/.@.i7&.,...~T%.bY'2uV=.8FUWAF62.qB4.@10.r.VZU8FUWAF.2F5I5IA0`@ZH6ZU8FUW.R62D$B4B!40DZ.6ZE8FUUAF02D4B4BA60DZH6ZU8&QWAD62D4B4@Ap.DZX6ZE8FUWQF6"D4B4BA 0DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA.D!"<6ZUL.QWAV62DdF4BQ00DZH6ZU8FUWAF.2DTB4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):4738
        Entropy (8bit):3.2420838031062376
        Encrypted:false
        SSDEEP:96:pwpIiAkXkkXQkuguWI0Qj0Qm0QgIv0QXi0QG0Q/kzgIXaHszeuzSzbxGQI5lmPsr:pNlp+uxIRoeyOkNH
        MD5:94C74654E578B7E1B188556EC1B5454B
        SHA1:6DBF445C49877F3EEE8ADF8444C528E3203AF0CD
        SHA-256:0F176FE88A16BADFF3AA89FB70ED690CFF5F477278566BAA856162148F51669B
        SHA-512:608BD10556058206C10C38A0B2F0A99B43BA8E71B3E24B53897AEAC1DC4095B0AAC79C0630FCD85FFA3A7367EF38EB70EF36C0D88205959DDDB84DCB436D4467
        Malicious:false
        Reputation:low
        Preview:......S.n.a.p.s.h.o.t. .s.t.a.t.i.s.t.i.c.s.:.....-. .S.i.g.n.a.t.u.r.e. . . . . . . . . . . . . . . . .:. .P.S.S.D.......-. .F.l.a.g.s./.C.a.p.t.u.r.e.F.l.a.g.s. . . . . . . .:. .0.0.0.0.0.0.0.1./.d.0.0.0.3.9.f.f.......-. .A.u.x. .p.a.g.e.s. . . . . . . . . . . . . . . . .:. .1. .e.n.t.r.i.e.s. .l.o.n.g.......-. .V.A. .s.p.a.c.e. .s.t.r.e.a.m. . . . . . . . . . .:. .3.7.4.4. .b.y.t.e.s. .i.n. .s.i.z.e.......-. .H.a.n.d.l.e. .t.r.a.c.e. .s.t.r.e.a.m. . . . . . .:. .0. .b.y.t.e.s. .i.n. .s.i.z.e.......-. .H.a.n.d.l.e. .s.t.r.e.a.m. . . . . . . . . . . . .:. .1.5.1.0. .b.y.t.e.s. .i.n. .s.i.z.e.......-. .T.h.r.e.a.d.s. . . . . . . . . . . . . . . . . . .:. .1. .t.h.r.e.a.d.s.......-. .T.h.r.e.a.d. .s.t.r.e.a.m. . . . . . . . . . . . .:. .8.3.2. .b.y.t.e.s. .i.n. .s.i.z.e...........S.n.a.p.s.h.o.t. .p.e.r.f.o.r.m.a.n.c.e. .c.o.u.n.t.e.r.s.:.....-. .T.o.t.a.l.C.y.c.l.e.C.o.u.n.t. . . . . . . . . . .:. .3.6.5.2.5.4.6. .c.y.c.l.e.s.......-. .V.a.C.l.o.n.e.C.y.c.l.e.C.o.u.n.t. . . . . . . . .
        Process:C:\Users\user\Desktop\7bAMuw5ono.exe
        File Type:data
        Category:dropped
        Size (bytes):287232
        Entropy (8bit):7.994158002979748
        Encrypted:true
        SSDEEP:6144:qJUOeikpQZ5t0yMYcpiugbke87OE4emsmA50d+IIUP0x6FsALun34R6:SB5xMYkDgg4VvAif0Ys8O
        MD5:0815F80BC6F17A79D47246556D257A21
        SHA1:5780811D42C1471786F0FEDE89FCB76F3DD03B96
        SHA-256:F027DEB7E5AABFFB7D967E49BFC88F39DA2C1BFBD6DE573F2672443192261D11
        SHA-512:C110650175916C2C0A706644CA34D3566D9859FA388700FF1B75AEDBE87880A5306231F6318388E318A317EBA011EB216DE584E402839051900352367BA466E2
        Malicious:false
        Reputation:low
        Preview:u..WBF62@4B4..00.ZH6ZU8F.WAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00.ZH6TJ.HU.H...Ex...)YCd*:Y='Y+u4 (X]0. Qb3E^d3&...kf88%#.?I>f4BA00DZ17S..&2.|&Q.yT%.X..~:/.@.i7&.,...~T%.bY'2uV=.8FUWAF62.qB4.@10.r.VZU8FUWAF.2F5I5IA0`@ZH6ZU8FUW.R62D$B4B!40DZ.6ZE8FUUAF02D4B4BA60DZH6ZU8&QWAD62D4B4@Ap.DZX6ZE8FUWQF6"D4B4BA 0DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA.D!"<6ZUL.QWAV62DdF4BQ00DZH6ZU8FUWAF.2DTB4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4B4BA00DZH6ZU8FUWAF62D4
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:MS Windows registry file, NT/2000 or above
        Category:dropped
        Size (bytes):1835008
        Entropy (8bit):4.4174264090606
        Encrypted:false
        SSDEEP:6144:jcifpi6ceLPL9skLmb0moSWSPtaJG8nAgex285i2MMhA20X4WABlGuNT5+:Yi58oSWIZBk2MM6AFBto
        MD5:07FABFAD645BE3970BEB61CA9E07A365
        SHA1:7A3FE2B51E77CB001E53B62BAA66CF196B5DD320
        SHA-256:A732069F5DB6A996E8DDF7A62218DDD35006764FC41CF9CCCA51151247D85A9B
        SHA-512:1831683EAFF97E4A3D402E3E62A5D5B4E961EB13B1E081E7EAD56EAC3E7F0BD9322AA0857173AB52C9BE9528D1E52202C3732EB497E6E53D51A58AC0908F6AC4
        Malicious:false
        Reputation:low
        Preview:regfE...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..`{.c...............................................................................................................................................................................................................................................................................................................................................|wO........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        File type:PE32 executable (GUI) Intel 80386, for MS Windows
        Entropy (8bit):7.191316963992763
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.96%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:7bAMuw5ono.exe
        File size:1'209'344 bytes
        MD5:003805e3cba7f0629cf016d9da9c0ac2
        SHA1:70615044c2125c271ad2f09b44f3c9d1c0d8ea81
        SHA256:f8beab3976bee6380664f93b76a6c31d918159d685ba32bba27c95453f020fe1
        SHA512:7a7c5e44dde34a09755e62624350fb89748f5116b579dd51ed6453eb109e9fe70c00aa3dc93abce5c6688cfb845f010cc86fda1cf6b96f27f1a52df5e66de8c7
        SSDEEP:24576:Bu6J33O0c+JY5UZ+XC0kGso6FaoHk+h6FU64kPWY:Tu0c++OCvkGs9FaoHh4UrY
        TLSH:2445CF2273DEC360CB669173BF69B7056EBF3C610630B85B2F980D7DA950161262DB63
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
        Icon Hash:aaf3e3e3938382a0
        Entrypoint:0x427dcd
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
        DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
        Time Stamp:0x675A3910 [Thu Dec 12 01:14:56 2024 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:5
        OS Version Minor:1
        File Version Major:5
        File Version Minor:1
        Subsystem Version Major:5
        Subsystem Version Minor:1
        Import Hash:afcdf79be1557326c854b6e20cb900a7
        Instruction
        call 00007F0E106EB23Ah
        jmp 00007F0E106DE004h
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        push edi
        push esi
        mov esi, dword ptr [esp+10h]
        mov ecx, dword ptr [esp+14h]
        mov edi, dword ptr [esp+0Ch]
        mov eax, ecx
        mov edx, ecx
        add eax, esi
        cmp edi, esi
        jbe 00007F0E106DE18Ah
        cmp edi, eax
        jc 00007F0E106DE4EEh
        bt dword ptr [004C31FCh], 01h
        jnc 00007F0E106DE189h
        rep movsb
        jmp 00007F0E106DE49Ch
        cmp ecx, 00000080h
        jc 00007F0E106DE354h
        mov eax, edi
        xor eax, esi
        test eax, 0000000Fh
        jne 00007F0E106DE190h
        bt dword ptr [004BE324h], 01h
        jc 00007F0E106DE660h
        bt dword ptr [004C31FCh], 00000000h
        jnc 00007F0E106DE32Dh
        test edi, 00000003h
        jne 00007F0E106DE33Eh
        test esi, 00000003h
        jne 00007F0E106DE31Dh
        bt edi, 02h
        jnc 00007F0E106DE18Fh
        mov eax, dword ptr [esi]
        sub ecx, 04h
        lea esi, dword ptr [esi+04h]
        mov dword ptr [edi], eax
        lea edi, dword ptr [edi+04h]
        bt edi, 03h
        jnc 00007F0E106DE193h
        movq xmm1, qword ptr [esi]
        sub ecx, 08h
        lea esi, dword ptr [esi+08h]
        movq qword ptr [edi], xmm1
        lea edi, dword ptr [edi+08h]
        test esi, 00000007h
        je 00007F0E106DE1E5h
        bt esi, 03h
        jnc 00007F0E106DE238h
        Programming Language:
        • [ASM] VS2013 build 21005
        • [ C ] VS2013 build 21005
        • [C++] VS2013 build 21005
        • [ C ] VS2008 SP1 build 30729
        • [IMP] VS2008 SP1 build 30729
        • [ASM] VS2013 UPD4 build 31101
        • [RES] VS2013 build 21005
        • [LNK] VS2013 UPD4 build 31101
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x5eb70.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x1260000x711c.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .rsrc0xc70000x5eb700x5ec003d04b8001f56fbe401903c450c3beb5fFalse0.9309140006596306data7.900766873750954IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .reloc0x1260000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
        RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
        RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
        RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
        RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
        RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
        RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
        RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
        RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
        RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
        RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
        RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
        RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
        RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
        RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
        RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
        RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
        RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
        RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
        RT_RCDATA0xcf7b80x55e35data1.0003297356145733
        RT_GROUP_ICON0x1255f00x76dataEnglishGreat Britain0.6610169491525424
        RT_GROUP_ICON0x1256680x14dataEnglishGreat Britain1.25
        RT_GROUP_ICON0x12567c0x14dataEnglishGreat Britain1.15
        RT_GROUP_ICON0x1256900x14dataEnglishGreat Britain1.25
        RT_VERSION0x1256a40xdcdataEnglishGreat Britain0.6181818181818182
        RT_MANIFEST0x1257800x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
        DLLImport
        WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
        VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
        COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
        MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
        WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
        PSAPI.DLLGetProcessMemoryInfo
        IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
        USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
        UxTheme.dllIsThemeActive
        KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
        USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
        GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
        COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
        ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
        SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
        ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
        OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
        Language of compilation systemCountry where language is spokenMap
        EnglishGreat Britain
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Jan 10, 2025 21:30:34.184134007 CET1.1.1.1192.168.2.70x1ae0No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comdefault.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comCNAME (Canonical name)IN (0x0001)false
        Jan 10, 2025 21:30:34.184134007 CET1.1.1.1192.168.2.70x1ae0No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.18A (IP address)IN (0x0001)false
        Jan 10, 2025 21:30:34.184134007 CET1.1.1.1192.168.2.70x1ae0No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.19A (IP address)IN (0x0001)false
        Jan 10, 2025 21:30:34.184134007 CET1.1.1.1192.168.2.70x1ae0No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.35A (IP address)IN (0x0001)false
        Jan 10, 2025 21:30:34.184134007 CET1.1.1.1192.168.2.70x1ae0No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.210.23A (IP address)IN (0x0001)false
        Jan 10, 2025 21:30:34.184134007 CET1.1.1.1192.168.2.70x1ae0No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.36A (IP address)IN (0x0001)false
        Jan 10, 2025 21:30:34.184134007 CET1.1.1.1192.168.2.70x1ae0No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.210.39A (IP address)IN (0x0001)false
        Jan 10, 2025 21:30:34.184134007 CET1.1.1.1192.168.2.70x1ae0No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.34A (IP address)IN (0x0001)false
        Jan 10, 2025 21:30:34.184134007 CET1.1.1.1192.168.2.70x1ae0No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.20A (IP address)IN (0x0001)false
        Jan 10, 2025 21:30:48.780623913 CET1.1.1.1192.168.2.70x6948No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
        Jan 10, 2025 21:30:48.780623913 CET1.1.1.1192.168.2.70x6948No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
        Jan 10, 2025 21:31:16.824417114 CET1.1.1.1192.168.2.70xfcccNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
        Jan 10, 2025 21:31:16.824417114 CET1.1.1.1192.168.2.70xfcccNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
        Jan 10, 2025 21:31:39.229772091 CET1.1.1.1192.168.2.70x6a3fNo error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comdefault.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comCNAME (Canonical name)IN (0x0001)false
        Jan 10, 2025 21:31:39.229772091 CET1.1.1.1192.168.2.70x6a3fNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.41A (IP address)IN (0x0001)false
        Jan 10, 2025 21:31:39.229772091 CET1.1.1.1192.168.2.70x6a3fNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.26A (IP address)IN (0x0001)false
        Jan 10, 2025 21:31:39.229772091 CET1.1.1.1192.168.2.70x6a3fNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.27A (IP address)IN (0x0001)false
        Jan 10, 2025 21:31:39.229772091 CET1.1.1.1192.168.2.70x6a3fNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.23A (IP address)IN (0x0001)false
        Jan 10, 2025 21:31:39.229772091 CET1.1.1.1192.168.2.70x6a3fNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.210.35A (IP address)IN (0x0001)false
        Jan 10, 2025 21:31:39.229772091 CET1.1.1.1192.168.2.70x6a3fNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.37A (IP address)IN (0x0001)false
        Jan 10, 2025 21:31:39.229772091 CET1.1.1.1192.168.2.70x6a3fNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.25A (IP address)IN (0x0001)false
        Jan 10, 2025 21:31:39.229772091 CET1.1.1.1192.168.2.70x6a3fNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.24A (IP address)IN (0x0001)false

        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:15:30:20
        Start date:10/01/2025
        Path:C:\Users\user\Desktop\7bAMuw5ono.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\7bAMuw5ono.exe"
        Imagebase:0x880000
        File size:1'209'344 bytes
        MD5 hash:003805E3CBA7F0629CF016D9DA9C0AC2
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Target ID:3
        Start time:15:30:25
        Start date:10/01/2025
        Path:C:\Windows\SysWOW64\svchost.exe
        Wow64 process (32bit):false
        Commandline:"C:\Users\user\Desktop\7bAMuw5ono.exe"
        Imagebase:0x410000
        File size:46'504 bytes
        MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:false

        Target ID:6
        Start time:15:30:26
        Start date:10/01/2025
        Path:C:\Windows\SysWOW64\WerFault.exe
        Wow64 process (32bit):true
        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7732 -s 32
        Imagebase:0x5d0000
        File size:483'680 bytes
        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        No disassembly