Edit tour

Windows Analysis Report
2pacalypse.dll.exe

Overview

General Information

Sample name:2pacalypse.dll.exe
Analysis ID:1670543
MD5:1f9946d6277725e373d979288583c6d5
SHA1:0c0e4bdcc106db4e4a568dda9d29188d955c6431
SHA256:394959e5988b228cf80266199200e2b164119466891edbf9949fd4738400eafc
Tags:exeuser-FelloBoiYuuka
Infos:

Detection

Score:3
Range:0 - 100
Confidence:60%

Signatures

AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • 2pacalypse.dll.exe (PID: 7488 cmdline: "C:\Users\user\Desktop\2pacalypse.dll.exe" MD5: 1F9946D6277725E373D979288583C6D5)
    • WerFault.exe (PID: 7584 cmdline: C:\Windows\system32\WerFault.exe -u -p 7488 -s 724 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: 2pacalypse.dll.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\iroha\Desktop\2pacalypse\obj\Release\net6.0-windows\2pacalypse.pdbSHA256j source: 2pacalypse.dll.exe
Source: Binary string: mscorlib.pdb source: WER54DC.tmp.dmp.3.dr
Source: Binary string: C:\Users\iroha\Desktop\2pacalypse\obj\Release\net6.0-windows\2pacalypse.pdb source: 2pacalypse.dll.exe
Source: Binary string: mscorlib.ni.pdb source: WER54DC.tmp.dmp.3.dr
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER54DC.tmp.dmp.3.dr
Source: Binary string: 2pacalypse.pdbMZ source: WER54DC.tmp.dmp.3.dr
Source: Binary string: 2pacalypse.pdb source: WER54DC.tmp.dmp.3.dr
Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\2pacalypse.dll.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7488 -s 724
Source: 2pacalypse.dll.exe, 00000000.00000000.1190526711.00000233AD5FE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename2pacalypse.dll6 vs 2pacalypse.dll.exe
Source: 2pacalypse.dll.exeBinary or memory string: OriginalFilename2pacalypse.dll6 vs 2pacalypse.dll.exe
Source: classification engineClassification label: clean3.winEXE@2/5@0/0
Source: C:\Users\user\Desktop\2pacalypse.dll.exeMutant created: NULL
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7488
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\32146e2a-619e-4df3-9c09-c2a4d5209390Jump to behavior
Source: 2pacalypse.dll.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: 2pacalypse.dll.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Users\user\Desktop\2pacalypse.dll.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\2pacalypse.dll.exe "C:\Users\user\Desktop\2pacalypse.dll.exe"
Source: C:\Users\user\Desktop\2pacalypse.dll.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7488 -s 724
Source: C:\Users\user\Desktop\2pacalypse.dll.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\2pacalypse.dll.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\2pacalypse.dll.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\2pacalypse.dll.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\2pacalypse.dll.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\2pacalypse.dll.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\2pacalypse.dll.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\2pacalypse.dll.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: 2pacalypse.dll.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: 2pacalypse.dll.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: 2pacalypse.dll.exeStatic file information: File size 5614592 > 1048576
Source: 2pacalypse.dll.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x55a200
Source: 2pacalypse.dll.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: 2pacalypse.dll.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\iroha\Desktop\2pacalypse\obj\Release\net6.0-windows\2pacalypse.pdbSHA256j source: 2pacalypse.dll.exe
Source: Binary string: mscorlib.pdb source: WER54DC.tmp.dmp.3.dr
Source: Binary string: C:\Users\iroha\Desktop\2pacalypse\obj\Release\net6.0-windows\2pacalypse.pdb source: 2pacalypse.dll.exe
Source: Binary string: mscorlib.ni.pdb source: WER54DC.tmp.dmp.3.dr
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER54DC.tmp.dmp.3.dr
Source: Binary string: 2pacalypse.pdbMZ source: WER54DC.tmp.dmp.3.dr
Source: Binary string: 2pacalypse.pdb source: WER54DC.tmp.dmp.3.dr
Source: 2pacalypse.dll.exeStatic PE information: 0xDB71B410 [Sat Aug 31 19:52:48 2086 UTC]
Source: C:\Users\user\Desktop\2pacalypse.dll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\2pacalypse.dll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\2pacalypse.dll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\2pacalypse.dll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\2pacalypse.dll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\2pacalypse.dll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\2pacalypse.dll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\2pacalypse.dll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\2pacalypse.dll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\2pacalypse.dll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\2pacalypse.dll.exeMemory allocated: 233AD940000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\2pacalypse.dll.exeMemory allocated: 233C73D0000 memory reserve | memory write watchJump to behavior
Source: Amcache.hve.3.drBinary or memory string: VMware
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: vmci.sys
Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: VMware20,1
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\2pacalypse.dll.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\2pacalypse.dll.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\2pacalypse.dll.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\2pacalypse.dll.exeQueries volume information: C:\Users\user\Desktop\2pacalypse.dll.exe VolumeInformationJump to behavior
Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
2
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory2
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager11
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Timestomp
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1670543 Sample: 2pacalypse.dll.exe Startdate: 21/04/2025 Architecture: WINDOWS Score: 3 5 2pacalypse.dll.exe 2->5         started        process3 7 WerFault.exe 19 16 5->7         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
2pacalypse.dll.exe1%VirustotalBrowse
2pacalypse.dll.exe3%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.3.drfalse
    high
    No contacted IP infos
    Joe Sandbox version:42.0.0 Malachite
    Analysis ID:1670543
    Start date and time:2025-04-21 21:10:19 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 11s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:14
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:2pacalypse.dll.exe
    Detection:CLEAN
    Classification:clean3.winEXE@2/5@0/0
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 20.42.65.92, 20.190.190.130, 184.29.183.29, 20.12.23.50
    • Excluded domains from analysis (whitelisted): a-ring-fallback.msedge.net, fs.microsoft.com, onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, c.pki.goog, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    TimeTypeDescription
    15:11:21API Interceptor1x Sleep call for process: WerFault.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\System32\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.8342850153457276
    Encrypted:false
    SSDEEP:96:e0F7mupQYTsdgrzxymTpQXIDcQ1c6mcEqcw3QdJ+BHUHZ0ownOgFkEwH3d2FYAKZ:XUGT5A0biwMsa+mzuiFlZ24lO8L1
    MD5:8C0F8AE60CD7B6231235A06075A215C7
    SHA1:2324165CADB881507EA4FFB6448DA06759CA2A87
    SHA-256:0AB5EC3AB850E73397E25F22ADCE56BF52F8835F3C90A4EAA1FB1AFB56FCFA84
    SHA-512:95B5E25ADDA855DA47FBCED86B76A4B81559883711C920788678824D2AAFC2004E3238C2D674BA84FD71C53307E1B7E7335A61CDD335D20D1D1B4A2DFE39E250
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.9.7.3.6.2.7.8.1.4.8.2.0.4.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.9.7.3.6.2.7.8.5.2.3.1.9.4.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.5.d.5.2.9.f.4.-.2.9.4.4.-.4.7.3.4.-.a.1.7.0.-.a.2.c.5.3.8.0.d.b.9.3.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.d.1.9.b.2.c.c.-.c.0.d.3.-.4.6.9.c.-.8.0.5.5.-.8.2.b.4.8.1.f.4.9.2.6.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.2.p.a.c.a.l.y.p.s.e...d.l.l...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.2.p.a.c.a.l.y.p.s.e...d.l.l.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.4.0.-.0.0.0.1.-.0.0.1.8.-.7.1.6.0.-.9.0.2.8.f.1.b.2.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.5.9.4.1.b.7.4.7.c.b.3.b.1.8.f.6.f.b.4.8.d.3.7.c.4.e.4.6.3.a.9.0.0.0.0.0.0.0.0.!.0.0.0.0.0.c.0.e.4.b.d.c.c.1.0.6.d.b.4.e.4.a.5.6.8.d.d.a.9.d.2.9.1.8.8.d.9.5.5.c.6.4.3.1.!.2.p.a.c.
    Process:C:\Windows\System32\WerFault.exe
    File Type:Mini DuMP crash report, 16 streams, Mon Apr 21 19:11:18 2025, 0x1205a4 type
    Category:dropped
    Size (bytes):172295
    Entropy (8bit):2.924552525936482
    Encrypted:false
    SSDEEP:1536:Ktc8DpivE0sZAfI3Z9jCC8jH/AVfmXh5+vMMimSSlx:KtRDpivE0sZAm1CCqF3+vLimn7
    MD5:E70F53105FD53178B32517B9CAE37ECE
    SHA1:12692DB846D56074CDC8269A0E0A238C98BEE71C
    SHA-256:4430AABAEC82FAF1C3E5142F5D9CDF7ADD7316E8723BE71CC17A5FC108347BA5
    SHA-512:12F82A936A2D34EC8EB559C3C20A877A83BE7D7DD45E1DABCC22414851952524A5CAE58A775A701E3DCFFF924082B54891ECB288C2EAD1D17E25687E7A6B8DBE
    Malicious:false
    Reputation:low
    Preview:MDMP..a..... .......V..h........................@...........$...T...........x............9..........l.......8...........T...............7.......................x...............................................................................eJ..............Lw......................T.......@...U..h.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8556
    Entropy (8bit):3.7025617249318197
    Encrypted:false
    SSDEEP:192:R6l7wVeJCZ56Y6xy4Phigmfz4dvkprT89bRCBf+bm:R6lXJs56Y8y+higmfz4dvFREfz
    MD5:82D8C3DF082FFD96A11A783A23DBF0DF
    SHA1:C5090BE5A0C832F15CC2886BC525ADA1C454BDCB
    SHA-256:E7F79D21D490FE7BA6BFFA52E78BD841CD3D7CDE2D07E9B6ECF4DEA39AFA2829
    SHA-512:D9C804BF86FE3DEE5D22A739BC6652BC1CE36F1274E46FC7BA232E6C45B7C3C640BCE13E7B4AE1E4D1984D04C8684FD63AC55DD536FDE2796E7E9E00C164F55C
    Malicious:false
    Reputation:low
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.4.8.8.<./.P.i.
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4738
    Entropy (8bit):4.477082445216592
    Encrypted:false
    SSDEEP:48:cvIwWl8zsiJg771I9KlWpW8VYzYm8M4JjsF3yq85tmyrQYTwd:uIjfwI7RU7VTJatyrQYTwd
    MD5:3A04024FB60BC66147065465993FE0C9
    SHA1:C4F3B59DB2EB2FDFC807F5413165018EF804985A
    SHA-256:51827C82A94FC2EEC40A6183368183E17F45A2887CEC2E41CAF07223283D9CCB
    SHA-512:B204FD5BFA1EBC55C81FFCB2F1C0588F505B438C2EDEFC2B34572F909EC64938B420165378832F8056041243B91C146A0516E1F202D05E9B182A4C1498724115
    Malicious:false
    Reputation:low
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="815653" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\System32\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.46896256017659
    Encrypted:false
    SSDEEP:6144:RIXfpi67eLPU9skLmb0b4dWSPKaJG8nAgejZMMhA2gX4WABlVuN6dwBCswSbr:yXD94dWlLZMM6YFU4+r
    MD5:8DE336F9601C7D096CDB4BB8F1F32448
    SHA1:C9B1EA6AE814898589A5EFDDA3CF66713C971A32
    SHA-256:D97ED8B6F60192C51D52184AED2471EFE23AE235F329CCCA17264AB359D17350
    SHA-512:2E229161989A243F729A891DF522B3B153AB1A7814263EB78F8598FF97863E9CE00946545F9869C8D70A18BC5693CE5F09048F9836BC28E05C94AA6ED91FCF8C
    Malicious:false
    Reputation:low
    Preview:regf:...:....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmf..(...............................................................................................................................................................................................................................................................................................................................................17..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
    Entropy (8bit):7.234837979871919
    TrID:
    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
    • Win32 Executable (generic) a (10002005/4) 49.78%
    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
    • Generic Win/DOS Executable (2004/3) 0.01%
    • DOS Executable Generic (2002/1) 0.01%
    File name:2pacalypse.dll.exe
    File size:5'614'592 bytes
    MD5:1f9946d6277725e373d979288583c6d5
    SHA1:0c0e4bdcc106db4e4a568dda9d29188d955c6431
    SHA256:394959e5988b228cf80266199200e2b164119466891edbf9949fd4738400eafc
    SHA512:e3def8ee65bb1d3a530f421967f5e942c5f2c97e309203c049b7931e7afcb2d62a4fd29877d4d3b7bab2341e6f1dae7cd885a9823a9caf591134147195cec61e
    SSDEEP:98304:DLWSnQr5nJQnoi8m2Fn3t+C3jDVsIb9kZXhnTu3vLSN/8jkB0MnWgXb5QdOjc3zc:GD6nwt+CT5DbgXhTymF8jkGMnWy5ljcY
    TLSH:0F46F1A3D1538B146EC74B279FD16C081EA0B00DFEA8663F358CAD45E2A3701B7A57B5
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....q..........."...0...U.........^.U.. ....U...@.. ....................... V...........`................................
    Icon Hash:90cececece8e8eb0
    Entrypoint:0x95c15e
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Time Stamp:0xDB71B410 [Sat Aug 31 19:52:48 2086 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
    Instruction
    jmp dword ptr [00402000h]
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x55c10b0x4f.text
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x55e0000x564.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x5600000xc.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x55c02c0x54.text
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x20000x55a1640x55a2001c98ed585be3a459c0b8068f789cf17eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rsrc0x55e0000x5640x60052d56f91b862ffe6fca2213e622b012aFalse0.39453125data3.951054182025157IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x5600000xc0x20048a438dca6c9eb6a2fa012035aaad689False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_VERSION0x55e0900x2d4data0.4185082872928177
    RT_MANIFEST0x55e3740x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
    DLLImport
    mscoree.dll_CorExeMain
    DescriptionData
    Translation0x0000 0x04b0
    CompanyName2pacalypse
    FileDescription2pacalypse
    FileVersion1.0.0.0
    InternalName2pacalypse.dll
    LegalCopyright
    OriginalFilename2pacalypse.dll
    ProductName2pacalypse
    ProductVersion1.0.0
    Assembly Version1.0.0.0
    No network behavior found
    050100s020406080100

    Click to jump to process

    050100s0.005101520MB

    Click to jump to process

    • File
    • Registry

    Click to dive into process behavior distribution

    Target ID:0
    Start time:15:11:17
    Start date:21/04/2025
    Path:C:\Users\user\Desktop\2pacalypse.dll.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\2pacalypse.dll.exe"
    Imagebase:0x233ad0a0000
    File size:5'614'592 bytes
    MD5 hash:1F9946D6277725E373D979288583C6D5
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:3
    Start time:15:11:17
    Start date:21/04/2025
    Path:C:\Windows\System32\WerFault.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\WerFault.exe -u -p 7488 -s 724
    Imagebase:0x7ff69b590000
    File size:570'736 bytes
    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

    No disassembly