Edit tour

Windows Analysis Report
ExpressVideoConverter.exe

Overview

General Information

Sample name:ExpressVideoConverter.exe
Analysis ID:1671514
MD5:9199fac04355998413a251ed0fac52be
SHA1:2a88f9c89383480c926f8ce726fe7f33fe71f473
SHA256:92b61a307ac342e66b3685d4d1f2b073ce3d47b92362e3aae65e7cedf523a562
Tags:exeuser-FelloBoiYuuka
Infos:

Detection

Score:48
Range:0 - 100
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Allocates memory with a write watch (potentially for evading sandboxes)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • ExpressVideoConverter.exe (PID: 6464 cmdline: "C:\Users\user\Desktop\ExpressVideoConverter.exe" MD5: 9199FAC04355998413A251ED0FAC52BE)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: ExpressVideoConverter.exeVirustotal: Detection: 8%Perma Link
Source: ExpressVideoConverter.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_88e266cb2fac7c0d\MSVCR80.dllJump to behavior
Source: ExpressVideoConverter.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\xtreme\Documents\Visual Studio 2008\Projects\Express Video Converter\Express Video Converter\obj\Debug\Express Video Converter.pdb source: ExpressVideoConverter.exe
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeCode function: 4x nop then jmp 00007FF88B5360ABh0_2_00007FF88B535E69
Source: ExpressVideoConverter.exeString found in binary or memory: https://arjie89.000webhostapp.com/evc.php
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeCode function: 0_2_00007FF88B53143C0_2_00007FF88B53143C
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeCode function: 0_2_00007FF88B5314920_2_00007FF88B531492
Source: ExpressVideoConverter.exe, 00000000.00000000.1178315468.0000000000B46000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameExpress Video Converter.exeP vs ExpressVideoConverter.exe
Source: ExpressVideoConverter.exeBinary or memory string: OriginalFilenameExpress Video Converter.exeP vs ExpressVideoConverter.exe
Source: ExpressVideoConverter.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: ExpressVideoConverter.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: classification engineClassification label: mal48.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeMutant created: NULL
Source: ExpressVideoConverter.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: ExpressVideoConverter.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: ExpressVideoConverter.exeVirustotal: Detection: 8%
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SettingsJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeAutomated click: Continue
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorrc.dllJump to behavior
Source: ExpressVideoConverter.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_88e266cb2fac7c0d\MSVCR80.dllJump to behavior
Source: ExpressVideoConverter.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: ExpressVideoConverter.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\xtreme\Documents\Visual Studio 2008\Projects\Express Video Converter\Express Video Converter\obj\Debug\Express Video Converter.pdb source: ExpressVideoConverter.exe
Source: ExpressVideoConverter.exeStatic PE information: section name: .text entropy: 7.934585066242869
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeMemory allocated: 13A0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeMemory allocated: 30E0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeMemory allocated: 1B0E0000 memory commit | memory reserve | memory write watchJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\ExpressVideoConverter.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
Virtualization/Sandbox Evasion
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Disable or Modify Tools
LSASS Memory12
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Software Packing
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1671514 Sample: ExpressVideoConverter.exe Startdate: 22/04/2025 Architecture: WINDOWS Score: 48 7 Multi AV Scanner detection for submitted file 2->7 5 ExpressVideoConverter.exe 2 2->5         started        process3

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
ExpressVideoConverter.exe8%VirustotalBrowse
ExpressVideoConverter.exe8%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://arjie89.000webhostapp.com/evc.php0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://arjie89.000webhostapp.com/evc.phpExpressVideoConverter.exefalse
  • Avira URL Cloud: safe
unknown
No contacted IP infos
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1671514
Start date and time:2025-04-22 23:31:11 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 0s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:11
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:ExpressVideoConverter.exe
Detection:MAL
Classification:mal48.winEXE@1/0@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 97%
  • Number of executed functions: 11
  • Number of non-executed functions: 1
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 184.29.183.29, 4.175.87.197
  • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, c.pki.goog, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target ExpressVideoConverter.exe, PID 6464 because it is empty
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtQueryValueKey calls found.
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
Entropy (8bit):7.8866783716425095
TrID:
  • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
  • Win32 Executable (generic) a (10002005/4) 49.75%
  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
  • Windows Screen Saver (13104/52) 0.07%
  • Win16/32 Executable Delphi generic (2074/23) 0.01%
File name:ExpressVideoConverter.exe
File size:275'456 bytes
MD5:9199fac04355998413a251ed0fac52be
SHA1:2a88f9c89383480c926f8ce726fe7f33fe71f473
SHA256:92b61a307ac342e66b3685d4d1f2b073ce3d47b92362e3aae65e7cedf523a562
SHA512:acd38de0585626198c33bd9e520930ffc8d65f2f43062fe4faff851c4c441d57e55088fb2a672afe046fc1e7b95069057e4107356b7e54562c341cc97f228b92
SSDEEP:6144:CueEdc/h2rqo0rclTAcKHgkU/B8ba5Od3pgCEL5U:Cueoyto9R4UKbasd3pREL
TLSH:2744126862E48F56EE7D0B38092A772003F8D95E872DE78B7CDE215D9FD2398431071A
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......c............................>5... ...@....@.. ....................................@................................
Icon Hash:0f395d8c1d313b0f
Entrypoint:0x44353e
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Time Stamp:0x63E1C5D9 [Tue Feb 7 03:30:33 2023 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
Instruction
jmp dword ptr [00402000h]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x434e80x53.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0x460000x1500.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x480000xc.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x440000x1c.sdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x20000x415440x41600454799a43e8b49a5c37569d732f1e5b5False0.9198770614244742data7.934585066242869IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.sdata0x440000xc00x20052f3df9f74e795dccadf307d53b372a4False0.298828125data2.670364923994363IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x460000x15000x1600c96019484c75cb160b024c1b7945f3b4False0.43110795454545453data4.647680885544932IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x480000xc0x200b14a33b8681c4c6ff3bad145981cd3d8False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0x464f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 1920.5777027027027027
RT_ICON0x466200x568Device independent bitmap graphic, 16 x 32 x 8, image size 3200.5505780346820809
RT_ICON0x46b880x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.5886524822695035
RT_GROUP_ICON0x46ff00x30data0.9375
RT_VERSION0x461900x368data0.39105504587155965
RT_MANIFEST0x470200x4dfXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.4041700080192462
DLLImport
mscoree.dll_CorExeMain
DescriptionData
Translation0x0000 0x04b0
CompanyNameMicrosoft
FileDescriptionExpress Video Converter
FileVersion1.0.0.0
InternalNameExpress Video Converter.exe
LegalCopyrightCopyright Microsoft 2023
OriginalFilenameExpress Video Converter.exe
ProductNameExpress Video Converter
ProductVersion1.0.0.0
Assembly Version1.0.0.0
No network behavior found
050100s020406080100

Click to jump to process

050100s0.0010203040MB

Click to jump to process

  • File
  • Registry

Click to dive into process behavior distribution

Target ID:0
Start time:17:32:02
Start date:22/04/2025
Path:C:\Users\user\Desktop\ExpressVideoConverter.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\ExpressVideoConverter.exe"
Imagebase:0xb00000
File size:275'456 bytes
MD5 hash:9199FAC04355998413A251ED0FAC52BE
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Executed Functions

Strings
Memory Dump Source
  • Source File: 00000000.00000002.2433488195.00007FF88B530000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88B530000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff88b530000_ExpressVideoConverter.jbxd
Similarity
  • API ID:
  • String ID: h1$h1$h1$h1
  • API String ID: 0-1019880495
  • Opcode ID: 93ef5cce80b77768f3bc4d43504850d39ea75e60dae9ec2bfda1f7702be80091
  • Instruction ID: 9a50301694380c1a7126d662e2f3f67253e1d6e30e65a856f71cfbb4b3dd3ba8
  • Opcode Fuzzy Hash: 93ef5cce80b77768f3bc4d43504850d39ea75e60dae9ec2bfda1f7702be80091
  • Instruction Fuzzy Hash: 2D63647061CB888FE7B5EB18C494B9AB7E1FF99301F454969D08DD72A2CF74A840CB52
Strings
Memory Dump Source
  • Source File: 00000000.00000002.2433488195.00007FF88B530000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88B530000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff88b530000_ExpressVideoConverter.jbxd
Similarity
  • API ID:
  • String ID: h1$h1$h1$h1
  • API String ID: 0-1019880495
  • Opcode ID: 73b4000a476aec53e86165dc57af35604b77cd996a004746ecd470b5d8777551
  • Instruction ID: 94e2576b36e95467e14f45c2c34c91d5d3ed70228911eaa5c43efb45fc4fad03
  • Opcode Fuzzy Hash: 73b4000a476aec53e86165dc57af35604b77cd996a004746ecd470b5d8777551
  • Instruction Fuzzy Hash: 8163647061CB888FE7B5EB18C494B9AB7E1FF99301F454969E08DD72A1CF74A840CB52
Strings
Memory Dump Source
  • Source File: 00000000.00000002.2433488195.00007FF88B530000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88B530000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff88b530000_ExpressVideoConverter.jbxd
Similarity
  • API ID:
  • String ID: `Y
  • API String ID: 0-3978992056
  • Opcode ID: e39ae25b7135d9233c95ba800d0747df3a696263b20b9290d9415ebe874ba759
  • Instruction ID: 50a86152909a91997acc83c658eb82fed6feeb777e5cda55a929a27d0e2c6c98
  • Opcode Fuzzy Hash: e39ae25b7135d9233c95ba800d0747df3a696263b20b9290d9415ebe874ba759
  • Instruction Fuzzy Hash: FD21657191DA899FD381DB289455725BFE0FF9A380F4409AAE08DC72B3DA24A844C712
Memory Dump Source
  • Source File: 00000000.00000002.2433488195.00007FF88B530000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88B530000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff88b530000_ExpressVideoConverter.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 4afd479738acaefca9cc0edfc41684f0d2c4d689997b447f51a5074b5a4a2a00
  • Instruction ID: 5934beab991c00d35d30d1eea772af998e5581d418134337a42bcfc2f2b255a3
  • Opcode Fuzzy Hash: 4afd479738acaefca9cc0edfc41684f0d2c4d689997b447f51a5074b5a4a2a00
  • Instruction Fuzzy Hash: 0581CD3061CBC88FD791EB28C495B5ABBE1FF9A340F5545A9E08DC7262DB34E844CB12
Memory Dump Source
  • Source File: 00000000.00000002.2433488195.00007FF88B530000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88B530000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff88b530000_ExpressVideoConverter.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 952555e7cf574c3559d5fa8bc4493c48e2bfe5ada477dc515184a6afb8fb298f
  • Instruction ID: 7c7541a9dc00afc919d5c3666485b4e8c0bd6ac3f0b7590947bb39f04aa35d07
  • Opcode Fuzzy Hash: 952555e7cf574c3559d5fa8bc4493c48e2bfe5ada477dc515184a6afb8fb298f
  • Instruction Fuzzy Hash: 51716170918A8D8FEBA1DF28C854BE97BE1FF5A340F544066E84DC72A2DB78D944CB01
Memory Dump Source
  • Source File: 00000000.00000002.2433488195.00007FF88B530000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88B530000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff88b530000_ExpressVideoConverter.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 90b2ad9015035c220477647f1e2b1f5647ef3e60cbd61973a815b24a9cd7797a
  • Instruction ID: 44ecf0c43854e7417574b15721d21d03ae39c4640540722dd2b187f55818c8d2
  • Opcode Fuzzy Hash: 90b2ad9015035c220477647f1e2b1f5647ef3e60cbd61973a815b24a9cd7797a
  • Instruction Fuzzy Hash: C351C770A18A8D8FEBA4EF6CC898BE977E1FF59341F544065E80DC7262DA34A941CB01
Memory Dump Source
  • Source File: 00000000.00000002.2433488195.00007FF88B530000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88B530000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff88b530000_ExpressVideoConverter.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 7547498340ebdba567be94715ef3d78f26b0345bdd5e03d14f9ad3d2ed8f1e2b
  • Instruction ID: 6deadad2fb64e0b50793ffad92b97410928d36d33926e28b6c76e5a1f9ae12f1
  • Opcode Fuzzy Hash: 7547498340ebdba567be94715ef3d78f26b0345bdd5e03d14f9ad3d2ed8f1e2b
  • Instruction Fuzzy Hash: 3D41B46194C98E5FEB81EF28CC917E93BE1FF5A380F4501A6E84DC72A3DA64E845C741
Memory Dump Source
  • Source File: 00000000.00000002.2433488195.00007FF88B530000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88B530000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff88b530000_ExpressVideoConverter.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: c4dc3adb435f167808a4dfef3f956a42e77fbb6091d931d2ba3c2b8a87999ebb
  • Instruction ID: 7621c7eb7aac07a3435bb96932cef4b2e7dba24e671e1bcfde8e038ea5843886
  • Opcode Fuzzy Hash: c4dc3adb435f167808a4dfef3f956a42e77fbb6091d931d2ba3c2b8a87999ebb
  • Instruction Fuzzy Hash: 04417370919A8D9FEB81EF68C851BA87BE1FF5A340F8514A5F449C72A3DA78E840C741
Memory Dump Source
  • Source File: 00000000.00000002.2433488195.00007FF88B530000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88B530000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff88b530000_ExpressVideoConverter.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 934c54e2627de85245da27f3e983477bb4e604e47df6af975403f93ebab4e765
  • Instruction ID: aaa992a9bab59598150029bfc7f6ffd36d626fbd6d413746a677dfdca3a80a25
  • Opcode Fuzzy Hash: 934c54e2627de85245da27f3e983477bb4e604e47df6af975403f93ebab4e765
  • Instruction Fuzzy Hash: 9A01C461C5CACE5FEB01AF249C517F93BA0FF5B280F4804A6E44DDB2A3DA28A505C351
Memory Dump Source
  • Source File: 00000000.00000002.2433260012.00007FF88B3EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88B3EA000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff88b3ea000_ExpressVideoConverter.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: bf0439df506c063a7ae3b6bab11ad0799d1448a1deb852ed6d09963c368ff16b
  • Instruction ID: f401f3e78be5d1567bc2d7413a4b1bf4ede846a6403592e7ce99a88d46681f64
  • Opcode Fuzzy Hash: bf0439df506c063a7ae3b6bab11ad0799d1448a1deb852ed6d09963c368ff16b
  • Instruction Fuzzy Hash: 56116D3250CE088FDBA8EF6EE886D5277E0FB98360710059BD409C7566D631F895CB91
Memory Dump Source
  • Source File: 00000000.00000002.2433488195.00007FF88B530000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88B530000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff88b530000_ExpressVideoConverter.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 4eab1a439cfe8a2a4382ad7ddc3014df76bbbde2a9888ed667419355c611c299
  • Instruction ID: f9cc42b1ad14f91babf28dfe1bf534b533082318d250bcf8e37719887561ad01
  • Opcode Fuzzy Hash: 4eab1a439cfe8a2a4382ad7ddc3014df76bbbde2a9888ed667419355c611c299
  • Instruction Fuzzy Hash: EE01756194DBC95FE381DB1C88047257FE0FF9A280F4905AAE0CCC73B3D6289945C712

Non-executed Functions

Memory Dump Source
  • Source File: 00000000.00000002.2433488195.00007FF88B530000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88B530000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff88b530000_ExpressVideoConverter.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 0f56de75a46d6a2dfa2b181a58b8c649d3a40c34e690d8e1eb770e8acc7792e2
  • Instruction ID: 8bc9dff465f9276f556ab89a7e84cd81a737688f427709c262463cba0f65fde7
  • Opcode Fuzzy Hash: 0f56de75a46d6a2dfa2b181a58b8c649d3a40c34e690d8e1eb770e8acc7792e2
  • Instruction Fuzzy Hash: 2B71FC3461D7898FD791EB28C455B6ABBE0FF9A341F4409ADE0C9C72A2CA24D944CB13