Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
4wauxstb.dll

Overview

General Information

Sample name:4wauxstb.dll
Analysis ID:1520419
MD5:22ae719e91b4bfcdf6122d3e2a0f272e
SHA1:99df98dfef4b483889fa88162d20ee46340a5dbe
SHA256:2529f6465570ac7f0b82613c694181cc10515ee045cfaa48dd7402e9b9d791bf
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
One or more processes crash
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7380 cmdline: loaddll32.exe "C:\Users\user\Desktop\4wauxstb.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7388 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7432 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\4wauxstb.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7456 cmdline: rundll32.exe "C:\Users\user\Desktop\4wauxstb.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7440 cmdline: rundll32.exe C:\Users\user\Desktop\4wauxstb.dll,#50 MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 7544 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7440 -s 596 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 7660 cmdline: rundll32.exe "C:\Users\user\Desktop\4wauxstb.dll",#50 MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 7704 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7660 -s 596 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 4wauxstb.dllReversingLabs: Detection: 28%
Source: 4wauxstb.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
Source: 4wauxstb.dllStatic PE information: certificate valid
Source: Binary string: C:\boneyard\whitelisting\ForMigration\templatebar2,3,85,5\Variations\TemplateBar\Release.AuxStub\m3AuxStb.pdb source: 4wauxstb.dll
Source: unknownDNS traffic detected: query: 198.187.3.20.in-addr.arpa replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
Source: 4wauxstb.dllString found in binary or memory: http://ak.results.myway.com/mw_eula.html0
Source: Amcache.hve.7.drString found in binary or memory: http://upx.sf.net
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7440 -s 596
Source: 4wauxstb.dllBinary or memory string: OriginalFilenamet8AuxStb.DLLV vs 4wauxstb.dll
Source: 4wauxstb.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
Source: classification engineClassification label: mal48.winDLL@12/9@1/0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10001447 FindResourceA,LoadResource,LockResource,3_2_10001447
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7440
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7660
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7388:120:WilError_03
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\f49bc078-3baa-4d28-8896-35c876e2391dJump to behavior
Source: 4wauxstb.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\4wauxstb.dll,#50
Source: 4wauxstb.dllReversingLabs: Detection: 28%
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\4wauxstb.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\4wauxstb.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\4wauxstb.dll,#50
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\4wauxstb.dll",#1
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7440 -s 596
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\4wauxstb.dll",#50
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7660 -s 596
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\4wauxstb.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\4wauxstb.dll,#50Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\4wauxstb.dll",#50Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\4wauxstb.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: 4wauxstb.dllStatic PE information: certificate valid
Source: 4wauxstb.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\boneyard\whitelisting\ForMigration\templatebar2,3,85,5\Variations\TemplateBar\Release.AuxStub\m3AuxStb.pdb source: 4wauxstb.dll
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: Amcache.hve.7.drBinary or memory string: VMware
Source: Amcache.hve.7.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.7.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.7.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.7.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.7.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.7.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.7.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.7.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.7.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.7.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.7.drBinary or memory string: vmci.sys
Source: Amcache.hve.7.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.7.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.7.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.7.drBinary or memory string: VMware20,1
Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.7.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.7.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.7.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.7.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.7.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.7.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.7.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.7.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.7.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10001792 GetProcessHeap,HeapReAlloc,3_2_10001792
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\4wauxstb.dll",#1Jump to behavior
Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.7.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.7.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.7.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
1
Rundll32
OS Credential Dumping31
Security Software Discovery
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
11
Virtualization/Sandbox Evasion
LSASS Memory11
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1520419 Sample: 4wauxstb.dll Startdate: 27/09/2024 Architecture: WINDOWS Score: 48 24 198.187.3.20.in-addr.arpa 2->24 26 Multi AV Scanner detection for submitted file 2->26 8 loaddll32.exe 1 2->8         started        signatures3 process4 process5 10 cmd.exe 1 8->10         started        12 rundll32.exe 8->12         started        14 rundll32.exe 8->14         started        16 conhost.exe 8->16         started        process6 18 rundll32.exe 10->18         started        20 WerFault.exe 22 16 12->20         started        22 WerFault.exe 16 14->22         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
4wauxstb.dll29%ReversingLabsWin32.PUA.MyWebSearch
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
198.187.3.20.in-addr.arpa
unknown
unknownfalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://upx.sf.netAmcache.hve.7.drfalse
    • URL Reputation: safe
    unknown
    http://ak.results.myway.com/mw_eula.html04wauxstb.dllfalse
      unknown
      No contacted IP infos
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1520419
      Start date and time:2024-09-27 10:47:38 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 33s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:15
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:4wauxstb.dll
      Detection:MAL
      Classification:mal48.winDLL@12/9@1/0
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 3
      • Number of non-executed functions: 2
      Cookbook Comments:
      • Found application associated with file extension: .dll
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 20.42.65.92
      • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • VT rate limit hit for: 4wauxstb.dll
      TimeTypeDescription
      04:48:33API Interceptor1x Sleep call for process: loaddll32.exe modified
      04:48:48API Interceptor2x Sleep call for process: WerFault.exe modified
      No context
      No context
      No context
      No context
      No context
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.8292068553821702
      Encrypted:false
      SSDEEP:192:7PDihTOWi0y6LEjjeTWzuiFxZ24IO8dci:LDi8Wpy6LEjjeizuiFxY4IO8dci
      MD5:80A6BFF5B2BAF91D3973E693EEEF742F
      SHA1:8A31512242184F2B36AA8844F159BEA0E8B09D1A
      SHA-256:C23E9FFB47FD4FB3A6FB9275284DA0F12F78AB907BF50CF1985009AAC5493402
      SHA-512:04EE8B454C14EB5E04ECE251B7E4CA751A871AF48ADE5A5A6AE1A70BE38E2B14479F65B0AFAF6E2A009B018470097873510482466E651EB5837D22862D8C2651
      Malicious:false
      Reputation:low
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.9.0.0.5.1.3.4.9.0.6.9.8.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.1.9.0.0.5.1.4.1.0.0.0.6.7.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.e.3.5.a.7.0.d.-.9.5.d.a.-.4.0.5.3.-.a.6.5.d.-.1.b.a.e.e.6.f.9.7.0.0.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.c.2.e.2.f.3.1.-.7.c.9.c.-.4.9.1.1.-.a.1.0.8.-.8.2.d.8.7.a.9.3.a.7.4.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.e.c.-.0.0.0.1.-.0.0.1.4.-.f.5.a.2.-.8.8.0.8.b.a.1.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.8291501230106552
      Encrypted:false
      SSDEEP:192:EAi+TOAdq0oDW4BRjeTWzuiFxZ24IO8dci:TitixOfBRjeizuiFxY4IO8dci
      MD5:DBB4B6D841949E9B040B6738D52D4E9C
      SHA1:8542B874DDF928C718BCD271D74567D9E1D9F060
      SHA-256:16FACF67F870FDECC5C9C745E2270F7CC0229F93D48584085F5B3B5972ECAB6F
      SHA-512:83301B14F0CC8E0C5A2897EE074A56CB29BDBC7242B4C2C6E6BB227644F7111A18228EC06A2AAB450F65CAF97131DE07A3EB7CB1B6C3CDF8F0C1969E46523363
      Malicious:false
      Reputation:low
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.9.0.0.5.1.0.7.4.7.6.2.0.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.1.9.0.0.5.1.1.3.8.8.2.4.5.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.3.e.5.5.f.1.3.-.f.1.2.d.-.4.f.e.0.-.9.0.0.c.-.a.3.8.3.a.4.c.7.8.2.7.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.e.8.e.1.3.c.b.-.a.c.a.a.-.4.6.d.2.-.9.7.6.b.-.9.4.a.e.e.6.7.2.0.3.a.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.1.0.-.0.0.0.1.-.0.0.1.4.-.8.d.9.5.-.b.b.0.6.b.a.1.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Mini DuMP crash report, 14 streams, Fri Sep 27 08:48:30 2024, 0x1205a4 type
      Category:dropped
      Size (bytes):285592
      Entropy (8bit):2.557863760494463
      Encrypted:false
      SSDEEP:1536:Bz+878iR/Thq1aFblIRjWVV25q9KAtkAnO1BF/tQ:zb7cgm0V25MKHpQ
      MD5:899643B89AB74A6992427F6FE1C8620E
      SHA1:5EB3C8162B1193EB9A0C2F95543B6FDEF678C8FB
      SHA-256:D456D5165142395A6AA8FCB19178F6FEAFF7A2801EF27AAE650F4F6DE05A37BC
      SHA-512:09A4B29159C51F9B9B980AA5CE4F1EA527C8D08829E1890439F062D2A7482E03457F036D87F68C0806FAD456EDAC5FE2467ED442E77D76FD9F2176AF79302084
      Malicious:false
      Reputation:low
      Preview:MDMP..a..... .......^q.f.........................................&..........T.......8...........T................D......................x...............................................................................eJ..............GenuineIntel............T...........^q.f.............................0..1...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):8270
      Entropy (8bit):3.691711280356437
      Encrypted:false
      SSDEEP:192:R6l7wVeJ6/6uP8+6Yur68PgmfTRJiqufepDT89bc1sfn0m:R6lXJy6uP8+6Yy68PgmfTRJidPcOfB
      MD5:9CA6603D152D564A6DE77822FC8209D2
      SHA1:EB88417DDB0C1518BE4EDF8A82C0876F691F7A13
      SHA-256:67E94F186B58DA6B88662345FED644DE60C9449CE16E7993C1D39CEED7EDC8D1
      SHA-512:4EC719C137FA89F548950539ED9771B777F2E500485ECF1402B3A33ECF943622431F3333D1570BF88DC870E6A2B84C50C749612B984D53C782728EBC79A75CDE
      Malicious:false
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.4.4.0.<./.P.i.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4656
      Entropy (8bit):4.457277209358839
      Encrypted:false
      SSDEEP:48:cvIwWl8zsHJg77aI9yNWpW8VYjkLYm8M4JCdP9FAd6+q8/pWtFGScSFd:uIjfpI7I87VROJ16LfJ3Fd
      MD5:B74B17A21C16CCA8F63C1F269CF274DC
      SHA1:8C7EAC40E0832008F9869D8A65BF5A907FF4A2D3
      SHA-256:66F4DBFE5B1564CAE651778AFE943E5BC8122DC59CE0BDEB4B2F78FD5C7FE337
      SHA-512:3FF312C2C51AA23AC839612CC052DCAD6B23AF1D939CE4AB5EAD6E24FCE5D614F9CFC8B9C319496D10A65C07A8CE1E45EF8DB103F724958BFE95D9720FD2CF3F
      Malicious:false
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="518391" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Mini DuMP crash report, 14 streams, Fri Sep 27 08:48:33 2024, 0x1205a4 type
      Category:dropped
      Size (bytes):285848
      Entropy (8bit):2.5419433406859135
      Encrypted:false
      SSDEEP:768:1P5KQ/E4OD7noY0AB/69DHAOfqf4RWC4NKoWwagqNhEgizexENVpa1u4Lz:1MQ/EZb0D9fFoNKf/NygiKENH4Lz
      MD5:D7B308131E4B2B07E6ECE0213184FFE7
      SHA1:7EA7B01A6E8E208F15570A21B80B3531A883432E
      SHA-256:B3CA5066FBDBDDB4802770C8590809DA3A3D875306E123E311AFB613D373FA34
      SHA-512:5602D4487AC09E2C5D9862671DD33473A7C818D26672E69EF908AD84DD24DC43C223F21EEAE82E04AFC613A1AE8AB2E4332848DFC011D393FF0BF6D05E67B075
      Malicious:false
      Preview:MDMP..a..... .......aq.f.........................................&..........T.......8...........T................E......................x...............................................................................eJ..............GenuineIntel............T...........aq.f.............................0..1...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):8250
      Entropy (8bit):3.692640339936544
      Encrypted:false
      SSDEEP:192:R6l7wVeJKp6x6Y+p6wgmfTRJKzSZpDT89bOOsf2Sam:R6lXJs6x6YQ6wgmfTRJKzDONf2m
      MD5:3062B1DCD8DB6518CA99FD192A7BCA92
      SHA1:DC2527D8CED5B028D38B95B38262839DC6CD9A44
      SHA-256:A6251F9E6A7A29045BE1E06E9783E606710E2DA2D1E08892F8A32CCCA6F0C245
      SHA-512:0A5A7DE46A253E1E031EC5EE7F020C6CEEB082A7FC5A5AD16CEB1A33F9030F2AC600E35CB72CC036C24A422CC0BE47C55D9224F0D2430EF1D7CE3611EC1623A5
      Malicious:false
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.6.6.0.<./.P.i.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4656
      Entropy (8bit):4.458768553229512
      Encrypted:false
      SSDEEP:48:cvIwWl8zsHJg77aI9yNWpW8VYjkiYm8M4JCdPHFwSo+q8/p83sGScSed:uIjfpI7I87VRLJyodsJ3ed
      MD5:F9A17A7D45F32171FD3AF14478C91F4B
      SHA1:3AA99C55EB00B466108616FC36771396C6604D20
      SHA-256:A750B479DAEF94E6F56149BC979C67E4CD7887245E4FB6689D228317148CC684
      SHA-512:45B036FDA7B1C6FAD318E3CD2F8D021CDDECD13B6136EE1A24E44A1FE68DA326540F6323A69FF11D7C0EA83955846357206AB7F43E9AAF288EA79E444ED4F564
      Malicious:false
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="518391" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:MS Windows registry file, NT/2000 or above
      Category:dropped
      Size (bytes):1835008
      Entropy (8bit):4.4662420991461556
      Encrypted:false
      SSDEEP:6144:oIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNxdwBCswSbG:9XD94+WlLZMM6YFHT+G
      MD5:FFA41D60D0488BE4A8E2B67D83A9DD10
      SHA1:83B2AEC6B952AFB60A106CDE710F7CED905B9A66
      SHA-256:CA3550654BE9F447F62E92B0098C48BD391D8D84F63511A8713E54B19831E601
      SHA-512:13484BC79E41F18752A69F8CD3BD7E2AEA22BF2E73A3A7AF809FD8433A534C138E8A73D1543716A31A6CB6ADD76C68FE1DF4FAC36F527CA56B5667E253329721
      Malicious:false
      Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.....................................................................................................................................................................................................................................................................................................................................................J.3........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Entropy (8bit):3.0983150597192086
      TrID:
      • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
      • Generic Win/DOS Executable (2004/3) 0.20%
      • DOS Executable Generic (2002/1) 0.20%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:4wauxstb.dll
      File size:30'224 bytes
      MD5:22ae719e91b4bfcdf6122d3e2a0f272e
      SHA1:99df98dfef4b483889fa88162d20ee46340a5dbe
      SHA256:2529f6465570ac7f0b82613c694181cc10515ee045cfaa48dd7402e9b9d791bf
      SHA512:61028e30c28501f0c18c00ec8888cec3eade43b823a545608fc6ee9c6c2529723b5bede0cb2d4a016562a8ad4a59b1cf2b6ed00d1f745387ef9f15b05b63ce8f
      SSDEEP:192:tcQrn/AP13N7YWklwzW+5eWaJZByowJL/8Qpkqs1ISSxC+ebCf3ET/:aLr7elwzW+5eWkYJLu1gx0bC
      TLSH:08D23A731B5418F2ED864F39A5E2D5A79E31F6842FD4900F427544862E52FA3AF2D30B
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......e...!...!...!...!...3...C...".......%....... ....... ...Rich!...................PE..L...;..M...........!.........@.............
      Icon Hash:7ae282899bbab082
      Entrypoint:0x100016b1
      Entrypoint Section:.text
      Digitally signed:true
      Imagebase:0x10000000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
      DLL Characteristics:
      Time Stamp:0x4DCCD63B [Fri May 13 06:56:59 2011 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:6ebc726cea13165ecab2cbba28e816f9
      Signature Valid:true
      Signature Issuer:CN=VeriSign Class 3 Code Signing 2009-2 CA, OU=Terms of use at https://www.verisign.com/rpa (c)09, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
      Signature Validation Error:The operation completed successfully
      Error Number:0
      Not Before, Not After
      • 31/05/2010 01:00:00 07/05/2012 00:59:59
      Subject Chain
      • CN=Mindspark Interactive Network, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Mindspark Interactive Network, L=White Plains, S=NewYork, C=US
      Version:3
      Thumbprint MD5:948EB00564165277EF51187B065D8FF1
      Thumbprint SHA-1:9FCB24A7661183FCB8AD11F8EDF81351886CFC18
      Thumbprint SHA-256:E1AFB266B11E757501CEAEF6C3D353664E386A011366D571D60E19107217A569
      Serial:41730EB0E6D92A476E16628A0DBEFB36
      Instruction
      push ebp
      mov ebp, esp
      cmp dword ptr [ebp+0Ch], 01h
      push esi
      mov esi, dword ptr [ebp+08h]
      jne 00007FE6B4B3F93Dh
      mov dword ptr [1000307Ch], esi
      call 00007FE6B4B3F955h
      push dword ptr [ebp+10h]
      push dword ptr [ebp+0Ch]
      push esi
      call 00007FE6B4B3F4CCh
      cmp dword ptr [ebp+0Ch], 00000000h
      mov esi, eax
      jne 00007FE6B4B3F937h
      call 00007FE6B4B3F973h
      mov eax, esi
      pop esi
      pop ebp
      retn 000Ch
      push 10003058h
      call dword ptr [10002024h]
      push 1000300Ch
      push 10003000h
      call 00007FE6B4B3F938h
      pop ecx
      pop ecx
      ret
      push esi
      mov esi, dword ptr [esp+08h]
      cmp esi, dword ptr [esp+0Ch]
      jnc 00007FE6B4B3F93Fh
      mov eax, dword ptr [esi]
      test eax, eax
      je 00007FE6B4B3F934h
      call eax
      add esi, 04h
      jmp 00007FE6B4B3F91Fh
      pop esi
      ret
      mov eax, dword ptr [10003078h]
      test eax, eax
      je 00007FE6B4B3F961h
      mov ecx, dword ptr [10003074h]
      push esi
      lea esi, dword ptr [ecx-04h]
      cmp esi, eax
      jc 00007FE6B4B3F944h
      mov ecx, dword ptr [esi]
      test ecx, ecx
      je 00007FE6B4B3F939h
      call ecx
      mov eax, dword ptr [10003078h]
      sub esi, 04h
      jmp 00007FE6B4B3F91Ch
      push eax
      call 00007FE6B4B3F99Eh
      and dword ptr [10003078h], 00000000h
      pop ecx
      pop esi
      push 10003058h
      call dword ptr [10002028h]
      ret
      call dword ptr [1000202Ch]
      xor eax, eax
      ret
      push dword ptr [esp+04h]
      push 00000000h
      call dword ptr [10002034h]
      Programming Language:
      • [C++] VS98 (6.0) SP6 build 8804
      • [EXP] VC++ 6.0 SP5 build 8804
      • [LNK] VC++ 6.0 SP5 build 8804
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x22300x39.rdata
      IMAGE_DIRECTORY_ENTRY_IMPORT0x206c0x28.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x378.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x60800x1590
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x50000xfc.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x20500x1c.rdata
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x20000x4c.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000xa6e0x100063e998aa9efe66d70007ee8548d27c82False0.4228515625data4.625876643362434IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x20000x2690x10006ccc470c62d83fa83028353a96253e8fFalse0.085693359375data1.0049624221597946IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0x30000x1cc0x1000f9d102e1f5b79d917493cfae84ba29f8False0.018310546875Matlab v4 mat-file (little endian) r, numeric, rows 268439580, columns 2684397060.10296095381598219IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rsrc0x40000x3780x1000c2c3a05e9091faf421f4a9bd86c6db4dFalse0.099609375data0.9234546394898066IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0x50000x1120x10008682280eb989a874cf744a26ed1cd33aFalse0.069091796875data0.6593276392044951IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_VERSION0x40600x314dataEnglishUnited States0.4517766497461929
      DLLImport
      KERNEL32.dllGetProcAddress, FreeLibrary, LoadLibraryExA, lstrcpyA, GetModuleFileNameA, LockResource, LoadResource, FindResourceA, lstrlenA, InitializeCriticalSection, DeleteCriticalSection, DebugBreak, HeapAlloc, GetProcessHeap, HeapReAlloc, HeapFree, LeaveCriticalSection, EnterCriticalSection
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      TimestampSource PortDest PortSource IPDest IP
      Sep 27, 2024 10:49:02.244692087 CEST5358926162.159.36.2192.168.2.4
      Sep 27, 2024 10:49:02.729120016 CEST5426653192.168.2.41.1.1.1
      Sep 27, 2024 10:49:02.736227989 CEST53542661.1.1.1192.168.2.4
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Sep 27, 2024 10:49:02.729120016 CEST192.168.2.41.1.1.10x8147Standard query (0)198.187.3.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Sep 27, 2024 10:49:02.736227989 CEST1.1.1.1192.168.2.40x8147Name error (3)198.187.3.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:04:48:29
      Start date:27/09/2024
      Path:C:\Windows\System32\loaddll32.exe
      Wow64 process (32bit):true
      Commandline:loaddll32.exe "C:\Users\user\Desktop\4wauxstb.dll"
      Imagebase:0xe20000
      File size:126'464 bytes
      MD5 hash:51E6071F9CBA48E79F10C84515AAE618
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:1
      Start time:04:48:29
      Start date:27/09/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff7699e0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:2
      Start time:04:48:30
      Start date:27/09/2024
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\4wauxstb.dll",#1
      Imagebase:0x240000
      File size:236'544 bytes
      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:3
      Start time:04:48:30
      Start date:27/09/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe C:\Users\user\Desktop\4wauxstb.dll,#50
      Imagebase:0xd30000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:4
      Start time:04:48:30
      Start date:27/09/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Users\user\Desktop\4wauxstb.dll",#1
      Imagebase:0xd30000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:7
      Start time:04:48:30
      Start date:27/09/2024
      Path:C:\Windows\SysWOW64\WerFault.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7440 -s 596
      Imagebase:0x660000
      File size:483'680 bytes
      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:8
      Start time:04:48:33
      Start date:27/09/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Users\user\Desktop\4wauxstb.dll",#50
      Imagebase:0xd30000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:10
      Start time:04:48:33
      Start date:27/09/2024
      Path:C:\Windows\SysWOW64\WerFault.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7660 -s 596
      Imagebase:0x660000
      File size:483'680 bytes
      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Reset < >

        Execution Graph

        Execution Coverage:22%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:0%
        Total number of Nodes:56
        Total number of Limit Nodes:3
        execution_graph 370 10001781 373 1000176d GetProcessHeap HeapAlloc 370->373 372 10001790 373->372 374 10001661 375 10001675 374->375 376 1000166a 374->376 378 100017de 376->378 381 100017b8 378->381 382 100017d2 381->382 383 100017bf GetProcessHeap HeapFree 381->383 382->375 383->382 384 100016b1 385 100016c9 384->385 386 100016be 384->386 394 1000126c 385->394 392 100016e9 InitializeCriticalSection 386->392 390 100016e2 393 10001703 392->393 393->385 395 10001273 394->395 396 10001285 394->396 405 100012a9 395->405 398 10001282 396->398 409 100012d4 396->409 398->390 400 10001720 398->400 401 10001758 DeleteCriticalSection 400->401 402 10001729 400->402 401->390 403 100017b8 2 API calls 402->403 404 1000174f 403->404 404->401 406 100012b2 405->406 407 100012c2 405->407 415 10001302 GetModuleFileNameA 406->415 407->398 410 100012eb 409->410 411 100012dd 409->411 413 10001301 410->413 414 100012fa FreeLibrary 410->414 412 10001302 6 API calls 411->412 412->410 413->398 414->413 416 10001328 415->416 417 1000139d 415->417 418 1000180b lstrlenA 416->418 417->407 419 10001330 418->419 419->417 420 10001338 lstrcpyA LoadLibraryExA 419->420 420->417 421 10001358 GetModuleFileNameA 420->421 422 1000180b lstrlenA 421->422 423 1000137b LoadLibraryExA 422->423 423->417 358 10001302 GetModuleFileNameA 359 10001328 358->359 360 1000139d 358->360 368 1000180b lstrlenA 359->368 363 10001338 lstrcpyA LoadLibraryExA 363->360 364 10001358 GetModuleFileNameA 363->364 365 1000180b lstrlenA 364->365 366 1000137b LoadLibraryExA 365->366 366->360 369 10001330 368->369 369->360 369->363 425 10001677 426 10001680 425->426 428 1000168b 425->428 427 100017de 2 API calls 426->427 427->428

        Callgraph

        • Executed
        • Not Executed
        • Opacity -> Relevance
        • Disassembly available
        callgraph 0 Function_10001000 1 Function_10001781 46 Function_1000176D 1->46 2 Function_10001302 7 Function_1000180B 2->7 3 Function_10001984 11 Function_10001792 3->11 4 Function_10001505 5 Function_10001706 6 Function_10001086 31 Function_10001038 6->31 8 Function_1000160D 18 Function_1000169C 8->18 27 Function_10001532 8->27 47 Function_10001972 8->47 9 Function_1000168D 10 Function_1000188E 11->46 12 Function_10001514 13 Function_10001297 13->12 14 Function_1000109A 22 Function_100010A4 14->22 15 Function_1000189A 16 Function_1000149B 35 Function_100014C8 16->35 17 Function_1000191B 52 Function_1000187C 17->52 19 Function_1000101C 23 Function_10001026 19->23 20 Function_10001720 30 Function_100017B8 20->30 21 Function_10001523 22->6 23->0 24 Function_100012A9 24->2 25 Function_100013AA 25->16 25->27 40 Function_100017DE 25->40 26 Function_100016B1 26->20 43 Function_100016E9 26->43 45 Function_1000126C 26->45 36 Function_100017D3 27->36 42 Function_100017E9 27->42 28 Function_100010B3 28->4 28->8 28->13 28->25 32 Function_100015B9 28->32 37 Function_100011D4 28->37 28->40 48 Function_100011F4 28->48 49 Function_100013F5 28->49 29 Function_10001833 32->9 32->27 32->47 33 Function_100018BE 34 Function_10001447 34->2 35->36 35->42 36->46 37->28 38 Function_100012D4 38->2 39 Function_100018D5 39->15 39->33 40->30 41 Function_10001661 41->40 43->5 44 Function_1000176A 45->24 45->38 47->3 48->7 48->37 49->16 49->21 49->34 49->40 50 Function_100018F6 50->52 51 Function_10001677 51->40

        Control-flow Graph

        APIs
        • GetModuleFileNameA.KERNEL32(?,C:\Users\user\Desktop\4wres.dll,00000104,?,?,?,00000000), ref: 1000131E
          • Part of subcall function 1000180B: lstrlenA.KERNEL32(?,C:\Users\user\Desktop\4wres.dll,10001330,C:\Users\user\Desktop\4wres.dll,0000005C,?,?,?,00000000), ref: 10001811
        • lstrcpyA.KERNEL32(00000001,t8res.dll,?,?,?,00000000), ref: 10001341
        • LoadLibraryExA.KERNELBASE(C:\Users\user\Desktop\4wres.dll,00000000,00000002,?,?,?,00000000), ref: 10001352
        • GetModuleFileNameA.KERNEL32(?,?,00000104,?,?,?,00000000), ref: 10001369
        • LoadLibraryExA.KERNELBASE(C:\Users\user\Desktop\4wres.dll,00000000,00000002,?,?,?,00000000), ref: 10001397
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.1867760732.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
        • Associated: 00000003.00000002.1867744541.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.1867779827.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.1867799140.0000000010003000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.1867817612.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
        Similarity
        • API ID: FileLibraryLoadModuleName$lstrcpylstrlen
        • String ID: C:\Users\user\Desktop\4wres.dll$t8res.dll
        • API String ID: 1941188506-343812953
        • Opcode ID: 886cca80de3aa001887236f1dead0c4ab8e56d35035777e94b3186a18b19c43a
        • Instruction ID: 013a9606494761160500bb1e431852ed4ab7effee52b232657d235283668686a
        • Opcode Fuzzy Hash: 886cca80de3aa001887236f1dead0c4ab8e56d35035777e94b3186a18b19c43a
        • Instruction Fuzzy Hash: B211E53A209357BBF321D7609C86FE77BECEF453D1F014465F690D6486DAA0D5188760

        Control-flow Graph

        APIs
        • GetModuleFileNameA.KERNEL32(?,000000F8), ref: 10001212
          • Part of subcall function 1000180B: lstrlenA.KERNEL32(?,C:\Users\user\Desktop\4wres.dll,10001330,C:\Users\user\Desktop\4wres.dll,0000005C,?,?,?,00000000), ref: 10001811
        • KiUserExceptionDispatcher.NTDLL(00000001,?), ref: 10001235
        • LoadLibraryExA.KERNEL32(?,00000000,00000008), ref: 10001245
          • Part of subcall function 100011D4: GetProcAddress.KERNEL32(00000000,00000032), ref: 100011E1
        • FreeLibrary.KERNEL32(00000000), ref: 1000125D
        Memory Dump Source
        • Source File: 00000003.00000002.1867760732.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
        • Associated: 00000003.00000002.1867744541.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.1867779827.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.1867799140.0000000010003000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.1867817612.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
        Similarity
        • API ID: Library$AddressDispatcherExceptionFileFreeLoadModuleNameProcUserlstrlen
        • String ID:
        • API String ID: 1235663815-0
        • Opcode ID: 5ed39e6bcd4a0199278d4a0e4bfddc7a5ff6daf523227ca519120504941755cf
        • Instruction ID: e12ade2416b2b8f881d2cdf7cd6ee05ce41f15c0b2287eab36968b335e766cfd
        • Opcode Fuzzy Hash: 5ed39e6bcd4a0199278d4a0e4bfddc7a5ff6daf523227ca519120504941755cf
        • Instruction Fuzzy Hash: 3BF0AF76605625ABFA21D7B0AC88BDB37ACDF057D5F000021FA81E6089DA74CA948B90

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 83 100011d4-100011d9 84 100011f1-100011f3 83->84 85 100011db-100011e9 GetProcAddress 83->85 85->84 86 100011eb call 100010b3 85->86 87 100011ed-100011f0 86->87
        APIs
        • GetProcAddress.KERNEL32(00000000,00000032), ref: 100011E1
        Memory Dump Source
        • Source File: 00000003.00000002.1867760732.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
        • Associated: 00000003.00000002.1867744541.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.1867779827.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.1867799140.0000000010003000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.1867817612.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
        Similarity
        • API ID: AddressProc
        • String ID:
        • API String ID: 190572456-0
        • Opcode ID: bdee9390e94cb4023d6a4f1cb6ca37b6a24ef073f27ede136e53c00b5eace5f3
        • Instruction ID: 3544e950ed3657740f22e8dd0b354c160d28ba24a04c1f2f4dbc2c01eb300f1a
        • Opcode Fuzzy Hash: bdee9390e94cb4023d6a4f1cb6ca37b6a24ef073f27ede136e53c00b5eace5f3
        • Instruction Fuzzy Hash: 48C00270355301BAFA559B608C857AA76D5AB80BC2F008868B645D50E9DBB58D82E511

        Control-flow Graph

        APIs
          • Part of subcall function 10001302: GetModuleFileNameA.KERNEL32(?,C:\Users\user\Desktop\4wres.dll,00000104,?,?,?,00000000), ref: 1000131E
          • Part of subcall function 10001302: lstrcpyA.KERNEL32(00000001,t8res.dll,?,?,?,00000000), ref: 10001341
          • Part of subcall function 10001302: LoadLibraryExA.KERNELBASE(C:\Users\user\Desktop\4wres.dll,00000000,00000002,?,?,?,00000000), ref: 10001352
          • Part of subcall function 10001302: GetModuleFileNameA.KERNEL32(?,?,00000104,?,?,?,00000000), ref: 10001369
          • Part of subcall function 10001302: LoadLibraryExA.KERNELBASE(C:\Users\user\Desktop\4wres.dll,00000000,00000002,?,?,?,00000000), ref: 10001397
        • FindResourceA.KERNEL32(00000000,?,0000000A), ref: 1000147C
        • LoadResource.KERNEL32(00000000,00000000,?,10001411,00000001,?,?,?,1000118D,?), ref: 10001488
        • LockResource.KERNEL32(00000000,?,10001411,00000001,?,?,?,1000118D,?), ref: 10001493
        Memory Dump Source
        • Source File: 00000003.00000002.1867760732.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
        • Associated: 00000003.00000002.1867744541.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.1867779827.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.1867799140.0000000010003000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.1867817612.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
        Similarity
        • API ID: LoadResource$FileLibraryModuleName$FindLocklstrcpy
        • String ID:
        • API String ID: 3696948136-0
        • Opcode ID: aed8b01c7a7f7b8bbe029595ede3559f220abab9367200c637a53f84fa2a4380
        • Instruction ID: a16a24c0636fcd78ea197a0ae47350010cc02528f2912d3680dff2fda699096b
        • Opcode Fuzzy Hash: aed8b01c7a7f7b8bbe029595ede3559f220abab9367200c637a53f84fa2a4380
        • Instruction Fuzzy Hash: A5F06D316983706AF7529B35ACC8BEB3BDCEB0A7D5F058005F944D10BDC7658885E2A2

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 112 10001792-1000179b 113 100017a4-100017b7 GetProcessHeap HeapReAlloc 112->113 114 1000179d 112->114 115 1000179d call 1000176d 114->115 116 100017a2-100017a3 115->116
        APIs
        • GetProcessHeap.KERNEL32(00000000,10001661,10001661,100019B8,0053E908,00000000,?,?,1000197B,00000000,10001657,10001661), ref: 100017AA
        • HeapReAlloc.KERNEL32(00000000,?,?,1000197B,00000000,10001657,10001661), ref: 100017B1
          • Part of subcall function 1000176D: GetProcessHeap.KERNEL32(00000000,?,100017DC,?,100014E9,00000001,?,?,10001431,?,?,?,?,1000118D,?), ref: 10001773
          • Part of subcall function 1000176D: HeapAlloc.KERNEL32(00000000,?,?,10001431,?,?,?,?,1000118D,?), ref: 1000177A
        Memory Dump Source
        • Source File: 00000003.00000002.1867760732.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
        • Associated: 00000003.00000002.1867744541.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.1867779827.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.1867799140.0000000010003000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.1867817612.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
        Similarity
        • API ID: Heap$AllocProcess
        • String ID:
        • API String ID: 1617791916-0
        • Opcode ID: f813cbda3ade9a16470dc4232966c3f2c44bc0d5a5ce9b963a94ff6ba90a7f2c
        • Instruction ID: 528e6dc2ab4ea83a9780b1fa4b60de7286fae4f5501eb75e606c84414621deba
        • Opcode Fuzzy Hash: f813cbda3ade9a16470dc4232966c3f2c44bc0d5a5ce9b963a94ff6ba90a7f2c
        • Instruction Fuzzy Hash: EFD01231409301BBEE01AB90CD48B8D7BB5EF807C2F108448F14E44069C7715050EB13