Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1431862
MD5:fbec778f85341774de2b32abb7aaff98
SHA1:945531568035c569fb61b036a257c07a85954c3c
SHA256:bcce85eac3795965ef9359dc8d4366121887b7265a45c7749da4a85acc4e3808
Tags:exe
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to dynamically determine API calls
One or more processes crash
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 6500 cmdline: "C:\Users\user\Desktop\file.exe" MD5: FBEC778F85341774DE2B32ABB7AAFF98)
    • WerFault.exe (PID: 5812 cmdline: C:\Windows\system32\WerFault.exe -u -p 6500 -s 1384 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: file.exeAvira: detected
Source: file.exeReversingLabs: Detection: 21%
Source: file.exeJoe Sandbox ML: detected
Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6500 -s 1384
Source: file.exeBinary or memory string: OriginalFilename vs file.exe
Source: file.exe, 00000000.00000000.1615191812.00007FF67B832000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameChurchgoer debarredF vs file.exe
Source: file.exeBinary or memory string: OriginalFilenameChurchgoer debarredF vs file.exe
Source: classification engineClassification label: mal64.evad.winEXE@2/5@0/0
Source: C:\Users\user\Desktop\file.exeMutant created: NULL
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6500
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\5f325db1-60ff-4a69-be3d-e2d4e45826a8Jump to behavior
Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: file.exeReversingLabs: Detection: 21%
Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6500 -s 1384
Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: file.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: file.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: file.exeStatic file information: File size 1620992 > 1048576
Source: file.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x10c400
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67B6A3F90 LoadLibraryA,GetProcAddress,0_2_00007FF67B6A3F90
Source: file.exeStatic PE information: section name: _RDATA
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67B6A6A8C push 889595A7h; retf 0_2_00007FF67B6A6AB0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67B6A6D70 pushfq ; ret 0_2_00007FF67B6A6D7C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67B6A600C push rcx; retf 0_2_00007FF67B6A5FF0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67B6A81EC push D1959549h; ret 0_2_00007FF67B6A8204
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67B6A5FD4 push rcx; retf 0_2_00007FF67B6A5FF0
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.3.drBinary or memory string: VMware
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: vmci.sys
Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: VMware20,1
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67B6A3F90 LoadLibraryA,GetProcAddress,0_2_00007FF67B6A3F90
Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\file.exeNtMapViewOfSection: Indirect: 0x7FF67B78EC7CJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: unknown VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: unknown VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67B79EC4C GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF67B79EC4C
Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Abuse Elevation Control Mechanism
1
Disable or Modify Tools
LSASS Memory21
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Process Injection
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Abuse Elevation Control Mechanism
NTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe21%ReversingLabsWin64.Trojan.Generic
file.exe100%AviraTR/ATRAPS.Gen2
file.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.3.drfalse
    high
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1431862
    Start date and time:2024-04-25 21:58:07 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 7s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:8
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:file.exe
    Detection:MAL
    Classification:mal64.evad.winEXE@2/5@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:Failed
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 104.208.16.94
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
    • Not all processes where analyzed, report is missing behavior information
    • VT rate limit hit for: file.exe
    TimeTypeDescription
    21:59:01API Interceptor1x Sleep call for process: WerFault.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\System32\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.7437706375885127
    Encrypted:false
    SSDEEP:192:xxBqbvVPgy50VGSaI3jXuzuiFPZ24lO8QxB:hYVYPVGSpjezuiFPY4lO8QH
    MD5:43C1121FD7A200106F66E629383BD142
    SHA1:181CF09C60F111BA5766EF3100E45B5D839A5ACE
    SHA-256:238C68B62D865F4AD752E16C8ED2E2259D50D23B927C830D39D80C5D3F6D4017
    SHA-512:C294698B0FDFCAC794C8D344D3D147ABC7BAA3BA6F39E6F947740C062768233FEA0E0248E45DD58870E312982343BC9D7C692F0BFC3D29BCE7D784A1787FFE3D
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.5.4.8.7.3.2.8.7.0.6.5.8.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.5.4.8.7.3.3.3.3.9.3.9.1.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.9.2.2.f.8.8.d.-.a.a.2.a.-.4.d.2.c.-.9.e.c.8.-.5.d.1.4.4.d.f.b.4.0.7.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.3.4.2.4.2.5.9.-.d.b.c.7.-.4.c.a.4.-.a.7.b.b.-.e.d.b.5.6.3.e.d.5.0.e.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.f.i.l.e...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.C.h.u.r.c.h.g.o.e.r. .d.e.b.a.r.r.e.d.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.6.4.-.0.0.0.1.-.0.0.1.4.-.b.4.0.0.-.2.b.f.f.4.a.9.7.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.9.a.c.c.b.c.e.8.f.2.6.1.b.7.5.9.6.9.1.b.8.2.f.1.2.2.9.4.6.5.3.f.0.0.0.0.1.9.0.4.!.0.0.0.0.9.4.5.5.3.1.5.6.8.0.3.5.c.5.6.9.f.b.6.1.b.0.3.6.a.2.5.7.c.0.7.a.8.5.9.5.4.c.3.c.!.f.i.l.e...e.x.e...
    Process:C:\Windows\System32\WerFault.exe
    File Type:Mini DuMP crash report, 15 streams, Thu Apr 25 19:58:52 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):169848
    Entropy (8bit):3.0721334383995664
    Encrypted:false
    SSDEEP:1536:QEiFkuBujLggHibBQg9tS7esiA8BkyWNk0e:biFkRj5US7hJ
    MD5:B016D2074ED61793F068751EA9443042
    SHA1:EB9D63570E9F6F89F72482A29F31E90FF3E0132B
    SHA-256:153074677F5CCE7C4E2B85E643EBEFDEB761605016B457896F0D780521021B09
    SHA-512:2D1756D9F9D3F188F99C5FA7FEFDE2F0921A32940DBB7E57805F27FB8B6871F233301C8A1203090DAFEA2957F56605FDE1FDD25E2672AFAAEA757B83A8D79BED
    Malicious:false
    Reputation:low
    Preview:MDMP..a..... .........*f....................................$...........D....'..........`.......8...........T...........p6...a......................................................................................................eJ......X.......Lw......................T.......d.....*f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8538
    Entropy (8bit):3.6997427572270865
    Encrypted:false
    SSDEEP:192:R6l7wVeJhCe8Dv6Y9elwgmfBrJRpr3q89b+Ulfoqm:R6lXJN8Dv6YklwgmfLP+efk
    MD5:6DA9218711C1210B64FA529E7EEB5368
    SHA1:F3AFA8FBFAB992159C64B8E7F160F795CA83986F
    SHA-256:CB2FC7FD3EF5AE38CF0479C41B6AE6C0A21D7642E43B0B5B43E0730A0B4AF6E2
    SHA-512:236BCFB1422785246BBD217F7DBFD141203D03654A4097D543E3DDD7564ABFC9933AA636803B36AE51D613303926204C4B447ABCEE0E6384D4DEAFE02795450B
    Malicious:false
    Reputation:low
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.5.0.0.<./.P.i.
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4723
    Entropy (8bit):4.479372905483836
    Encrypted:false
    SSDEEP:48:cvIwWl8zs7Jg771I9KVWpW8VYJYm8M4J7NrrFEyq857DPPED+7asAmd:uIjfVI7Fk7VhJ7VC8D0D+7asfd
    MD5:F91189813615EC788A35DEBD2679309F
    SHA1:4074DEBE46818CAD6ED700EA0129C888B4C5829C
    SHA-256:BBFDD8B0EB565A95F36130446B3B2F0919A60839307F443EE13B2D5B463691E6
    SHA-512:A89198D874FDDDD3FF9B1D2124B4C2D338234838FD7494D4AD740BD7935147446A8C48AF48C1C982695ABC7CE89F14D58AD36BF4ED3ED64BD412DDDCC425DE51
    Malicious:false
    Reputation:low
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="295861" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\System32\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.465889814896879
    Encrypted:false
    SSDEEP:6144:BIXfpi67eLPU9skLmb0b4YWSPKaJG8nAgejZMMhA2gX4WABl0uNPdwBCswSbX:CXD94YWlLZMM6YFH1+X
    MD5:DCF305B41C06A18F1A32076DAEB0ABAB
    SHA1:88DB16DA56572B7BC822163A83202C6C6F87C8E7
    SHA-256:20C18BA10D545FE45EA9FED247241FF4395BB948D62C2488D1BC93AB6A4D6EBA
    SHA-512:95F727ADDBEB41BC551E043079CBF9D5CF78DE54F5542C2EC26EA713C2DA1A71101EB3E0EB067E8BD58E6C4190DFB2443E88F5524E606988D1D03D5C67B5DCBE
    Malicious:false
    Reputation:low
    Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.dW.J..............................................................................................................................................................................................................................................................................................................................................."iA.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:PE32+ executable (GUI) x86-64, for MS Windows
    Entropy (8bit):6.102212805681943
    TrID:
    • Win64 Executable GUI (202006/5) 92.65%
    • Win64 Executable (generic) (12005/4) 5.51%
    • Generic Win/DOS Executable (2004/3) 0.92%
    • DOS Executable Generic (2002/1) 0.92%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:file.exe
    File size:1'620'992 bytes
    MD5:fbec778f85341774de2b32abb7aaff98
    SHA1:945531568035c569fb61b036a257c07a85954c3c
    SHA256:bcce85eac3795965ef9359dc8d4366121887b7265a45c7749da4a85acc4e3808
    SHA512:d8a28a1360eaf99ba0647becd474b3a51608b66285c7f679b02f5f73812c29ae0e0e8aecab87daeee5ed6cfd72492fae83e93bc9897054091aeaa589dda60944
    SSDEEP:24576:wRzV4+t4yoPahuXo613HHW8xz9h+GKKdLM+Eg/Tb:wRe+t4RCh+TlWq/+gdX
    TLSH:7E7519072B3B4A9DC51184BED67A1163D95C7D0CD024F8B98EC44A05BF62FA06A7E7EC
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........x;a.+;a.+;a.+p..*>a.+p..*1a.+...*.a.+...*+a.+...**a.+p..*.a.+p..*<a.+;a.+.a.+;a.+9a.+...*:a.+V..*8a.+..,+:a.+...*:a.+Rich;a.
    Icon Hash:90cececece8e8eb0
    Entrypoint:0x1400fe9f8
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x140000000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Time Stamp:0x661D6EA8 [Mon Apr 15 18:15:04 2024 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:2ca1f7af050d22fd80a619bcf1246004
    Instruction
    dec eax
    sub esp, 28h
    call 00007F1094F7E100h
    dec eax
    add esp, 28h
    jmp 00007F1094F7DD2Fh
    int3
    int3
    dec eax
    sub esp, 28h
    call 00007F1094F7E684h
    test eax, eax
    je 00007F1094F7DED3h
    dec eax
    mov eax, dword ptr [00000030h]
    dec eax
    mov ecx, dword ptr [eax+08h]
    jmp 00007F1094F7DEB7h
    dec eax
    cmp ecx, eax
    je 00007F1094F7DEC6h
    xor eax, eax
    dec eax
    cmpxchg dword ptr [0008FFE8h], ecx
    jne 00007F1094F7DEA0h
    xor al, al
    dec eax
    add esp, 28h
    ret
    mov al, 01h
    jmp 00007F1094F7DEA9h
    int3
    int3
    int3
    dec eax
    sub esp, 28h
    test ecx, ecx
    jne 00007F1094F7DEB9h
    mov byte ptr [0008FFD1h], 00000001h
    call 00007F1094F7E491h
    call 00007F1094F7E85Ch
    test al, al
    jne 00007F1094F7DEB6h
    xor al, al
    jmp 00007F1094F7DEC6h
    call 00007F1094F8309Fh
    test al, al
    jne 00007F1094F7DEBBh
    xor ecx, ecx
    call 00007F1094F7E86Ch
    jmp 00007F1094F7DE9Ch
    mov al, 01h
    dec eax
    add esp, 28h
    ret
    int3
    int3
    inc eax
    push ebx
    dec eax
    sub esp, 20h
    cmp byte ptr [0008FF98h], 00000000h
    mov ebx, ecx
    jne 00007F1094F7DF19h
    cmp ecx, 01h
    jnbe 00007F1094F7DF1Ch
    call 00007F1094F7E5FAh
    test eax, eax
    je 00007F1094F7DEDAh
    test ebx, ebx
    jne 00007F1094F7DED6h
    dec eax
    lea ecx, dword ptr [0008FF82h]
    call 00007F1094F82EBEh
    test eax, eax
    jne 00007F1094F7DEC2h
    dec eax
    lea ecx, dword ptr [0008FF8Ah]
    call 00007F1094F7DFAEh
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x159bbc0x50.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1930000x668.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1900000x1068.pdata
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1940000x668.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x1584e00x1c.rdata
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1583a00x140.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x10e0000x678.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x10c2100x10c400cf069fca81dcb5358722b4e6e3b2f83bFalse0.44960009174044735data5.656884668685357IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x10e0000x4d1840x4d200e01c0fc253e40cc388a77dfa5af45094False0.7329695097244733dBase III DBT, version number 0, next free block index 1420532, 1st item "\236\247\025"6.300379726506215IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x15c0000x33bc80x2fe002ee7f066b09de60fbae9e64b8c6a9656False0.7388167020234987OpenPGP Secret Key5.8389121231663195IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .pdata0x1900000x10680x12006f2853c38daa97f762de39f2c0e0f7efFalse0.4496527777777778data5.052342509461047IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    _RDATA0x1920000x1f40x200b15ecf3c52ade70ca8f1740b1c18da73False0.51953125data4.170166079282163IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0x1930000x6680x800d65932c234353d2e182b4422b55dc15aFalse0.36767578125data3.3405595161759307IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x1940000x6680x800910b2945bb4164c524fd69b57e4643f7False0.50634765625data4.894148520570021IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_VERSION0x1932000x468dataEnglishUnited States0.4601063829787234
    RT_MANIFEST0x1930a00x15aASCII text, with CRLF line terminatorsEnglishUnited States0.5491329479768786
    DLLImport
    KERNEL32.dllGetModuleFileNameA, GetModuleFileNameW, LockResource, GlobalUnlock, GlobalCompact, GlobalUnfix, GlobalUnWire, LocalUnlock, LocalCompact, GetProcessAffinityMask, ConvertFiberToThread, CreateFiber, PulseEvent, GlobalDeleteAtom, DeleteAtom, SetMessageWaitingIndicator, DisableThreadLibraryCalls, EscapeCommFunction, GetCommMask, GetCommModemStatus, GetCommTimeouts, TransmitCommChar, PrepareTape, EraseTape, CreateTapePartition, GetTapeStatus, MulDiv, GetMailslotInfo, SetMailslotInfo, AddAtomW, GetNamedPipeHandleStateA, MapUserPhysicalPagesScatter, WriteConsoleW, SetInformationJobObject, AssignProcessToJobObject, IsProcessInJob, CreateMemoryResourceNotification, GetWriteWatch, SetProcessWorkingSetSize, FlushViewOfFile, SetSystemTimeAdjustment, GetNativeSystemInfo, GetVersion, GetThreadIOPendingFlag, SetProcessPriorityBoost, GetProcessPriorityBoost, GetProcessHandleCount, OpenProcess, GetThreadTimes, FlushInstructionCache, GetProcessId, SetPriorityClass, GetProcessVersion, GetThreadPriority, GetThreadPriorityBoost, GetCurrentProcessId, GetModuleHandleA, GetProcessTimes, WaitForMultipleObjects, CancelWaitableTimer, CreateEventW, CreateMutexW, WaitForSingleObject, ReleaseMutex, ReleaseSemaphore, ResetEvent, SetEvent, PostQueuedCompletionStatus, CreateIoCompletionPort, HeapCreate, GetNamedPipeHandleStateW, GetNamedPipeInfo, PeekNamedPipe, SetLastError, DecodeSystemPointer, EncodeSystemPointer, DecodePointer, EncodePointer, GetFileTime, GetFileInformationByHandle, FlushFileBuffers, FindNextChangeNotification, FindFirstFileExW, SetStdHandle, GetStdHandle, FreeResource, GetProcAddress, LoadLibraryA, ClearCommBreak, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, IsProcessorFeaturePresent, GetModuleHandleW, RtlUnwindEx, GetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, RaiseException, RtlPcToFileHeader, WriteFile, GetCurrentProcess, ExitProcess, TerminateProcess, GetModuleHandleExW, HeapAlloc, HeapFree, FindClose, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetFileType, GetStringTypeW, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, LCMapStringW, GetProcessHeap, HeapSize, HeapReAlloc, GetConsoleOutputCP, GetConsoleMode, SetFilePointerEx, CreateFileW, CloseHandle
    GDI32.dllSetBrushOrgEx, SetBitmapDimensionEx, PolylineTo, PolyBezierTo, LPtoDP, PolyDraw, GetPath, AbortPath, GetDIBColorTable, SetWorldTransform, AngleArc, CopyEnhMetaFileW, SetTextJustification, SetTextAlign, SetROP2, SetPixelV, GetLayout, SetBoundsRect, SetDCPenColor, SetDCBrushColor, ResizePalette, PtVisible, MaskBlt, RemoveFontMemResourceEx, GetFontUnicodeRanges, GetFontLanguageInfo, GetTextExtentPoint32W, GetTextExtentPointW, GetSystemPaletteUse, GetSystemPaletteEntries, GetRandomRgn, GetRasterizerCaps, GetPaletteEntries, GetOutlineTextMetricsW, GetDIBits, GetMetaRgn, GetCharABCWidthsFloatW, GetCharWidthFloatW, GetBoundsRect, GetBitmapBits, GetDCPenColor, GetBkColor, GetROP2, FrameRgn, ExcludeClipRect, EnumFontFamiliesW, EnumFontFamiliesExW, Chord, CancelDC, Arc, AnimatePalette, GetTextAlign
    ADVAPI32.dllGetUserNameW, DecryptFileW
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:21:58:52
    Start date:25/04/2024
    Path:C:\Users\user\Desktop\file.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\file.exe"
    Imagebase:0x7ff67b6a0000
    File size:1'620'992 bytes
    MD5 hash:FBEC778F85341774DE2B32ABB7AAFF98
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:3
    Start time:21:58:52
    Start date:25/04/2024
    Path:C:\Windows\System32\WerFault.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\WerFault.exe -u -p 6500 -s 1384
    Imagebase:0x7ff6633e0000
    File size:570'736 bytes
    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:4.3%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:33.3%
      Total number of Nodes:18
      Total number of Limit Nodes:0

      Callgraph

      • Executed
      • Not Executed
      • Opacity -> Relevance
      • Disassembly available
      callgraph 0 Function_00007FF67B6A9AB0 1 Function_00007FF67B6A78B0 2 Function_00007FF67B6A6AB5 3 Function_00007FF67B6A4CB4 4 Function_00007FF67B6A83A8 5 Function_00007FF67B6A4DA9 6 Function_00007FF67B6A94AC 7 Function_00007FF67B6A80AD 8 Function_00007FF67B6A84A1 9 Function_00007FF67B6A42A0 10 Function_00007FF67B6A6C98 11 Function_00007FF67B6A8690 12 Function_00007FF67B6A3F90 12->9 18 Function_00007FF67B6A4480 12->18 13 Function_00007FF67B6A8295 14 Function_00007FF67B6A8E88 15 Function_00007FF67B6A598D 16 Function_00007FF67B6A6A8C 17 Function_00007FF67B6A6B8C 19 Function_00007FF67B6A8685 20 Function_00007FF67B6A7485 21 Function_00007FF67B6A6084 22 Function_00007FF67B6A6484 23 Function_00007FF67B6A7284 24 Function_00007FF67B6A7978 25 Function_00007FF67B6A997C 26 Function_00007FF67B6A8C71 27 Function_00007FF67B6A6D70 28 Function_00007FF67B6A9E75 29 Function_00007FF67B6A7075 30 Function_00007FF67B6A5B74 31 Function_00007FF67B6A8968 32 Function_00007FF67B6A5569 33 Function_00007FF67B79E9F8 73 Function_00007FF67B79EC4C 33->73 34 Function_00007FF67B6A856D 35 Function_00007FF67B6A866D 36 Function_00007FF67B6A986D 37 Function_00007FF67B6A9D6D 38 Function_00007FF67B6A4660 39 Function_00007FF67B6A4D65 40 Function_00007FF67B6A5458 41 Function_00007FF67B6A995C 42 Function_00007FF67B6A7F5D 43 Function_00007FF67B6A635C 44 Function_00007FF67B6A615C 45 Function_00007FF67B6A9351 46 Function_00007FF67B6A8A49 47 Function_00007FF67B6A8E49 48 Function_00007FF67B6A5D4D 49 Function_00007FF67B6A4D4C 50 Function_00007FF67B6A794C 51 Function_00007FF67B6A4840 52 Function_00007FF67B6A6C45 53 Function_00007FF67B6A4E44 54 Function_00007FF67B6A8338 55 Function_00007FF67B6A763C 56 Function_00007FF67B6A8531 57 Function_00007FF67B6A6D30 58 Function_00007FF67B6A9735 59 Function_00007FF67B6A5234 60 Function_00007FF67B6A9B28 61 Function_00007FF67B6A892D 62 Function_00007FF67B6A7F2D 63 Function_00007FF67B6A682C 64 Function_00007FF67B6A4A20 65 Function_00007FF67B6A6F20 66 Function_00007FF67B6A7220 67 Function_00007FF67B6A7420 68 Function_00007FF67B6A9D25 69 Function_00007FF67B6A7825 70 Function_00007FF67B6A4C17 71 Function_00007FF67B6A9218 72 Function_00007FF67B6A9C19 74 Function_00007FF67B6A7E1C 75 Function_00007FF67B6A4C10 76 Function_00007FF67B6A7814 77 Function_00007FF67B6A940D 78 Function_00007FF67B6A600C 79 Function_00007FF67B6A720C 80 Function_00007FF67B6A1000 81 Function_00007FF67B6A4C00 82 Function_00007FF67B6A9305 83 Function_00007FF67B6A8EFC 84 Function_00007FF67B6A3FF0 84->38 84->51 84->64 103 Function_00007FF67B6A40C0 84->103 85 Function_00007FF67B6A6DF0 86 Function_00007FF67B6A90F5 87 Function_00007FF67B6A62F4 88 Function_00007FF67B6A94E9 89 Function_00007FF67B6A81EC 90 Function_00007FF67B6A53EC 91 Function_00007FF67B6A70EC 92 Function_00007FF67B6A8CE1 93 Function_00007FF67B6A6DE0 94 Function_00007FF67B6A7ED9 95 Function_00007FF67B6A8ADD 96 Function_00007FF67B6A5CDD 97 Function_00007FF67B6A72DC 98 Function_00007FF67B6A4ED0 99 Function_00007FF67B6A60D5 100 Function_00007FF67B6A5FD4 101 Function_00007FF67B6A9ACD 102 Function_00007FF67B6A61CD 104 Function_00007FF67B6A4FC0 105 Function_00007FF67B6A91C5 106 Function_00007FF67B6A67C4 107 Function_00007FF67B6A6EB9 108 Function_00007FF67B6A77B9 109 Function_00007FF67B6A59B8 110 Function_00007FF67B6A9CBC 111 Function_00007FF67B6A6ABC

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1704472015.00007FF67B6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67B6A0000, based on PE: true
      • Associated: 00000000.00000002.1704457020.00007FF67B6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1704546594.00007FF67B7AE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1704581749.00007FF67B7FC000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1704607304.00007FF67B82A000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1704622244.00007FF67B830000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1704622244.00007FF67B832000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff67b6a0000_file.jbxd
      Similarity
      • API ID: AddressLibraryLoadProc
      • String ID: CreateDXGIFactory$dxgi.dll
      • API String ID: 2574300362-1239289089
      • Opcode ID: 5ce8d29d53be1807762bcddf748a26a79a0e1f2b8f6c8324b5df236cd30e2fd7
      • Instruction ID: be4db1fff37b7b3ff9611ae3ff71c72e1b1a09a940a7bcbfb830dc3d70bbda85
      • Opcode Fuzzy Hash: 5ce8d29d53be1807762bcddf748a26a79a0e1f2b8f6c8324b5df236cd30e2fd7
      • Instruction Fuzzy Hash: 06F01C72A3A90391EA10DB14EC512F56324FF8C344F904032E44D8227DDF2CE109CB50
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1704472015.00007FF67B6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67B6A0000, based on PE: true
      • Associated: 00000000.00000002.1704457020.00007FF67B6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1704546594.00007FF67B7AE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1704581749.00007FF67B7FC000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1704607304.00007FF67B82A000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1704622244.00007FF67B830000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1704622244.00007FF67B832000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff67b6a0000_file.jbxd
      Similarity
      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
      • String ID:
      • API String ID: 2933794660-0
      • Opcode ID: 0d00c921fedd729166008937e5de8067c84091cbd5b71c22bf47497ce6c26beb
      • Instruction ID: 568e44fb251d4c0f3670a611b8af1b4697be2fa76a29cd28e7fb4d8f026b132e
      • Opcode Fuzzy Hash: 0d00c921fedd729166008937e5de8067c84091cbd5b71c22bf47497ce6c26beb
      • Instruction Fuzzy Hash: 1A112A32B25F068AEB40CF64E8542B933A8FB1D758F440E35EA6D867B8DF78D5948740
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1704472015.00007FF67B6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67B6A0000, based on PE: true
      • Associated: 00000000.00000002.1704457020.00007FF67B6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1704546594.00007FF67B7AE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1704581749.00007FF67B7FC000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1704607304.00007FF67B82A000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1704622244.00007FF67B830000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1704622244.00007FF67B832000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff67b6a0000_file.jbxd
      Similarity
      • API ID: AddressHandleModuleProc
      • String ID: MpExitThread$kernel32.dll$mpSwitchToNextThread$ntdll.dll
      • API String ID: 1646373207-3205826427
      • Opcode ID: 38783e131e7327c1d1a28f45271bcbb7742de174b7098bfc47db860d6abbd531
      • Instruction ID: 27f4af345afe7cfd3f2a2c9fcd9aa581fb652c781451329e526d700aa1940652
      • Opcode Fuzzy Hash: 38783e131e7327c1d1a28f45271bcbb7742de174b7098bfc47db860d6abbd531
      • Instruction Fuzzy Hash: 2D11B972A3AA4691EA40DB18F8903F57325FF8C385F905532E54D8667DEF2CE119CB50
      Uniqueness

      Uniqueness Score: -1.00%