VMRay Analyzer Report
Analysis Information
Creation Time2016-11-09 16:51 (UTC+1)
VM Analysis Duration Time00:01:30
Execution SuccessfulTrue
Sample Filenamed8891477315db13a640ed5956a636951.exe
Command Line ParametersFalse
PrescriptFalse
Number of Processes46
Termination ReasonMaximum binlog size reached
Download Function Logfile Generic Logfile PCAP STIX/CybOX
RemarksBoot sector was modified
VM rebooted
VTI Information
VTI Score
100 / 100
VTI Database Version2.2
VTI Rule Match Count1023
VTI Rule TypeDefault (PE, ...)
Tags
The tags feature is only available in the fully licensed version of VMRay Analyzer.
Screenshots
Screenshot Screenshot Screenshot Screenshot Screenshot Screenshot Screenshot Screenshot Screenshot Screenshot Screenshot
Monitored Processes
Process Graph


IDPIDMonitor ReasonImage NameCommand LineOrigin ID
#10x6ecAnalysis Targetd8891477315db13a640ed5956a636951.exe"C:\Users\hJrD1KOKY DS8lUjv\Desktop\d8891477315db13a640ed5956a636951.exe"
#20x7b8Child Processesentutl.exe"C:\Users\hJrD1KOKY DS8lUjv\AppData\Roaming\{B3889326-9C2C-0B70-124E-56B7B618030C}\esentutl.exe"#1
#30x744Child Processcmd.exe/d /c taskkill /t /f /im "d8891477315db13a640ed5956a636951.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\hJrD1KOKY DS8lUjv\Desktop\d8891477315db13a640ed5956a636951.exe" > NUL#1
#40x484Child Processtaskkill.exetaskkill /t /f /im "d8891477315db13a640ed5956a636951.exe" #3
#60x698Child Processvssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet#2
#110x82cChild Processping.exeping -n 1 127.0.0.1 #3
#120x884Child Processwmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete#2
#130x8b4Child Processbcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no#2
#140x8d0Child Processbcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures#2
#160x4Kernel AnalysisSystem
#170xd8Child Processsmss.exe\SystemRoot\System32\smss.exe#16
#180xf0Child Processautochk.exe\??\C:\Windows\system32\autochk.exe *#17
#190x120Child Processsmss.exe\SystemRoot\System32\smss.exe 00000000 0000003c #17
#200x128Child Processcsrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16#19
#210x150Child Processsmss.exe\SystemRoot\System32\smss.exe 00000001 0000003c #17
#220x158Child Processwininit.exewininit.exe#19
#230x164Child Processcsrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16#21
#240x180Child Processwinlogon.exewinlogon.exe#21
#250x1a8Child Processservices.exeC:\Windows\system32\services.exe#22
#260x1b8Child Processlsass.exeC:\Windows\system32\lsass.exe#22
#270x1c0Child Processlsm.exeC:\Windows\system32\lsm.exe#22
#280x234Child Processsvchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch#25
#290x27cChild Processsvchost.exeC:\Windows\system32\svchost.exe -k RPCSS#25
#300x2acChild Processsvchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted#25
#310x2f4Child Processlogonui.exe"LogonUI.exe" /flags:0x0#24
#320x32cChild Processsvchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted#25
#330x358Child Processsvchost.exeC:\Windows\system32\svchost.exe -k netsvcs#25
#340x394Child Processaudiodg.exeC:\Windows\system32\AUDIODG.EXE 0x2bc#30
#350x3e0Child Processsvchost.exeC:\Windows\system32\svchost.exe -k LocalService#25
#360x12cChild Processdllhost.exeC:\Windows\system32\DllHost.exe /Processid:{E10F6C3A-F1AE-4ADC-AA9D-2FE65525666E}#28
#370x10cChild Processuserinit.exeC:\Windows\system32\userinit.exe#24
#380x200Child Processexplorer.exeC:\Windows\Explorer.EXE#37
#390x104Child Processdwm.exe"C:\Windows\system32\Dwm.exe"#32
#400x41cChild Processsvchost.exeC:\Windows\system32\svchost.exe -k NetworkService#25
#410x49cChild Processesentutl.exe"C:\Users\hJrD1KOKY DS8lUjv\AppData\Roaming\{B3889326-9C2C-0B70-124E-56B7B618030C}\esentutl.exe" #38
#420x4a4Child Processrunonce.exeC:\Windows\SysWOW64\runonce.exe /Run6432#38
#430x4acChild Processesentutl.exe"C:\Users\hJrD1KOKY DS8lUjv\AppData\Roaming\{B3889326-9C2C-0B70-124E-56B7B618030C}\esentutl.exe" #38
#440x4b8Child Processesentutl.exe"C:\Users\hJrD1KOKY DS8lUjv\AppData\Roaming\{B3889326-9C2C-0B70-124E-56B7B618030C}\esentutl.exe" #38
#450x4f4Child Processspoolsv.exeC:\Windows\System32\spoolsv.exe#25
#460x524Child Processdllhost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}#28
#470x548Child Processtaskhost.exe"taskhost.exe"#25
#480x570Child Processjusched.exe"C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe" #42
#490x580Child Processsvchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork#25
#500x600Child Processexplorer.exe"C:\Windows\SysWOW64\explorer.exe"#44
#510x608Child Processexplorer.exe"C:\Windows\SysWOW64\explorer.exe"#41
#520x664Child Processexplorer.exe"C:\Windows\SysWOW64\explorer.exe"#43
Sample Information
ID#663085
MD5 Hash Valued8891477315db13a640ed5956a636951
SHA1 Hash Valueabb3fd6a48b0881f4d01ff468ea81cd81e24e97b
SHA256 Hash Valueddffb78d1b7dd7831fc074911671fa5e3b9d7b33f10ab3a9933cf563b570f756
Filenamed8891477315db13a640ed5956a636951.exe
File Size116.50 KB (119296 bytes)
File TypeWindows Exe (x86-32)
Analyzer and Virtual Machine Information
Analyzer Version1.11.0
Analyzer Build Date2016-10-24 09:58 (UTC+2)
VM Namewin7_64_sp1
VM DescriptionWindows 7 (SP1, 64-bit)
VM Architecturex86 64-bit
VM OSWindows 7
VM Kernel Version6.1.7601.17514 (3844dbb9-2017-4967-be7a-a4a2c20430fa)
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefox with deactivated setting "security.fileuri.strict_origin_policy".


Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image