Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
test1.txt

Overview

General Information

Sample name:test1.txt
Analysis ID:1541404
MD5:44d88612fea8a8f36de82e1278abb02f
SHA1:3395856ce81f2b7382dee72602f798b642f14140
SHA256:275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f
Infos:

Detection

EICAR
Score:0
Range:0 - 100
Whitelisted:true
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
EICAR test file detected
Multi AV Scanner detection for submitted file
Yara detected EICAR
Machine Learning detection for sample
Installs a global mouse hook
Queries the volume information (name, serial number etc) of a device

Classification

  • System is w10x64_ra
  • notepad.exe (PID: 6932 cmdline: "C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\test1.txt MD5: 27F71B12CB585541885A31BE22F61C83)
  • notepad.exe (PID: 1796 cmdline: "C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\test22.txt MD5: 27F71B12CB585541885A31BE22F61C83)
  • SystemSettingsBroker.exe (PID: 3412 cmdline: C:\Windows\System32\SystemSettingsBroker.exe -Embedding MD5: C0D134B5F3F4541B92342D62F2CA4DC9)
  • notepad.exe (PID: 3780 cmdline: "C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\test22.txt MD5: 27F71B12CB585541885A31BE22F61C83)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
test1.txtJoeSecurity_EICARYara detected EICARJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\Desktop\test22.txtJoeSecurity_EICARYara detected EICARJoe Security
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: test1.txtAvira: detected
      Source: test1.txtReversingLabs: Detection: 97%
      Source: test1.txtJoe Sandbox ML: detected
      Source: C:\Windows\System32\notepad.exeWindows user hook set: 0 mouse C:\Windows\System32\SHELL32.dllJump to behavior

      System Summary

      barindex
      Source: test1.txtInitial sample: EICAR test sig
      Source: Yara matchFile source: test1.txt, type: SAMPLE
      Source: Yara matchFile source: C:\Users\user\Desktop\test22.txt, type: DROPPED
      Source: classification engineClassification label: clean76.troj.winTXT@4/1@0/0
      Source: C:\Windows\System32\notepad.exeFile created: C:\Users\user\Desktop\test22.txtJump to behavior
      Source: C:\Windows\System32\notepad.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Windows\System32\notepad.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: test1.txtReversingLabs: Detection: 97%
      Source: unknownProcess created: C:\Windows\System32\notepad.exe "C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\test1.txt
      Source: unknownProcess created: C:\Windows\System32\notepad.exe "C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\test22.txt
      Source: unknownProcess created: C:\Windows\System32\SystemSettingsBroker.exe C:\Windows\System32\SystemSettingsBroker.exe -Embedding
      Source: unknownProcess created: C:\Windows\System32\notepad.exe "C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\test22.txt
      Source: C:\Windows\System32\notepad.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: mrmcorer.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: efswrt.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: twinapi.appcore.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: policymanager.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: msvcp110_win.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: dui70.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: duser.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: explorerframe.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: windowscodecs.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: thumbcache.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: dataexchange.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: d3d11.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: dcomp.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: dxgi.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: msftedit.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: windows.globalization.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: bcp47mrm.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: globinputhost.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: xmllite.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: edputil.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: structuredquery.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: atlthunk.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: windows.storage.search.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: samlib.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: linkinfo.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: twinapi.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: ehstorshell.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: networkexplorer.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: cscui.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: ntshrui.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: cscapi.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: winmm.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: cldapi.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: fltlib.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: mrmcorer.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: efswrt.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: twinapi.appcore.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: policymanager.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: msvcp110_win.dllJump to behavior
      Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: systemsettings.datamodel.dllJump to behavior
      Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: settingshandlers_sharedexperiences_rome.dllJump to behavior
      Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: windows.devices.radios.dllJump to behavior
      Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: cdp.dllJump to behavior
      Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: dsreg.dllJump to behavior
      Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: msvcp110_win.dllJump to behavior
      Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: policymanager.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: mrmcorer.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: efswrt.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: twinapi.appcore.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: policymanager.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeSection loaded: msvcp110_win.dllJump to behavior
      Source: C:\Windows\System32\notepad.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{11659a23-5884-4d1b-9cf6-67d6f4f90b36}\InProcServer32Jump to behavior
      Source: C:\Windows\System32\notepad.exeFile opened: C:\Windows\system32\MsftEdit.dllJump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Windows\System32\notepad.exeWindow detected: Number of UI elements: 16
      Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\SystemSettingsBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\notepad.exeQueries volume information: C:\Users\user\Desktop\test1.txt VolumeInformationJump to behavior
      Source: C:\Windows\System32\notepad.exeQueries volume information: C:\Users\user\Desktop\test22.txt VolumeInformationJump to behavior
      Source: C:\Windows\System32\notepad.exeQueries volume information: C:\Users\user\Desktop\test22.txt VolumeInformationJump to behavior
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
      DLL Side-Loading
      1
      Process Injection
      1
      Masquerading
      1
      Input Capture
      1
      File and Directory Discovery
      Remote Services1
      Input Capture
      Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      1
      Process Injection
      LSASS Memory11
      System Information Discovery
      Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
      DLL Side-Loading
      Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1541404 Sample: test1.txt Startdate: 24/10/2024 Architecture: WINDOWS Score: 0 13 EICAR test file detected 2->13 15 Antivirus / Scanner detection for submitted sample 2->15 17 Multi AV Scanner detection for submitted file 2->17 19 2 other signatures 2->19 5 notepad.exe 34 12 2->5         started        7 notepad.exe 2->7         started        9 notepad.exe 2->9         started        11 SystemSettingsBroker.exe 2->11         started        process3

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      test1.txt97%ReversingLabsDOS.Malware.EICAR
      test1.txt100%AviraEicar-Test-Signature
      test1.txt100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No contacted domains info
      No contacted IP infos
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1541404
      Start date and time:2024-10-24 19:39:56 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 20s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:defaultwindowsinteractivecookbook.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:35
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:test1.txt
      Detection:CLEAN
      Classification:clean76.troj.winTXT@4/1@0/0
      EGA Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .txt
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, ShellExperienceHost.exe, SIHClient.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
      • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, evoke-windowsservices-tas.msedge.net, ctldl.windowsupdate.com, tse1.mm.bing.net, arc.msn.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtEnumerateKey calls found.
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtProtectVirtualMemory calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      • VT rate limit hit for: test1.txt
      No simulations
      No context
      No context
      No context
      No context
      No context
      Process:C:\Windows\System32\notepad.exe
      File Type:EICAR virus test files
      Category:dropped
      Size (bytes):68
      Entropy (8bit):4.8723276870872425
      Encrypted:false
      SSDEEP:3:a+JraNvsgzsVqSwHq9:tJuOgzsko
      MD5:44D88612FEA8A8F36DE82E1278ABB02F
      SHA1:3395856CE81F2B7382DEE72602F798B642F14140
      SHA-256:275A021BBFB6489E54D471899F7DB9D1663FC695EC2FE2A2C4538AABF651FD0F
      SHA-512:CC805D5FAB1FD71A4AB352A9C533E65FB2D5B885518F4E565E68847223B8E6B85CB48F3AFAD842726D99239C9E36505C64B0DC9A061D9E507D833277ADA336AB
      Malicious:false
      Yara Hits:
      • Rule: JoeSecurity_EICAR, Description: Yara detected EICAR, Source: C:\Users\user\Desktop\test22.txt, Author: Joe Security
      Reputation:moderate, very likely benign file
      Preview:X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
      File type:EICAR virus test files
      Entropy (8bit):4.8723276870872425
      TrID:
        File name:test1.txt
        File size:68 bytes
        MD5:44d88612fea8a8f36de82e1278abb02f
        SHA1:3395856ce81f2b7382dee72602f798b642f14140
        SHA256:275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f
        SHA512:cc805d5fab1fd71a4ab352a9c533e65fb2d5b885518f4e565e68847223b8e6b85cb48f3afad842726d99239c9e36505c64b0dc9a061d9e507d833277ada336ab
        SSDEEP:3:a+JraNvsgzsVqSwHq9:tJuOgzsko
        TLSH:41A022003B0EEE2BA20B00200032E8B00808020E2CE00A3820A020B8C83308803EC228
        File Content Preview:X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
        Icon Hash:72eaa2aaa2a2a292
        No network behavior found

        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:13:40:26
        Start date:24/10/2024
        Path:C:\Windows\System32\notepad.exe
        Wow64 process (32bit):false
        Commandline:"C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\test1.txt
        Imagebase:0x7ff79f750000
        File size:201'216 bytes
        MD5 hash:27F71B12CB585541885A31BE22F61C83
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:moderate
        Has exited:true

        Target ID:10
        Start time:13:41:10
        Start date:24/10/2024
        Path:C:\Windows\System32\notepad.exe
        Wow64 process (32bit):false
        Commandline:"C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\test22.txt
        Imagebase:0x7ff79f750000
        File size:201'216 bytes
        MD5 hash:27F71B12CB585541885A31BE22F61C83
        Has elevated privileges:false
        Has administrator privileges:false
        Programmed in:C, C++ or other language
        Reputation:moderate
        Has exited:true

        Target ID:20
        Start time:13:41:32
        Start date:24/10/2024
        Path:C:\Windows\System32\SystemSettingsBroker.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\System32\SystemSettingsBroker.exe -Embedding
        Imagebase:0x7ff731930000
        File size:205'040 bytes
        MD5 hash:C0D134B5F3F4541B92342D62F2CA4DC9
        Has elevated privileges:false
        Has administrator privileges:false
        Programmed in:C, C++ or other language
        Reputation:moderate
        Has exited:true

        Target ID:25
        Start time:13:41:56
        Start date:24/10/2024
        Path:C:\Windows\System32\notepad.exe
        Wow64 process (32bit):false
        Commandline:"C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\test22.txt
        Imagebase:0x7ff79f750000
        File size:201'216 bytes
        MD5 hash:27F71B12CB585541885A31BE22F61C83
        Has elevated privileges:false
        Has administrator privileges:false
        Programmed in:C, C++ or other language
        Reputation:moderate
        Has exited:false

        No disassembly