Windows
Analysis Report
UDCC Launcher.exe
Overview
General Information
Detection
Score: | 7 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
- System is w10x64
UDCC Launcher.exe (PID: 2108 cmdline:
"C:\Users\ user\Deskt op\UDCC La uncher.exe " MD5: 47825D6EFA91F5AEF6974A9A4D0A0C93)
- cleanup
- • Cryptography
- • Compliance
- • Spreading
- • Networking
- • System Summary
- • Data Obfuscation
- • Persistence and Installation Behavior
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | Code function: | 0_2_00007FF6AB3E6840 | |
Source: | Code function: | 0_2_00007FF6AB3A86A0 |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_00007FF6AB3DBBE4 | |
Source: | Code function: | 0_2_00007FF6AB3DBD68 | |
Source: | Code function: | 0_2_00007FF6AB3C0494 | |
Source: | Code function: | 0_2_00007FF6AB3C0420 |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Code function: | 0_2_00007FF6AB3D3D08 | |
Source: | Code function: | 0_2_00007FF6AB3DED2C | |
Source: | Code function: | 0_2_00007FF6AB3E1B80 | |
Source: | Code function: | 0_2_00007FF6AB3A7BB0 | |
Source: | Code function: | 0_2_00007FF6AB3CEC18 | |
Source: | Code function: | 0_2_00007FF6AB3C9BE4 | |
Source: | Code function: | 0_2_00007FF6AB3DBBE4 | |
Source: | Code function: | 0_2_00007FF6AB3DAA88 | |
Source: | Code function: | 0_2_00007FF6AB3AAB00 | |
Source: | Code function: | 0_2_00007FF6AB3A9B30 | |
Source: | Code function: | 0_2_00007FF6AB3CF12C | |
Source: | Code function: | 0_2_00007FF6AB3C9FFC | |
Source: | Code function: | 0_2_00007FF6AB3CFFD0 | |
Source: | Code function: | 0_2_00007FF6AB3A7FE0 | |
Source: | Code function: | 0_2_00007FF6AB3A8EB0 | |
Source: | Code function: | 0_2_00007FF6AB3DBD68 | |
Source: | Code function: | 0_2_00007FF6AB3CAE04 | |
Source: | Code function: | 0_2_00007FF6AB3C9DF0 | |
Source: | Code function: | 0_2_00007FF6AB3C0494 | |
Source: | Code function: | 0_2_00007FF6AB3D13CC | |
Source: | Code function: | 0_2_00007FF6AB3DB250 | |
Source: | Code function: | 0_2_00007FF6AB3D2274 | |
Source: | Code function: | 0_2_00007FF6AB3E0194 | |
Source: | Code function: | 0_2_00007FF6AB3D41A0 | |
Source: | Code function: | 0_2_00007FF6AB3E2228 | |
Source: | Code function: | 0_2_00007FF6AB3D4818 | |
Source: | Code function: | 0_2_00007FF6AB3DD7E0 | |
Source: | Code function: | 0_2_00007FF6AB3A86A0 |
Source: | Code function: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_00007FF6AB3BC4E0 |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00007FF6AB3ACA80 |
Source: | Code function: | 0_2_00007FF6AB3A7830 |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Code function: | 0_2_00007FF6AB3DBBE4 | |
Source: | Code function: | 0_2_00007FF6AB3DBD68 | |
Source: | Code function: | 0_2_00007FF6AB3C0494 | |
Source: | Code function: | 0_2_00007FF6AB3C0420 |
Source: | Code function: | 0_2_00007FF6AB3C8C58 |
Source: | Code function: | 0_2_00007FF6AB3BECCC |
Source: | Code function: | 0_2_00007FF6AB3DCF10 |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Code function: | 0_2_00007FF6AB3C8C58 | |
Source: | Code function: | 0_2_00007FF6AB3C3CD0 | |
Source: | Code function: | 0_2_00007FF6AB3C2F88 | |
Source: | Code function: | 0_2_00007FF6AB3C3EB0 |
Source: | Code function: | 0_2_00007FF6AB3A6920 |
Source: | Code function: | 0_2_00007FF6AB3E4770 |
Source: | Code function: | 0_2_00007FF6AB3DFD34 | |
Source: | Code function: | 0_2_00007FF6AB3DFB3C | |
Source: | Code function: | 0_2_00007FF6AB3DFBF0 | |
Source: | Code function: | 0_2_00007FF6AB3DF9E4 | |
Source: | Code function: | 0_2_00007FF6AB3D6050 | |
Source: | Code function: | 0_2_00007FF6AB3BF05C | |
Source: | Code function: | 0_2_00007FF6AB3D646C | |
Source: | Code function: | 0_2_00007FF6AB3DF2D4 | |
Source: | Code function: | 0_2_00007FF6AB3DF7A0 | |
Source: | Code function: | 0_2_00007FF6AB3DF638 | |
Source: | Code function: | 0_2_00007FF6AB3DF708 |
Source: | Code function: | 0_2_00007FF6AB3C3F1C |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 Exploitation for Privilege Escalation | 1 Deobfuscate/Decode Files or Information | OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 DLL Side-Loading | LSASS Memory | 3 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Obfuscated Files or Information | Security Account Manager | 1 File and Directory Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | 22 System Information Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | 1 System Service Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1559401 |
Start date and time: | 2024-11-20 13:40:23 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 2s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 5 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | UDCC Launcher.exe |
Detection: | CLEAN |
Classification: | clean7.winEXE@1/0@0/0 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, W MIADAP.exe, SIHClient.exe, con host.exe - Excluded domains from analysis
(whitelisted): ocsp.digicert. com, slscr.update.microsoft.co m, otelrules.azureedge.net, ct ldl.windowsupdate.com, fe3cr.d elivery.mp.microsoft.com - Execution Graph export aborted
for target UDCC Launcher.exe, PID 2108 because there are no executed function - Not all processes where analyz
ed, report is missing behavior information - VT rate limit hit for: UDCC L
auncher.exe
File type: | |
Entropy (8bit): | 6.719887206744112 |
TrID: |
|
File name: | UDCC Launcher.exe |
File size: | 3'939'392 bytes |
MD5: | 47825d6efa91f5aef6974a9a4d0a0c93 |
SHA1: | 2d50927f87df83b3ceff8c547da1fc2b681ee73d |
SHA256: | fd0c79e2e708c31acec9421dd40cd8c7f7e254c1f46fd931dcfd8141dd44c7db |
SHA512: | 367801e88e830d13f960ea513e3af5104de9d25c5440aadf78e94ee46787bf6104381b75ddf31ae571ff140cd5199820121ff84f2dd1e336d8c46cfe0984852c |
SSDEEP: | 49152:ZlP/rZLtTfsMizM/zKHXx0z+sdKf3xQfbdAuV4TmJepHke4+ae6JqfL9:/lLtTfIzM/zCucO4KIpEe4+GE |
TLSH: | A8069D2BB26142E8D0A7C17889638A55EA717C140721A7CF06E5BB6F1F33BE01A7F715 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............x...x...x......Jx.......x.......x..=....x..=....x.......x..=....x.......x...x...y.......x....=..x.......x..Rich.x......... |
Icon Hash: | 0f274d444d71138e |
Entrypoint: | 0x1400237a4 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x140000000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x67371F10 [Fri Nov 15 10:14:40 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 8bd950ea6c7b3e36283d0a40b27e69a7 |
Signature Valid: | |
Signature Issuer: | |
Signature Validation Error: | |
Error Number: | |
Not Before, Not After | |
Subject Chain | |
Version: | |
Thumbprint MD5: | |
Thumbprint SHA-1: | |
Thumbprint SHA-256: | |
Serial: |
Instruction |
---|
dec eax |
sub esp, 28h |
call 00007FB91D3D9EF4h |
dec eax |
add esp, 28h |
jmp 00007FB91D3D95FFh |
int3 |
int3 |
dec eax |
sub esp, 28h |
dec ebp |
mov eax, dword ptr [ecx+38h] |
dec eax |
mov ecx, edx |
dec ecx |
mov edx, ecx |
call 00007FB91D3D9792h |
mov eax, 00000001h |
dec eax |
add esp, 28h |
ret |
int3 |
int3 |
int3 |
inc eax |
push ebx |
inc ebp |
mov ebx, dword ptr [eax] |
dec eax |
mov ebx, edx |
inc ecx |
and ebx, FFFFFFF8h |
dec esp |
mov ecx, ecx |
inc ecx |
test byte ptr [eax], 00000004h |
dec esp |
mov edx, ecx |
je 00007FB91D3D9795h |
inc ecx |
mov eax, dword ptr [eax+08h] |
dec ebp |
arpl word ptr [eax+04h], dx |
neg eax |
dec esp |
add edx, ecx |
dec eax |
arpl ax, cx |
dec esp |
and edx, ecx |
dec ecx |
arpl bx, ax |
dec edx |
mov edx, dword ptr [eax+edx] |
dec eax |
mov eax, dword ptr [ebx+10h] |
mov ecx, dword ptr [eax+08h] |
dec eax |
mov eax, dword ptr [ebx+08h] |
test byte ptr [ecx+eax+03h], 0000000Fh |
je 00007FB91D3D978Dh |
movzx eax, byte ptr [ecx+eax+03h] |
and eax, FFFFFFF0h |
dec esp |
add ecx, eax |
dec esp |
xor ecx, edx |
dec ecx |
mov ecx, ecx |
pop ebx |
jmp 00007FB91D3D8E42h |
int3 |
dec eax |
mov eax, esp |
dec eax |
mov dword ptr [eax+08h], ebx |
dec eax |
mov dword ptr [eax+10h], ebp |
dec eax |
mov dword ptr [eax+18h], esi |
dec eax |
mov dword ptr [eax+20h], edi |
inc ecx |
push esi |
dec eax |
sub esp, 20h |
dec ecx |
mov ebx, dword ptr [ecx+38h] |
dec eax |
mov esi, edx |
dec ebp |
mov esi, eax |
dec eax |
mov ebp, ecx |
dec ecx |
mov edx, ecx |
dec eax |
mov ecx, esi |
dec ecx |
mov edi, ecx |
dec esp |
lea eax, dword ptr [ebx+04h] |
call 00007FB91D3D96F1h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x5c630 | 0xf0 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x69000 | 0x9a590 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x63000 | 0x4e84 | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0xffe00 | 0x2920 | .rsrc |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x104000 | 0xc74 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x55b30 | 0x70 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x55d00 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x559f0 | 0x140 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x48000 | 0x708 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x46f8e | 0x47000 | af099a7b491a7b59fedc24346dd96a97 | False | 0.461394833846831 | data | 6.156815738498735 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x48000 | 0x1654a | 0x16600 | 5cfa08d02ab5c2d86873d52b8dc03ee0 | False | 0.39052679818435754 | data | 4.849513356739472 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x5f000 | 0x39f4 | 0x1e00 | 6e170c7bd632378a86f9330cc87a3353 | False | 0.18046875 | DOS executable (block device driver) | 3.40709858794464 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0x63000 | 0x4e84 | 0x5000 | 239ce4bf855fcc24f84771a6992300cc | False | 0.4576171875 | data | 5.535352131788659 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.fptable | 0x68000 | 0x100 | 0x200 | bf619eac0cdf3f68d496ea9344137e8b | False | 0.02734375 | data | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x69000 | 0x9a590 | 0x9a600 | a6af6889db7596a4323d868bfe54ea41 | False | 0.7977416497975709 | data | 7.445147893884647 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x104000 | 0xc74 | 0xe00 | 84db3eac539ea1146c7b5aef0d9f1220 | False | 0.4453125 | data | 5.21571073873519 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
ZIPRES | 0xb3e50 | 0x4f73b | Zip archive data, at least v2.0 to extract, compression method=deflate | Chinese | China | 0.9792308755972775 |
RT_ICON | 0x69280 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1024 | Chinese | China | 0.7393617021276596 |
RT_ICON | 0x696e8 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2304 | Chinese | China | 0.5975409836065574 |
RT_ICON | 0x6a070 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4096 | Chinese | China | 0.5220450281425891 |
RT_ICON | 0x6b118 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9216 | Chinese | China | 0.4074688796680498 |
RT_ICON | 0x6d6c0 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16384 | Chinese | China | 0.3299480396787907 |
RT_ICON | 0x718e8 | 0x5488 | Device independent bitmap graphic, 72 x 144 x 32, image size 20736 | Chinese | China | 0.3008780036968577 |
RT_ICON | 0x76d70 | 0x94a8 | Device independent bitmap graphic, 96 x 192 x 32, image size 36864 | Chinese | China | 0.2389899096068951 |
RT_ICON | 0x80218 | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 65536 | Chinese | China | 0.1853040340707441 |
RT_ICON | 0x90a40 | 0x23381 | PNG image data, 256 x 256, 16-bit/color RGBA, non-interlaced | Chinese | China | 0.9986759741295049 |
RT_GROUP_ICON | 0xb3dc8 | 0x84 | data | Chinese | China | 0.75 |
DLL | Import |
---|---|
KERNEL32.dll | LocalFree, Sleep, CreateEventW, WritePrivateProfileStringW, GetUserDefaultUILanguage, GetPrivateProfileStringW, CreateMutexW, HeapDestroy, HeapSize, HeapReAlloc, HeapFree, HeapAlloc, GetProcessHeap, SizeofResource, lstrcmpiW, LoadResource, FindResourceExW, FindResourceW, InitializeCriticalSectionEx, DecodePointer, WriteConsoleW, SetEndOfFile, SetStdHandle, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetCommandLineA, GetOEMCP, GetACP, LocalAlloc, LockResource, DeleteFileW, CreateDirectoryW, GetLastError, ReadFile, CreateProcessW, GetStartupInfoW, CreatePipe, IsValidCodePage, ReadConsoleW, GetConsoleMode, GetConsoleOutputCP, FlushFileBuffers, SetEvent, GetUserDefaultLCID, IsValidLocale, GetLocaleInfoW, LCMapStringW, VirtualProtect, FlsFree, FlsSetValue, FlsGetValue, FlsAlloc, SetFilePointerEx, GetFileSizeEx, GetFileType, WriteFile, GetStdHandle, GetModuleFileNameW, ExitProcess, GetModuleHandleExW, FreeLibraryAndExitThread, ExitThread, CreateThread, LoadLibraryExW, FreeLibrary, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, InitializeCriticalSectionAndSpinCount, SetLastError, RtlPcToFileHeader, RtlUnwindEx, InitializeSListHead, GetCurrentProcessId, IsProcessorFeaturePresent, TerminateProcess, GetCurrentProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, GetCPInfo, LCMapStringEx, EncodePointer, SleepConditionVariableSRW, WakeAllConditionVariable, TryAcquireSRWLockExclusive, AcquireSRWLockExclusive, CloseHandle, WaitForSingleObject, GetFileAttributesW, LeaveCriticalSection, EnterCriticalSection, DeleteCriticalSection, EnumSystemLocalesW, InitializeCriticalSection, ReleaseSRWLockExclusive, IsDebuggerPresent, OutputDebugStringW, RaiseException, QueryPerformanceCounter, QueryPerformanceFrequency, GetCurrentThreadId, FormatMessageA, GetLocaleInfoEx, WideCharToMultiByte, MultiByteToWideChar, GetStringTypeW, CreateFileW, FindClose, FindFirstFileW, FindFirstFileExW, FindNextFileW, GetFileAttributesExW, SetFileInformationByHandle, AreFileApisANSI, GetModuleHandleW, GetProcAddress, GetFileInformationByHandleEx, GetSystemTimeAsFileTime, RtlUnwind |
USER32.dll | SetWindowRgn, InvalidateRect, SendMessageW, SetWindowPos, SetWindowLongW, GetWindowLongW, GetSystemMetrics |
GDI32.dll | CreateRoundRectRgn, DeleteObject |
ADVAPI32.dll | RegOpenKeyExW, OpenSCManagerW, EnumServicesStatusExW, CloseServiceHandle, RegCloseKey |
SHELL32.dll | ShellExecuteExW, ShellExecuteW |
ole32.dll | CoUninitialize, CoInitialize |
OLEAUT32.dll | VariantClear, SysAllocString, SysFreeString |
UiLib_d_x64.dll | ??0CDuiString@UiLib@@QEAA@PEB_WH@Z, ?DeleteTrayIcon@CDuiTrayIcon@UiLib@@QEAAXXZ, ?GetTrayObject@CPaintManagerUI@UiLib@@QEAAAEAVCDuiTrayIcon@2@XZ, ??0CWindowWnd@UiLib@@QEAA@XZ, ?GetMessageMap@CNotifyPump@UiLib@@MEBAPEBUDUI_MSGMAP@2@XZ, ??0CStdStringPtrMap@UiLib@@QEAA@H@Z, ??1CStdStringPtrMap@UiLib@@QEAA@XZ, ?GetSuperClassName@CWindowWnd@UiLib@@MEBAPEB_WXZ, ?GetClassStyle@WindowImplBase@UiLib@@UEBAIXZ, ?HandleMessage@WindowImplBase@UiLib@@UEAA_JI_K_J@Z, ?OnFinalMessage@WindowImplBase@UiLib@@UEAAXPEAUHWND__@@@Z, ?OnClick@WindowImplBase@UiLib@@MEAAXAEAUtagTNotifyUI@2@@Z, ?GetResourceType@WindowImplBase@UiLib@@UEBA?AW4UILIB_RESOURCETYPE@2@XZ, ?GetZIPFileName@WindowImplBase@UiLib@@UEBA?AVCDuiString@2@XZ, ?GetResourceID@WindowImplBase@UiLib@@UEBAPEB_WXZ, ??0CDuiString@UiLib@@QEAA@AEBV01@@Z, ?OnDestroy@WindowImplBase@UiLib@@UEAA_JI_K_JAEAH@Z, ?OnNcActivate@WindowImplBase@UiLib@@UEAA_JI_K_JAEAH@Z, ?OnNcCalcSize@WindowImplBase@UiLib@@UEAA_JI_K_JAEAH@Z, ?OnNcPaint@WindowImplBase@UiLib@@UEAA_JI_K_JAEAH@Z, ?OnNcHitTest@WindowImplBase@UiLib@@UEAA_JI_K_JAEAH@Z, ?OnGetMinMaxInfo@WindowImplBase@UiLib@@UEAA_JI_K_JAEAH@Z, ?OnMouseWheel@WindowImplBase@UiLib@@UEAA_JI_K_JAEAH@Z, ?OnMouseHover@WindowImplBase@UiLib@@UEAA_JI_K_JAEAH@Z, ?OnSize@WindowImplBase@UiLib@@UEAA_JI_K_JAEAH@Z, ?OnChar@WindowImplBase@UiLib@@UEAA_JI_K_JAEAH@Z, ?OnSysCommand@WindowImplBase@UiLib@@UEAA_JI_K_JAEAH@Z, ?OnCreate@WindowImplBase@UiLib@@UEAA_JI_K_JAEAH@Z, ?OnKeyDown@WindowImplBase@UiLib@@UEAA_JI_K_JAEAH@Z, ?OnKillFocus@WindowImplBase@UiLib@@UEAA_JI_K_JAEAH@Z, ?OnSetFocus@WindowImplBase@UiLib@@UEAA_JI_K_JAEAH@Z, ?OnLButtonDown@WindowImplBase@UiLib@@UEAA_JI_K_JAEAH@Z, ?OnLButtonUp@WindowImplBase@UiLib@@UEAA_JI_K_JAEAH@Z, ?OnMouseMove@WindowImplBase@UiLib@@UEAA_JI_K_JAEAH@Z, ?HandleCustomMessage@WindowImplBase@UiLib@@UEAA_JI_K_JAEAH@Z, ?GetStyle@WindowImplBase@UiLib@@UEAAJXZ, ?GetMessageMap@WindowImplBase@UiLib@@MEBAPEBUDUI_MSGMAP@2@XZ, ?Notify@WindowImplBase@UiLib@@UEAAXAEAUtagTNotifyUI@2@@Z, ?MessageHandler@WindowImplBase@UiLib@@UEAA_JI_K_JAEA_N@Z, ?CreateControl@WindowImplBase@UiLib@@UEAAPEAVCControlUI@2@PEB_W@Z, ??0CPaintManagerUI@UiLib@@QEAA@XZ, ??1CPaintManagerUI@UiLib@@QEAA@XZ, ?FindControl@CPaintManagerUI@UiLib@@QEBAPEAVCControlUI@2@PEB_W@Z, ?SetValue@CProgressUI@UiLib@@QEAAXH@Z, ??BCDuiString@UiLib@@QEBAPEB_WXZ, ?GetCheck@CCheckBoxUI@UiLib@@QEBA_NXZ, ?GetHWND@CWindowWnd@UiLib@@QEBAPEAUHWND__@@XZ, ?Close@CWindowWnd@UiLib@@QEAAXI@Z, ?SetInstance@CPaintManagerUI@UiLib@@SAXPEAUHINSTANCE__@@@Z, ?Create@CWindowWnd@UiLib@@QEAAPEAUHWND__@@PEAU3@PEB_WKKHHHHPEAUHMENU__@@@Z, ?ShowModal@CWindowWnd@UiLib@@QEAAIH@Z, ??1CDuiString@UiLib@@QEAA@XZ, ?OnClose@WindowImplBase@UiLib@@UEAA_JI_K_JAEAH@Z |
WINTRUST.dll | WinVerifyTrust |
CRYPT32.dll | CryptMsgClose, CertFindCertificateInStore, CertGetNameStringW, CertFreeCertificateContext, CertCloseStore, CryptQueryObject, CryptMsgGetParam |
WINHTTP.dll | WinHttpReadData, WinHttpQueryHeaders, WinHttpConnect, WinHttpReceiveResponse, WinHttpSendRequest, WinHttpOpen, WinHttpCloseHandle, WinHttpOpenRequest |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
Chinese | China |
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 07:41:14 |
Start date: | 20/11/2024 |
Path: | C:\Users\user\Desktop\UDCC Launcher.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6ab3a0000 |
File size: | 3'939'392 bytes |
MD5 hash: | 47825D6EFA91F5AEF6974A9A4D0A0C93 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|