Edit tour

Windows Analysis Report
UnInstDaemon.exe

Overview

General Information

Sample name:UnInstDaemon.exe
Analysis ID:1662984
MD5:12efa0cf526660fb40b51cd0a6803243
SHA1:66240015b7a62f3be3a90ebac18e62ded16e87c8
SHA256:f4f04622550043b143e57dbbdd2029cfcf1bcbc44545ddff76201741e8bd8063
Infos:

Detection

Score:26
Range:0 - 100
Confidence:20%

Signatures

Found potential dummy code loops (likely to delay analysis)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Potential time zone aware malware
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • UnInstDaemon.exe (PID: 7976 cmdline: "C:\Users\user\Desktop\UnInstDaemon.exe" MD5: 12EFA0CF526660FB40B51CD0A6803243)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: UnInstDaemon.exeStatic PE information: certificate valid
Source: UnInstDaemon.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\UnInstDaemon.exeCode function: 4x nop then jmp 00A715ABh0_2_00A71458
Source: C:\Users\user\Desktop\UnInstDaemon.exeCode function: 4x nop then jmp 00A715ABh0_2_00A71449
Source: UnInstDaemon.exeString found in binary or memory: https://dc.services.visualstudio.com/v2/trackH9116d88d-13b2-4182-8498-4530aac1b83f.Microsoft.BingWal
Source: UnInstDaemon.exeString found in binary or memory: https://dc.services.visualstudio.com/v2/trackSis
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess Stats: CPU usage > 49%
Source: UnInstDaemon.exe, 00000000.00000002.3706577552.00000000006F8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs UnInstDaemon.exe
Source: UnInstDaemon.exe, 00000000.00000002.3707245382.0000000000AAE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs UnInstDaemon.exe
Source: UnInstDaemon.exe, ApplicationInsightsTelemetryService.csSuspicious method names: .ApplicationInsightsTelemetryService.BuildEventPayload
Source: UnInstDaemon.exe, ApplicationInsightsTelemetryService.csSuspicious method names: .ApplicationInsightsTelemetryService.BuildMetricPayload
Source: UnInstDaemon.exe, ApplicationInsightsTelemetryService.csSuspicious method names: .ApplicationInsightsTelemetryService.BuildExceptionPayload
Source: classification engineClassification label: sus26.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\UnInstDaemon.exeMutant created: NULL
Source: C:\Users\user\Desktop\UnInstDaemon.exeMutant created: \Sessions\1\BaseNamedObjects\bwu-{e200bcf0-fc02-4919-90a0-d3c3daeee66b}
Source: UnInstDaemon.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: UnInstDaemon.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
Source: C:\Users\user\Desktop\UnInstDaemon.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeSection loaded: windows.applicationmodel.dllJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeSection loaded: appxdeploymentclient.dllJump to behavior
Source: UnInstDaemon.exeStatic PE information: certificate valid
Source: initial sampleStatic PE information: Valid certificate with Microsoft Issuer
Source: UnInstDaemon.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: UnInstDaemon.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: UnInstDaemon.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: UnInstDaemon.exeStatic PE information: 0x8A08C5CF [Thu May 21 14:18:55 2043 UTC]
Source: C:\Users\user\Desktop\UnInstDaemon.exeCode function: 0_2_00A742D7 push ebx; ret 0_2_00A742DA
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeMemory allocated: A40000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeMemory allocated: 26C0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeMemory allocated: 2440000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeWindow / User API: threadDelayed 1890Jump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeWindow / User API: threadDelayed 7928Jump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exe TID: 8020Thread sleep count: 1890 > 30Jump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exe TID: 8020Thread sleep count: 7928 > 30Jump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exe TID: 8024Thread sleep time: -26747778906878833s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeSystem information queried: CurrentTimeZoneInformationJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\UnInstDaemon.exeThread delayed: delay time: 922337203685477Jump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\UnInstDaemon.exeProcess Stats: CPU usage > 42% for more than 60s
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\UnInstDaemon.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeQueries volume information: C:\Users\user\Desktop\UnInstDaemon.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeQueries volume information: C:\Windows\System32\WinMetadata\Windows.Management.winmd VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeQueries volume information: C:\Windows\System32\WinMetadata\Windows.Foundation.winmd VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeQueries volume information: C:\Windows\System32\WinMetadata\Windows.ApplicationModel.winmd VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeQueries volume information: C:\Windows\System32\WinMetadata\Windows.System.winmd VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UnInstDaemon.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Disable or Modify Tools
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts133
Virtualization/Sandbox Evasion
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Timestomp
Security Account Manager133
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
Obfuscated Files or Information
LSA Secrets12
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1662984 Sample: UnInstDaemon.exe Startdate: 11/04/2025 Architecture: WINDOWS Score: 26 4 UnInstDaemon.exe 2 2->4         started        signatures3 7 Found potential dummy code loops (likely to delay analysis) 4->7

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

No bigger version

windows-stand
SourceDetectionScannerLabelLink
UnInstDaemon.exe0%VirustotalBrowse
UnInstDaemon.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://dc.services.visualstudio.com/v2/trackSisUnInstDaemon.exefalse
    high
    https://dc.services.visualstudio.com/v2/trackH9116d88d-13b2-4182-8498-4530aac1b83f.Microsoft.BingWalUnInstDaemon.exefalse
      high
      No contacted IP infos
      Joe Sandbox version:42.0.0 Malachite
      Analysis ID:1662984
      Start date and time:2025-04-11 11:33:37 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 6m 21s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:10
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:UnInstDaemon.exe
      Detection:SUS
      Classification:sus26.evad.winEXE@1/0@0/0
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 12
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Override analysis time to 240s for sample files taking high CPU consumption
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 23.1.62.115, 52.149.20.212, 150.171.27.254
      • Excluded domains from analysis (whitelisted): c2a9c95e369881c67228a6591cac2686.clo.footprintdns.com, ax-ring.msedge.net, fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, c.pki.goog, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      TimeTypeDescription
      05:34:31API Interceptor17419633x Sleep call for process: UnInstDaemon.exe modified
      No context
      No context
      No context
      No context
      No context
      No created / dropped files found
      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
      Entropy (8bit):6.178702956029725
      TrID:
      • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
      • Win32 Executable (generic) a (10002005/4) 49.97%
      • Generic Win/DOS Executable (2004/3) 0.01%
      • DOS Executable Generic (2002/1) 0.01%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:UnInstDaemon.exe
      File size:50'736 bytes
      MD5:12efa0cf526660fb40b51cd0a6803243
      SHA1:66240015b7a62f3be3a90ebac18e62ded16e87c8
      SHA256:f4f04622550043b143e57dbbdd2029cfcf1bcbc44545ddff76201741e8bd8063
      SHA512:47f29be935eda5bf80c235192721bf6630d983d438dab9cec5b655050727462cc3549c1a52191bb44d02a9a41f962ea9278d8f376f0935eea623872c53094fb5
      SSDEEP:768:MLoYSq4vvB204klZaM/JcQgvRUSIDCCDJOTD+9zGAY:MLXS5H74FQjxD8TWzGAY
      TLSH:8C338F4DB3DC4613E9BF2ABAA87484510F77F567A911D76E0DC894D928A33814D20B3F
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0.................. ........@.. ....................................`................................
      Icon Hash:90cececece8e8eb0
      Entrypoint:0x40b11e
      Entrypoint Section:.text
      Digitally signed:true
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Time Stamp:0x8A08C5CF [Thu May 21 14:18:55 2043 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
      Signature Valid:true
      Signature Issuer:CN=Microsoft Code Signing PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
      Signature Validation Error:The operation completed successfully
      Error Number:0
      Not Before, Not After
      • 12/09/2024 22:11:13 11/09/2025 22:11:13
      Subject Chain
      • CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
      Version:3
      Thumbprint MD5:951A35417DAF1CB8A4336614BADF5A84
      Thumbprint SHA-1:245D262748012A4FE6CE8BA6C951A4C4AFBC3E5D
      Thumbprint SHA-256:4466ED9AEBC11CA869C22F056DF40297AB3FA8E0A3A12B3698F7E90AF7EF596D
      Serial:3300000403BDD5955D0F3B18AD000000000403
      Instruction
      jmp dword ptr [00402000h]
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0xb0cc0x4f.text
      IMAGE_DIRECTORY_ENTRY_RESOURCE0xc0000x614.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x9e000x2830
      IMAGE_DIRECTORY_ENTRY_BASERELOC0xe0000xc.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0xb0b00x1c.text
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x20000x91240x9200a4986203065bec262790fe498a908ab1False0.4438142123287671data5.808217058957112IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rsrc0xc0000x6140x800e338c042505c80a6866df2956bbd81dfFalse0.3310546875data3.4563042031927895IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0xe0000xc0x200c7bc3841c1f79f9e603aa0f946939057False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_VERSION0xc0900x384data0.41555555555555557
      RT_MANIFEST0xc4240x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
      DLLImport
      mscoree.dll_CorExeMain
      DescriptionData
      Translation0x0000 0x04b0
      Comments
      CompanyNameMicrosoft Corp.
      FileDescriptionUnInstDaemon
      FileVersion1.1.390.0
      InternalNameUnInstDaemon.exe
      LegalCopyrightCopyright Microsoft Corp. 2024
      LegalTrademarks
      OriginalFilenameUnInstDaemon.exe
      ProductNameUnInstDaemon
      ProductVersion1.1.390.0
      Assembly Version1.1.390.0

      Download Network PCAP: filteredfull

      TimestampSource PortDest PortSource IPDest IP
      Apr 11, 2025 11:35:08.675548077 CEST5365084162.159.36.2192.168.2.5
      050100150200s020406080100

      Click to jump to process

      050100150200s0.001020MB

      Click to jump to process

      • File
      • Registry

      Click to dive into process behavior distribution

      Target ID:0
      Start time:05:34:25
      Start date:11/04/2025
      Path:C:\Users\user\Desktop\UnInstDaemon.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\UnInstDaemon.exe"
      Imagebase:0x2d0000
      File size:50'736 bytes
      MD5 hash:12EFA0CF526660FB40B51CD0A6803243
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Execution Graph

      Execution Coverage

      Dynamic/Packed Code Coverage

      Signature Coverage

      Execution Coverage:8.2%
      Dynamic/Decrypted Code Coverage:100%
      Signature Coverage:25.9%
      Total number of Nodes:27
      Total number of Limit Nodes:0
      Show Legend
      Hide Nodes/Edges
      execution_graph 13177 a7acf0 13178 a7ad36 13177->13178 13182 a7aec0 13178->13182 13186 a7aed0 13178->13186 13179 a7ae23 13183 a7aed0 13182->13183 13189 a7a8b0 13183->13189 13187 a7a8b0 DuplicateHandle 13186->13187 13188 a7aefe 13187->13188 13188->13179 13190 a7af38 DuplicateHandle 13189->13190 13191 a7aefe 13190->13191 13191->13179 13156 a70d08 13157 a70d24 13156->13157 13158 a70d7f 13157->13158 13160 a710e8 13157->13160 13161 a7111c 13160->13161 13165 a71449 13161->13165 13169 a71458 13161->13169 13164 a71195 13164->13158 13166 a71458 13165->13166 13173 a70c24 13166->13173 13168 a714bd 13168->13164 13170 a7147c 13169->13170 13171 a70c24 GetUserGeoID 13170->13171 13172 a714bd 13171->13172 13172->13164 13174 a715d0 GetUserGeoID 13173->13174 13176 a71660 13174->13176 13176->13168

      Executed Functions

      Memory Dump Source
      • Source File: 00000000.00000002.3707198410.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_a70000_UnInstDaemon.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 0f28a7f938f8c36eeaa8e5ef8da01df156f069a6853f5f1100bfa11776be2fb0
      • Instruction ID: 220c56a7f11cf1df8e1e54d9ffb7cb32dc5bcd2cfaf77bb268d730a431aa6987
      • Opcode Fuzzy Hash: 0f28a7f938f8c36eeaa8e5ef8da01df156f069a6853f5f1100bfa11776be2fb0
      • Instruction Fuzzy Hash: 2941CA74D00218CFDB18DFE9D984AEDBBF2BB89300F24812AE409AB264D7355986CF14
      Memory Dump Source
      • Source File: 00000000.00000002.3707198410.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_a70000_UnInstDaemon.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: ceb593088a4b3886085564ea20f95b6545cb4ec4e3c2a0591228a7c9c6622237
      • Instruction ID: b933dbf3e218d173133d93a81f3bff3d70ccc8a6988a98ca4e6d9e90dbfbac6e
      • Opcode Fuzzy Hash: ceb593088a4b3886085564ea20f95b6545cb4ec4e3c2a0591228a7c9c6622237
      • Instruction Fuzzy Hash: 8F41AB75D01218CFDB18DFE9D984ADDBBF2AF89300F20812AE419BB264D7355946CF14

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 0 a7a8b0-a7b013 DuplicateHandle 2 a7b015-a7b01b 0->2 3 a7b01c-a7b05c 0->3 2->3
      APIs
      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00A7B003
      Memory Dump Source
      • Source File: 00000000.00000002.3707198410.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_a70000_UnInstDaemon.jbxd
      Similarity
      • API ID: DuplicateHandle
      • String ID:
      • API String ID: 3793708945-0
      • Opcode ID: 7fa9afc070bc0d0f07d0a198933ce33fbef80c3a89a1cd4d9dd913e3742986a5
      • Instruction ID: f66555d6158ed61a559f89511a734d39d1ec3a3910297672b0911bbc4b1593f8
      • Opcode Fuzzy Hash: 7fa9afc070bc0d0f07d0a198933ce33fbef80c3a89a1cd4d9dd913e3742986a5
      • Instruction Fuzzy Hash: 8D4176B9D002589FCF10CFA9D984ADEBBF5BB19310F14906AE918BB310D335A945DFA4

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 7 a7af30 8 a7af35-a7b013 DuplicateHandle 7->8 9 a7b015-a7b01b 8->9 10 a7b01c-a7b05c 8->10 9->10
      APIs
      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00A7B003
      Memory Dump Source
      • Source File: 00000000.00000002.3707198410.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_a70000_UnInstDaemon.jbxd
      Similarity
      • API ID: DuplicateHandle
      • String ID:
      • API String ID: 3793708945-0
      • Opcode ID: 986f3a08db475b23c6343f5f9ae741c75e407eab1aff2e3e661cc9b3a2f37c0d
      • Instruction ID: 8aaee132b39d193059c16805a03c3569263f58369b64443eedc63cd6a7207aa6
      • Opcode Fuzzy Hash: 986f3a08db475b23c6343f5f9ae741c75e407eab1aff2e3e661cc9b3a2f37c0d
      • Instruction Fuzzy Hash: 314166B9D002589FCB10CFA9D984ADEBFF5BB09310F14902AE918BB310D375A945CF64

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 14 a70c24-a7165e GetUserGeoID 17 a71667-a71695 14->17 18 a71660-a71666 14->18 18->17
      APIs
      • GetUserGeoID.KERNELBASE(?), ref: 00A7164E
      Memory Dump Source
      • Source File: 00000000.00000002.3707198410.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_a70000_UnInstDaemon.jbxd
      Similarity
      • API ID: User
      • String ID:
      • API String ID: 765557111-0
      • Opcode ID: 96335287807cf75df4e017bfc9565bf7c78a8934612a87b151dface43a860e3a
      • Instruction ID: aaaa9401656323ec27e9e06f49b2a36eba2ad37d50e88659d5b274f200c377aa
      • Opcode Fuzzy Hash: 96335287807cf75df4e017bfc9565bf7c78a8934612a87b151dface43a860e3a
      • Instruction Fuzzy Hash: 543199B8D002589FCB10CFA9D984ADEFBF4EB49314F24906AE918B7310D775A945CFA4

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 21 a715c8-a7160d 22 a71615-a7165e GetUserGeoID 21->22 23 a71667-a71695 22->23 24 a71660-a71666 22->24 24->23
      APIs
      • GetUserGeoID.KERNELBASE(?), ref: 00A7164E
      Memory Dump Source
      • Source File: 00000000.00000002.3707198410.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_a70000_UnInstDaemon.jbxd
      Similarity
      • API ID: User
      • String ID:
      • API String ID: 765557111-0
      • Opcode ID: f8f5436a56e9e6979b7705e15fa6295b8861f2753fca239ddee21e0546cc9051
      • Instruction ID: 2f0e4c41847628db3e7a137942a53452fd2b50820fef2ce60f183b358c290e2f
      • Opcode Fuzzy Hash: f8f5436a56e9e6979b7705e15fa6295b8861f2753fca239ddee21e0546cc9051
      • Instruction Fuzzy Hash: CB3199B8D002589FCB10CFA9D984ADEFBF4BB49314F24906AE918B7310D735A945CFA4
      Memory Dump Source
      • Source File: 00000000.00000002.3706774595.000000000089D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0089D000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_89d000_UnInstDaemon.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: db48a151adaefef5ead8f8875d5f5491be92ed9d95510404872a2dcc28076acb
      • Instruction ID: 587c8c9d67f343954dc5e67cb90e9b7460c69cc7a7081132c7721aae83eb0c09
      • Opcode Fuzzy Hash: db48a151adaefef5ead8f8875d5f5491be92ed9d95510404872a2dcc28076acb
      • Instruction Fuzzy Hash: DB213772504304EFDF15EF54D9C0B26BF65FB88324F28C569E9098B256C336D816CBA2
      Memory Dump Source
      • Source File: 00000000.00000002.3706818804.00000000008AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 008AD000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_8ad000_UnInstDaemon.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: d3a65cb14ec1b01f82340171db51d782cac9f771d9d476ed59e2c7d43c9d7281
      • Instruction ID: b8092f66a2c9a0773522bdd3bb3ed8e1edb72832cd38702657a621e68576c7d4
      • Opcode Fuzzy Hash: d3a65cb14ec1b01f82340171db51d782cac9f771d9d476ed59e2c7d43c9d7281
      • Instruction Fuzzy Hash: E4212271604704DFEB15DF24D980B26BB65FB89314F20C569E90ACBA86C33AD807CA61
      Memory Dump Source
      • Source File: 00000000.00000002.3706818804.00000000008AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 008AD000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_8ad000_UnInstDaemon.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: c92a6ffe031441b7138e50cb6c61bdf6187c4c617e927d528423a5e0d4c2972b
      • Instruction ID: 5d55c87716ea5d519952f7cf54c9582df4936efa8f604ea9a274eda0276272e5
      • Opcode Fuzzy Hash: c92a6ffe031441b7138e50cb6c61bdf6187c4c617e927d528423a5e0d4c2972b
      • Instruction Fuzzy Hash: 60214F755087809FDB02CF24D994B11BF71FB46314F28C5EAD8498F6A7C33A985ACB62
      Memory Dump Source
      • Source File: 00000000.00000002.3706774595.000000000089D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0089D000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_89d000_UnInstDaemon.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e68199e4efcf8fe5faf796e1eb00fdac1bd40fbc6b1f5683208f03f6d852d321
      • Instruction ID: 09d41df29ae7190552f68f194f9495c1330b868d8f93adf9aa249b06213b9420
      • Opcode Fuzzy Hash: e68199e4efcf8fe5faf796e1eb00fdac1bd40fbc6b1f5683208f03f6d852d321
      • Instruction Fuzzy Hash: 1D11E176504280DFCF12DF54D5C0B16BF71FB84310F28C5A9D8094B256C33AD85ACBA1
      Memory Dump Source
      • Source File: 00000000.00000002.3706774595.000000000089D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0089D000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_89d000_UnInstDaemon.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 9b1482310a84a8d4917ad321615d0e56c72d0aed1743c6392710e3a4f75ebeeb
      • Instruction ID: 48b2edfa4f4a40a0071a5fef2be390085c5d5125e981e69cc2b143bf6472bb5a
      • Opcode Fuzzy Hash: 9b1482310a84a8d4917ad321615d0e56c72d0aed1743c6392710e3a4f75ebeeb
      • Instruction Fuzzy Hash: B101A7714057449AEB21AB25CD84B67BF98FF91334F2CC41AED098B282C2799842CAB5
      Memory Dump Source
      • Source File: 00000000.00000002.3706774595.000000000089D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0089D000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_89d000_UnInstDaemon.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: bbe4d0e2b3a566c93fae331a15ab2117eb1d9c43bf2d2007eb2fec8dade0b730
      • Instruction ID: f45163bf132e36c0ccac130af391d8de0581ed96fcf300b8ad0c447f8406e9f2
      • Opcode Fuzzy Hash: bbe4d0e2b3a566c93fae331a15ab2117eb1d9c43bf2d2007eb2fec8dade0b730
      • Instruction Fuzzy Hash: 2FF0C271404344AEEB108F19CD84B62FF98FB91324F28C45BED084B286C2799841CAB1