Edit tour

Windows Analysis Report
UnInstDaemon.exe

Overview

General Information

Sample name:UnInstDaemon.exe
Analysis ID:1662984
MD5:12efa0cf526660fb40b51cd0a6803243
SHA1:66240015b7a62f3be3a90ebac18e62ded16e87c8
SHA256:f4f04622550043b143e57dbbdd2029cfcf1bcbc44545ddff76201741e8bd8063
Infos:

Detection

Score:25
Range:0 - 100
Confidence:20%

Signatures

Found potential dummy code loops (likely to delay analysis)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Potential time zone aware malware
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64native
  • UnInstDaemon.exe (PID: 1132 cmdline: "C:\Users\TEMP\Desktop\UnInstDaemon.exe" MD5: 12EFA0CF526660FB40B51CD0A6803243)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: UnInstDaemon.exeStatic PE information: certificate valid
Source: UnInstDaemon.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeCode function: 4x nop then jmp 027411ABh0_2_02741058
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h0_2_02745CB8
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeCode function: 4x nop then jmp 027411ABh0_2_02741048
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h0_2_02745CAE
Source: UnInstDaemon.exeString found in binary or memory: https://dc.services.visualstudio.com/v2/trackH9116d88d-13b2-4182-8498-4530aac1b83f.Microsoft.BingWal
Source: UnInstDaemon.exeString found in binary or memory: https://dc.services.visualstudio.com/v2/trackSis
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess Stats: CPU usage > 6%
Source: UnInstDaemon.exe, 00000000.00000002.860627777946.00000000008FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs UnInstDaemon.exe
Source: UnInstDaemon.exe, ApplicationInsightsTelemetryService.csSuspicious method names: .ApplicationInsightsTelemetryService.BuildEventPayload
Source: UnInstDaemon.exe, ApplicationInsightsTelemetryService.csSuspicious method names: .ApplicationInsightsTelemetryService.BuildMetricPayload
Source: UnInstDaemon.exe, ApplicationInsightsTelemetryService.csSuspicious method names: .ApplicationInsightsTelemetryService.BuildExceptionPayload
Source: classification engineClassification label: sus25.evad.winEXE@1/0@0/0
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeMutant created: NULL
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeMutant created: \Sessions\1\BaseNamedObjects\bwu-{e200bcf0-fc02-4919-90a0-d3c3daeee66b}
Source: UnInstDaemon.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: UnInstDaemon.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeSection loaded: version.dllJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeSection loaded: edgegdi.dllJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeSection loaded: windows.applicationmodel.dllJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeSection loaded: appxdeploymentclient.dllJump to behavior
Source: UnInstDaemon.exeStatic PE information: certificate valid
Source: initial sampleStatic PE information: Valid certificate with Microsoft Issuer
Source: UnInstDaemon.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: UnInstDaemon.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: UnInstDaemon.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: UnInstDaemon.exeStatic PE information: 0x8A08C5CF [Thu May 21 14:18:55 2043 UTC]
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeMemory allocated: 2700000 memory reserve | memory write watchJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeMemory allocated: 2930000 memory reserve | memory write watchJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeMemory allocated: 2780000 memory reserve | memory write watchJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeWindow / User API: threadDelayed 9943Jump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exe TID: 5564Thread sleep count: 9943 > 30Jump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exe TID: 1048Thread sleep time: -2767011611056431s >= -30000sJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeSystem information queried: CurrentTimeZoneInformationJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeThread delayed: delay time: 922337203685477Jump to behavior

Anti Debugging

barindex
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeProcess Stats: CPU usage > 5% for more than 60s
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeQueries volume information: C:\Users\TEMP\Desktop\UnInstDaemon.exe VolumeInformationJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeQueries volume information: C:\Windows\System32\WinMetadata\Windows.Management.winmd VolumeInformationJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeQueries volume information: C:\Windows\System32\WinMetadata\Windows.Foundation.winmd VolumeInformationJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Runtime.dll VolumeInformationJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeQueries volume information: C:\Windows\System32\WinMetadata\Windows.ApplicationModel.winmd VolumeInformationJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.WindowsRuntime\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.WindowsRuntime.dll VolumeInformationJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeQueries volume information: C:\Windows\System32\WinMetadata\Windows.System.winmd VolumeInformationJump to behavior
Source: C:\Users\TEMP\Desktop\UnInstDaemon.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Disable or Modify Tools
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts133
Virtualization/Sandbox Evasion
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Timestomp
Security Account Manager133
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA Secrets12
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1662984 Sample: UnInstDaemon.exe Startdate: 11/04/2025 Architecture: WINDOWS Score: 25 4 UnInstDaemon.exe 2 2->4         started        signatures3 7 Found potential dummy code loops (likely to delay analysis) 4->7

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version

windows-stand
SourceDetectionScannerLabelLink
UnInstDaemon.exe0%ReversingLabs
UnInstDaemon.exe0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://dc.services.visualstudio.com/v2/trackSisUnInstDaemon.exefalse
    high
    https://dc.services.visualstudio.com/v2/trackH9116d88d-13b2-4182-8498-4530aac1b83f.Microsoft.BingWalUnInstDaemon.exefalse
      high
      No contacted IP infos
      Joe Sandbox version:42.0.0 Malachite
      Analysis ID:1662984
      Start date and time:2025-04-11 11:40:31 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 12m 50s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2021, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
      Run name:Suspected Instruction Hammering
      Number of analysed new started processes analysed:3
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Sample name:UnInstDaemon.exe
      Detection:SUS
      Classification:sus25.evad.winEXE@1/0@0/0
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 14
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
      • Exclude process from analysis (whitelisted): dllhost.exe, backgroundTaskHost.exe
      • Excluded IPs from analysis (whitelisted): 52.111.229.19, 20.42.73.30
      • Excluded domains from analysis (whitelisted): self.events.data.microsoft.com, ctldl.windowsupdate.com, nexusrules.officeapps.live.com
      TimeTypeDescription
      05:42:42API Interceptor30512704x Sleep call for process: UnInstDaemon.exe modified
      No context
      No context
      No context
      No context
      No context
      No created / dropped files found
      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
      Entropy (8bit):6.178702956029725
      TrID:
      • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
      • Win32 Executable (generic) a (10002005/4) 49.97%
      • Generic Win/DOS Executable (2004/3) 0.01%
      • DOS Executable Generic (2002/1) 0.01%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:UnInstDaemon.exe
      File size:50'736 bytes
      MD5:12efa0cf526660fb40b51cd0a6803243
      SHA1:66240015b7a62f3be3a90ebac18e62ded16e87c8
      SHA256:f4f04622550043b143e57dbbdd2029cfcf1bcbc44545ddff76201741e8bd8063
      SHA512:47f29be935eda5bf80c235192721bf6630d983d438dab9cec5b655050727462cc3549c1a52191bb44d02a9a41f962ea9278d8f376f0935eea623872c53094fb5
      SSDEEP:768:MLoYSq4vvB204klZaM/JcQgvRUSIDCCDJOTD+9zGAY:MLXS5H74FQjxD8TWzGAY
      TLSH:8C338F4DB3DC4613E9BF2ABAA87484510F77F567A911D76E0DC894D928A33814D20B3F
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0.................. ........@.. ....................................`................................
      Icon Hash:90cececece8e8eb0
      Entrypoint:0x40b11e
      Entrypoint Section:.text
      Digitally signed:true
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Time Stamp:0x8A08C5CF [Thu May 21 14:18:55 2043 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
      Signature Valid:true
      Signature Issuer:CN=Microsoft Code Signing PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
      Signature Validation Error:The operation completed successfully
      Error Number:0
      Not Before, Not After
      • 12/09/2024 22:11:13 11/09/2025 22:11:13
      Subject Chain
      • CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
      Version:3
      Thumbprint MD5:951A35417DAF1CB8A4336614BADF5A84
      Thumbprint SHA-1:245D262748012A4FE6CE8BA6C951A4C4AFBC3E5D
      Thumbprint SHA-256:4466ED9AEBC11CA869C22F056DF40297AB3FA8E0A3A12B3698F7E90AF7EF596D
      Serial:3300000403BDD5955D0F3B18AD000000000403
      Instruction
      jmp dword ptr [00402000h]
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0xb0cc0x4f.text
      IMAGE_DIRECTORY_ENTRY_RESOURCE0xc0000x614.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x9e000x2830
      IMAGE_DIRECTORY_ENTRY_BASERELOC0xe0000xc.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0xb0b00x1c.text
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x20000x91240x9200a4986203065bec262790fe498a908ab1False0.4438142123287671data5.808217058957112IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rsrc0xc0000x6140x800e338c042505c80a6866df2956bbd81dfFalse0.3310546875data3.4563042031927895IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0xe0000xc0x200c7bc3841c1f79f9e603aa0f946939057False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_VERSION0xc0900x384data0.41555555555555557
      RT_MANIFEST0xc4240x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
      DLLImport
      mscoree.dll_CorExeMain
      DescriptionData
      Translation0x0000 0x04b0
      Comments
      CompanyNameMicrosoft Corp.
      FileDescriptionUnInstDaemon
      FileVersion1.1.390.0
      InternalNameUnInstDaemon.exe
      LegalCopyrightCopyright Microsoft Corp. 2024
      LegalTrademarks
      OriginalFilenameUnInstDaemon.exe
      ProductNameUnInstDaemon
      ProductVersion1.1.390.0
      Assembly Version1.1.390.0
      No network behavior found
      0100200300s020406080100

      Click to jump to process

      0100200300s0.001020MB

      Click to jump to process

      • File
      • Registry

      Click to dive into process behavior distribution

      Target ID:0
      Start time:05:42:35
      Start date:11/04/2025
      Path:C:\Users\TEMP\Desktop\UnInstDaemon.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\TEMP\Desktop\UnInstDaemon.exe"
      Imagebase:0x400000
      File size:50'736 bytes
      MD5 hash:12EFA0CF526660FB40B51CD0A6803243
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Execution Graph

      Execution Coverage

      Dynamic/Packed Code Coverage

      Signature Coverage

      Execution Coverage:11.3%
      Dynamic/Decrypted Code Coverage:100%
      Signature Coverage:43.8%
      Total number of Nodes:16
      Total number of Limit Nodes:0
      Show Legend
      Hide Nodes/Edges
      execution_graph 4237 2740908 4238 2740924 4237->4238 4239 274097f 4238->4239 4241 2740ce8 4238->4241 4242 2740d1c 4241->4242 4246 2741058 4242->4246 4250 2741048 4242->4250 4243 2740d95 4243->4239 4247 274107c 4246->4247 4254 27406fc 4247->4254 4249 27410bd 4249->4243 4251 2741058 4250->4251 4252 27406fc GetUserGeoID 4251->4252 4253 27410bd 4252->4253 4253->4243 4255 27411d0 GetUserGeoID 4254->4255 4257 2741260 4255->4257 4257->4249

      Executed Functions

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 211 2741048-274107a 213 2741081-27410b8 call 27406fc 211->213 214 274107c 211->214 216 27410bd-27410d8 call 2740708 213->216 214->213 219 27410ea-27410ec 216->219 220 27410da-27410e8 216->220 221 27410ef-27410fa 219->221 220->221 222 2741100-2741169 call 2740714 221->222 223 274119b-27411bd 221->223 231 274119a 222->231 232 274116b-2741199 222->232 231->223 232->231
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.860628812122.0000000002740000.00000040.00000800.00020000.00000000.sdmp, Offset: 02740000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_2740000_UnInstDaemon.jbxd
      Similarity
      • API ID:
      • String ID: LR?i
      • API String ID: 0-4077793671
      • Opcode ID: db06a95a977da45fe394bf0a3978941689595dc0dc107ffa3d0b2b8c1cda3339
      • Instruction ID: fe5d66dda981303c3323aef01bc41a0c87c41e6760a54908af1bc1316283c32f
      • Opcode Fuzzy Hash: db06a95a977da45fe394bf0a3978941689595dc0dc107ffa3d0b2b8c1cda3339
      • Instruction Fuzzy Hash: 3741DD74D00258DFDB04DFE9D894ADCBBB2AF89304F10812AE419BB264EB345986CF14

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 236 2741058-274107a 237 2741081-27410b8 call 27406fc 236->237 238 274107c 236->238 240 27410bd-27410d8 call 2740708 237->240 238->237 243 27410ea-27410ec 240->243 244 27410da-27410e8 240->244 245 27410ef-27410fa 243->245 244->245 246 2741100-2741169 call 2740714 245->246 247 274119b-27411bd 245->247 255 274119a 246->255 256 274116b-2741199 246->256 255->247 256->255
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.860628812122.0000000002740000.00000040.00000800.00020000.00000000.sdmp, Offset: 02740000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_2740000_UnInstDaemon.jbxd
      Similarity
      • API ID:
      • String ID: LR?i
      • API String ID: 0-4077793671
      • Opcode ID: 1226f3e211571e7f882ec500c8cf57bfe780fa2dbea049b345cdf1215b684acd
      • Instruction ID: 02b67b32023376c10026a0fb79eca61e43ce370a78fff871658cff83aef333ca
      • Opcode Fuzzy Hash: 1226f3e211571e7f882ec500c8cf57bfe780fa2dbea049b345cdf1215b684acd
      • Instruction Fuzzy Hash: 0341BE74D01258CFCB08DFE9D844ADDBBF2AF89304F50912AE419BB264EB355985CF14

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 344 2745cae-2745da8 349 2745db1-2745dc8 344->349 350 2745daa-2745db0 344->350 351 2745ddf-2745e08 349->351 352 2745dca-2745dd8 349->352 350->349 357 2745e10-2745e48 351->357 352->351 359 2745e52-2745e56 357->359 360 2745e4a 357->360 361 2745e66 359->361 362 2745e58-2745e5c 359->362 360->359 365 2745e67 361->365 362->361 363 2745e5e-2745e61 call 27403fc 362->363 363->361 365->365
      Memory Dump Source
      • Source File: 00000000.00000002.860628812122.0000000002740000.00000040.00000800.00020000.00000000.sdmp, Offset: 02740000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_2740000_UnInstDaemon.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: b60eae3db2c0c0dcb15f115063a322f3b7440a6156079061075c5c1feae422e7
      • Instruction ID: 070fe4a6a9eb278d0ee7d0eb5ab65a07fba84d413b898622f88c9d5f6dad5834
      • Opcode Fuzzy Hash: b60eae3db2c0c0dcb15f115063a322f3b7440a6156079061075c5c1feae422e7
      • Instruction Fuzzy Hash: C251CE74D00218DFDB24CFA9C988BDEBBB1BF49308F20906AD509BB251DB75A945CF54

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 366 2745cb8-2745da8 370 2745db1-2745dc8 366->370 371 2745daa-2745db0 366->371 372 2745ddf-2745e08 370->372 373 2745dca-2745dd8 370->373 371->370 378 2745e10-2745e48 372->378 373->372 380 2745e52-2745e56 378->380 381 2745e4a 378->381 382 2745e66 380->382 383 2745e58-2745e5c 380->383 381->380 386 2745e67 382->386 383->382 384 2745e5e-2745e61 call 27403fc 383->384 384->382 386->386
      Memory Dump Source
      • Source File: 00000000.00000002.860628812122.0000000002740000.00000040.00000800.00020000.00000000.sdmp, Offset: 02740000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_2740000_UnInstDaemon.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: ab9f7e2db2cb2cf624592182a05ae9507ab72435292819a6c34ae6cadff535c5
      • Instruction ID: 38bd646eedb220ac0eef203976c8a9d4d5c54dab1745bb4c8e4022dad3f63bf8
      • Opcode Fuzzy Hash: ab9f7e2db2cb2cf624592182a05ae9507ab72435292819a6c34ae6cadff535c5
      • Instruction Fuzzy Hash: 6551BD74D00218DFDB24CFA9C988BDEBBB1BB49308F20906AD509BB251DB755985CF54

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 165 2740720-2740738 168 27406be-2741227 165->168 169 274073a-2740754 165->169 175 274122a-274125e GetUserGeoID 168->175 173 2740706 169->173 174 2740756-27407d8 169->174 173->165 177 2741267-2741295 175->177 178 2741260-2741266 175->178 178->177
      APIs
      • GetUserGeoID.KERNELBASE(?), ref: 0274124E
      Memory Dump Source
      • Source File: 00000000.00000002.860628812122.0000000002740000.00000040.00000800.00020000.00000000.sdmp, Offset: 02740000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_2740000_UnInstDaemon.jbxd
      Similarity
      • API ID: User
      • String ID:
      • API String ID: 765557111-0
      • Opcode ID: a561a4562a1c945288cb5d86f1ae9a5c5ae688cfb5ce37db0896263d17030712
      • Instruction ID: 505121d7af05793e6f85a87d31a91e86c1076905e491a636599eb40e86dcceda
      • Opcode Fuzzy Hash: a561a4562a1c945288cb5d86f1ae9a5c5ae688cfb5ce37db0896263d17030712
      • Instruction Fuzzy Hash: ED412475D09248DFCB02DFA9D880ADDBBB0EF4A314F00409AE955BB212D734A848CF65

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 181 27412a0-27412a4 182 27412a6-2741328 181->182 183 274122a-274125e GetUserGeoID 181->183 191 2741331-274135d 182->191 192 274132a-2741330 182->192 185 2741267-2741295 183->185 186 2741260-2741266 183->186 186->185 192->191
      APIs
      • GetUserGeoID.KERNELBASE(?), ref: 0274124E
      Memory Dump Source
      • Source File: 00000000.00000002.860628812122.0000000002740000.00000040.00000800.00020000.00000000.sdmp, Offset: 02740000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_2740000_UnInstDaemon.jbxd
      Similarity
      • API ID: User
      • String ID:
      • API String ID: 765557111-0
      • Opcode ID: f2b43536c2762b171c1a185f9f6c8f1d24b9bacca95fd2007b7da2ad4cdbbde3
      • Instruction ID: c507eb0be8a8f9cbe0c4e4052aef5048147eb96a3916673674a3d42cfe3ca25f
      • Opcode Fuzzy Hash: f2b43536c2762b171c1a185f9f6c8f1d24b9bacca95fd2007b7da2ad4cdbbde3
      • Instruction Fuzzy Hash: F84189B4E002189FCF10CFA9D584ADEFBF0AB49328F24905AE818B7251C775A945CFA5

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 195 27406fc-274125e GetUserGeoID 199 2741267-2741295 195->199 200 2741260-2741266 195->200 200->199
      APIs
      • GetUserGeoID.KERNELBASE(?), ref: 0274124E
      Memory Dump Source
      • Source File: 00000000.00000002.860628812122.0000000002740000.00000040.00000800.00020000.00000000.sdmp, Offset: 02740000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_2740000_UnInstDaemon.jbxd
      Similarity
      • API ID: User
      • String ID:
      • API String ID: 765557111-0
      • Opcode ID: 8cc21b8c7abe873fd74a62f7b2b5db12e0e0581aeff9fa73f9d0952087a34bf9
      • Instruction ID: 5889cddcc1cc1ce30cacb6a4819b5a12be7ff76eb3d15f78b23f07ac567dd32b
      • Opcode Fuzzy Hash: 8cc21b8c7abe873fd74a62f7b2b5db12e0e0581aeff9fa73f9d0952087a34bf9
      • Instruction Fuzzy Hash: 2F3199B4E042089FCB10DFA9E584ADEFBF4EB49314F10906AE818B7310D774A945CFA5

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 203 27411c9-2741227 206 274122a-274125e GetUserGeoID 203->206 207 2741267-2741295 206->207 208 2741260-2741266 206->208 208->207
      APIs
      • GetUserGeoID.KERNELBASE(?), ref: 0274124E
      Memory Dump Source
      • Source File: 00000000.00000002.860628812122.0000000002740000.00000040.00000800.00020000.00000000.sdmp, Offset: 02740000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_2740000_UnInstDaemon.jbxd
      Similarity
      • API ID: User
      • String ID:
      • API String ID: 765557111-0
      • Opcode ID: e7e405c49bf2ade3ebfa8b7241cded3e35605cd34f0400de8f379c7bdef0e46d
      • Instruction ID: ccd791717e1e77232edf26bc6c06a5e59e662cb7b3ba56d5106e16f41c0b449c
      • Opcode Fuzzy Hash: e7e405c49bf2ade3ebfa8b7241cded3e35605cd34f0400de8f379c7bdef0e46d
      • Instruction Fuzzy Hash: 533198B4D002189FCB10CFA9D584ADEFBF4AB49314F10906AE818B7310D734A945CFA5
      Memory Dump Source
      • Source File: 00000000.00000002.860628548014.0000000000DBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DBD000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_dbd000_UnInstDaemon.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 06fde09135bca3482cf1bcc1b8518654e3f64dd9f6e4ad715ef38e78f0360a00
      • Instruction ID: 1d2f0177fb26befed384eb85af8a13edeac4c7e6d2b93fe6979c8769c0c1ffc0
      • Opcode Fuzzy Hash: 06fde09135bca3482cf1bcc1b8518654e3f64dd9f6e4ad715ef38e78f0360a00
      • Instruction Fuzzy Hash: 23213375504244DFCB00DF14D8C4FAABB62FB98324F248569E94A0B246D736D806CBB2
      Memory Dump Source
      • Source File: 00000000.00000002.860628598290.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_dcd000_UnInstDaemon.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 1625498e1411f66688a68161165a4f33fa1c50920bd2b7cab26607843ef5ff2a
      • Instruction ID: 565bddf4069a43b8db0f1e5793c421207b8ecfaa6a209270ae7720b42c7421f7
      • Opcode Fuzzy Hash: 1625498e1411f66688a68161165a4f33fa1c50920bd2b7cab26607843ef5ff2a
      • Instruction Fuzzy Hash: 42210370204240DFCB10DF18DC84F16BBA2EB84314F24C97DE94A4B282C736D807DA72
      Memory Dump Source
      • Source File: 00000000.00000002.860628598290.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_dcd000_UnInstDaemon.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 8bc7c0b1ab8a3b621b55a45dda83cbee8e11eabe2cf0e73c3184d9c4fb3e1646
      • Instruction ID: eb56955c5d73c2a3e8020337604f025b4e6b74682d0954cb411e9965fee85367
      • Opcode Fuzzy Hash: 8bc7c0b1ab8a3b621b55a45dda83cbee8e11eabe2cf0e73c3184d9c4fb3e1646
      • Instruction Fuzzy Hash: 972186755093809FCB02CF24D994B15BF71EB46314F28C5EED8458B697C33A980ACB62
      Memory Dump Source
      • Source File: 00000000.00000002.860628548014.0000000000DBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DBD000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_dbd000_UnInstDaemon.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: d6b4a0f2dfa200fd812581ea48e0ce25dbd1a095eb2890e4a1de5da8ccd7432f
      • Instruction ID: 378f48a7a52b183c38ad04ecda1741e9a087bd6b5cb8889a50b53dc807e8456d
      • Opcode Fuzzy Hash: d6b4a0f2dfa200fd812581ea48e0ce25dbd1a095eb2890e4a1de5da8ccd7432f
      • Instruction Fuzzy Hash: 5111D376504280DFCB11CF10D9C4B56BF72FB94324F28C6A9D90A4B656C336D856CBA2
      Memory Dump Source
      • Source File: 00000000.00000002.860628548014.0000000000DBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DBD000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_dbd000_UnInstDaemon.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 25dbe0efac82d4abc3892cfde1dd1f6ebaadfcd56d0be7a123c0cb6ee456bc48
      • Instruction ID: 500320e0f8c35c0d9eb7bbac6d3886d258af6e3ce41508aa5a7a162526988723
      • Opcode Fuzzy Hash: 25dbe0efac82d4abc3892cfde1dd1f6ebaadfcd56d0be7a123c0cb6ee456bc48
      • Instruction Fuzzy Hash: 0501AC71108740DAE7105A15C9C87A7FF99DF41364F18C456ED4A5A282E779D841CA71
      Memory Dump Source
      • Source File: 00000000.00000002.860628548014.0000000000DBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DBD000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_dbd000_UnInstDaemon.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 3b9a00b86395c13f4ff783117732f55dbc6e269fd0c04904c6ba8c622ed0a608
      • Instruction ID: cbde7d9b838fb15b6b69a329ba4e4fd5a1b01cce80f25ad2670c6e7145f92d93
      • Opcode Fuzzy Hash: 3b9a00b86395c13f4ff783117732f55dbc6e269fd0c04904c6ba8c622ed0a608
      • Instruction Fuzzy Hash: 46F06271408740EEE7108E16C988B63FFA9EB51734F18C55AED095B286D2799C45CAB1