Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
UxaZyTE7nq.exe

Overview

General Information

Sample Name:UxaZyTE7nq.exe
Original Sample Name:91a442b21fb353b221ea33e767c7fe1b.exe
Analysis ID:816262
MD5:91a442b21fb353b221ea33e767c7fe1b
SHA1:e58e0d08ebdc5e91f43631b339c573a732c07056
SHA256:35330f1bbbc0f361845b9b987e2f4ac70cdb96ab3f9e80161c2b8971c7df0df4
Tags:exe
Infos:

Detection

AsyncRAT, DcRat, VenomRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected UAC Bypass using CMSTP
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Yara detected DcRat
Yara detected VenomRAT
Yara detected AsyncRAT
Snort IDS alert for network traffic
Writes to foreign memory regions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Sample is not signed and drops a device driver
Machine Learning detection for sample
Injects a PE file into a foreign processes
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to call native functions
Found dropped PE file which has not been started or loaded
Contains long sleeps (>= 3 min)
Enables debug privileges
Is looking for software installed on the system
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Contains functionality to load drivers
AV process strings found (often used to terminate AV products)
PE file does not import any functions
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
Enables driver privileges
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates driver files
Binary contains a suspicious time stamp
Spawns drivers
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates or modifies windows services
Dropped file seen in connection with other malware
Creates a process in suspended mode (likely to inject code)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)

Classification

  • System is w10x64
  • UxaZyTE7nq.exe (PID: 5248 cmdline: C:\Users\user\Desktop\UxaZyTE7nq.exe MD5: 91A442B21FB353B221EA33E767C7FE1B)
    • MSBuild.exe (PID: 3164 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe MD5: 8B9E68304AF4B81C9AB70CB2220EBA74)
    • aspnet_regsql.exe (PID: 4860 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe MD5: F31014EE4DE7FE48E9B7C9BE94CFB45F)
    • AddInProcess.exe (PID: 1792 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe MD5: 11D8A500C4C0FBAF20EBDB8CDF6EA452)
    • EdmGen.exe (PID: 4856 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe MD5: 2B6A31DFD7C9ED8B413DBDAB800F10F3)
    • RegAsm.exe (PID: 4916 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe MD5: 2B5D765B33C67EBA41E9F47954227BC3)
    • Microsoft.Workflow.Compiler.exe (PID: 3232 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe MD5: D91462AE31562E241AF5595BA5E1A3C4)
    • SMSvcHost.exe (PID: 5564 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe MD5: 7EC8B56348F9298BCCA7A745C7F70E2C)
    • ngen.exe (PID: 1368 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe MD5: FBA5E8D94C9EADC279BC06B9CF041A9A)
    • aspnet_regbrowsers.exe (PID: 784 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe MD5: BF7E443F1E1FA88AD5A2A5EB44F42834)
    • AddInUtil.exe (PID: 4504 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe MD5: 65D30D747EB31E108A36EBC966C1227D)
    • mscorsvw.exe (PID: 4840 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe MD5: B00E9325AC7356A3F4864EAAAD48E13F)
    • cvtres.exe (PID: 3440 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe MD5: 33BB8BE0B4F547324D93D5D2725CAC3D)
    • ServiceModelReg.exe (PID: 5388 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe MD5: 80B018258257C2F78CBFE08198883AC1)
    • jsc.exe (PID: 4532 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe MD5: 2B40A449D6034F41771A460DADD53A60)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
NameDescriptionAttributionBlogpost URLsLink
DCRatDCRat is a typical RAT that has been around since at least June 2019.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.dcrat
{"Server": "127.0.0.1,91.134.187.20", "Ports": "4449", "Version": "Venom RAT + HVNC + Stealer + Grabber  v6.0.1", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "fLhIsNqVZyP3FtIfE3paid39lvLLS0GF", "Mutex": "mhtuxtjimxsu", "Certificate": "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", "ServerSignature": "kFvNmgZ/O5v1sx/qrRRjCJ65ULSYW0YUs6D8HUtcZiIPmdxxX1FnuqnG7Hqf58PvDX3GI/brbGZ53PRUq5Q2RpiVxj+vfAPMR0vYli5u3fC8P3PEfV6q8ByxVzA/JPq19BNQyRc/ggnXxDaQb3mMnaO7P9LiftEDaJle8Xfr3Kk=", "BDOS": "null", "External_config_on_Pastebin": "false"}
{"Server": "127.0.0.1,91.134.187.20", "Ports": "4449", "Version": "Venom RAT + HVNC + Stealer + Grabber  v6.0.1", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "fLhIsNqVZyP3FtIfE3paid39lvLLS0GF", "Mutex": "mhtuxtjimxsu", "Certificate": "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", "ServerSignature": "kFvNmgZ/O5v1sx/qrRRjCJ65ULSYW0YUs6D8HUtcZiIPmdxxX1FnuqnG7Hqf58PvDX3GI/brbGZ53PRUq5Q2RpiVxj+vfAPMR0vYli5u3fC8P3PEfV6q8ByxVzA/JPq19BNQyRc/ggnXxDaQb3mMnaO7P9LiftEDaJle8Xfr3Kk=", "BDOS": "null"}
SourceRuleDescriptionAuthorStrings
0000000E.00000002.512134947.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    00000000.00000002.266467876.000001DC931AA000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
      0000000E.00000002.513654530.00000000030B0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DcRat_2Yara detected DcRatJoe Security
        00000000.00000002.266467876.000001DC9326F000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          Process Memory Space: UxaZyTE7nq.exe PID: 5248JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            0.2.UxaZyTE7nq.exe.1dc9347bb50.2.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
              0.2.UxaZyTE7nq.exe.1dc9347bb50.2.raw.unpackINDICATOR_SUSPICIOUS_DisableWinDefenderDetects executables containing artifcats associated with disabling Widnows DefenderditekSHen
              • 0x9d0d:$e1: Microsoft\Windows Defender\Exclusions\Paths
              • 0x9d3c:$e2: Add-MpPreference -ExclusionPath
              0.2.UxaZyTE7nq.exe.1dc9347bb50.2.raw.unpackINDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOMDetects executables embedding command execution via IExecuteCommand COM objectditekSHen
              • 0x9cdd:$r1: Classes\Folder\shell\open\command
              • 0x912c:$k1: DelegateExecute
              0.2.UxaZyTE7nq.exe.1dc931dd380.3.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
                0.2.UxaZyTE7nq.exe.1dc931dd380.3.unpackINDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDeviceDetects executables attemping to enumerate video devices using WMIditekSHen
                • 0xda88:$q1: Select * from Win32_CacheMemory
                • 0xdac8:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
                • 0xdb16:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
                • 0xdb64:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
                Click to see the 8 entries
                No Sigma rule has matched
                Timestamp:91.134.187.20192.168.2.64449497182850454 02/27/23-19:11:47.671813
                SID:2850454
                Source Port:4449
                Destination Port:49718
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: UxaZyTE7nq.exeReversingLabs: Detection: 20%
                Source: UxaZyTE7nq.exeVirustotal: Detection: 22%Perma Link
                Source: UxaZyTE7nq.exeJoe Sandbox ML: detected
                Source: 0.2.UxaZyTE7nq.exe.1dc931dd380.3.raw.unpackMalware Configuration Extractor: AsyncRAT {"Server": "127.0.0.1,91.134.187.20", "Ports": "4449", "Version": "Venom RAT + HVNC + Stealer + Grabber v6.0.1", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "fLhIsNqVZyP3FtIfE3paid39lvLLS0GF", "Mutex": "mhtuxtjimxsu", "Certificate": "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", "ServerSignature": "kFvNmgZ/O5v1sx/qrRRjCJ65ULSYW0YUs6D8HUtcZiIPmdxxX1FnuqnG7Hqf58PvDX3GI/brbGZ53PRUq5Q2RpiVxj+vfAPMR0vYli5u3fC8P3PEfV6q8ByxVzA/JPq19BNQyRc/ggnXxDaQb3mMnaO7P9LiftEDaJle8Xfr3Kk=", "BDOS": "null", "External_config_on_Pastebin": "false"}
                Source: 0.2.UxaZyTE7nq.exe.1dc931dd380.3.raw.unpackMalware Configuration Extractor: VenomRAT {"Server": "127.0.0.1,91.134.187.20", "Ports": "4449", "Version": "Venom RAT + HVNC + Stealer + Grabber v6.0.1", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "fLhIsNqVZyP3FtIfE3paid39lvLLS0GF", "Mutex": "mhtuxtjimxsu", "Certificate": "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", "ServerSignature": "kFvNmgZ/O5v1sx/qrRRjCJ65ULSYW0YUs6D8HUtcZiIPmdxxX1FnuqnG7Hqf58PvDX3GI/brbGZ53PRUq5Q2RpiVxj+vfAPMR0vYli5u3fC8P3PEfV6q8ByxVzA/JPq19BNQyRc/ggnXxDaQb3mMnaO7P9LiftEDaJle8Xfr3Kk=", "BDOS": "null"}

                Exploits

                barindex
                Source: Yara matchFile source: 0.2.UxaZyTE7nq.exe.1dc9347bb50.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.266467876.000001DC9326F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: UxaZyTE7nq.exe PID: 5248, type: MEMORYSTR
                Source: UxaZyTE7nq.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: C:\Users\Bir_Mateb\source\repos\27 Feb 2023\FormElements-master\obj\Debug\FormElements.pdb source: UxaZyTE7nq.exe
                Source: Binary string: C:\agent\1\s\sys\x64\Release\ProcExpDriver.pdb source: UxaZyTE7nq.exe, 00000000.00000002.266467876.000001DC93093000.00000004.00000800.00020000.00000000.sdmp, UxaZyTE7nq.exe, 00000000.00000002.266467876.000001DC9326F000.00000004.00000800.00020000.00000000.sdmp, ?????.sys.0.dr

                Networking

                barindex
                Source: TrafficSnort IDS: 2850454 ETPRO TROJAN Observed Malicious SSL Cert (AsyncRAT) 91.134.187.20:4449 -> 192.168.2.6:49718
                Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
                Source: global trafficTCP traffic: 192.168.2.6:49718 -> 91.134.187.20:4449
                Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49685 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49683 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49684 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
                Source: unknownTCP traffic detected without corresponding DNS query: 40.90.65.8
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                Source: unknownTCP traffic detected without corresponding DNS query: 209.197.3.8
                Source: unknownTCP traffic detected without corresponding DNS query: 8.241.126.249
                Source: unknownTCP traffic detected without corresponding DNS query: 209.197.3.8
                Source: unknownTCP traffic detected without corresponding DNS query: 209.197.3.8
                Source: unknownTCP traffic detected without corresponding DNS query: 8.241.126.249
                Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.5
                Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.70
                Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.70
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: unknownTCP traffic detected without corresponding DNS query: 91.134.187.20
                Source: 77EC63BDA74BD0D0E0426DC8F80085060.14.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                Source: UxaZyTE7nq.exe, 00000000.00000002.266467876.000001DC93093000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 0000000E.00000002.513654530.0000000002EA1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 0000000E.00000002.513654530.000000000302F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: UxaZyTE7nq.exe, 00000000.00000002.266467876.000001DC93093000.00000004.00000800.00020000.00000000.sdmp, UxaZyTE7nq.exe, 00000000.00000002.266467876.000001DC9326F000.00000004.00000800.00020000.00000000.sdmp, ?????.sys.0.drString found in binary or memory: https://www.sysinternals.com0

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: Yara matchFile source: Process Memory Space: jsc.exe PID: 4532, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.UxaZyTE7nq.exe.1dc931dd380.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.UxaZyTE7nq.exe.1dc931cab58.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.jsc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.UxaZyTE7nq.exe.1dc931dd380.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.UxaZyTE7nq.exe.1dc931cab58.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.512134947.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.266467876.000001DC931AA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: UxaZyTE7nq.exe PID: 5248, type: MEMORYSTR

                System Summary

                barindex
                Source: 0.2.UxaZyTE7nq.exe.1dc9347bb50.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
                Source: 0.2.UxaZyTE7nq.exe.1dc9347bb50.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
                Source: 0.2.UxaZyTE7nq.exe.1dc931dd380.3.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                Source: 0.2.UxaZyTE7nq.exe.1dc931cab58.4.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                Source: 14.2.jsc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                Source: 0.2.UxaZyTE7nq.exe.1dc931dd380.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                Source: 0.2.UxaZyTE7nq.exe.1dc931cab58.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                Source: 0.2.UxaZyTE7nq.exe.1dc9347bb50.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
                Source: 0.2.UxaZyTE7nq.exe.1dc9347bb50.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
                Source: 0.2.UxaZyTE7nq.exe.1dc931dd380.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                Source: 0.2.UxaZyTE7nq.exe.1dc931cab58.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                Source: 14.2.jsc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                Source: 0.2.UxaZyTE7nq.exe.1dc931dd380.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                Source: 0.2.UxaZyTE7nq.exe.1dc931cab58.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeCode function: 0_2_00007FFCA44924AD0_2_00007FFCA44924AD
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeCode function: 0_2_00007FFCA44943080_2_00007FFCA4494308
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeCode function: 0_2_00007FFCA44943000_2_00007FFCA4494300
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeCode function: 0_2_00007FFCA44A5BC90_2_00007FFCA44A5BC9
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeCode function: 0_2_00007FFCA449BC590_2_00007FFCA449BC59
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeCode function: 0_2_00007FFCA44968580_2_00007FFCA4496858
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeCode function: 0_2_00007FFCA44990100_2_00007FFCA4499010
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeCode function: 14_2_0150DB0814_2_0150DB08
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeCode function: 14_2_01501EF014_2_01501EF0
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeCode function: 14_2_0150266814_2_01502668
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeCode function: 14_2_0150D9B014_2_0150D9B0
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeCode function: 14_2_01501EE214_2_01501EE2
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeCode function: 14_2_0586E32814_2_0586E328
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeCode function: 14_2_0586EBF814_2_0586EBF8
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeCode function: 14_2_05866E0014_2_05866E00
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeCode function: 14_2_0586DFE014_2_0586DFE0
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeCode function: 0_2_00007FFCA44A9254 NtLoadDriver,0_2_00007FFCA44A9254
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeCode function: 0_2_00007FFCA44902F8 NtResumeThread,0_2_00007FFCA44902F8
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeCode function: 0_2_00007FFCA44902E8 NtResumeThread,0_2_00007FFCA44902E8
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeCode function: 14_2_01502AC0 NtProtectVirtualMemory,14_2_01502AC0
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeCode function: 14_2_01502668 NtProtectVirtualMemory,14_2_01502668
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeCode function: 0_2_00007FFCA44A9254 NtLoadDriver,0_2_00007FFCA44A9254
                Source: UxaZyTE7nq.exeStatic PE information: No import functions for PE file found
                Source: UxaZyTE7nq.exe, 00000000.00000002.266309550.000001DC92F80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameRunpeX.Stub.Framework.exeL vs UxaZyTE7nq.exe
                Source: UxaZyTE7nq.exe, 00000000.00000002.266090632.000001DC916DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs UxaZyTE7nq.exe
                Source: UxaZyTE7nq.exe, 00000000.00000002.266467876.000001DC93093000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprocexp.SysB vs UxaZyTE7nq.exe
                Source: UxaZyTE7nq.exe, 00000000.00000002.266467876.000001DC931AA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientAny.exe" vs UxaZyTE7nq.exe
                Source: UxaZyTE7nq.exe, 00000000.00000002.271051377.000001DCA3077000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRunpeX.Stub.Framework.exeL vs UxaZyTE7nq.exe
                Source: UxaZyTE7nq.exe, 00000000.00000002.266467876.000001DC9326F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprocexp.SysB vs UxaZyTE7nq.exe
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess token adjusted: Load DriverJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeFile created: C:\Users\user\AppData\Local\Temp\?????.sysJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeDriver loaded: \Registry\Machine\System\CurrentControlSet\Services\TaskKillJump to behavior
                Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\?????.sys 440883CD9D6A76DB5E53517D0EC7FE13D5A50D2F6A7F91ECFC863BC3490E4F5C
                Source: UxaZyTE7nq.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: UxaZyTE7nq.exeReversingLabs: Detection: 20%
                Source: UxaZyTE7nq.exeVirustotal: Detection: 22%
                Source: UxaZyTE7nq.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\UxaZyTE7nq.exe C:\Users\user\Desktop\UxaZyTE7nq.exe
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exeJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exeJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exeJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exeJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exeJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exeJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exeJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exeJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exeJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeCode function: 0_2_00007FFCA44A8655 AdjustTokenPrivileges,0_2_00007FFCA44A8655
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Processor
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\UxaZyTE7nq.exe.logJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeFile created: C:\Users\user\AppData\Local\Temp\?????.sysJump to behavior
                Source: ?????.sys.0.drBinary string: \DosDevices\PROCEXP152\ObjectTypes\\Device\PROCEXP152PsAcquireProcessExitSynchronizationPsReleaseProcessExitSynchronizationMmGetMaximumNonPagedPoolInBytesObGetObjectTypeMutantIoCreateDeviceSecureIoValidateDeviceIoControlAccessD:P
                Source: classification engineClassification label: mal100.troj.expl.evad.winEXE@29/5@0/2
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeMutant created: \Sessions\1\BaseNamedObjects\mhtuxtjimxsu
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                Source: UxaZyTE7nq.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: UxaZyTE7nq.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: UxaZyTE7nq.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: C:\Users\Bir_Mateb\source\repos\27 Feb 2023\FormElements-master\obj\Debug\FormElements.pdb source: UxaZyTE7nq.exe
                Source: Binary string: C:\agent\1\s\sys\x64\Release\ProcExpDriver.pdb source: UxaZyTE7nq.exe, 00000000.00000002.266467876.000001DC93093000.00000004.00000800.00020000.00000000.sdmp, UxaZyTE7nq.exe, 00000000.00000002.266467876.000001DC9326F000.00000004.00000800.00020000.00000000.sdmp, ?????.sys.0.dr
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeCode function: 0_2_00007FFCA44A5BC9 push ebx; ret 0_2_00007FFCA44A61DA
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeCode function: 0_2_00007FFCA449EE19 push AFE80939h; ret 0_2_00007FFCA449EE1E
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeCode function: 0_2_00007FFCA449EE2E pushfd ; ret 0_2_00007FFCA449EE31
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeCode function: 0_2_00007FFCA449CB9C push esi; iretd 0_2_00007FFCA449CBD4
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeCode function: 14_2_01501C5A push ebx; iretd 14_2_01501C7A
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeCode function: 14_2_05862491 push edi; iretd 14_2_05862492
                Source: UxaZyTE7nq.exeStatic PE information: real checksum: 0x5c1b0 should be: 0x60c13
                Source: UxaZyTE7nq.exeStatic PE information: 0xDF4149F2 [Thu Sep 9 19:52:18 2088 UTC]
                Source: initial sampleStatic PE information: section name: .text entropy: 7.981513997954339

                Persistence and Installation Behavior

                barindex
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeFile created: C:\Users\user\AppData\Local\Temp\?????.sysJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeFile created: C:\Users\user\AppData\Local\Temp\?????.sysJump to dropped file

                Boot Survival

                barindex
                Source: Yara matchFile source: Process Memory Space: jsc.exe PID: 4532, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.UxaZyTE7nq.exe.1dc931dd380.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.UxaZyTE7nq.exe.1dc931cab58.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.jsc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.UxaZyTE7nq.exe.1dc931dd380.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.UxaZyTE7nq.exe.1dc931cab58.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.512134947.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.266467876.000001DC931AA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: UxaZyTE7nq.exe PID: 5248, type: MEMORYSTR
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TaskKillJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: UxaZyTE7nq.exe PID: 5248, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: jsc.exe PID: 4532, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.UxaZyTE7nq.exe.1dc931dd380.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.UxaZyTE7nq.exe.1dc931cab58.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.jsc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.UxaZyTE7nq.exe.1dc931dd380.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.UxaZyTE7nq.exe.1dc931cab58.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.512134947.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.266467876.000001DC931AA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: UxaZyTE7nq.exe PID: 5248, type: MEMORYSTR
                Source: UxaZyTE7nq.exe, 00000000.00000002.266467876.000001DC9326F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                Source: UxaZyTE7nq.exe, 00000000.00000002.266467876.000001DC9326F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_VideoController
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exe TID: 5216Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe TID: 2608Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe TID: 5172Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe TID: 5172Thread sleep count: 110 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe TID: 5216Thread sleep count: 9781 > 30Jump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\?????.sysJump to dropped file
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeRegistry key enumerated: More than 149 enums for key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeWindow / User API: threadDelayed 9781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * From Win32_ComputerSystem
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: UxaZyTE7nq.exe, 00000000.00000002.266467876.000001DC9326F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                Source: UxaZyTE7nq.exe, 00000000.00000002.266467876.000001DC9326F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmmouse.sys
                Source: UxaZyTE7nq.exe, 00000000.00000002.266467876.000001DC9326F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                Source: UxaZyTE7nq.exe, 00000000.00000002.266467876.000001DC9326F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: UxaZyTE7nq.exe, 00000000.00000002.266467876.000001DC9326F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmhgfs.sys
                Source: UxaZyTE7nq.exe, 00000000.00000002.266467876.000001DC9326F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                Source: UxaZyTE7nq.exe, 00000000.00000002.266467876.000001DC9326F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                Source: UxaZyTE7nq.exe, 00000000.00000002.266467876.000001DC9326F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\'C:\WINDOWS\system32\drivers\vmmouse.sys&C:\WINDOWS\system32\drivers\vmhgfs.sys
                Source: UxaZyTE7nq.exe, 00000000.00000002.266467876.000001DC9326F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noValueButYesKey)C:\WINDOWS\system32\drivers\VBoxMouse.sys
                Source: UxaZyTE7nq.exe, 00000000.00000002.266467876.000001DC9326F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\VBoxMouse.sys
                Source: UxaZyTE7nq.exe, 00000000.00000002.266467876.000001DC9326F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                Source: UxaZyTE7nq.exe, 00000000.00000002.266467876.000001DC9326F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe base: 400000Jump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe base: 402000Jump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe base: 414000Jump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe base: 416000Jump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe base: D9D008Jump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exeJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exeJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exeJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exeJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exeJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exeJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exeJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exeJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exeJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeJump to behavior
                Source: jsc.exe, 0000000E.00000002.513654530.0000000002F03000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 0000000E.00000002.513654530.00000000031BC000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 0000000E.00000002.513654530.00000000030B0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeQueries volume information: C:\Users\user\Desktop\UxaZyTE7nq.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeQueries volume information: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\UxaZyTE7nq.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Lowering of HIPS / PFW / Operating System Security Settings

                barindex
                Source: Yara matchFile source: Process Memory Space: jsc.exe PID: 4532, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.UxaZyTE7nq.exe.1dc931dd380.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.UxaZyTE7nq.exe.1dc931cab58.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.jsc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.UxaZyTE7nq.exe.1dc931dd380.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.UxaZyTE7nq.exe.1dc931cab58.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.512134947.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.266467876.000001DC931AA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: UxaZyTE7nq.exe PID: 5248, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                Source: UxaZyTE7nq.exe, 00000000.00000002.266467876.000001DC931AA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: MSASCui.exe
                Source: UxaZyTE7nq.exe, 00000000.00000002.266467876.000001DC931AA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: procexp.exe
                Source: UxaZyTE7nq.exe, 00000000.00000002.266467876.000001DC931AA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0000000E.00000002.513654530.00000000030B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0000000E.00000002.513654530.00000000030B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts131
                Windows Management Instrumentation
                2
                Windows Service
                1
                Access Token Manipulation
                1
                Masquerading
                OS Credential Dumping241
                Security Software Discovery
                Remote Services1
                Archive Collected Data
                Exfiltration Over Other Network Medium12
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default Accounts2
                Scheduled Task/Job
                2
                Scheduled Task/Job
                2
                Windows Service
                1
                Disable or Modify Tools
                LSASS Memory12
                Process Discovery
                Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                Non-Standard Port
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)2
                LSASS Driver
                212
                Process Injection
                141
                Virtualization/Sandbox Evasion
                Security Account Manager141
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)2
                Scheduled Task/Job
                1
                Access Token Manipulation
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon Script2
                LSASS Driver
                212
                Process Injection
                LSA Secrets1
                Remote System Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common22
                Obfuscated Files or Information
                Cached Domain Credentials34
                System Information Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items2
                Software Packing
                DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                Timestomp
                Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                UxaZyTE7nq.exe21%ReversingLabsWin64.Trojan.Generic
                UxaZyTE7nq.exe23%VirustotalBrowse
                UxaZyTE7nq.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Temp\?????.sys1%VirustotalBrowse
                C:\Users\user\AppData\Local\Temp\?????.sys0%ReversingLabs
                SourceDetectionScannerLabelLinkDownload
                14.2.jsc.exe.400000.0.unpack100%AviraHEUR/AGEN.1202836Download File
                SourceDetectionScannerLabelLink
                l-0007.l-dc-msedge.net0%VirustotalBrowse
                SourceDetectionScannerLabelLink
                https://www.sysinternals.com00%URL Reputationsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                l-0007.l-dc-msedge.net
                13.107.43.16
                truefalseunknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameUxaZyTE7nq.exe, 00000000.00000002.266467876.000001DC93093000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 0000000E.00000002.513654530.0000000002EA1000.00000004.00000800.00020000.00000000.sdmp, jsc.exe, 0000000E.00000002.513654530.000000000302F000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://www.sysinternals.com0UxaZyTE7nq.exe, 00000000.00000002.266467876.000001DC93093000.00000004.00000800.00020000.00000000.sdmp, UxaZyTE7nq.exe, 00000000.00000002.266467876.000001DC9326F000.00000004.00000800.00020000.00000000.sdmp, ?????.sys.0.drfalse
                  • URL Reputation: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  91.134.187.20
                  unknownFrance
                  16276OVHFRtrue
                  IP
                  127.0.0.1
                  Joe Sandbox Version:37.0.0 Beryl
                  Analysis ID:816262
                  Start date and time:2023-02-27 19:10:25 +01:00
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 8m 27s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:27
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample file name:UxaZyTE7nq.exe
                  Original Sample Name:91a442b21fb353b221ea33e767c7fe1b.exe
                  Detection:MAL
                  Classification:mal100.troj.expl.evad.winEXE@29/5@0/2
                  EGA Information:
                  • Successful, ratio: 100%
                  HDC Information:
                  • Successful, ratio: 0.6% (good quality ratio 0.3%)
                  • Quality average: 30.2%
                  • Quality standard deviation: 41.2%
                  HCA Information:
                  • Successful, ratio: 96%
                  • Number of executed functions: 33
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, HxTsr.exe, RuntimeBroker.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
                  • Excluded IPs from analysis (whitelisted): 23.35.236.109, 173.222.108.210, 173.222.108.226, 20.90.152.133, 184.28.57.26, 40.126.32.74, 20.190.160.22, 40.126.32.133, 20.190.160.20, 40.126.32.140, 40.126.32.68, 20.190.160.14, 40.126.32.136, 23.0.174.120, 23.0.174.122, 23.0.174.136, 23.0.174.121, 23.0.174.130, 23.0.174.123, 23.0.174.137, 23.0.174.129, 23.0.174.138, 13.107.5.88, 20.90.153.243, 20.90.156.32
                  • Excluded domains from analysis (whitelisted): client-office365-tas.msedge.net, ocos-office365-s2s.msedge.net, config.edge.skype.com.trafficmanager.net, e-0009.e-msedge.net, a767.dspw65.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, cdn.onenote.net.edgekey.net, wns.notify.trafficmanager.net, prda.aadg.msidentity.com, e86303.dscx.akamaiedge.net, www.bing.com.edgekey.net, login.live.com, config-edge-skype.l-0007.l-msedge.net, e16604.g.akamaiedge.net, prod.fs.microsoft.com.akadns.net, cdn.onenote.net, config.edge.skype.com, www.bing.com, client.wns.windows.com, fs.microsoft.com, afdo-tas-offload.trafficmanager.net, ctldl.windowsupdate.com, www.tm.a.prd.aadg.akadns.net, wu-bg-shim.trafficmanager.net, www-www.bing.com.trafficmanager.net, login.msa.msidentity.com, download.windowsupdate.com.edgesuite.net, ocos-office365-s2s-msedge-net.e-0009.e-msedge.net, l-0007.config.skype.com, e1553.dspg.akamaiedge.net, www.tm.lg.prod.aadmsa.trafficmanager.net
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  TimeTypeDescription
                  19:11:48API Interceptor2x Sleep call for process: jsc.exe modified
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  l-0007.l-dc-msedge.netmodest-menu.exeGet hashmaliciousUnknownBrowse
                  • 13.107.43.16
                  Pepsico LLC RFQ Information.com.exeGet hashmaliciousGuLoaderBrowse
                  • 13.107.43.16
                  file.exeGet hashmaliciousNymaimBrowse
                  • 13.107.43.16
                  file.exeGet hashmaliciousRedLineBrowse
                  • 13.107.43.16
                  8dlWtwg48G.exeGet hashmaliciousFabookieBrowse
                  • 13.107.43.16
                  DHL AWB.jsGet hashmaliciousGuLoaderBrowse
                  • 13.107.43.16
                  https://madalonlaw-my.sharepoint.com:443/:b:/p/sdavalos/ES7WLbIY1jNMq6AlFu50i38B95khnUlQKvgFTYOg8VA76w?e=4%3aPZONAY&at=9Get hashmaliciousUnknownBrowse
                  • 13.107.43.16
                  https://document1.box.com/s/akq1m6wb78qbuhj7r4op5uogtknw8ssrGet hashmaliciousUnknownBrowse
                  • 13.107.43.16
                  202105-USD122986.exeGet hashmaliciousAgentTeslaBrowse
                  • 13.107.43.16
                  https://hyclogisticscom-my.sharepoint.com/:x:/g/personal/shlomo_hyclogistics_com/ERTxS7bQd2xLmRxdNmUFmmoBRA2FOG_umzjSHIRFNUWUlQ?e=wodANMGet hashmaliciousUnknownBrowse
                  • 13.107.43.16
                  Revised Purchase Order.exeGet hashmaliciousRemcosBrowse
                  • 13.107.43.16
                  SecureMessageAtt.htmGet hashmaliciousHTMLPhisherBrowse
                  • 13.107.43.16
                  2nd-payload.bin.dllGet hashmaliciousUrsnifBrowse
                  • 13.107.43.16
                  6m6k3k1OtZ.exeGet hashmaliciousSnake KeyloggerBrowse
                  • 13.107.43.16
                  AnyDesk.exeGet hashmaliciousUnknownBrowse
                  • 13.107.43.16
                  R-Studio.v9.1.191039.exeGet hashmaliciousUnknownBrowse
                  • 13.107.43.16
                  04YVmZ1211.exeGet hashmaliciousUnknownBrowse
                  • 13.107.43.16
                  MicrosoftEdgeWebview2Setup.exeGet hashmaliciousUnknownBrowse
                  • 13.107.43.16
                  Ih5Ndh.dllGet hashmaliciousUrsnifBrowse
                  • 13.107.43.16
                  990702.xlsGet hashmaliciousUnknownBrowse
                  • 13.107.43.16
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  OVHFRfile.exeGet hashmaliciousRedLineBrowse
                  • 51.89.204.181
                  https://greenindiaenvironmentalconsultant.in/feedback.htmlGet hashmaliciousHTMLPhisherBrowse
                  • 51.210.113.204
                  file.exeGet hashmaliciousRedLineBrowse
                  • 51.89.204.181
                  zDmQ9SLGOr.elfGet hashmaliciousUnknownBrowse
                  • 8.33.144.231
                  UnJXSGaaEh.JS.jsGet hashmaliciousAsyncRATBrowse
                  • 51.77.78.35
                  SecuriteInfo.com.Win64.Trojan.Agent.2G5ELT.4490.2041.exeGet hashmaliciousXmrig, ccminerBrowse
                  • 149.56.27.47
                  tamj1tEuQe.elfGet hashmaliciousMiraiBrowse
                  • 192.99.130.92
                  SecuriteInfo.com.Win64.Trojan-gen.23581.31557.exeGet hashmaliciousXmrigBrowse
                  • 51.68.190.80
                  SecuriteInfo.com.Win64.Evo-gen.30580.11620.exeGet hashmaliciousXmrigBrowse
                  • 51.68.190.80
                  file.exeGet hashmaliciousRedLineBrowse
                  • 51.89.204.181
                  RmL5OwrOSzxkHdO.exeGet hashmaliciousAgentTeslaBrowse
                  • 198.50.154.90
                  https://www.todayville.com/meeting-the-threshold-justins-tantrum-gets-justice-rouleaus-approvalGet hashmaliciousUnknownBrowse
                  • 54.38.64.100
                  loader.exeGet hashmaliciousUnknownBrowse
                  • 51.79.119.231
                  file.exeGet hashmaliciousRedLineBrowse
                  • 51.89.204.181
                  9LuXRgeRSv.exeGet hashmaliciousLaplas ClipperBrowse
                  • 51.195.166.203
                  https://killianferrer.com/zn/b/prod.php?cm9ib2NvcA=modGet hashmaliciousHTMLPhisherBrowse
                  • 188.165.53.185
                  B8WzvBHEts.exeGet hashmaliciousXmrigBrowse
                  • 51.68.190.80
                  file.exeGet hashmaliciousXmrig, zgRATBrowse
                  • 198.50.243.185
                  sample.cmdGet hashmaliciousUnknownBrowse
                  • 51.79.163.195
                  sample.cmdGet hashmaliciousUnknownBrowse
                  • 51.79.163.195
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  C:\Users\user\AppData\Local\Temp\?????.sysENQUIRY - TAIPEI DISCHARGE EQUIPMENT.PDF.exeGet hashmaliciousVector StealerBrowse
                    8UwYWNRGdr.exeGet hashmaliciousAsyncRAT, DcRat, VenomRATBrowse
                      5nEPpS2Hhg.exeGet hashmaliciousAgentTeslaBrowse
                        Excel_xls.exeGet hashmaliciousXWormBrowse
                          proforma Invoice Sheet.exeGet hashmaliciousAgentTeslaBrowse
                            PO 347282-1.exeGet hashmaliciousAsyncRATBrowse
                              ORPO-INVOCE.exeGet hashmaliciousAgentTeslaBrowse
                                ORPO-INVOCE0987.jarGet hashmaliciousAgentTeslaBrowse
                                  SKH076434567-09876543476.jarGet hashmaliciousSnake KeyloggerBrowse
                                    ORIGINAL_BL_INVOICE_PL_.exeGet hashmaliciousVector StealerBrowse
                                      OnionBrowserV27.321.4212-exe-only.zipGet hashmaliciousRedLineBrowse
                                        npp.28.442421Installer.x64-exe-only.zipGet hashmaliciousRedLineBrowse
                                          rufus-28.412.213-exe-only.zipGet hashmaliciousRedLineBrowse
                                            npp.27.31.21.x64.exeGet hashmaliciousRedLineBrowse
                                              32WRxzwd03.exeGet hashmaliciouslgoogLoaderBrowse
                                                YFBSe9827J.exeGet hashmaliciouslgoogLoaderBrowse
                                                  file.exeGet hashmaliciouslgoogLoaderBrowse
                                                    file.exeGet hashmaliciouslgoogLoaderBrowse
                                                      SecuriteInfo.com.Win64.CrypterX-gen.381.20116.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        file.exeGet hashmaliciousUnknownBrowse
                                                          Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe
                                                          File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 62932 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                                          Category:dropped
                                                          Size (bytes):62932
                                                          Entropy (8bit):7.9958071285043335
                                                          Encrypted:true
                                                          SSDEEP:1536:pvl2gmukMiArbge/oKIxf+Q9yNJLaRCfIElhUuDz:pvl2gmZhpehIxfJsJLawfIElhUu3
                                                          MD5:FC4666CBCA561E864E7FDF883A9E6661
                                                          SHA1:2F8D6094C7A34BF12EA0BBF0D51EE9C5BB7939A5
                                                          SHA-256:10F3DEB6C452D749A7451B5D065F4C0449737E5EE8A44F4D15844B503141E65B
                                                          SHA-512:C71F54B571E01F247F072BE4BBEBDF5D8410B67EB79A61E7E0D9853FE857AB9BD12F53E6AF3394B935560178107291FC4BE351B27DEB388EBA90BA949633D57D
                                                          Malicious:false
                                                          Preview:MSCF............,...................I.................oU.s .authroot.stl......5..CK..8U[...q.yL;sf!d.D..."2."C...2....RRRHnT...\...!2.)QQ*2..nN.\7.....lgYk;.^.....}..h4.....Kc.cG.q.tY..Drg<..G.D....c.qnx..G.......r.8.....w...;.Q6..o.xf:f..:NL[.`..]I.@ ,W..J..Qf.z9.<.../.D.p:0R...#..I,.%.+."...B.n)...[Y=.,0...R.#..G5..2..]........$p..3.M.O...._L.......g.....?=.J..!...G~.#.J:.Wj.........9(:..g.8,.o.b...3..C..t.7L=..+~%pc...%..b(.q.......F.'...@~P .6CA.(d.Z~..6....=.).9......A........p...Gy....7U.L....S...^.R.T.p...R..:.hr./..8...a&p.l(....g.3a)...[.M..v.......g,.U..l.F..._kJv.4.rG.{.K.6.X.rz.8.r..&..G.j..p".z...L...EUX.......;...Y.................j}..FrT.,J3.d?T.T}Q..hn.?.4F...~K...........'...c...X,.v..yk..0._.j|.(.q4k1....^b..6...z..\9'}.%.*...S.[..D.k....J.../D$.#..O.o~%S.9u....|61.........~....Q+.w.e....7}..:.....^.p.mKm._9v......'.3T..bY3..9a..p.'1..Lx.O.g..J5w+.r..K.R.P.....E0bf*r...c..;...`.j...i.;y.C..#|L.e.(.....w.X'...z../.-...c.......
                                                          Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe
                                                          File Type:data
                                                          Category:modified
                                                          Size (bytes):328
                                                          Entropy (8bit):3.1615723839320826
                                                          Encrypted:false
                                                          SSDEEP:6:kKM0qz7ksN+SkQlPlEGYRMY9z+4KlDA3RUe+OGNglcy:k+kPlE99SNxAhUefblcy
                                                          MD5:C878E1166FCB2708482602C39E162BBA
                                                          SHA1:884E515CBE4BFA12F511D978A6D785CAD4CAFA82
                                                          SHA-256:FF266CFA40017CF79B191B137229C3724982F9DA2F3D442F70693FFBE033A084
                                                          SHA-512:6728CE5910D39EC81CE2F83718343C779CF0B7BD0D119BA65D1477DBA5AD046AD54B5C7BC59D11C400DD2F4F9C347B73B6727546C90C63C59D6D9B6DEBF13A1D
                                                          Malicious:false
                                                          Preview:p...... ........k.4e"K..(....................................................... .........g.%.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".8.0.a.1.6.7.1.3.2.5.4.d.9.1.:.0."...
                                                          Process:C:\Users\user\Desktop\UxaZyTE7nq.exe
                                                          File Type:CSV text
                                                          Category:dropped
                                                          Size (bytes):654
                                                          Entropy (8bit):5.374391981354885
                                                          Encrypted:false
                                                          SSDEEP:12:Q3La/KDLI4MWuPTxAIOKbbDLI4MWuPOKN08JOKhap+92n4MNQpN9tv:ML9E4KrgKDE4KGKN08AKh6+84xpNT
                                                          MD5:C8A62E39DE7A3F805D39384E8BABB1E0
                                                          SHA1:B32B1257401F17A2D1D5D3CC1D8C1E072E3FEE31
                                                          SHA-256:A7BC127854C5327ABD50C86000BF10586B556A5E085BB23523B07A15DD4C5383
                                                          SHA-512:7DB2825131F5CDA6AF33A179D9F7CD0A206FF34AE50D6E66DE9E99BE2CD1CB985B88C00F0EDE72BBC4467E7E42B5DC6132403AA2EC1A0A7A6D11766C438B10C3
                                                          Malicious:true
                                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\10a17139182a9efd561f01fada9688a5\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\4e05e2e48b8a6dd267a8c9e25ef129a7\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\f2e0589ed6d670f264a5f65dd0ad000f\Microsoft.VisualBasic.ni.dll",0..
                                                          Process:C:\Users\user\Desktop\UxaZyTE7nq.exe
                                                          File Type:PE32+ executable (DLL) (native) x86-64, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):36208
                                                          Entropy (8bit):6.284053631838433
                                                          Encrypted:false
                                                          SSDEEP:768:tKCM0IWRhm8LiES4cT4iZ923OMqUD6Q4KICJw4:t7/Vhzb3pL4GJw4
                                                          MD5:97E3A44EC4AE58C8CC38EEFC613E950E
                                                          SHA1:BC47E15537FA7C32DFEFD23168D7E1741F8477ED
                                                          SHA-256:440883CD9D6A76DB5E53517D0EC7FE13D5A50D2F6A7F91ECFC863BC3490E4F5C
                                                          SHA-512:8EF7FC489B6FFED9EC14746E526AE87F44C39D5EAFFF0D4C3BFA0B3F0D28450F76D1066F446C766F4C9A20842A7F084FE4A9F94659D5487EA88959FCCB2A96EB
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Virustotal, Detection: 1%, Browse
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          Joe Sandbox View:
                                                          • Filename: ENQUIRY - TAIPEI DISCHARGE EQUIPMENT.PDF.exe, Detection: malicious, Browse
                                                          • Filename: 8UwYWNRGdr.exe, Detection: malicious, Browse
                                                          • Filename: 5nEPpS2Hhg.exe, Detection: malicious, Browse
                                                          • Filename: Excel_xls.exe, Detection: malicious, Browse
                                                          • Filename: proforma Invoice Sheet.exe, Detection: malicious, Browse
                                                          • Filename: PO 347282-1.exe, Detection: malicious, Browse
                                                          • Filename: ORPO-INVOCE.exe, Detection: malicious, Browse
                                                          • Filename: ORPO-INVOCE0987.jar, Detection: malicious, Browse
                                                          • Filename: SKH076434567-09876543476.jar, Detection: malicious, Browse
                                                          • Filename: ORIGINAL_BL_INVOICE_PL_.exe, Detection: malicious, Browse
                                                          • Filename: OnionBrowserV27.321.4212-exe-only.zip, Detection: malicious, Browse
                                                          • Filename: npp.28.442421Installer.x64-exe-only.zip, Detection: malicious, Browse
                                                          • Filename: rufus-28.412.213-exe-only.zip, Detection: malicious, Browse
                                                          • Filename: npp.27.31.21.x64.exe, Detection: malicious, Browse
                                                          • Filename: 32WRxzwd03.exe, Detection: malicious, Browse
                                                          • Filename: YFBSe9827J.exe, Detection: malicious, Browse
                                                          • Filename: file.exe, Detection: malicious, Browse
                                                          • Filename: file.exe, Detection: malicious, Browse
                                                          • Filename: SecuriteInfo.com.Win64.CrypterX-gen.381.20116.exe, Detection: malicious, Browse
                                                          • Filename: file.exe, Detection: malicious, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3...w.{.w.{.w.{.~...p.{.w.z.H.{.~...t.{.~...t.{.~...t.{."...v.{."..v.{.".y.v.{.Richw.{.........PE..d...l..a.........." .....L..........X.......................................................................................................x...(............`.......l..p!......0....I..T............................................@...............................text....%.......&.................. ..h.rdata.......@.......*..............@..H.data...,....P.......:..............@....pdata.......`.......<..............@..HPAGE.........p.......@.............. ..`INIT.................\.............. ..b.rsrc................f..............@..B.reloc..0............j..............@..B................................................................................................................................................................................................
                                                          Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe
                                                          File Type:ASCII text
                                                          Category:dropped
                                                          Size (bytes):8
                                                          Entropy (8bit):2.75
                                                          Encrypted:false
                                                          SSDEEP:3:Rt:v
                                                          MD5:CF759E4C5F14FE3EEC41B87ED756CEA8
                                                          SHA1:C27C796BB3C2FAC929359563676F4BA1FFADA1F5
                                                          SHA-256:C9F9F193409217F73CC976AD078C6F8BF65D3AABCF5FAD3E5A47536D47AA6761
                                                          SHA-512:C7F832AEE13A5EB36D145F35D4464374A9E12FA2017F3C2257442D67483B35A55ECCAE7F7729243350125B37033E075EFBC2303839FD86B81B9B4DCA3626953B
                                                          Malicious:false
                                                          Preview:.5.False
                                                          File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                                          Entropy (8bit):7.978944604782391
                                                          TrID:
                                                          • Win64 Executable GUI (202006/5) 92.65%
                                                          • Win64 Executable (generic) (12005/4) 5.51%
                                                          • Generic Win/DOS Executable (2004/3) 0.92%
                                                          • DOS Executable Generic (2002/1) 0.92%
                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                          File name:UxaZyTE7nq.exe
                                                          File size:363008
                                                          MD5:91a442b21fb353b221ea33e767c7fe1b
                                                          SHA1:e58e0d08ebdc5e91f43631b339c573a732c07056
                                                          SHA256:35330f1bbbc0f361845b9b987e2f4ac70cdb96ab3f9e80161c2b8971c7df0df4
                                                          SHA512:262ef3d9577dacde7ad613fe858073b347d21a553961c63f6f64c9dd593fc610dc2bb04ab84b6cf2a4c9347e3795d825690bdb412d19e89fe380da5bd4009f58
                                                          SSDEEP:6144:ozh88dY9m16JNcxnDggHNrRP5fw2fTt+iMaNOSm3lVVCT4kH/7zppTR:o18fCcaxdPhHTANaYSIlHCT4k/9
                                                          TLSH:3D74129093DC9C57FF5C1679C8AC11172A789EBBD7A796CF2EA844CC66EA3000472573
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....IA..........."...0.................. ....@...... ....................................`................................
                                                          Icon Hash:00828e8e8686b000
                                                          Entrypoint:0x400000
                                                          Entrypoint Section:
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                          Time Stamp:0xDF4149F2 [Thu Sep 9 19:52:18 2088 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:4
                                                          OS Version Minor:0
                                                          File Version Major:4
                                                          File Version Minor:0
                                                          Subsystem Version Major:4
                                                          Subsystem Version Minor:0
                                                          Import Hash:
                                                          Instruction
                                                          dec ebp
                                                          pop edx
                                                          nop
                                                          add byte ptr [ebx], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax+eax], al
                                                          add byte ptr [eax], al
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x5c0000x60.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x5a4680x38.text
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x20000x585140x58600False0.9499453014497878data7.981513997954339IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .rsrc0x5c0000x600x200False0.125data3.1757517953526886IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountry
                                                          RT_GROUP_ICON0x5c0580x6data
                                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                          91.134.187.20192.168.2.64449497182850454 02/27/23-19:11:47.671813TCP2850454ETPRO TROJAN Observed Malicious SSL Cert (AsyncRAT)44494971891.134.187.20192.168.2.6
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Feb 27, 2023 19:11:46.553606033 CET49672443192.168.2.640.90.65.8
                                                          Feb 27, 2023 19:11:47.573369026 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:11:47.600991011 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:11:47.601259947 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:11:47.635396004 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:11:47.671813011 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:11:47.679271936 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:11:47.708478928 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:11:47.756535053 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:11:50.830960989 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:11:50.904359102 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:11:50.904592991 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:11:50.982225895 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:12:03.165569067 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:12:03.248050928 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:12:03.248159885 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:12:03.277838945 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:12:03.320290089 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:12:03.347985983 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:12:03.398428917 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:12:03.510010004 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:12:03.592195034 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:12:03.592434883 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:12:03.680654049 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:12:04.232732058 CET4969380192.168.2.693.184.220.29
                                                          Feb 27, 2023 19:12:06.153676987 CET8049707209.197.3.8192.168.2.6
                                                          Feb 27, 2023 19:12:06.153904915 CET4970780192.168.2.6209.197.3.8
                                                          Feb 27, 2023 19:12:08.657963991 CET4970480192.168.2.68.241.126.249
                                                          Feb 27, 2023 19:12:08.658171892 CET4970780192.168.2.6209.197.3.8
                                                          Feb 27, 2023 19:12:08.674978018 CET8049707209.197.3.8192.168.2.6
                                                          Feb 27, 2023 19:12:08.675625086 CET4970780192.168.2.6209.197.3.8
                                                          Feb 27, 2023 19:12:08.677985907 CET80497048.241.126.249192.168.2.6
                                                          Feb 27, 2023 19:12:08.678109884 CET4970480192.168.2.68.241.126.249
                                                          Feb 27, 2023 19:12:09.339575052 CET804970993.184.220.29192.168.2.6
                                                          Feb 27, 2023 19:12:09.341197968 CET4970980192.168.2.693.184.220.29
                                                          Feb 27, 2023 19:12:12.360469103 CET49729443192.168.2.613.107.43.16
                                                          Feb 27, 2023 19:12:12.360563993 CET4434972913.107.43.16192.168.2.6
                                                          Feb 27, 2023 19:12:12.360718966 CET49729443192.168.2.613.107.43.16
                                                          Feb 27, 2023 19:12:16.451729059 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:12:16.530651093 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:12:16.530862093 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:12:16.566533089 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:12:16.656225920 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:12:16.683962107 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:12:16.832526922 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:12:16.904267073 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:12:16.904393911 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:12:16.984352112 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:12:28.577745914 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:12:28.670877934 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:12:28.671067953 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:12:28.700054884 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:12:28.744337082 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:12:28.772017002 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:12:28.808320999 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:12:28.888947964 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:12:28.889134884 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:12:28.967809916 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:12:40.849802017 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:12:40.919904947 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:12:40.925098896 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:12:40.954245090 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:12:41.011068106 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:12:41.043493032 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:12:41.089118958 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:12:41.098615885 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:12:41.170604944 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:12:41.171689034 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:12:41.248167038 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:12:50.921273947 CET4970980192.168.2.693.184.220.29
                                                          Feb 27, 2023 19:12:50.939707041 CET804970993.184.220.29192.168.2.6
                                                          Feb 27, 2023 19:12:50.939836979 CET4970980192.168.2.693.184.220.29
                                                          Feb 27, 2023 19:12:55.917112112 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:12:55.997915983 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:12:55.998095036 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:12:56.027657986 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:12:56.075226068 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:12:56.103025913 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:12:56.128896952 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:12:56.201147079 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:12:56.201338053 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:12:56.279298067 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:13:01.184989929 CET49683443192.168.2.620.190.159.5
                                                          Feb 27, 2023 19:13:01.356775045 CET49684443192.168.2.640.126.31.70
                                                          Feb 27, 2023 19:13:01.365171909 CET49685443192.168.2.640.126.31.70
                                                          Feb 27, 2023 19:13:05.696619987 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:13:05.779391050 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:13:05.779546976 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:13:05.808697939 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:13:05.856870890 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:13:05.884537935 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:13:05.905389071 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:13:05.982521057 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:13:05.982654095 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:13:06.060770035 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:13:17.950309992 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:13:18.030042887 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:13:18.030193090 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:13:18.059967041 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:13:18.108022928 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:13:18.138520956 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:13:18.145309925 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:13:18.217257977 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:13:18.217431068 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:13:18.296447992 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:13:30.156754971 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:13:30.232592106 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:13:30.234091997 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:13:30.263084888 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:13:30.312685013 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:13:30.340630054 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:13:30.341931105 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:13:30.420027018 CET44494971891.134.187.20192.168.2.6
                                                          Feb 27, 2023 19:13:30.420202017 CET497184449192.168.2.691.134.187.20
                                                          Feb 27, 2023 19:13:30.498017073 CET44494971891.134.187.20192.168.2.6
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Feb 27, 2023 19:12:12.347565889 CET8.8.8.8192.168.2.60x5272No error (0)l-0007.l-dc-msedge.net13.107.43.16A (IP address)IN (0x0001)false

                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:19:11:20
                                                          Start date:27/02/2023
                                                          Path:C:\Users\user\Desktop\UxaZyTE7nq.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Users\user\Desktop\UxaZyTE7nq.exe
                                                          Imagebase:0x1dc91420000
                                                          File size:363008 bytes
                                                          MD5 hash:91A442B21FB353B221EA33E767C7FE1B
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Yara matches:
                                                          • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000002.266467876.000001DC931AA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.266467876.000001DC9326F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:low

                                                          Target ID:1
                                                          Start time:19:11:28
                                                          Start date:27/02/2023
                                                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
                                                          Imagebase:0x198d6330000
                                                          File size:258144 bytes
                                                          MD5 hash:8B9E68304AF4B81C9AB70CB2220EBA74
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:moderate

                                                          Target ID:2
                                                          Start time:19:11:29
                                                          Start date:27/02/2023
                                                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe
                                                          Imagebase:0x1f77e8a0000
                                                          File size:126560 bytes
                                                          MD5 hash:F31014EE4DE7FE48E9B7C9BE94CFB45F
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:moderate

                                                          Target ID:3
                                                          Start time:19:11:29
                                                          Start date:27/02/2023
                                                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
                                                          Imagebase:0x186a8be0000
                                                          File size:42080 bytes
                                                          MD5 hash:11D8A500C4C0FBAF20EBDB8CDF6EA452
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:moderate

                                                          Target ID:4
                                                          Start time:19:11:29
                                                          Start date:27/02/2023
                                                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe
                                                          Imagebase:0x1a018270000
                                                          File size:96864 bytes
                                                          MD5 hash:2B6A31DFD7C9ED8B413DBDAB800F10F3
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:moderate

                                                          Target ID:5
                                                          Start time:19:11:29
                                                          Start date:27/02/2023
                                                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                                                          Imagebase:0x20cfa730000
                                                          File size:64096 bytes
                                                          MD5 hash:2B5D765B33C67EBA41E9F47954227BC3
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:moderate

                                                          Target ID:6
                                                          Start time:19:11:29
                                                          Start date:27/02/2023
                                                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe
                                                          Imagebase:0x174169e0000
                                                          File size:32872 bytes
                                                          MD5 hash:D91462AE31562E241AF5595BA5E1A3C4
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:moderate

                                                          Target ID:7
                                                          Start time:19:11:29
                                                          Start date:27/02/2023
                                                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
                                                          Imagebase:0x2126f360000
                                                          File size:136296 bytes
                                                          MD5 hash:7EC8B56348F9298BCCA7A745C7F70E2C
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:moderate

                                                          Target ID:8
                                                          Start time:19:11:29
                                                          Start date:27/02/2023
                                                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
                                                          Imagebase:0x7ff7aa180000
                                                          File size:174184 bytes
                                                          MD5 hash:FBA5E8D94C9EADC279BC06B9CF041A9A
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language

                                                          Target ID:9
                                                          Start time:19:11:30
                                                          Start date:27/02/2023
                                                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe
                                                          Imagebase:0x1fcf0460000
                                                          File size:44648 bytes
                                                          MD5 hash:BF7E443F1E1FA88AD5A2A5EB44F42834
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language

                                                          Target ID:10
                                                          Start time:19:11:30
                                                          Start date:27/02/2023
                                                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe
                                                          Imagebase:0x28d293e0000
                                                          File size:42600 bytes
                                                          MD5 hash:65D30D747EB31E108A36EBC966C1227D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language

                                                          Target ID:11
                                                          Start time:19:11:30
                                                          Start date:27/02/2023
                                                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                                          Imagebase:0x7ff701c60000
                                                          File size:128584 bytes
                                                          MD5 hash:B00E9325AC7356A3F4864EAAAD48E13F
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language

                                                          Target ID:12
                                                          Start time:19:11:30
                                                          Start date:27/02/2023
                                                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                          Imagebase:0x7ff60e470000
                                                          File size:47280 bytes
                                                          MD5 hash:33BB8BE0B4F547324D93D5D2725CAC3D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language

                                                          Target ID:13
                                                          Start time:19:11:30
                                                          Start date:27/02/2023
                                                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe
                                                          Imagebase:0x7ff7bec50000
                                                          File size:270440 bytes
                                                          MD5 hash:80B018258257C2F78CBFE08198883AC1
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language

                                                          Target ID:14
                                                          Start time:19:11:30
                                                          Start date:27/02/2023
                                                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe
                                                          Imagebase:0xb50000
                                                          File size:46688 bytes
                                                          MD5 hash:2B40A449D6034F41771A460DADD53A60
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Yara matches:
                                                          • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 0000000E.00000002.512134947.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_DcRat_2, Description: Yara detected DcRat, Source: 0000000E.00000002.513654530.00000000030B0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:15.6%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:10.6%
                                                            Total number of Nodes:530
                                                            Total number of Limit Nodes:91
                                                            execution_graph 17532 7ffca449b355 17533 7ffca449b36f 17532->17533 17534 7ffca4496ab0 2 API calls 17533->17534 17535 7ffca449b3c0 17534->17535 17075 7ffca44a9254 17076 7ffca44a925d NtLoadDriver 17075->17076 17078 7ffca44a930e 17076->17078 17079 7ffca44a8655 17080 7ffca44a86c6 AdjustTokenPrivileges 17079->17080 17082 7ffca44a87a3 17080->17082 17083 7ffca449bc59 17084 7ffca449bc7b 17083->17084 17085 7ffca449bd4a 17084->17085 17087 7ffca449bd38 17084->17087 17089 7ffca4497650 17084->17089 17087->17085 17088 7ffca4497650 2 API calls 17087->17088 17088->17085 17091 7ffca449766a 17089->17091 17094 7ffca44976a2 17089->17094 17090 7ffca44977bf 17100 7ffca44978b0 17090->17100 17091->17090 17092 7ffca44978b0 2 API calls 17091->17092 17091->17094 17096 7ffca44942f8 17091->17096 17092->17091 17094->17087 17097 7ffca44aa520 17096->17097 17099 7ffca44aa573 17097->17099 17104 7ffca44990e8 17097->17104 17099->17091 17101 7ffca44978dc 17100->17101 17102 7ffca44978ca 17100->17102 17101->17102 17111 7ffca4494300 17101->17111 17102->17094 17105 7ffca44ab610 17104->17105 17105->17099 17106 7ffca44ab78a 17105->17106 17109 7ffca44abb84 17105->17109 17110 7ffca4497650 VirtualAllocEx 17105->17110 17106->17099 17107 7ffca44ac1c9 VirtualAllocEx 17108 7ffca44ac215 17107->17108 17108->17099 17109->17106 17109->17107 17110->17109 17115 7ffca44ab880 17111->17115 17112 7ffca44ac1c9 VirtualAllocEx 17114 7ffca44ac215 17112->17114 17113 7ffca44abb84 17113->17112 17116 7ffca44abc27 17113->17116 17114->17101 17115->17101 17115->17113 17115->17116 17117 7ffca4497650 VirtualAllocEx 17115->17117 17116->17101 17117->17113 17427 7ffca4490258 17428 7ffca4490261 CreateProcessW 17427->17428 17430 7ffca44aa195 17428->17430 17431 7ffca44aa1f0 Wow64SetThreadContext 17430->17431 17432 7ffca44aa1b8 17431->17432 17670 7ffca44a0858 17672 7ffca44a085f 17670->17672 17671 7ffca4498ff8 2 API calls 17671->17672 17672->17671 17673 7ffca44a0e58 17672->17673 17674 7ffca44a0c44 17672->17674 17684 7ffca4497650 2 API calls 17673->17684 17685 7ffca44a0ed2 17673->17685 17674->17673 17675 7ffca44a0e5a 17674->17675 17676 7ffca44a0e0f 17674->17676 17678 7ffca44a0e32 17674->17678 17675->17673 17679 7ffca449dad0 2 API calls 17675->17679 17677 7ffca449dad0 2 API calls 17676->17677 17677->17678 17680 7ffca44a0e3f 17678->17680 17683 7ffca44a0e90 17678->17683 17679->17683 17682 7ffca4497650 2 API calls 17680->17682 17681 7ffca4497650 2 API calls 17681->17673 17682->17673 17683->17673 17683->17681 17684->17685 17401 7ffca44a61db 17410 7ffca44a61e8 17401->17410 17402 7ffca44a62b9 17403 7ffca44a6940 17407 7ffca4497650 2 API calls 17403->17407 17411 7ffca44a693b 17403->17411 17412 7ffca44a69f4 17403->17412 17404 7ffca44a688c 17404->17403 17405 7ffca4498638 2 API calls 17404->17405 17406 7ffca44a68fc 17405->17406 17406->17403 17408 7ffca44a692a 17406->17408 17407->17411 17409 7ffca4497650 2 API calls 17408->17409 17409->17411 17410->17402 17410->17404 17410->17411 17413 7ffca4497650 2 API calls 17410->17413 17411->17412 17414 7ffca4498648 2 API calls 17411->17414 17413->17404 17414->17412 17123 7ffca44aa359 17125 7ffca44aa36f Wow64SetThreadContext 17123->17125 17126 7ffca44aa40c 17125->17126 17127 7ffca44a424d 17128 7ffca44a4257 17127->17128 17130 7ffca44a430a 17128->17130 17131 7ffca44967c8 17128->17131 17134 7ffca44a5300 17131->17134 17135 7ffca44a534c 17134->17135 17136 7ffca44935d0 17134->17136 17135->17128 17137 7ffca44935e0 17136->17137 17140 7ffca44931f8 17137->17140 17141 7ffca449b370 17140->17141 17144 7ffca4496ab0 17141->17144 17143 7ffca4493603 17143->17128 17145 7ffca4496ac7 17144->17145 17146 7ffca4496e3e 17145->17146 17148 7ffca44942d0 17145->17148 17146->17143 17149 7ffca44976f0 17148->17149 17150 7ffca44978b0 2 API calls 17149->17150 17151 7ffca44942f8 2 API calls 17149->17151 17152 7ffca4497851 17149->17152 17153 7ffca44977bf 17149->17153 17150->17149 17151->17149 17152->17146 17154 7ffca44978b0 2 API calls 17153->17154 17154->17152 17686 7ffca44a6453 17687 7ffca44a6462 17686->17687 17697 7ffca44a6471 17686->17697 17688 7ffca4497650 2 API calls 17687->17688 17688->17697 17689 7ffca44a65a2 17690 7ffca44a6940 17694 7ffca4497650 2 API calls 17690->17694 17699 7ffca44a69f4 17690->17699 17700 7ffca44a693b 17690->17700 17691 7ffca44a688c 17691->17690 17692 7ffca4498638 2 API calls 17691->17692 17693 7ffca44a68fc 17692->17693 17693->17690 17695 7ffca44a692a 17693->17695 17694->17700 17696 7ffca4497650 2 API calls 17695->17696 17696->17700 17697->17689 17697->17691 17698 7ffca4497650 2 API calls 17697->17698 17697->17700 17698->17691 17700->17699 17701 7ffca4498648 2 API calls 17700->17701 17701->17699 17155 7ffca44a5bc9 17157 7ffca44a5bf0 17155->17157 17156 7ffca44a5d8b 17157->17156 17158 7ffca44a606a 17157->17158 17160 7ffca44a607f 17157->17160 17172 7ffca44a607a 17157->17172 17159 7ffca4497650 2 API calls 17158->17159 17159->17172 17186 7ffca449dad0 17160->17186 17162 7ffca44a6169 17164 7ffca4497650 2 API calls 17162->17164 17162->17172 17163 7ffca44a61a7 17164->17172 17165 7ffca44a6940 17169 7ffca4497650 2 API calls 17165->17169 17173 7ffca44a69f4 17165->17173 17175 7ffca44a693b 17165->17175 17166 7ffca44a688c 17166->17165 17177 7ffca4498638 17166->17177 17168 7ffca44a68fc 17168->17165 17170 7ffca44a692a 17168->17170 17169->17175 17171 7ffca4497650 2 API calls 17170->17171 17171->17175 17172->17163 17172->17166 17174 7ffca4497650 2 API calls 17172->17174 17172->17175 17174->17166 17175->17173 17181 7ffca4498648 17175->17181 17178 7ffca44a6c69 17177->17178 17179 7ffca4498648 2 API calls 17178->17179 17180 7ffca44a6ce1 17178->17180 17179->17180 17180->17168 17182 7ffca44a7020 17181->17182 17182->17173 17183 7ffca44a76e3 17182->17183 17184 7ffca44935d0 2 API calls 17182->17184 17183->17173 17185 7ffca44a7792 17184->17185 17185->17173 17187 7ffca449db11 17186->17187 17188 7ffca449dade 17186->17188 17187->17162 17188->17187 17189 7ffca4497650 2 API calls 17188->17189 17190 7ffca449e386 17189->17190 17190->17162 17593 7ffca4498ff5 17594 7ffca4498ff8 17593->17594 17595 7ffca4497650 2 API calls 17594->17595 17596 7ffca44a0fb3 17594->17596 17595->17596 17470 7ffca44902f8 17471 7ffca4490301 NtResumeThread 17470->17471 17473 7ffca44ac884 17471->17473 17474 7ffca4498af8 17475 7ffca44a7cc0 17474->17475 17476 7ffca4498b20 LookupPrivilegeValueW 17475->17476 17477 7ffca44a7d61 17475->17477 17476->17477 17540 7ffca44a5378 17541 7ffca44a537f 17540->17541 17542 7ffca44935d0 2 API calls 17541->17542 17544 7ffca44a5637 17541->17544 17543 7ffca44a56e8 17542->17543 17191 7ffca4492bee 17194 7ffca4492c04 LoadLibraryA 17191->17194 17193 7ffca4492d14 17194->17193 17597 7ffca449e7e4 17598 7ffca4497650 2 API calls 17597->17598 17599 7ffca449e7f3 17598->17599 17195 7ffca4492fea 17196 7ffca4492ff9 VirtualProtect 17195->17196 17198 7ffca44930d1 17196->17198 17600 7ffca449cfea 17605 7ffca449cff7 17600->17605 17601 7ffca44990e8 2 API calls 17604 7ffca449d6de 17601->17604 17602 7ffca44942f8 2 API calls 17607 7ffca449d71d 17602->17607 17603 7ffca449d0bf 17603->17601 17603->17604 17608 7ffca449d619 17603->17608 17604->17602 17604->17607 17605->17603 17606 7ffca4499018 2 API calls 17605->17606 17606->17603 17478 7ffca44a62df 17479 7ffca44a6313 17478->17479 17487 7ffca44a62ee 17478->17487 17480 7ffca44a6940 17484 7ffca4497650 2 API calls 17480->17484 17489 7ffca44a693b 17480->17489 17491 7ffca44a69f4 17480->17491 17481 7ffca44a688c 17481->17480 17482 7ffca4498638 2 API calls 17481->17482 17483 7ffca44a68fc 17482->17483 17483->17480 17485 7ffca44a692a 17483->17485 17484->17489 17486 7ffca4497650 2 API calls 17485->17486 17486->17489 17487->17479 17487->17481 17488 7ffca4497650 2 API calls 17487->17488 17487->17489 17488->17481 17490 7ffca4498648 2 API calls 17489->17490 17489->17491 17490->17491 17415 7ffca449f1de 17416 7ffca449f1ee 17415->17416 17420 7ffca449f24e 17415->17420 17417 7ffca449f233 17416->17417 17416->17420 17418 7ffca4497650 2 API calls 17417->17418 17419 7ffca449f242 17418->17419 17421 7ffca4497650 2 API calls 17420->17421 17422 7ffca449f3e3 17420->17422 17421->17422 17324 7ffca449c0e1 17326 7ffca449c121 17324->17326 17325 7ffca449c274 17328 7ffca4497650 2 API calls 17325->17328 17329 7ffca449c36b 17325->17329 17332 7ffca449c188 17325->17332 17326->17325 17327 7ffca4497650 2 API calls 17326->17327 17326->17332 17327->17325 17328->17329 17330 7ffca4497650 2 API calls 17329->17330 17329->17332 17331 7ffca449c5b2 17330->17331 17453 7ffca44aa261 17456 7ffca44aa26c 17453->17456 17454 7ffca44aa2f2 17455 7ffca44aa3d8 Wow64SetThreadContext 17457 7ffca44aa40c 17455->17457 17456->17454 17456->17455 17337 7ffca44a0518 17338 7ffca44a051f 17337->17338 17339 7ffca44a066d 17338->17339 17340 7ffca44a05ed 17338->17340 17350 7ffca44a066b 17338->17350 17341 7ffca449dad0 2 API calls 17339->17341 17368 7ffca44991f0 17340->17368 17343 7ffca44a06b9 17341->17343 17342 7ffca44a06f8 17348 7ffca4497650 2 API calls 17343->17348 17343->17350 17346 7ffca449dad0 2 API calls 17347 7ffca44a064b 17346->17347 17347->17343 17349 7ffca44a0653 17347->17349 17348->17350 17349->17350 17351 7ffca4497650 2 API calls 17349->17351 17350->17342 17352 7ffca4497650 2 API calls 17350->17352 17356 7ffca44a0807 17350->17356 17351->17350 17352->17356 17353 7ffca4498ff8 2 API calls 17353->17356 17354 7ffca44a0e5a 17360 7ffca449dad0 2 API calls 17354->17360 17364 7ffca44a0e58 17354->17364 17355 7ffca44a0e0f 17358 7ffca449dad0 2 API calls 17355->17358 17356->17342 17356->17353 17357 7ffca44a0c44 17356->17357 17356->17364 17357->17354 17357->17355 17359 7ffca44a0e32 17357->17359 17357->17364 17358->17359 17361 7ffca44a0e3f 17359->17361 17362 7ffca44a0e90 17359->17362 17360->17362 17365 7ffca4497650 2 API calls 17361->17365 17363 7ffca4497650 2 API calls 17362->17363 17362->17364 17363->17364 17366 7ffca4497650 2 API calls 17364->17366 17367 7ffca44a0ed2 17364->17367 17365->17364 17366->17367 17369 7ffca44a3420 17368->17369 17370 7ffca449dad0 2 API calls 17369->17370 17371 7ffca44a0639 17370->17371 17371->17346 17423 7ffca449b998 17424 7ffca449b9ab 17423->17424 17425 7ffca449ba63 17424->17425 17426 7ffca4497650 2 API calls 17424->17426 17426->17425 17372 7ffca44a410d 17374 7ffca44a4117 17372->17374 17373 7ffca44a414d 17374->17373 17379 7ffca4496858 17374->17379 17376 7ffca44a4231 17377 7ffca4496858 2 API calls 17376->17377 17378 7ffca44a423e 17377->17378 17380 7ffca44a4270 17379->17380 17381 7ffca44967c8 2 API calls 17380->17381 17382 7ffca44a430a 17380->17382 17381->17380 17382->17376 17199 7ffca44a8b0c 17200 7ffca44a8b1e 17199->17200 17201 7ffca4497650 2 API calls 17200->17201 17202 7ffca44a8b7b 17200->17202 17201->17202 17203 7ffca44a9f91 17204 7ffca44a9faf CreateProcessW 17203->17204 17206 7ffca44aa195 17204->17206 17209 7ffca44aa1f0 17206->17209 17208 7ffca44aa1b8 17210 7ffca44aa22c 17209->17210 17211 7ffca44aa216 17209->17211 17210->17208 17211->17210 17212 7ffca44aa3d8 Wow64SetThreadContext 17211->17212 17213 7ffca44aa40c 17212->17213 17213->17208 17609 7ffca449df92 17610 7ffca449dfa0 17609->17610 17611 7ffca4497650 2 API calls 17610->17611 17613 7ffca449dfdb 17610->17613 17612 7ffca449e386 17611->17612 17214 7ffca44a8885 17215 7ffca44a8893 FindCloseChangeNotification 17214->17215 17217 7ffca44a8954 17215->17217 17614 7ffca44a0388 17615 7ffca44a038f 17614->17615 17616 7ffca44a04d2 17615->17616 17617 7ffca44a066d 17615->17617 17618 7ffca44a05ed 17615->17618 17628 7ffca44a066b 17615->17628 17619 7ffca449dad0 2 API calls 17617->17619 17622 7ffca44991f0 2 API calls 17618->17622 17621 7ffca44a06b9 17619->17621 17620 7ffca44a06f8 17626 7ffca4497650 2 API calls 17621->17626 17621->17628 17623 7ffca44a0639 17622->17623 17624 7ffca449dad0 2 API calls 17623->17624 17625 7ffca44a064b 17624->17625 17625->17621 17627 7ffca44a0653 17625->17627 17626->17628 17627->17628 17629 7ffca4497650 2 API calls 17627->17629 17628->17620 17630 7ffca4497650 2 API calls 17628->17630 17632 7ffca44a0807 17628->17632 17629->17628 17630->17632 17631 7ffca4498ff8 2 API calls 17631->17632 17632->17620 17632->17631 17635 7ffca44a0c44 17632->17635 17639 7ffca44a0e58 17632->17639 17633 7ffca44a0e5a 17638 7ffca449dad0 2 API calls 17633->17638 17633->17639 17634 7ffca44a0e0f 17636 7ffca449dad0 2 API calls 17634->17636 17635->17633 17635->17634 17637 7ffca44a0e32 17635->17637 17635->17639 17636->17637 17640 7ffca44a0e3f 17637->17640 17642 7ffca44a0e90 17637->17642 17638->17642 17644 7ffca4497650 2 API calls 17639->17644 17645 7ffca44a0ed2 17639->17645 17643 7ffca4497650 2 API calls 17640->17643 17641 7ffca4497650 2 API calls 17641->17639 17642->17639 17642->17641 17643->17639 17644->17645 17218 7ffca44a9efd 17219 7ffca44a9f0f 17218->17219 17222 7ffca44902e8 17219->17222 17223 7ffca44902f1 NtResumeThread 17222->17223 17225 7ffca44a9f76 17223->17225 17458 7ffca4497635 17459 7ffca449764f 17458->17459 17460 7ffca44978b0 2 API calls 17459->17460 17461 7ffca44942f8 2 API calls 17459->17461 17462 7ffca44976a2 17459->17462 17463 7ffca44977bf 17459->17463 17460->17459 17461->17459 17464 7ffca44978b0 2 API calls 17463->17464 17464->17462 17226 7ffca44a3437 17227 7ffca44a343b 17226->17227 17228 7ffca44a3442 17227->17228 17229 7ffca449dad0 2 API calls 17227->17229 17230 7ffca44a34fe 17229->17230 17550 7ffca44a9338 17553 7ffca44a9341 17550->17553 17551 7ffca44935d0 2 API calls 17552 7ffca44a95c2 17551->17552 17554 7ffca4497650 2 API calls 17553->17554 17555 7ffca44a94de 17553->17555 17554->17555 17555->17551 17556 7ffca44a94fd 17555->17556 17492 7ffca44a02ba 17493 7ffca44a02ec 17492->17493 17498 7ffca44a036c 17492->17498 17494 7ffca44a0351 17493->17494 17493->17498 17495 7ffca4497650 2 API calls 17494->17495 17496 7ffca44a0360 17495->17496 17497 7ffca44a04d2 17498->17497 17499 7ffca44a066d 17498->17499 17500 7ffca44a05ed 17498->17500 17510 7ffca44a066b 17498->17510 17501 7ffca449dad0 2 API calls 17499->17501 17504 7ffca44991f0 2 API calls 17500->17504 17503 7ffca44a06b9 17501->17503 17502 7ffca44a06f8 17508 7ffca4497650 2 API calls 17503->17508 17503->17510 17505 7ffca44a0639 17504->17505 17506 7ffca449dad0 2 API calls 17505->17506 17507 7ffca44a064b 17506->17507 17507->17503 17509 7ffca44a0653 17507->17509 17508->17510 17509->17510 17511 7ffca4497650 2 API calls 17509->17511 17510->17502 17512 7ffca4497650 2 API calls 17510->17512 17516 7ffca44a0807 17510->17516 17511->17510 17512->17516 17513 7ffca4498ff8 2 API calls 17513->17516 17514 7ffca44a0e5a 17520 7ffca449dad0 2 API calls 17514->17520 17524 7ffca44a0e58 17514->17524 17515 7ffca44a0e0f 17518 7ffca449dad0 2 API calls 17515->17518 17516->17502 17516->17513 17517 7ffca44a0c44 17516->17517 17516->17524 17517->17514 17517->17515 17519 7ffca44a0e32 17517->17519 17517->17524 17518->17519 17521 7ffca44a0e3f 17519->17521 17522 7ffca44a0e90 17519->17522 17520->17522 17525 7ffca4497650 2 API calls 17521->17525 17523 7ffca4497650 2 API calls 17522->17523 17522->17524 17523->17524 17526 7ffca4497650 2 API calls 17524->17526 17527 7ffca44a0ed2 17524->17527 17525->17524 17526->17527 17231 7ffca4496ab0 17232 7ffca4496ac7 17231->17232 17233 7ffca4496e3e 17232->17233 17234 7ffca44942d0 2 API calls 17232->17234 17234->17233 17557 7ffca44a0331 17558 7ffca44a0340 17557->17558 17559 7ffca44a0351 17558->17559 17563 7ffca44a03b9 17558->17563 17560 7ffca4497650 2 API calls 17559->17560 17561 7ffca44a0360 17560->17561 17562 7ffca44a04d2 17563->17562 17564 7ffca44a066d 17563->17564 17565 7ffca44a05ed 17563->17565 17575 7ffca44a066b 17563->17575 17566 7ffca449dad0 2 API calls 17564->17566 17569 7ffca44991f0 2 API calls 17565->17569 17568 7ffca44a06b9 17566->17568 17567 7ffca44a06f8 17573 7ffca4497650 2 API calls 17568->17573 17568->17575 17570 7ffca44a0639 17569->17570 17571 7ffca449dad0 2 API calls 17570->17571 17572 7ffca44a064b 17571->17572 17572->17568 17574 7ffca44a0653 17572->17574 17573->17575 17574->17575 17576 7ffca4497650 2 API calls 17574->17576 17575->17567 17577 7ffca4497650 2 API calls 17575->17577 17581 7ffca44a0807 17575->17581 17576->17575 17577->17581 17578 7ffca4498ff8 2 API calls 17578->17581 17579 7ffca44a0e5a 17585 7ffca449dad0 2 API calls 17579->17585 17589 7ffca44a0e58 17579->17589 17580 7ffca44a0e0f 17583 7ffca449dad0 2 API calls 17580->17583 17581->17567 17581->17578 17582 7ffca44a0c44 17581->17582 17581->17589 17582->17579 17582->17580 17584 7ffca44a0e32 17582->17584 17582->17589 17583->17584 17586 7ffca44a0e3f 17584->17586 17587 7ffca44a0e90 17584->17587 17585->17587 17590 7ffca4497650 2 API calls 17586->17590 17588 7ffca4497650 2 API calls 17587->17588 17587->17589 17588->17589 17591 7ffca4497650 2 API calls 17589->17591 17592 7ffca44a0ed2 17589->17592 17590->17589 17591->17592 17646 7ffca449efa4 17647 7ffca449efaf 17646->17647 17648 7ffca4497650 2 API calls 17647->17648 17649 7ffca449f0a1 17647->17649 17648->17649 17650 7ffca4497650 2 API calls 17649->17650 17651 7ffca449f11f 17649->17651 17650->17651 17235 7ffca44a7ca9 17237 7ffca44a7cb3 17235->17237 17236 7ffca44a7d61 17237->17236 17239 7ffca4498b20 17237->17239 17240 7ffca44a7e20 17239->17240 17240->17236 17241 7ffca44a8115 17240->17241 17242 7ffca44a822d LookupPrivilegeValueW 17240->17242 17241->17236 17243 7ffca44a826a 17242->17243 17243->17236 17244 7ffca44a682b 17245 7ffca44a6837 17244->17245 17250 7ffca44a688c 17244->17250 17249 7ffca4497650 2 API calls 17245->17249 17245->17250 17246 7ffca44a6940 17253 7ffca4497650 2 API calls 17246->17253 17254 7ffca44a693b 17246->17254 17256 7ffca44a69f4 17246->17256 17247 7ffca4498638 2 API calls 17248 7ffca44a68fc 17247->17248 17248->17246 17251 7ffca44a692a 17248->17251 17249->17250 17250->17246 17250->17247 17252 7ffca4497650 2 API calls 17251->17252 17252->17254 17253->17254 17255 7ffca4498648 2 API calls 17254->17255 17254->17256 17255->17256 17257 7ffca449cc9d 17261 7ffca449ccaf 17257->17261 17258 7ffca449ce08 17259 7ffca449cdb8 17265 7ffca4499018 17259->17265 17260 7ffca449cdda 17281 7ffca4499010 17260->17281 17261->17258 17261->17259 17261->17260 17264 7ffca449cdd8 17266 7ffca44a0860 17265->17266 17270 7ffca44a0c44 17266->17270 17277 7ffca44a0e58 17266->17277 17290 7ffca4498ff8 17266->17290 17268 7ffca44a0e5a 17273 7ffca449dad0 2 API calls 17268->17273 17268->17277 17269 7ffca44a0e0f 17271 7ffca449dad0 2 API calls 17269->17271 17270->17268 17270->17269 17272 7ffca44a0e32 17270->17272 17270->17277 17271->17272 17274 7ffca44a0e3f 17272->17274 17275 7ffca44a0e90 17272->17275 17273->17275 17278 7ffca4497650 2 API calls 17274->17278 17276 7ffca4497650 2 API calls 17275->17276 17275->17277 17276->17277 17279 7ffca4497650 2 API calls 17277->17279 17280 7ffca44a0ed2 17277->17280 17278->17277 17279->17280 17280->17264 17285 7ffca449d010 17281->17285 17282 7ffca44990e8 2 API calls 17284 7ffca449d6de 17282->17284 17283 7ffca44942f8 2 API calls 17288 7ffca449d71d 17283->17288 17284->17283 17284->17288 17286 7ffca4499018 2 API calls 17285->17286 17287 7ffca449d0bf 17285->17287 17286->17287 17287->17282 17287->17284 17289 7ffca449d619 17287->17289 17288->17264 17289->17264 17289->17289 17291 7ffca44a0f60 17290->17291 17292 7ffca4497650 2 API calls 17291->17292 17293 7ffca44a0fb3 17291->17293 17292->17293 17293->17266 17655 7ffca44a779d 17656 7ffca44a77a5 17655->17656 17661 7ffca44931c8 17656->17661 17658 7ffca44a77d6 17666 7ffca4493200 17658->17666 17662 7ffca44a7820 17661->17662 17663 7ffca44a790e 17662->17663 17664 7ffca4496ab0 2 API calls 17662->17664 17663->17658 17665 7ffca44a7980 17664->17665 17665->17658 17667 7ffca44a7930 17666->17667 17668 7ffca4496ab0 2 API calls 17667->17668 17669 7ffca44a77f3 17668->17669 17383 7ffca44a0d20 17394 7ffca44a0d2f 17383->17394 17384 7ffca44a0e5a 17388 7ffca449dad0 2 API calls 17384->17388 17395 7ffca44a0e58 17384->17395 17385 7ffca44a0e0f 17386 7ffca449dad0 2 API calls 17385->17386 17387 7ffca44a0e32 17386->17387 17389 7ffca44a0e3f 17387->17389 17390 7ffca44a0e90 17387->17390 17388->17390 17393 7ffca4497650 2 API calls 17389->17393 17392 7ffca4497650 2 API calls 17390->17392 17390->17395 17391 7ffca44a0ed2 17392->17395 17393->17395 17394->17384 17394->17385 17394->17387 17395->17391 17396 7ffca4497650 2 API calls 17395->17396 17396->17391 17333 7ffca44934a2 17334 7ffca44934ad 17333->17334 17335 7ffca44931f8 2 API calls 17334->17335 17336 7ffca4493603 17335->17336 17294 7ffca44a6022 17295 7ffca44a602c 17294->17295 17296 7ffca44a6069 17295->17296 17298 7ffca44a60d1 17295->17298 17297 7ffca4497650 2 API calls 17296->17297 17302 7ffca44a607a 17296->17302 17297->17302 17299 7ffca449dad0 2 API calls 17298->17299 17300 7ffca44a6169 17299->17300 17301 7ffca4497650 2 API calls 17300->17301 17300->17302 17301->17302 17303 7ffca44a61a7 17302->17303 17304 7ffca44a688c 17302->17304 17311 7ffca4497650 2 API calls 17302->17311 17312 7ffca44a693b 17302->17312 17305 7ffca4498638 2 API calls 17304->17305 17307 7ffca44a6940 17304->17307 17306 7ffca44a68fc 17305->17306 17306->17307 17309 7ffca44a692a 17306->17309 17308 7ffca4497650 2 API calls 17307->17308 17307->17312 17314 7ffca44a69f4 17307->17314 17308->17312 17310 7ffca4497650 2 API calls 17309->17310 17310->17312 17311->17304 17313 7ffca4498648 2 API calls 17312->17313 17312->17314 17313->17314

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 7ffca4494308-7ffca44943c4 17 7ffca44943c6 0->17 18 7ffca44943c7-7ffca449445e 0->18 17->18 24 7ffca4494464-7ffca44944c5 18->24 25 7ffca44946d6-7ffca4494709 18->25 51 7ffca4494525-7ffca449452f 24->51 52 7ffca44944c8-7ffca44944d4 call 7ffca4493348 24->52 32 7ffca449470b-7ffca4494712 25->32 33 7ffca4494713-7ffca449472e 25->33 32->33 37 7ffca4494730-7ffca4494732 33->37 38 7ffca4494762-7ffca4494791 33->38 40 7ffca4494734-7ffca4494737 call 7ffca4493418 37->40 41 7ffca449473c-7ffca4494742 37->41 53 7ffca4494794-7ffca44947ca 38->53 40->41 42 7ffca4494744-7ffca449474f 41->42 43 7ffca4494751-7ffca4494761 41->43 42->43 56 7ffca4494536-7ffca4494549 51->56 57 7ffca44944d9-7ffca44944f0 52->57 53->53 55 7ffca44947cc 53->55 58 7ffca4494550 56->58 60 7ffca4494552-7ffca4494565 57->60 58->60 61 7ffca4494567-7ffca4494569 60->61 62 7ffca44944f2-7ffca449451f call 7ffca44940d0 * 2 call 7ffca44940d8 60->62 64 7ffca44945c2-7ffca44945d5 61->64 80 7ffca449457e-7ffca4494594 62->80 85 7ffca4494521-7ffca4494523 62->85 66 7ffca44945d7-7ffca44945d9 64->66 67 7ffca449456b-7ffca449457d call 7ffca44940d0 * 2 64->67 70 7ffca449467e-7ffca4494691 66->70 67->80 73 7ffca4494697-7ffca44946d5 70->73 74 7ffca44945de-7ffca4494610 call 7ffca44940d0 70->74 82 7ffca449462a-7ffca449462b 74->82 83 7ffca4494612-7ffca4494628 74->83 88 7ffca449459b-7ffca44945a9 80->88 87 7ffca449462d-7ffca449464c call 7ffca4490450 82->87 83->87 85->51 92 7ffca4494651-7ffca4494677 call 7ffca4493420 87->92 90 7ffca44945b0-7ffca44945c0 88->90 90->64 94 7ffca449467c 92->94 94->70
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.281862107.00007FFCA4490000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFCA4490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffca4490000_UxaZyTE7nq.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: fish$]_H
                                                            • API String ID: 0-3021672115
                                                            • Opcode ID: 47b69f6e88fc1e368a10dd519109e2b330ab43a43ae3d52b0fcfd51cb779dedd
                                                            • Instruction ID: 3294874027e328f9b4414563b2faba7515dfac1d1e5cdcdb3a9864e5a72e8e66
                                                            • Opcode Fuzzy Hash: 47b69f6e88fc1e368a10dd519109e2b330ab43a43ae3d52b0fcfd51cb779dedd
                                                            • Instruction Fuzzy Hash: C3F17831A0EA9D4FEB58DA6898A11B977D0EF56314B1405BED08AC31EBDE14FC02D3E5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.281862107.00007FFCA4490000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFCA4490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffca4490000_UxaZyTE7nq.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: cd303d459da28bb656d0daed6db0046b9d40f3f29f9699b056d11b3e0f564fd8
                                                            • Instruction ID: d6a5552c36a00b56dfef10a8c057ffe7686bab73d65dd5da02df6a7659b07b24
                                                            • Opcode Fuzzy Hash: cd303d459da28bb656d0daed6db0046b9d40f3f29f9699b056d11b3e0f564fd8
                                                            • Instruction Fuzzy Hash: DD82A93090D69E8FE759CB14C4A12B477E1EF95311F0049BDD18E9B5EBDE28B846CBA0
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 422 7ffca4499010-7ffca449d025 424 7ffca449d027-7ffca449d068 422->424 425 7ffca449d06f-7ffca449d099 422->425 429 7ffca449d06e 424->429 427 7ffca449d09b-7ffca449d0b0 425->427 428 7ffca449d0b2 425->428 430 7ffca449d0b4-7ffca449d0b9 427->430 428->430 429->425 432 7ffca449d1b6-7ffca449d1d6 430->432 433 7ffca449d0bf-7ffca449d0ce 430->433 436 7ffca449d227-7ffca449d232 432->436 437 7ffca449d0d8-7ffca449d0d9 433->437 438 7ffca449d0d0-7ffca449d0d6 433->438 439 7ffca449d234-7ffca449d243 436->439 440 7ffca449d1d8-7ffca449d1de 436->440 443 7ffca449d0db-7ffca449d0fe 437->443 438->443 448 7ffca449d245-7ffca449d257 439->448 449 7ffca449d259 439->449 441 7ffca449d1e4-7ffca449d205 call 7ffca4498ff0 440->441 442 7ffca449d6a1-7ffca449d6b9 440->442 457 7ffca449d20a-7ffca449d224 441->457 455 7ffca449d6bb-7ffca449d6f6 call 7ffca44990e8 442->455 456 7ffca449d703-7ffca449d731 call 7ffca44942f8 442->456 447 7ffca449d153-7ffca449d15e 443->447 452 7ffca449d100-7ffca449d106 447->452 453 7ffca449d160-7ffca449d177 447->453 454 7ffca449d25b-7ffca449d260 448->454 449->454 452->442 458 7ffca449d10c-7ffca449d150 call 7ffca4498ff0 452->458 473 7ffca449d1a6-7ffca449d1b1 call 7ffca4498e60 453->473 474 7ffca449d179-7ffca449d19f call 7ffca4498ff0 453->474 459 7ffca449d266-7ffca449d288 call 7ffca4498ff0 454->459 460 7ffca449d2ec-7ffca449d300 454->460 499 7ffca449d6f8-7ffca449d701 455->499 500 7ffca449d740-7ffca449d74b 455->500 504 7ffca449d73c-7ffca449d73f 456->504 505 7ffca449d733-7ffca449d73b 456->505 457->436 458->447 491 7ffca449d2b6-7ffca449d2b7 459->491 492 7ffca449d28a-7ffca449d2b4 459->492 463 7ffca449d350-7ffca449d35f 460->463 464 7ffca449d302-7ffca449d308 460->464 486 7ffca449d36c 463->486 487 7ffca449d361-7ffca449d36a 463->487 470 7ffca449d327-7ffca449d33f 464->470 471 7ffca449d30a-7ffca449d325 464->471 482 7ffca449d348-7ffca449d34b 470->482 471->470 473->460 474->473 489 7ffca449d4f8-7ffca449d50d 482->489 494 7ffca449d36e-7ffca449d373 486->494 487->494 509 7ffca449d54d 489->509 510 7ffca449d50f-7ffca449d54b 489->510 501 7ffca449d2b9-7ffca449d2c0 491->501 492->501 502 7ffca449d379-7ffca449d37c 494->502 503 7ffca449d67f-7ffca449d680 494->503 499->456 507 7ffca449d756-7ffca449d767 500->507 508 7ffca449d74d-7ffca449d755 500->508 501->460 513 7ffca449d2c2-7ffca449d2e7 call 7ffca4499018 501->513 514 7ffca449d3c4 502->514 515 7ffca449d37e-7ffca449d39b 502->515 512 7ffca449d683-7ffca449d692 503->512 504->500 505->504 516 7ffca449d769-7ffca449d771 507->516 517 7ffca449d772-7ffca449d7ad 507->517 508->507 522 7ffca449d54f-7ffca449d554 509->522 510->522 525 7ffca449d693-7ffca449d69a 512->525 513->460 539 7ffca449d66e-7ffca449d67e 513->539 520 7ffca449d3c6-7ffca449d3cb 514->520 515->514 545 7ffca449d39d-7ffca449d3c2 515->545 516->517 534 7ffca449d7b4-7ffca449d7bf 517->534 535 7ffca449d7af call 7ffca449b1d0 517->535 526 7ffca449d4cc-7ffca449d4ef 520->526 527 7ffca449d3d1-7ffca449d3dd 520->527 528 7ffca449d5c4-7ffca449d605 call 7ffca4494230 522->528 529 7ffca449d556-7ffca449d5b3 call 7ffca4494230 522->529 525->442 532 7ffca449d4f1 526->532 527->442 537 7ffca449d3e3-7ffca449d3f2 527->537 558 7ffca449d60a-7ffca449d612 528->558 579 7ffca449d5b5-7ffca449d5be 529->579 580 7ffca449d634 529->580 546 7ffca449d4f5-7ffca449d4f6 532->546 553 7ffca449d7d1 534->553 554 7ffca449d7c1-7ffca449d7cf 534->554 535->534 543 7ffca449d405-7ffca449d412 537->543 544 7ffca449d3f4-7ffca449d403 537->544 556 7ffca449d418-7ffca449d41e 543->556 544->556 545->520 546->489 555 7ffca449d7d3-7ffca449d7d8 553->555 554->555 560 7ffca449d7da-7ffca449d7ed call 7ffca4493280 555->560 561 7ffca449d7ef-7ffca449d7f7 call 7ffca4494248 555->561 562 7ffca449d420-7ffca449d44d 556->562 563 7ffca449d453-7ffca449d458 556->563 558->512 564 7ffca449d614-7ffca449d617 558->564 575 7ffca449d7fc-7ffca449d803 560->575 561->575 562->563 563->442 571 7ffca449d45e-7ffca449d47e 563->571 564->525 572 7ffca449d619 564->572 582 7ffca449d480-7ffca449d490 571->582 583 7ffca449d492-7ffca449d4c2 call 7ffca44985e0 571->583 577 7ffca449d61b-7ffca449d62e 572->577 578 7ffca449d660-7ffca449d66b 572->578 577->580 578->539 579->528 580->580 582->532 582->583 587 7ffca449d4c7-7ffca449d4ca 583->587 587->489
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.281862107.00007FFCA4490000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFCA4490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffca4490000_UxaZyTE7nq.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: T]_H
                                                            • API String ID: 0-1147892275
                                                            • Opcode ID: aead15e65f456c4fcaa213870eaf8484b6770c4efb9931abe69560249e86e4cc
                                                            • Instruction ID: 8b4291014dac51743da5ffafa05a8fe2fae176ce8e0946b14db37cef56e775ed
                                                            • Opcode Fuzzy Hash: aead15e65f456c4fcaa213870eaf8484b6770c4efb9931abe69560249e86e4cc
                                                            • Instruction Fuzzy Hash: 3D520470A0DA1D4FDB68DA68C8A5A797BE1EF59300B1005BDE08EC72A7CE24FC42D755
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.281862107.00007FFCA4490000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFCA4490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffca4490000_UxaZyTE7nq.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 64211bda6b5c4dcc6fb3e57887f09573a575693418fdcdf5fe853018821ea14a
                                                            • Instruction ID: 9361cdaa4515e309685a46e6aca4bd657152cfb2b72cf7b6e1c8fc90ddbfa5d8
                                                            • Opcode Fuzzy Hash: 64211bda6b5c4dcc6fb3e57887f09573a575693418fdcdf5fe853018821ea14a
                                                            • Instruction Fuzzy Hash: 38D27830A0DA5D8FE759DB28C4A55B977E1FF95300B0049BEE08AC72A6DE34F846C791
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1456 7ffca44a8655-7ffca44a87a1 AdjustTokenPrivileges 1460 7ffca44a87a9-7ffca44a881e call 7ffca44a881f 1456->1460 1461 7ffca44a87a3 1456->1461 1461->1460
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.281862107.00007FFCA4490000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFCA4490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffca4490000_UxaZyTE7nq.jbxd
                                                            Similarity
                                                            • API ID: AdjustPrivilegesToken
                                                            • String ID:
                                                            • API String ID: 2874748243-0
                                                            • Opcode ID: 621aeed17c38ee6e3712fe9629a4b2ca15fb28c03f5a61c63c937923a30d07ef
                                                            • Instruction ID: 8e9b40c5572be323f2edf22d56ebd7a0d2517bc891bdd0a54c15214c8076793e
                                                            • Opcode Fuzzy Hash: 621aeed17c38ee6e3712fe9629a4b2ca15fb28c03f5a61c63c937923a30d07ef
                                                            • Instruction Fuzzy Hash: 41517F71908A1C8FDF58DF48D895BE9B7F1FB68310F0042AAE44EE7252DB70A945CB81
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1574 7ffca44902e8-7ffca44ac882 NtResumeThread 1582 7ffca44ac884 1574->1582 1583 7ffca44ac88a-7ffca44ac8a6 1574->1583 1582->1583
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.281862107.00007FFCA4490000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFCA4490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffca4490000_UxaZyTE7nq.jbxd
                                                            Similarity
                                                            • API ID: ResumeThread
                                                            • String ID:
                                                            • API String ID: 947044025-0
                                                            • Opcode ID: 2bf0a3522f1ad002c30eb9db2d1f3787c5e6994e26f08f08767096d3c865bade
                                                            • Instruction ID: cb5db0dd74795d79399316825acb3b68b389969b9b33790bb312b56744c8952d
                                                            • Opcode Fuzzy Hash: 2bf0a3522f1ad002c30eb9db2d1f3787c5e6994e26f08f08767096d3c865bade
                                                            • Instruction Fuzzy Hash: B231157190DA5C8FDB58DB9C98957F9BFF4EBA6310F14016BC04AD3257DA20A802C791
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.281862107.00007FFCA4490000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFCA4490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffca4490000_UxaZyTE7nq.jbxd
                                                            Similarity
                                                            • API ID: ResumeThread
                                                            • String ID:
                                                            • API String ID: 947044025-0
                                                            • Opcode ID: dc30f5040377ad411da17c39852eb581545289d5b948b1338c87622fb6b6d247
                                                            • Instruction ID: 4df35aa46499152b3c86f54094ded93c80bb596131c4bad3ee352d69f627e5db
                                                            • Opcode Fuzzy Hash: dc30f5040377ad411da17c39852eb581545289d5b948b1338c87622fb6b6d247
                                                            • Instruction Fuzzy Hash: EF31267190DA5C8FDB58DB9C98897F9BFF4FB99310F14016BC04AD3256CB20A842CB91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.281862107.00007FFCA4490000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFCA4490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffca4490000_UxaZyTE7nq.jbxd
                                                            Similarity
                                                            • API ID: DriverLoad
                                                            • String ID:
                                                            • API String ID: 2513027847-0
                                                            • Opcode ID: 778ddb17e7ccc8eaa351f6fc6855aac5d95f837440dc27070591ba8d36a783de
                                                            • Instruction ID: b7a84a3f4a7842e9be59f45b0d3abbf52783d06f2728fcc36224cca9ba1a3788
                                                            • Opcode Fuzzy Hash: 778ddb17e7ccc8eaa351f6fc6855aac5d95f837440dc27070591ba8d36a783de
                                                            • Instruction Fuzzy Hash: E231E43190CA4C9FDB58DB58C849BE9BBF1FF9A321F04422ED009D32A1DB706416CB91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.281862107.00007FFCA4490000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFCA4490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffca4490000_UxaZyTE7nq.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2d8083e554f40ebca69b482946fc317ed1bdaff28c30fe85437ff24d0adb5f7c
                                                            • Instruction ID: a48551a49d4b821484b3c15c64938e4e6d61a9257ddda740469b05e4d50f18f3
                                                            • Opcode Fuzzy Hash: 2d8083e554f40ebca69b482946fc317ed1bdaff28c30fe85437ff24d0adb5f7c
                                                            • Instruction Fuzzy Hash: 1662D13051AA5D8FE759DF18C4E09B973E1FF94304B604ABDD08B876AACA35F842C791
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.281862107.00007FFCA4490000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFCA4490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffca4490000_UxaZyTE7nq.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f701e5041f8668e1d79cfd96d3f9109b548343a8c5baf06d29008db68c8c48d5
                                                            • Instruction ID: 57b2384400c8cee07c1ab021ebc5f75a3b1e892d0a93a520291dfdcc70ba5f74
                                                            • Opcode Fuzzy Hash: f701e5041f8668e1d79cfd96d3f9109b548343a8c5baf06d29008db68c8c48d5
                                                            • Instruction Fuzzy Hash: 0332D630618E4D8FDB88EF1CC8A5AA577E1FF99310B144AA9E00DD7296CE35EC42C795
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.281862107.00007FFCA4490000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFCA4490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffca4490000_UxaZyTE7nq.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2b2a4136b10b3f7dd95b5ae1d49102af2a3815313f5a7b7b8151d08268e72f9a
                                                            • Instruction ID: 70fbba69d50816f24ca0b6da99128ea2f55f4ef8953c7c1eb9fdc480e03996f7
                                                            • Opcode Fuzzy Hash: 2b2a4136b10b3f7dd95b5ae1d49102af2a3815313f5a7b7b8151d08268e72f9a
                                                            • Instruction Fuzzy Hash: 14F17A3050DBAA4FE31DCA6884E51B577D2FF91302B144E7ED48AC72AADE24F802C795
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 730 7ffca4498b20-7ffca44a7e2a 732 7ffca44a7e74-7ffca44a7e77 730->732 733 7ffca44a7e2c-7ffca44a7e4e 730->733 734 7ffca44a7ed6-7ffca44a7ef0 732->734 735 7ffca44a7e79-7ffca44a7e93 732->735 737 7ffca44a7ead-7ffca44a7eb1 733->737 738 7ffca44a7e50-7ffca44a7e55 733->738 744 7ffca44a7ef2-7ffca44a7f10 734->744 735->744 747 7ffca44a7e95-7ffca44a7eac 735->747 739 7ffca44a7e59-7ffca44a7e72 737->739 746 7ffca44a7eb3-7ffca44a7ed3 737->746 738->739 739->732 750 7ffca44a7f81-7ffca44a7f8b 744->750 751 7ffca44a7f12-7ffca44a7f14 744->751 746->734 747->737 753 7ffca44a7f8d-7ffca44a7f8e 750->753 754 7ffca44a7f16 751->754 755 7ffca44a7f90-7ffca44a7f9b 751->755 753->755 756 7ffca44a7f18-7ffca44a7f1c 754->756 757 7ffca44a7f5c-7ffca44a7f5f 754->757 762 7ffca44a7f9d-7ffca44a7fa5 755->762 756->753 759 7ffca44a7f1e-7ffca44a7f21 756->759 760 7ffca44a7fdb-7ffca44a7fe7 757->760 761 7ffca44a7f61 757->761 759->762 763 7ffca44a7f23 759->763 772 7ffca44a7fe8-7ffca44a7ff1 760->772 764 7ffca44a7fa7-7ffca44a7fad 761->764 765 7ffca44a7f63-7ffca44a7f67 761->765 762->764 766 7ffca44a7f69-7ffca44a7f6c 763->766 769 7ffca44a7f25-7ffca44a7f5b 763->769 770 7ffca44a7faf-7ffca44a7fb1 764->770 771 7ffca44a801e-7ffca44a8027 764->771 765->766 767 7ffca44a7fd8-7ffca44a7fd9 765->767 766->772 773 7ffca44a7f6e 766->773 767->760 769->757 792 7ffca44a7fcc-7ffca44a7fd6 769->792 774 7ffca44a802d-7ffca44a8038 770->774 775 7ffca44a7fb3 770->775 785 7ffca44a802a-7ffca44a802c 771->785 780 7ffca44a806d-7ffca44a806e 772->780 781 7ffca44a7ff2-7ffca44a7ff6 772->781 776 7ffca44a7fb4-7ffca44a7fb9 773->776 777 7ffca44a7f70-7ffca44a7f7f 773->777 778 7ffca44a80b4-7ffca44a80b5 774->778 779 7ffca44a8039 774->779 775->776 783 7ffca44a7ff9-7ffca44a7ffe 775->783 776->785 791 7ffca44a7fbb-7ffca44a7fbe 776->791 777->750 793 7ffca44a80b6-7ffca44a80b8 778->793 786 7ffca44a80aa-7ffca44a80ab 779->786 787 7ffca44a803a-7ffca44a803d 779->787 789 7ffca44a806f 780->789 796 7ffca44a7ff8 781->796 797 7ffca44a8072-7ffca44a807e 781->797 783->789 790 7ffca44a8000-7ffca44a8003 783->790 785->774 816 7ffca44a8124-7ffca44a812b 786->816 817 7ffca44a80ad-7ffca44a80b3 786->817 794 7ffca44a80b9-7ffca44a80be 787->794 795 7ffca44a803e 787->795 789->797 798 7ffca44a8005 790->798 799 7ffca44a807f 790->799 791->787 800 7ffca44a7fc0 791->800 792->767 793->794 803 7ffca44a80bf-7ffca44a80c4 794->803 795->803 804 7ffca44a803f 795->804 796->783 796->795 797->799 806 7ffca44a8006-7ffca44a801d 798->806 807 7ffca44a804b 798->807 801 7ffca44a80fb-7ffca44a80fc 799->801 802 7ffca44a8080 799->802 800->806 808 7ffca44a7fc2-7ffca44a7fc9 800->808 809 7ffca44a80fd-7ffca44a80ff 801->809 810 7ffca44a80f1-7ffca44a80fa 802->810 811 7ffca44a8081-7ffca44a8084 802->811 830 7ffca44a80c6-7ffca44a80cb 803->830 812 7ffca44a8085 804->812 813 7ffca44a8040-7ffca44a8045 804->813 806->771 814 7ffca44a804c 807->814 815 7ffca44a80cc-7ffca44a80d5 807->815 808->792 818 7ffca44a8100-7ffca44a8102 809->818 810->801 811->812 811->818 820 7ffca44a8106-7ffca44a810a 812->820 821 7ffca44a8086 812->821 813->793 824 7ffca44a8047-7ffca44a804a 813->824 825 7ffca44a804d-7ffca44a8068 814->825 826 7ffca44a8092 814->826 822 7ffca44a80d6 815->822 823 7ffca44a8151 815->823 827 7ffca44a8144-7ffca44a8145 816->827 828 7ffca44a812d-7ffca44a812e 816->828 817->778 818->820 832 7ffca44a810d-7ffca44a8111 820->832 821->815 831 7ffca44a8087-7ffca44a808c 821->831 829 7ffca44a8147-7ffca44a814f 822->829 834 7ffca44a80d7-7ffca44a80d8 822->834 833 7ffca44a8153-7ffca44a8155 823->833 824->807 824->830 825->780 835 7ffca44a8113 826->835 836 7ffca44a8093 826->836 827->829 837 7ffca44a812f-7ffca44a813a 828->837 830->815 831->809 838 7ffca44a808e-7ffca44a8091 831->838 832->835 840 7ffca44a8156-7ffca44a815b 833->840 841 7ffca44a80d9-7ffca44a80da 834->841 842 7ffca44a8115-7ffca44a811b 835->842 843 7ffca44a818c-7ffca44a8214 835->843 836->841 844 7ffca44a8094-7ffca44a80a9 836->844 837->827 850 7ffca44a813c-7ffca44a8142 837->850 838->826 838->832 846 7ffca44a815c-7ffca44a8188 840->846 841->840 847 7ffca44a80db 841->847 853 7ffca44a8122-7ffca44a8123 842->853 862 7ffca44a8216-7ffca44a821b 843->862 863 7ffca44a821e-7ffca44a8223 843->863 844->786 847->846 852 7ffca44a80dc 847->852 850->827 852->853 856 7ffca44a80dd-7ffca44a80e2 852->856 853->816 856->833 858 7ffca44a80e4-7ffca44a80e9 856->858 858->837 865 7ffca44a80eb-7ffca44a80ee 858->865 862->863 866 7ffca44a8225-7ffca44a822a 863->866 867 7ffca44a822d-7ffca44a8268 LookupPrivilegeValueW 863->867 865->810 866->867 868 7ffca44a826a 867->868 869 7ffca44a8270-7ffca44a82a2 867->869 868->869
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.281862107.00007FFCA4490000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFCA4490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffca4490000_UxaZyTE7nq.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 916686f177c61bd8e15619574d0ddd371cee0db2e1f559be8ce25a22db914c5e
                                                            • Instruction ID: c63e593dfab1d1b37494a994b4a70255ec21099e86db801433afc4197d980067
                                                            • Opcode Fuzzy Hash: 916686f177c61bd8e15619574d0ddd371cee0db2e1f559be8ce25a22db914c5e
                                                            • Instruction Fuzzy Hash: D8127A3190EA9D4FE768D71C886A1B577E0FF99311F0409BED04DDB2A6DE28B805C7A1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1372 7ffca4490258-7ffca44aa056 1386 7ffca44aa058-7ffca44aa05d 1372->1386 1387 7ffca44aa060-7ffca44aa065 1372->1387 1386->1387 1388 7ffca44aa067-7ffca44aa077 1387->1388 1389 7ffca44aa07f-7ffca44aa0aa 1387->1389 1388->1389 1390 7ffca44aa079-7ffca44aa07d 1389->1390 1391 7ffca44aa0ac-7ffca44aa0b9 1389->1391 1392 7ffca44aa0bc-7ffca44aa193 CreateProcessW 1390->1392 1391->1392 1394 7ffca44aa195 1392->1394 1395 7ffca44aa19b-7ffca44aa1ef call 7ffca44aa1f0 1392->1395 1394->1395
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.281862107.00007FFCA4490000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFCA4490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffca4490000_UxaZyTE7nq.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: eb78852cd9d48ba15e7365fc1e7897220dbb4bbf4eec344130417bb93fd868dc
                                                            • Instruction ID: 47ea7287a1d45408db1a0fdb0d94c08de2e7b3dc8fcf77cad0711f95ae098496
                                                            • Opcode Fuzzy Hash: eb78852cd9d48ba15e7365fc1e7897220dbb4bbf4eec344130417bb93fd868dc
                                                            • Instruction Fuzzy Hash: FDA1D17190DA5C8FDB68DB4C98556E8BBE0FF98310F1046ABD009A3256DA30AD81CBC2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1399 7ffca44aa1f0-7ffca44aa214 1400 7ffca44aa216-7ffca44aa22a 1399->1400 1401 7ffca44aa22c-7ffca44aa234 1399->1401 1400->1401 1405 7ffca44aa28b-7ffca44aa2a6 1400->1405 1403 7ffca44aa236-7ffca44aa247 1401->1403 1404 7ffca44aa24d-7ffca44aa25d 1401->1404 1403->1404 1408 7ffca44aa2a8 1405->1408 1409 7ffca44aa26c-7ffca44aa289 1405->1409 1410 7ffca44aa324-7ffca44aa327 1408->1410 1411 7ffca44aa2aa-7ffca44aa2ad 1408->1411 1409->1405 1413 7ffca44aa329-7ffca44aa32c 1410->1413 1415 7ffca44aa371-7ffca44aa3ba 1410->1415 1411->1413 1414 7ffca44aa2af 1411->1414 1418 7ffca44aa32f-7ffca44aa33f 1413->1418 1416 7ffca44aa2f5-7ffca44aa300 1414->1416 1417 7ffca44aa2b1-7ffca44aa2be 1414->1417 1424 7ffca44aa3bb-7ffca44aa3c5 1415->1424 1417->1418 1419 7ffca44aa2c0-7ffca44aa2c5 1417->1419 1418->1424 1425 7ffca44aa341-7ffca44aa345 1418->1425 1422 7ffca44aa346 1419->1422 1423 7ffca44aa2c7-7ffca44aa2e8 1419->1423 1427 7ffca44aa347-7ffca44aa349 1422->1427 1428 7ffca44aa34a-7ffca44aa355 1422->1428 1430 7ffca44aa364-7ffca44aa36f 1423->1430 1431 7ffca44aa2ea-7ffca44aa2f0 1423->1431 1426 7ffca44aa3c6-7ffca44aa3ce 1424->1426 1425->1422 1425->1426 1433 7ffca44aa3d8-7ffca44aa40a Wow64SetThreadContext 1426->1433 1434 7ffca44aa3d0-7ffca44aa3d5 1426->1434 1427->1428 1430->1415 1431->1415 1436 7ffca44aa2f2 1431->1436 1437 7ffca44aa40c 1433->1437 1438 7ffca44aa412-7ffca44aa439 1433->1438 1434->1433 1436->1416 1437->1438
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.281862107.00007FFCA4490000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFCA4490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffca4490000_UxaZyTE7nq.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2454ea3f8c842642e2e86f06c7979801b3b689af8a30bc96b21eafbe3c677903
                                                            • Instruction ID: 97355cd5ef70333a02ca1ca3d0af2fbc36ff2692fb72f15b3997a8bcfc52544c
                                                            • Opcode Fuzzy Hash: 2454ea3f8c842642e2e86f06c7979801b3b689af8a30bc96b21eafbe3c677903
                                                            • Instruction Fuzzy Hash: 0C81AC3180EB9C4FEB59DB1888566F97BE0FF16310F0405BED049E71A2EBA57806C7A1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1439 7ffca44a9f91-7ffca44aa056 1443 7ffca44aa058-7ffca44aa05d 1439->1443 1444 7ffca44aa060-7ffca44aa065 1439->1444 1443->1444 1445 7ffca44aa067-7ffca44aa077 1444->1445 1446 7ffca44aa07f-7ffca44aa0aa 1444->1446 1445->1446 1447 7ffca44aa079-7ffca44aa07d 1446->1447 1448 7ffca44aa0ac-7ffca44aa0b9 1446->1448 1449 7ffca44aa0bc-7ffca44aa193 CreateProcessW 1447->1449 1448->1449 1451 7ffca44aa195 1449->1451 1452 7ffca44aa19b-7ffca44aa1ef call 7ffca44aa1f0 1449->1452 1451->1452
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.281862107.00007FFCA4490000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFCA4490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffca4490000_UxaZyTE7nq.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a34997f1853ea5e253ba2f823dab1966ae774380332920d4fc86d70a03a14c12
                                                            • Instruction ID: e870f8dc6fb3e483c8a9b9865873f81985616d2bec56955fc746a3d6cf2e323d
                                                            • Opcode Fuzzy Hash: a34997f1853ea5e253ba2f823dab1966ae774380332920d4fc86d70a03a14c12
                                                            • Instruction Fuzzy Hash: B8818C71908A2C8FDBA8DF48D855AE9B7F0FB98311F1042AAD40DE7255DB70A981CFC1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1536 7ffca4492bee-7ffca4492c3c 1539 7ffca4492c3e-7ffca4492c65 1536->1539 1540 7ffca4492caf-7ffca4492d12 LoadLibraryA 1536->1540 1539->1540 1545 7ffca4492c67-7ffca4492c6a 1539->1545 1543 7ffca4492d14 1540->1543 1544 7ffca4492d1a-7ffca4492d46 call 7ffca4492d6a 1540->1544 1543->1544 1547 7ffca4492ca4-7ffca4492cac 1545->1547 1548 7ffca4492c6c-7ffca4492c7f 1545->1548 1547->1540 1550 7ffca4492c81 1548->1550 1551 7ffca4492c83-7ffca4492c96 1548->1551 1550->1551 1551->1551 1552 7ffca4492c98-7ffca4492ca0 1551->1552 1552->1547
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.281862107.00007FFCA4490000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFCA4490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffca4490000_UxaZyTE7nq.jbxd
                                                            Similarity
                                                            • API ID: LibraryLoad
                                                            • String ID:
                                                            • API String ID: 1029625771-0
                                                            • Opcode ID: 1d1c0e30c34b93f23161892d8109dedf1b2540e92aee472066d464d1f44ca89b
                                                            • Instruction ID: c8dc5441477cf4dcbb8369440a4df41b8f670d9f65e3318f1454a4b4e2e9bc12
                                                            • Opcode Fuzzy Hash: 1d1c0e30c34b93f23161892d8109dedf1b2540e92aee472066d464d1f44ca89b
                                                            • Instruction Fuzzy Hash: D3414234604A4D8FEB98DF68C8957A977D1FB58301F10462EE84EC7295CF75E981CB81
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1553 7ffca4492fea-7ffca4492ff7 1554 7ffca4492ff9-7ffca4493001 1553->1554 1555 7ffca4493002-7ffca4493013 1553->1555 1554->1555 1556 7ffca4493015-7ffca449301d 1555->1556 1557 7ffca449301e-7ffca44930cf VirtualProtect 1555->1557 1556->1557 1561 7ffca44930d7-7ffca44930ff 1557->1561 1562 7ffca44930d1 1557->1562 1562->1561
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.281862107.00007FFCA4490000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFCA4490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffca4490000_UxaZyTE7nq.jbxd
                                                            Similarity
                                                            • API ID: ProtectVirtual
                                                            • String ID:
                                                            • API String ID: 544645111-0
                                                            • Opcode ID: fa6112e8332243609ea90bf83d3e0becc81a6eab044eda3e381ecb8e03485cfa
                                                            • Instruction ID: b9229dae5063f09ff1343fb6f3c4ecbb4bba8aa70645fb9a363f43233ce9b561
                                                            • Opcode Fuzzy Hash: fa6112e8332243609ea90bf83d3e0becc81a6eab044eda3e381ecb8e03485cfa
                                                            • Instruction Fuzzy Hash: 0241263090C7885FDB19DBA89C566E97FF0EB56321F0402AFD049C32A3CB646846C795
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1563 7ffca44a8885-7ffca44a8891 1564 7ffca44a889c-7ffca44a88ab 1563->1564 1565 7ffca44a8893-7ffca44a889b 1563->1565 1566 7ffca44a88b6-7ffca44a8952 FindCloseChangeNotification 1564->1566 1567 7ffca44a88ad-7ffca44a88b5 1564->1567 1565->1564 1571 7ffca44a8954 1566->1571 1572 7ffca44a895a-7ffca44a8988 1566->1572 1567->1566 1571->1572
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.281862107.00007FFCA4490000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFCA4490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffca4490000_UxaZyTE7nq.jbxd
                                                            Similarity
                                                            • API ID: ChangeCloseFindNotification
                                                            • String ID:
                                                            • API String ID: 2591292051-0
                                                            • Opcode ID: 5a71aefe587a6f754aa2c9cc29012d81c48305128eb0bbd1f111f80f21c79f65
                                                            • Instruction ID: eb85d2b7f762c55130905342b7d830b37766070854f6ff5b4bd0c1d39e1fb2a6
                                                            • Opcode Fuzzy Hash: 5a71aefe587a6f754aa2c9cc29012d81c48305128eb0bbd1f111f80f21c79f65
                                                            • Instruction Fuzzy Hash: BE314A3090CA8C8FDB19DB68C895BF87BF0FF56321F04026EC089D31A2CB64A416CB51
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.281862107.00007FFCA4490000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFCA4490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffca4490000_UxaZyTE7nq.jbxd
                                                            Similarity
                                                            • API ID: ContextThreadWow64
                                                            • String ID:
                                                            • API String ID: 983334009-0
                                                            • Opcode ID: e6d7565af5c0603aef5c215d94859788dc99420abcde6cd329f5442e452dc551
                                                            • Instruction ID: 2d38cc2fbca66b52402980a0ee865ce3465e034425cfb5ccd7f1b118615d8605
                                                            • Opcode Fuzzy Hash: e6d7565af5c0603aef5c215d94859788dc99420abcde6cd329f5442e452dc551
                                                            • Instruction Fuzzy Hash: 9531DE3190CB5C8FDB68DF58C889AEA7BF0FF69311F0441ABD049D7256DB60A805CBA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.282403573.00007FFCA4550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFCA4550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffca4550000_UxaZyTE7nq.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a5315a23d725987cf334d43e5913382aceb0ac78f5e65b4c0f2cfb4f6a0832a0
                                                            • Instruction ID: 3ec826a4318e79827dde824277a5a349c921dfabea7a85b3194bf6680feed779
                                                            • Opcode Fuzzy Hash: a5315a23d725987cf334d43e5913382aceb0ac78f5e65b4c0f2cfb4f6a0832a0
                                                            • Instruction Fuzzy Hash: F0627C72D0EB994FD755DB6888A55B57FE0EF56300F0809BEC08ACB1B2DA25B845C393
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.282403573.00007FFCA4550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFCA4550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffca4550000_UxaZyTE7nq.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 147fc4c8626a474b5a39c9f18754f5db69528f54898ed1a67186f80b969f75a4
                                                            • Instruction ID: 8f1650854eb732f166a616875b3143d6f0bafb2362301cf6cde1c203f3bbce49
                                                            • Opcode Fuzzy Hash: 147fc4c8626a474b5a39c9f18754f5db69528f54898ed1a67186f80b969f75a4
                                                            • Instruction Fuzzy Hash: A0F12A72C0EBDA4FEB55D66858A61B57FE0EF56610F0509FAC088CB1A3DB15780AC363
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.282403573.00007FFCA4550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFCA4550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffca4550000_UxaZyTE7nq.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 50ce09f9915e6f8b603ec1910ee7d51e42fa9fd7be7fd8c4cbf5dd2ce7352ba3
                                                            • Instruction ID: 39790e845b0d796765b68c93bd8cca1b40154dc978c71bf7ce8c905065efa265
                                                            • Opcode Fuzzy Hash: 50ce09f9915e6f8b603ec1910ee7d51e42fa9fd7be7fd8c4cbf5dd2ce7352ba3
                                                            • Instruction Fuzzy Hash: 32D1167280EBDA4FE756D66888A51B5BFE0FF56710F0409FED0C8CB1A2DA15B845C362
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.282403573.00007FFCA4550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFCA4550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffca4550000_UxaZyTE7nq.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 73cd836a56c650db6697ba42f66ea7bc64f5e95f8e39e8ffb58e839292e9ba23
                                                            • Instruction ID: dfcabb53df69a67cf6f7799e7a391bcf3576451df5feb8a99a4f0e096942b0e5
                                                            • Opcode Fuzzy Hash: 73cd836a56c650db6697ba42f66ea7bc64f5e95f8e39e8ffb58e839292e9ba23
                                                            • Instruction Fuzzy Hash: 04D16B71D0EB594FD798DB58C8A5AB5BBE1FF96300F0409AFD08BC7262DA21B841C742
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.282403573.00007FFCA4550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFCA4550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffca4550000_UxaZyTE7nq.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5dbe527b9f7cf8f5fe8728fa8b19d0956656ef88ad75e82318b1460378d7148c
                                                            • Instruction ID: 824958cfeb1484f808da59c5bff811d13d558fa69e62ea3611fb7354e482bea4
                                                            • Opcode Fuzzy Hash: 5dbe527b9f7cf8f5fe8728fa8b19d0956656ef88ad75e82318b1460378d7148c
                                                            • Instruction Fuzzy Hash: 0A617C7290EB994FD749DB58C8E55B5BBE1FF96300B0409BEC089C71A3CA25B801C3A3
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.282403573.00007FFCA4550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFCA4550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffca4550000_UxaZyTE7nq.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: babe564bc34b74103ee4b88d65ce6e85bc83b02cf3e6cf00fe74f0bb5a85b171
                                                            • Instruction ID: 48d11a47ccd8cfca89e46d804fbb2aee974ffe12db50bcf90c4a060c1fa37294
                                                            • Opcode Fuzzy Hash: babe564bc34b74103ee4b88d65ce6e85bc83b02cf3e6cf00fe74f0bb5a85b171
                                                            • Instruction Fuzzy Hash: 3A518F31D0EB594FD755D768C8965B57FE0EF95310F0809BEC04AC7162DE12B845C392
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.282403573.00007FFCA4550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFCA4550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffca4550000_UxaZyTE7nq.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 962e671dba2205d177e05f8ced1fb73d81432fea07cb90e319732d4dbf9e28a3
                                                            • Instruction ID: 47a0fedfb3a7b9585e7e3f69c9f369daf4d5780d99fbd8e5e88b0b123ff42f86
                                                            • Opcode Fuzzy Hash: 962e671dba2205d177e05f8ced1fb73d81432fea07cb90e319732d4dbf9e28a3
                                                            • Instruction Fuzzy Hash: 0F414F72C1EB994FDB59D6688CA75B97BE0EF41700F04087DC085871A3DB157806C397
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.282403573.00007FFCA4550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFCA4550000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ffca4550000_UxaZyTE7nq.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ed2259d6c0164c7dc4c58b9729aee79a83910bbc4fa4f25b7b4f4d61dbff6e49
                                                            • Instruction ID: 3b090002b1b0b418f2d03d8b374bab43463ac10cf9f54639a8169a518347d142
                                                            • Opcode Fuzzy Hash: ed2259d6c0164c7dc4c58b9729aee79a83910bbc4fa4f25b7b4f4d61dbff6e49
                                                            • Instruction Fuzzy Hash: 86116A7260DB490FD788D65CA4515B9B7E1FBD6320F0406AEE08EC7253DA12E802C796
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Execution Graph

                                                            Execution Coverage:7.4%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:30
                                                            Total number of Limit Nodes:0
                                                            execution_graph 25426 1502ac0 25427 1502b0e NtProtectVirtualMemory 25426->25427 25429 1502b58 25427->25429 25430 1508da0 DuplicateHandle 25431 1508e36 25430->25431 25432 1500848 25433 1500868 25432->25433 25437 1502f80 25433->25437 25442 1502f71 25433->25442 25434 1500a27 25438 1502f90 25437->25438 25447 15034c8 25438->25447 25451 15034b9 25438->25451 25443 1502f80 25442->25443 25445 15034c8 SetWindowsHookExW 25443->25445 25446 15034b9 SetWindowsHookExW 25443->25446 25444 1502ff2 25444->25434 25445->25444 25446->25444 25448 15034e7 25447->25448 25455 1501c18 25448->25455 25450 150350d 25450->25450 25452 15034c8 25451->25452 25453 1501c18 SetWindowsHookExW 25452->25453 25454 150350d 25453->25454 25454->25454 25456 1503cd0 SetWindowsHookExW 25455->25456 25458 1503d5a 25456->25458 25458->25450 25459 150090a 25460 150090f 25459->25460 25461 1502f80 SetWindowsHookExW 25460->25461 25462 1502f71 SetWindowsHookExW 25460->25462 25463 1500a27 25461->25463 25462->25463

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 1502668-15026ac 1 15026b8-15026bb 0->1 2 15026ae-15026b0 0->2 3 1502a26-1502a55 1->3 5 15026c1-15026e4 1->5 2->3 4 15026b6 2->4 21 1502a5c-1502a60 3->21 4->5 8 15026f0-15026f3 5->8 9 15026e6-15026e8 5->9 8->3 12 15026f9-150271f 8->12 9->3 11 15026ee 9->11 11->12 15 1502721-1502725 12->15 16 150272d-1502731 12->16 15->3 18 150272b 15->18 16->3 19 1502737-1502745 16->19 18->19 22 1502754-150275c 19->22 23 1502747-1502752 19->23 24 1502a62-1502a6c 21->24 25 1502a6d-1502b56 NtProtectVirtualMemory 21->25 26 150275f-1502761 22->26 23->26 54 1502b58-1502b5e 25->54 55 1502b5f-1502b84 25->55 27 1502763-1502765 26->27 28 150276d-1502770 26->28 27->3 30 150276b 27->30 28->3 31 1502776-1502799 28->31 30->31 35 15027a5-15027a8 31->35 36 150279b-150279d 31->36 35->3 38 15027ae-15027d2 35->38 36->3 37 15027a3 36->37 37->38 41 15027d4-15027d6 38->41 42 15027de-15027e1 38->42 41->3 44 15027dc 41->44 42->3 45 15027e7-1502808 42->45 44->45 49 1502814-1502817 45->49 50 150280a-150280c 45->50 49->3 52 150281d-1502841 49->52 50->3 51 1502812 50->51 51->52 58 1502843-1502845 52->58 59 150284d-1502850 52->59 54->55 58->3 61 150284b 58->61 59->3 62 1502856-150287a 59->62 61->62 65 1502886-1502889 62->65 66 150287c-150287e 62->66 65->3 68 150288f-15028b3 65->68 66->3 67 1502884 66->67 67->68 70 15028b5-15028b7 68->70 71 15028bf-15028c2 68->71 70->3 72 15028bd 70->72 71->3 73 15028c8-15028db 71->73 72->73 73->21 75 15028e1-1502910 73->75 76 1502912-1502914 75->76 77 150291c-150291f 75->77 76->3 78 150291a 76->78 77->3 79 1502925-150293d 77->79 78->79 81 1502949-150294c 79->81 82 150293f-1502941 79->82 81->3 84 1502952-1502969 81->84 82->3 83 1502947 82->83 83->84 87 1502a15-1502a1e 84->87 88 150296f-1502992 84->88 87->75 91 1502a24 87->91 89 1502994-1502996 88->89 90 150299e-15029a1 88->90 89->3 93 150299c 89->93 90->3 92 15029a7-15029d7 90->92 91->21 95 15029d9-15029db 92->95 96 15029df-15029e2 92->96 93->92 95->3 97 15029dd 95->97 96->3 98 15029e4-1502a01 96->98 97->98 100 1502a03-1502a05 98->100 101 1502a09-1502a0c 98->101 100->3 102 1502a07 100->102 101->3 103 1502a0e-1502a13 101->103 102->103 103->21
                                                            APIs
                                                            • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 01502B49
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.513428155.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_1500000_jsc.jbxd
                                                            Similarity
                                                            • API ID: MemoryProtectVirtual
                                                            • String ID:
                                                            • API String ID: 2706961497-0
                                                            • Opcode ID: 851cbe47ebe6e3ed5879e9ff171264d11a3bcadc3b2b2c5b24fe63f8b85a0f1b
                                                            • Instruction ID: 8f3118091cac5971f307f198a15bcf398cd21e07e8d7a319ef8fdb53af240927
                                                            • Opcode Fuzzy Hash: 851cbe47ebe6e3ed5879e9ff171264d11a3bcadc3b2b2c5b24fe63f8b85a0f1b
                                                            • Instruction Fuzzy Hash: 4CE1B431F013068BDB16DAED8C943AE76E7BFC4620F188629DA15DF3C5EEB499814741
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 237 1502ac0-1502b56 NtProtectVirtualMemory 240 1502b58-1502b5e 237->240 241 1502b5f-1502b84 237->241 240->241
                                                            APIs
                                                            • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 01502B49
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.513428155.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_1500000_jsc.jbxd
                                                            Similarity
                                                            • API ID: MemoryProtectVirtual
                                                            • String ID:
                                                            • API String ID: 2706961497-0
                                                            • Opcode ID: e792ec31fa5b17f4ffc3812145930b6c8cfbbb4f72aef2bad7986bc3c232f42e
                                                            • Instruction ID: 81f0e1db18f0b3ff34ba94fdad963d1c2ac67c9f9290d4a2c18e6ac37f48d0b0
                                                            • Opcode Fuzzy Hash: e792ec31fa5b17f4ffc3812145930b6c8cfbbb4f72aef2bad7986bc3c232f42e
                                                            • Instruction Fuzzy Hash: 6921F0B1D012099FCB10DFAAD984ADEFBF5BB48310F60842AE919A7250C7789940CBA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 231 1508d98-1508d9b 232 1508da0-1508e34 DuplicateHandle 231->232 233 1508e36-1508e3c 232->233 234 1508e3d-1508e5a 232->234 233->234
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 01508E27
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.513428155.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_1500000_jsc.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: ca27811f78f00fe3caff70eafe60d02a477d9d56f745a1b1475ae55336cff53d
                                                            • Instruction ID: 9f93d0c795c97955006ed1b17483172750f1c0da4b12a46c8bc0f78c539ff7b1
                                                            • Opcode Fuzzy Hash: ca27811f78f00fe3caff70eafe60d02a477d9d56f745a1b1475ae55336cff53d
                                                            • Instruction Fuzzy Hash: BD21D2B5D002089FDB10CFAAD984ADEBBF9EB48320F14851AE914A7350D378A944DFA4
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 245 1508da0-1508e34 DuplicateHandle 246 1508e36-1508e3c 245->246 247 1508e3d-1508e5a 245->247 246->247
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 01508E27
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.513428155.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_1500000_jsc.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 8f5834a8252b543223a4aabfe32f666383736345cacd003f84bdcf9e90ecb326
                                                            • Instruction ID: ad0681e2324bdcb0d5ab14386590e4aaed6dd03438b6da073c8c82c20acb60a7
                                                            • Opcode Fuzzy Hash: 8f5834a8252b543223a4aabfe32f666383736345cacd003f84bdcf9e90ecb326
                                                            • Instruction Fuzzy Hash: 4421B0B5D002099FDB10CFAAD984ADEBFF9FB48320F14841AE914A7350D378A944CFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 250 1501c18-1503d1a 253 1503d26-1503d58 SetWindowsHookExW 250->253 254 1503d1c 250->254 255 1503d61-1503d86 253->255 256 1503d5a-1503d60 253->256 257 1503d24 254->257 256->255 257->253
                                                            APIs
                                                            • SetWindowsHookExW.USER32(010145A0,00000000,?,?), ref: 01503D4B
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.513428155.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_1500000_jsc.jbxd
                                                            Similarity
                                                            • API ID: HookWindows
                                                            • String ID:
                                                            • API String ID: 2559412058-0
                                                            • Opcode ID: abe37c8c583d93c70614083cda7ea6445c0d4e1b0d5ab4b159b1becc35fe1e31
                                                            • Instruction ID: 0160fd8d5aaa5e9b5f26c4fea0cb722ee33144d2160b793cb9f1b57a87a689da
                                                            • Opcode Fuzzy Hash: abe37c8c583d93c70614083cda7ea6445c0d4e1b0d5ab4b159b1becc35fe1e31
                                                            • Instruction Fuzzy Hash: D421F571900209DFCB54DF9AD944BEEBBF5BB88310F108429E455AB350D778A944CFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 261 1503cc8-1503d1a 264 1503d26-1503d58 SetWindowsHookExW 261->264 265 1503d1c 261->265 266 1503d61-1503d86 264->266 267 1503d5a-1503d60 264->267 268 1503d24 265->268 267->266 268->264
                                                            APIs
                                                            • SetWindowsHookExW.USER32(010145A0,00000000,?,?), ref: 01503D4B
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.513428155.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_1500000_jsc.jbxd
                                                            Similarity
                                                            • API ID: HookWindows
                                                            • String ID:
                                                            • API String ID: 2559412058-0
                                                            • Opcode ID: f73279b61d29537fc6b1e25351abfdc1068b7c94468dd04f0d1524d1e7221ff6
                                                            • Instruction ID: 8cef51dcbb32347d8c10e13322cd2a7044ae3987e4a50656818af8fb444b4758
                                                            • Opcode Fuzzy Hash: f73279b61d29537fc6b1e25351abfdc1068b7c94468dd04f0d1524d1e7221ff6
                                                            • Instruction Fuzzy Hash: AB21F571900209DFCB54DF9AD944AEEBBF5BB88310F10841AE459A7350C778A944CFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%