Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:854945
MD5:fc6925e4bf5f890a1c62a406693cea77
SHA1:595e9e5c1736f28acfeb529a695fb3eada2602d4
SHA256:03f8e0b404e2ff092e515614d63a8dd3a167ce5df128ae3b0406c07708ad3310
Tags:exe
Infos:

Detection

Vidar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected UAC Bypass using CMSTP
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Yara detected Vidar stealer
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
.NET source code contains very large array initializations
C2 URLs / IPs found in malware configuration
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
JA3 SSL client fingerprint seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
PE file does not import any functions
Sample file is different than original file name gathered from version info
Compiles C# or VB.Net code
Creates a process in suspended mode (likely to inject code)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • file.exe (PID: 6940 cmdline: C:\Users\user\Desktop\file.exe MD5: FC6925E4BF5F890A1C62A406693CEA77)
    • SMSvcHost.exe (PID: 4544 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe MD5: 7EC8B56348F9298BCCA7A745C7F70E2C)
    • cvtres.exe (PID: 6392 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe MD5: 33BB8BE0B4F547324D93D5D2725CAC3D)
    • DataSvcUtil.exe (PID: 3636 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe MD5: CCDF8F3B189FFB839B390F695FAE2A6D)
    • AppLaunch.exe (PID: 4988 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe MD5: 98A8F518B66BA43DF38821C364C3B791)
    • MSBuild.exe (PID: 4916 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe MD5: 8B9E68304AF4B81C9AB70CB2220EBA74)
    • aspnet_regiis.exe (PID: 1304 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe MD5: 061D8C0371566D560C5B15C77A34046F)
    • aspnet_state.exe (PID: 4516 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe MD5: 9EDC7F9BB19D3F12EB05437BD5687C8A)
    • aspnet_compiler.exe (PID: 3428 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe MD5: 7809A19AA8DA1A41F36B60B0664C4E20)
    • ComSvcConfig.exe (PID: 3928 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe MD5: 2778AE0EB674B74FF8028BF4E51F1DF5)
    • AddInProcess32.exe (PID: 4436 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe MD5: F2A47587431C466535F3C3D3427724BE)
    • aspnet_regbrowsers.exe (PID: 1092 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe MD5: BF7E443F1E1FA88AD5A2A5EB44F42834)
    • ngen.exe (PID: 1380 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe MD5: FBA5E8D94C9EADC279BC06B9CF041A9A)
    • ilasm.exe (PID: 1364 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe MD5: 155758025B42F1804E1429483BA53553)
    • ngentask.exe (PID: 1248 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe MD5: AA98E294A0210BDA5F79A7288F91B78C)
    • Microsoft.Workflow.Compiler.exe (PID: 6608 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe MD5: D91462AE31562E241AF5595BA5E1A3C4)
    • mscorsvw.exe (PID: 4180 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe MD5: B00E9325AC7356A3F4864EAAAD48E13F)
    • AddInUtil.exe (PID: 6708 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe MD5: 65D30D747EB31E108A36EBC966C1227D)
    • jsc.exe (PID: 6668 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe MD5: 2B40A449D6034F41771A460DADD53A60)
    • aspnet_wp.exe (PID: 6736 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe MD5: 3F68BCF536EEAE067038C67022CDF6D8)
    • InstallUtil.exe (PID: 6660 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe MD5: 6EE3F830099ADD53C26DF5739B44D608)
    • ServiceModelReg.exe (PID: 3760 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe MD5: 80B018258257C2F78CBFE08198883AC1)
    • dfsvc.exe (PID: 2240 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe MD5: 48FD4DD682051712E3E7757C525DED71)
    • RegAsm.exe (PID: 4296 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe MD5: 2B5D765B33C67EBA41E9F47954227BC3)
    • CasPol.exe (PID: 1008 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe MD5: CB86BA6B2759BF478ADD7A1612C183D5)
    • RegSvcs.exe (PID: 4980 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe MD5: 59FCE79E9D81AB9E2ED4C3561205F5DF)
    • EdmGen.exe (PID: 6984 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe MD5: 2B6A31DFD7C9ED8B413DBDAB800F10F3)
    • csc.exe (PID: 6792 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe MD5: B46100977911A0C9FB1C3E5F16A5017D)
    • AddInProcess.exe (PID: 6776 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe MD5: 11D8A500C4C0FBAF20EBDB8CDF6EA452)
    • aspnet_regsql.exe (PID: 6760 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe MD5: F31014EE4DE7FE48E9B7C9BE94CFB45F)
    • vbc.exe (PID: 6960 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe MD5: AC610BC00AF71E7C5B89F5AC0F65DAFA)
    • WsatConfig.exe (PID: 6588 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe MD5: EDA1875528E99782E9A2C0001BB4C5A9)
  • cleanup
{
  "C2 url": [
    "https://steamcommunity.com/profiles/76561199499188534",
    "https://t.me/nutalse"
  ],
  "Botnet": "d53752acbcbb2dd88ecc4d536f03b032",
  "Version": "3.6"
}
SourceRuleDescriptionAuthorStrings
file.exeINDICATOR_EXE_Packed_DotNetReactorDetects executables packed with unregistered version of .NET ReactorditekSHen
  • 0x2085d:$s2: is protected by an unregistered version of .NET Reactor!" );</script>
SourceRuleDescriptionAuthorStrings
00000000.00000002.324891839.000001EE50AC5000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
    00000000.00000002.330382732.000001EE609B7000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
      Process Memory Space: file.exe PID: 6940JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
        Process Memory Space: file.exe PID: 6940JoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          Process Memory Space: file.exe PID: 6940JoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
            SourceRuleDescriptionAuthorStrings
            0.2.file.exe.1ee60b63f10.4.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
              0.2.file.exe.1ee60aebac8.2.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                0.2.file.exe.1ee60b63f10.4.raw.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                  0.2.file.exe.1ee4ebf0000.0.unpackINDICATOR_EXE_Packed_DotNetReactorDetects executables packed with unregistered version of .NET ReactorditekSHen
                  • 0x2085d:$s2: is protected by an unregistered version of .NET Reactor!" );</script>
                  0.0.file.exe.1ee4ebf0000.0.unpackINDICATOR_EXE_Packed_DotNetReactorDetects executables packed with unregistered version of .NET ReactorditekSHen
                  • 0x2085d:$s2: is protected by an unregistered version of .NET Reactor!" );</script>
                  Click to see the 4 entries
                  No Sigma rule has matched
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 00000000.00000002.330382732.000001EE609B7000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Vidar {"C2 url": ["https://steamcommunity.com/profiles/76561199499188534", "https://t.me/nutalse"], "Botnet": "d53752acbcbb2dd88ecc4d536f03b032", "Version": "3.6"}
                  Source: file.exeVirustotal: Detection: 21%Perma Link
                  Source: file.exeJoe Sandbox ML: detected

                  Exploits

                  barindex
                  Source: Yara matchFile source: 0.2.file.exe.1ee50d5a508.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.324891839.000001EE50AC5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: file.exe PID: 6940, type: MEMORYSTR
                  Source: unknownHTTPS traffic detected: 23.0.174.120:443 -> 192.168.2.5:49697 version: TLS 1.2
                  Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: N57d.pdb source: file.exe
                  Source: Binary string: C:\agent\1\s\sys\x64\Release\ProcExpDriver.pdb source: file.exe, 00000000.00000002.324891839.000001EE50AC5000.00000004.00000800.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 00007FF9A5BA32D1h0_2_00007FF9A5BA30A6
                  Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 00007FF9A5BA215Ch0_2_00007FF9A5BA1F3A

                  Networking

                  barindex
                  Source: Malware configuration extractorURLs: https://steamcommunity.com/profiles/76561199499188534
                  Source: Malware configuration extractorURLs: https://t.me/nutalse
                  Source: Joe Sandbox ViewJA3 fingerprint: 10ee8d30a5d01c042afd7b2b205facc4
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.120
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.120
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.120
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.120
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.120
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.120
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.120
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.120
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.120
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.120
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.120
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.120
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.120
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.120
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.120
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.120
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.0.174.120
                  Source: file.exe, 00000000.00000002.330382732.000001EE609B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://freebl3.dllmozglue.dllmsvcp140.dllnss3.dllsoftokn3.dllvcruntime140.dll
                  Source: file.exe, 00000000.00000002.330382732.000001EE609B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199499188534
                  Source: file.exe, 00000000.00000002.330382732.000001EE609B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199499188534update.zipopenopen_NULL%s
                  Source: file.exe, 00000000.00000002.330382732.000001EE609B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://t.me/nutalse
                  Source: file.exe, 00000000.00000002.330382732.000001EE609B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://t.me/nutalsesportbikedatapack.zipMozilla/5.0
                  Source: file.exe, 00000000.00000002.324891839.000001EE50AC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.sysinternals.com0
                  Source: unknownHTTPS traffic detected: 23.0.174.120:443 -> 192.168.2.5:49697 version: TLS 1.2

                  System Summary

                  barindex
                  Source: file.exe, type: SAMPLEMatched rule: Detects executables packed with unregistered version of .NET Reactor Author: ditekSHen
                  Source: 0.2.file.exe.1ee4ebf0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with unregistered version of .NET Reactor Author: ditekSHen
                  Source: 0.0.file.exe.1ee4ebf0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with unregistered version of .NET Reactor Author: ditekSHen
                  Source: 0.2.file.exe.1ee50d5a508.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
                  Source: 0.2.file.exe.1ee50d5a508.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
                  Source: file.exe, N57d/You6bh.csLarge array initialization: .cctor: array initializer size 760848
                  Source: file.exe, type: SAMPLEMatched rule: INDICATOR_EXE_Packed_DotNetReactor author = ditekSHen, description = Detects executables packed with unregistered version of .NET Reactor
                  Source: 0.2.file.exe.1ee4ebf0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_DotNetReactor author = ditekSHen, description = Detects executables packed with unregistered version of .NET Reactor
                  Source: 0.0.file.exe.1ee4ebf0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_DotNetReactor author = ditekSHen, description = Detects executables packed with unregistered version of .NET Reactor
                  Source: 0.2.file.exe.1ee50d5a508.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
                  Source: 0.2.file.exe.1ee50d5a508.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF9A5BAEEBA0_2_00007FF9A5BAEEBA
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF9A5BA86980_2_00007FF9A5BA8698
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF9A5BA86080_2_00007FF9A5BA8608
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF9A5BADA890_2_00007FF9A5BADA89
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF9A5BB7B3B0_2_00007FF9A5BB7B3B
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF9A5BB8B510_2_00007FF9A5BB8B51
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF9A5BA6DE00_2_00007FF9A5BA6DE0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF9A5BA61980_2_00007FF9A5BA6198
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF9A5BB03A50_2_00007FF9A5BB03A5
                  Source: file.exeStatic PE information: No import functions for PE file found
                  Source: file.exeBinary or memory string: OriginalFilename vs file.exe
                  Source: file.exe, 00000000.00000000.295714406.000001EE4EBF2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSIV.exe. vs file.exe
                  Source: file.exe, 00000000.00000002.324669994.000001EE4EF3A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs file.exe
                  Source: file.exe, 00000000.00000002.324891839.000001EE50AC5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprocexp.SysB vs file.exe
                  Source: file.exe, 00000000.00000002.330382732.000001EE609B7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRunpeX.Stub.Framework.exeL vs file.exe
                  Source: file.exeBinary or memory string: OriginalFilenameSIV.exe. vs file.exe
                  Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: file.exeVirustotal: Detection: 21%
                  Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\file.exe.logJump to behavior
                  Source: classification engineClassification label: mal100.troj.expl.evad.winEXE@63/1@0/0
                  Source: file.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
                  Source: C:\Users\user\Desktop\file.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                  Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: N57d.pdb source: file.exe
                  Source: Binary string: C:\agent\1\s\sys\x64\Release\ProcExpDriver.pdb source: file.exe, 00000000.00000002.324891839.000001EE50AC5000.00000004.00000800.00020000.00000000.sdmp

                  Data Obfuscation

                  barindex
                  Source: file.exe, N57d/You6bh.cs.Net Code: fgxQ03wPW0AjClahVW System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000001EE4EBF98A5 push rdi; retf 0_2_000001EE4EBF98B0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF9A5BA90D0 push esi; retn F9A5h0_2_00007FF9A5BA940A
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF9A5BA9010 push esp; retn F9A5h0_2_00007FF9A5BA90CA
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF9A5BB5AC5 push ebp; retf 0_2_00007FF9A5BB5AC8
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF9A5BA5127 push esp; ret 0_2_00007FF9A5BA5132
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF9A5BA5134 push esp; ret 0_2_00007FF9A5BA514C
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF9A5BA50EC push esp; ret 0_2_00007FF9A5BA50F4
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeJump to behavior
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.805434983404769
                  Source: file.exe, Loca92ion/Encountb9r.csHigh entropy of concatenated method names: 'Ex5fibit', 'v4dB2dQPs', 'Jm1VjWgOM', 'oB2rXj1AI', 'vlRNa3eNl', '.ctor', 'vtf8VaNfS2Yx2qUyOg', 'd8IdAAmgvejE0UCqXU', 'kvErbu8sfFuShJGrfH', 'KUut4HaO2Gj06AVYnP'
                  Source: file.exe, N57d/R0avi0aw.csHigh entropy of concatenated method names: 'e9elephone', 'VImjLwg0Y', 'MHSkfxSVT', '.ctor', 'UROqrPQN9lfnNfg8U8', 'QwhBOOlpoN2oQDGeYn', 'O7WGIu24wvlpOITpfl', 'tN3HGFgm56b3JUmt5U', 'Vc4pPyiOsNZ5x8ueBi', 'gUcccpALtvDdV8dMqb'
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: file.exe PID: 6940, type: MEMORYSTR
                  Source: file.exe, 00000000.00000002.324891839.000001EE50AC5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                  Source: file.exe, 00000000.00000002.324891839.000001EE50AC5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Users\user\Desktop\file.exe TID: 6976Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: file.exe, 00000000.00000002.324891839.000001EE50AC5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                  Source: file.exeBinary or memory string: Power OffSServerDatacenterwithoutHyper-VFullEdition080a!Spanish - Mexico045a
                  Source: file.exeBinary or memory string: Server Datacenter without Hyper-V Core Edition
                  Source: file.exeBinary or memory string: AustriaZulu]Server Datacenter without Hyper-V Core Edition0425
                  Source: file.exeBinary or memory string: Comoros041e9ServerStandardwithoutHyper-V
                  Source: file.exeBinary or memory string: SudanSServerDatacenterwithoutHyper-VCoreEdition3809'English - Indonesia0465
                  Source: file.exe, 00000000.00000002.324891839.000001EE50AC5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: file.exeBinary or memory string: ServerDatacenterwithoutHyper-VFullEdition
                  Source: file.exe, 00000000.00000002.324891839.000001EE50AC5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                  Source: file.exe, 00000000.00000002.324891839.000001EE50AC5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\'C:\WINDOWS\system32\drivers\vmmouse.sys&C:\WINDOWS\system32\drivers\vmhgfs.sys
                  Source: file.exeBinary or memory string: Hyper-V Edition
                  Source: file.exeBinary or memory string: Server Standard without Hyper-V Core Edition
                  Source: file.exeBinary or memory string: Blocked PID-AMD Opteron(TM) Family082c!Azeri (Cyrillic)?Server Standard without Hyper-V081a
                  Source: file.exeBinary or memory string: 290MSaint Helena and also Tristan Da CunhaOServerStandardwithoutHyper-VCoreEdition
                  Source: file.exe, 00000000.00000002.324891839.000001EE50AC5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                  Source: file.exe, 00000000.00000002.324891839.000001EE50AC5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                  Source: file.exeBinary or memory string: Server 2008 without Hyper-V for Windows Essential Server Solutions
                  Source: file.exeBinary or memory string: ServerStandardwithoutHyper-VCoreEdition
                  Source: file.exeBinary or memory string: Server2008withoutHyper-VforWindowsEssentialServerSolutions
                  Source: file.exeBinary or memory string: ServerStandardwithoutHyper-V
                  Source: file.exe, 00000000.00000002.324891839.000001EE50AC5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmmouse.sys
                  Source: file.exeBinary or memory string: Hyper-VEditionYServer Standard without Hyper-V Core Edition0460#Kashmiri (Arabic)200c!French - Reunion5Server For SB Solutions EM0424
                  Source: file.exe, 00000000.00000002.324891839.000001EE50AC5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                  Source: file.exeBinary or memory string: ]Server Datacenter without Hyper-V Full Edition
                  Source: file.exeBinary or memory string: ServerDatacenterwithoutHyper-VCoreEdition
                  Source: file.exeBinary or memory string: Server Standard without Hyper-V
                  Source: file.exe, 00000000.00000002.324891839.000001EE50AC5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmhgfs.sys
                  Source: file.exe, 00000000.00000002.324891839.000001EE50AC5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                  Source: file.exeBinary or memory string: Server Datacenter without Hyper-V Full Edition
                  Source: file.exeBinary or memory string: 540a/Spanish - United States!Business EditionIServer Datacenter Evaluation EditionuServer2008withoutHyper-VforWindowsEssentialServerSolutions
                  Source: file.exe, 00000000.00000002.324891839.000001EE50AC5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noValueButYesKey)C:\WINDOWS\system32\drivers\VBoxMouse.sys
                  Source: file.exe, 00000000.00000002.324891839.000001EE50AC5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\VBoxMouse.sys
                  Source: file.exeBinary or memory string: Hyper-V Edition043b
                  Source: file.exeBinary or memory string: Hyper-VEdition
                  Source: C:\Users\user\Desktop\file.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.file.exe.1ee60b63f10.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.1ee60aebac8.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.1ee60b63f10.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.1ee60aebac8.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.330382732.000001EE609B7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: file.exe PID: 6940, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.file.exe.1ee60b63f10.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.1ee60aebac8.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.1ee60b63f10.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.1ee60aebac8.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.330382732.000001EE609B7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: file.exe PID: 6940, type: MEMORYSTR
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid AccountsWindows Management InstrumentationPath Interception11
                  Process Injection
                  1
                  Masquerading
                  OS Credential Dumping11
                  Security Software Discovery
                  Remote Services1
                  Archive Collected Data
                  Exfiltration Over Other Network Medium12
                  Encrypted Channel
                  Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                  Disable or Modify Tools
                  LSASS Memory1
                  Process Discovery
                  Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth11
                  Application Layer Protocol
                  Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
                  Virtualization/Sandbox Evasion
                  Security Account Manager21
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)12
                  Software Packing
                  NTDS12
                  System Information Discovery
                  Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script11
                  Process Injection
                  LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.common3
                  Obfuscated Files or Information
                  Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 854945 Sample: file.exe Startdate: 27/04/2023 Architecture: WINDOWS Score: 100 19 Found malware configuration 2->19 21 Malicious sample detected (through community Yara rule) 2->21 23 Multi AV Scanner detection for submitted file 2->23 25 8 other signatures 2->25 6 file.exe 3 2->6         started        process3 file4 17 C:\Users\user\AppData\Local\...\file.exe.log, CSV 6->17 dropped 9 SMSvcHost.exe 6->9         started        11 cvtres.exe 6->11         started        13 DataSvcUtil.exe 6->13         started        15 28 other processes 6->15 process5

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  file.exe21%VirustotalBrowse
                  file.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  https://www.sysinternals.com00%URL Reputationsafe
                  https://freebl3.dllmozglue.dllmsvcp140.dllnss3.dllsoftokn3.dllvcruntime140.dll0%URL Reputationsafe

                  Download Network PCAP: filteredfull

                  No contacted domains info
                  NameMaliciousAntivirus DetectionReputation
                  https://steamcommunity.com/profiles/76561199499188534false
                    high
                    https://t.me/nutalsefalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://steamcommunity.com/profiles/76561199499188534update.zipopenopen_NULL%sfile.exe, 00000000.00000002.330382732.000001EE609B7000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://www.sysinternals.com0file.exe, 00000000.00000002.324891839.000001EE50AC5000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://t.me/nutalsesportbikedatapack.zipMozilla/5.0file.exe, 00000000.00000002.330382732.000001EE609B7000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://freebl3.dllmozglue.dllmsvcp140.dllnss3.dllsoftokn3.dllvcruntime140.dllfile.exe, 00000000.00000002.330382732.000001EE609B7000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          No contacted IP infos
                          Joe Sandbox Version:37.0.0 Beryl
                          Analysis ID:854945
                          Start date and time:2023-04-27 09:17:09 +02:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 4m 26s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:32
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample file name:file.exe
                          Detection:MAL
                          Classification:mal100.troj.expl.evad.winEXE@63/1@0/0
                          EGA Information:
                          • Successful, ratio: 100%
                          HDC Information:
                          • Successful, ratio: 10.8% (good quality ratio 10.2%)
                          • Quality average: 74.2%
                          • Quality standard deviation: 28.9%
                          HCA Information:
                          • Successful, ratio: 94%
                          • Number of executed functions: 15
                          • Number of non-executed functions: 3
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Stop behavior analysis, all processes terminated
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                          No simulations
                          No context
                          No context
                          No context
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          10ee8d30a5d01c042afd7b2b205facc4MSBuild.exeGet hashmaliciousXmrigBrowse
                          • 23.0.174.120
                          https://www.temu.com/mbs_lucky_draw_download.html?Get hashmaliciousUnknownBrowse
                          • 23.0.174.120
                          {DDFD237E-0AA7-47C8-BA75-3059D7415462}-GoogleUpdateSetup.exeGet hashmaliciousUnknownBrowse
                          • 23.0.174.120
                          file.exeGet hashmaliciousFormBookBrowse
                          • 23.0.174.120
                          INV736103251059.xllGet hashmaliciousAgentTesla, zgRATBrowse
                          • 23.0.174.120
                          file.exeGet hashmaliciousRedLineBrowse
                          • 23.0.174.120
                          RFQ190423.exeGet hashmaliciousUnknownBrowse
                          • 23.0.174.120
                          Invoice_#INV-000003.xlsmGet hashmaliciousUnknownBrowse
                          • 23.0.174.120
                          https://floral-surf-6fd7.51g0jm50281.workers.dev/Get hashmaliciousPhisherBrowse
                          • 23.0.174.120
                          immagine_degli_elementi_elencati.exeGet hashmaliciousAgentTeslaBrowse
                          • 23.0.174.120
                          hxxps://www%5B.%5Donline-managepayees1%5B.%5Dcom/Get hashmaliciousHTMLPhisherBrowse
                          • 23.0.174.120
                          PO_6601600170423001.exeGet hashmaliciousAgentTeslaBrowse
                          • 23.0.174.120
                          cryptor.exeGet hashmaliciousUnknownBrowse
                          • 23.0.174.120
                          file.exeGet hashmaliciouslgoogLoaderBrowse
                          • 23.0.174.120
                          file.exeGet hashmaliciousAgentTeslaBrowse
                          • 23.0.174.120
                          DO-251244.exeGet hashmaliciousSnake KeyloggerBrowse
                          • 23.0.174.120
                          cryptor.exeGet hashmaliciousUnknownBrowse
                          • 23.0.174.120
                          20231104_1C23TTS_00000246.exeGet hashmaliciousFormBookBrowse
                          • 23.0.174.120
                          Remittance_Advice.exeGet hashmaliciousAgentTeslaBrowse
                          • 23.0.174.120
                          Ship_particular.exeGet hashmaliciousSnake KeyloggerBrowse
                          • 23.0.174.120
                          No context
                          Process:C:\Users\user\Desktop\file.exe
                          File Type:CSV text
                          Category:dropped
                          Size (bytes):425
                          Entropy (8bit):5.351599573976469
                          Encrypted:false
                          SSDEEP:12:Q3La/KDLI4MWuPTxAIOKbbDLI4MWuPOKN08JOKhav:ML9E4KrgKDE4KGKN08AKhk
                          MD5:BEBB66F4CB83D5C34857FE75DE3A8610
                          SHA1:66FB475AADAE0D4542125C8E272D9D6BBFA555BB
                          SHA-256:C1A8084313E66497C9F53D0F65E85AC2D4A840AF7FEBCCCFB3924F54BCF1BADC
                          SHA-512:45181B8B60B7F0FD0D841F50592B9E83F7BADF1FFED040DFCAF5779BF5F653633D78B28E5AFA92A53E9DA965113E4A8E7A16456AE3A8FDF786B7DF6B3FEE5CE8
                          Malicious:true
                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\10a17139182a9efd561f01fada9688a5\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\4e05e2e48b8a6dd267a8c9e25ef129a7\System.Core.ni.dll",0..
                          File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                          Entropy (8bit):7.7197667813368165
                          TrID:
                          • Win64 Executable GUI Net Framework (217006/5) 49.88%
                          • Win64 Executable GUI (202006/5) 46.43%
                          • Win64 Executable (generic) (12005/4) 2.76%
                          • Generic Win/DOS Executable (2004/3) 0.46%
                          • DOS Executable Generic (2002/1) 0.46%
                          File name:file.exe
                          File size:1024000
                          MD5:fc6925e4bf5f890a1c62a406693cea77
                          SHA1:595e9e5c1736f28acfeb529a695fb3eada2602d4
                          SHA256:03f8e0b404e2ff092e515614d63a8dd3a167ce5df128ae3b0406c07708ad3310
                          SHA512:f31b220e745430460a3839a5a646d5db0660457bfe1abb7ebfbbc7150dbf3073992590efb2cfe08dc4d50a66226d5d93eb487ba99bf9f5d82dec5e9911f6926f
                          SSDEEP:12288:Mp+tJodRhl6EEDiXnx6rjxI+JXFxN+rsH4ctY6rJQyz45dHdsVCzMtgBRWQ:HojWIUvJXFoy+dHdmCU
                          TLSH:F0258E382BA6CE08FFE281F0D5E50212209DB7B4C525E745CA361D35C9B2E857FA27D6
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....Gd..............0.................. ....@...... ....................................`...@......@............... .....
                          Icon Hash:ccf2c0d4d0c0f6c0
                          Entrypoint:0x400000
                          Entrypoint Section:
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE
                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Time Stamp:0x6447CEF7 [Tue Apr 25 13:00:39 2023 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:
                          Instruction
                          dec ebp
                          pop edx
                          nop
                          add byte ptr [ebx], al
                          add byte ptr [eax], al
                          add byte ptr [eax+eax], al
                          add byte ptr [eax], al
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xe00000x1c228.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                          IMAGE_DIRECTORY_ENTRY_DEBUG0xdf7e40x1c.text
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x20000xdd8300xdda00False0.8131543464467005data7.805434983404769IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rsrc0xe00000x1c2280x1c400False0.47810080199115046data6.1772659453745025IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountry
                          RT_ICON0xe01900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216
                          RT_ICON0xe27380x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536
                          RT_ICON0xf2f600x8b44PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                          RT_GROUP_ICON0xfbaa40x30data
                          RT_VERSION0xfbad40x568zlib compressed data
                          RT_MANIFEST0xfc03c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators

                          Download Network PCAP: filteredfull

                          TimestampSource PortDest PortSource IPDest IP
                          Apr 27, 2023 09:18:01.183608055 CEST49697443192.168.2.523.0.174.120
                          Apr 27, 2023 09:18:01.183701038 CEST4434969723.0.174.120192.168.2.5
                          Apr 27, 2023 09:18:01.183820009 CEST49697443192.168.2.523.0.174.120
                          Apr 27, 2023 09:18:01.184046030 CEST49697443192.168.2.523.0.174.120
                          Apr 27, 2023 09:18:01.184072018 CEST4434969723.0.174.120192.168.2.5
                          Apr 27, 2023 09:18:01.259202957 CEST4434969723.0.174.120192.168.2.5
                          Apr 27, 2023 09:18:01.259408951 CEST49697443192.168.2.523.0.174.120
                          Apr 27, 2023 09:18:01.266238928 CEST49697443192.168.2.523.0.174.120
                          Apr 27, 2023 09:18:01.266269922 CEST4434969723.0.174.120192.168.2.5
                          Apr 27, 2023 09:18:01.266752005 CEST4434969723.0.174.120192.168.2.5
                          Apr 27, 2023 09:18:01.266927004 CEST49697443192.168.2.523.0.174.120
                          Apr 27, 2023 09:18:01.267491102 CEST49697443192.168.2.523.0.174.120
                          Apr 27, 2023 09:18:01.267530918 CEST4434969723.0.174.120192.168.2.5
                          Apr 27, 2023 09:18:01.267546892 CEST49697443192.168.2.523.0.174.120
                          Apr 27, 2023 09:18:01.267632008 CEST49697443192.168.2.523.0.174.120
                          Apr 27, 2023 09:18:01.267647028 CEST4434969723.0.174.120192.168.2.5
                          Apr 27, 2023 09:18:01.267672062 CEST4434969723.0.174.120192.168.2.5
                          Apr 27, 2023 09:18:01.267791986 CEST49697443192.168.2.523.0.174.120
                          Apr 27, 2023 09:18:01.267823935 CEST49697443192.168.2.523.0.174.120
                          Apr 27, 2023 09:18:01.267862082 CEST4434969723.0.174.120192.168.2.5
                          Apr 27, 2023 09:18:01.268069029 CEST49697443192.168.2.523.0.174.120
                          Apr 27, 2023 09:18:01.268131971 CEST4434969723.0.174.120192.168.2.5
                          Apr 27, 2023 09:18:01.432425022 CEST4434969723.0.174.120192.168.2.5
                          Apr 27, 2023 09:18:01.432629108 CEST49697443192.168.2.523.0.174.120
                          Apr 27, 2023 09:18:01.432643890 CEST4434969723.0.174.120192.168.2.5
                          Apr 27, 2023 09:18:01.432758093 CEST49697443192.168.2.523.0.174.120
                          Apr 27, 2023 09:18:01.433042049 CEST49697443192.168.2.523.0.174.120
                          Apr 27, 2023 09:18:01.433073044 CEST4434969723.0.174.120192.168.2.5
                          Apr 27, 2023 09:18:01.433124065 CEST49697443192.168.2.523.0.174.120
                          Apr 27, 2023 09:18:01.433182955 CEST49697443192.168.2.523.0.174.120
                          • File
                          • Registry

                          Click to dive into process behavior distribution

                          Target ID:0
                          Start time:09:18:02
                          Start date:27/04/2023
                          Path:C:\Users\user\Desktop\file.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Users\user\Desktop\file.exe
                          Imagebase:0x1ee4ebf0000
                          File size:1024000 bytes
                          MD5 hash:FC6925E4BF5F890A1C62A406693CEA77
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.324891839.000001EE50AC5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000000.00000002.330382732.000001EE609B7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low
                          There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                          There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                          Target ID:1
                          Start time:09:18:09
                          Start date:27/04/2023
                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
                          Imagebase:0x239b29c0000
                          File size:136296 bytes
                          MD5 hash:7EC8B56348F9298BCCA7A745C7F70E2C
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:moderate

                          Target ID:2
                          Start time:09:18:10
                          Start date:27/04/2023
                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                          Imagebase:0x7ff6de440000
                          File size:47280 bytes
                          MD5 hash:33BB8BE0B4F547324D93D5D2725CAC3D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Target ID:3
                          Start time:09:18:10
                          Start date:27/04/2023
                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe
                          Imagebase:0x1fed2160000
                          File size:71776 bytes
                          MD5 hash:CCDF8F3B189FFB839B390F695FAE2A6D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:moderate

                          Target ID:4
                          Start time:09:18:10
                          Start date:27/04/2023
                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe
                          Imagebase:0x7ff71eec0000
                          File size:119904 bytes
                          MD5 hash:98A8F518B66BA43DF38821C364C3B791
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:moderate

                          Target ID:5
                          Start time:09:18:10
                          Start date:27/04/2023
                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
                          Imagebase:0x20986ef0000
                          File size:258144 bytes
                          MD5 hash:8B9E68304AF4B81C9AB70CB2220EBA74
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:moderate

                          Target ID:6
                          Start time:09:18:10
                          Start date:27/04/2023
                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe
                          Imagebase:0x7ff66c790000
                          File size:44640 bytes
                          MD5 hash:061D8C0371566D560C5B15C77A34046F
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:moderate

                          Target ID:7
                          Start time:09:18:10
                          Start date:27/04/2023
                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
                          Imagebase:0x7ff6ee380000
                          File size:52832 bytes
                          MD5 hash:9EDC7F9BB19D3F12EB05437BD5687C8A
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:moderate

                          Target ID:8
                          Start time:09:18:10
                          Start date:27/04/2023
                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                          Imagebase:0x1f6a9a60000
                          File size:54888 bytes
                          MD5 hash:7809A19AA8DA1A41F36B60B0664C4E20
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:moderate

                          Target ID:9
                          Start time:09:18:10
                          Start date:27/04/2023
                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe
                          Imagebase:0x18224ee0000
                          File size:173672 bytes
                          MD5 hash:2778AE0EB674B74FF8028BF4E51F1DF5
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:moderate

                          Target ID:10
                          Start time:09:18:10
                          Start date:27/04/2023
                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe
                          Imagebase:0x1c0000
                          File size:42080 bytes
                          MD5 hash:F2A47587431C466535F3C3D3427724BE
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          Target ID:11
                          Start time:09:18:11
                          Start date:27/04/2023
                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe
                          Imagebase:0x25efd4a0000
                          File size:44648 bytes
                          MD5 hash:BF7E443F1E1FA88AD5A2A5EB44F42834
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          Target ID:12
                          Start time:09:18:11
                          Start date:27/04/2023
                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
                          Imagebase:0x7ff6c3910000
                          File size:174184 bytes
                          MD5 hash:FBA5E8D94C9EADC279BC06B9CF041A9A
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          Target ID:13
                          Start time:09:18:11
                          Start date:27/04/2023
                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe
                          Imagebase:0x7ff75a2a0000
                          File size:365664 bytes
                          MD5 hash:155758025B42F1804E1429483BA53553
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          Target ID:14
                          Start time:09:18:11
                          Start date:27/04/2023
                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe
                          Imagebase:0x22386810000
                          File size:84576 bytes
                          MD5 hash:AA98E294A0210BDA5F79A7288F91B78C
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          Target ID:15
                          Start time:09:18:11
                          Start date:27/04/2023
                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe
                          Imagebase:0x1cd1e470000
                          File size:32872 bytes
                          MD5 hash:D91462AE31562E241AF5595BA5E1A3C4
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          Target ID:16
                          Start time:09:18:11
                          Start date:27/04/2023
                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                          Imagebase:0x7ff7330a0000
                          File size:128584 bytes
                          MD5 hash:B00E9325AC7356A3F4864EAAAD48E13F
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          Target ID:17
                          Start time:09:18:11
                          Start date:27/04/2023
                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe
                          Imagebase:0x223e3180000
                          File size:42600 bytes
                          MD5 hash:65D30D747EB31E108A36EBC966C1227D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          Target ID:18
                          Start time:09:18:11
                          Start date:27/04/2023
                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe
                          Imagebase:0x60000
                          File size:46688 bytes
                          MD5 hash:2B40A449D6034F41771A460DADD53A60
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          Target ID:19
                          Start time:09:18:11
                          Start date:27/04/2023
                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe
                          Imagebase:0x7ff7f0cf0000
                          File size:50784 bytes
                          MD5 hash:3F68BCF536EEAE067038C67022CDF6D8
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          Target ID:20
                          Start time:09:18:11
                          Start date:27/04/2023
                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                          Imagebase:0x24bf9bf0000
                          File size:40552 bytes
                          MD5 hash:6EE3F830099ADD53C26DF5739B44D608
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          Target ID:21
                          Start time:09:18:12
                          Start date:27/04/2023
                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe
                          Imagebase:0x7ff6b38e0000
                          File size:270440 bytes
                          MD5 hash:80B018258257C2F78CBFE08198883AC1
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          Target ID:22
                          Start time:09:18:12
                          Start date:27/04/2023
                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
                          Imagebase:0x189f9cf0000
                          File size:24160 bytes
                          MD5 hash:48FD4DD682051712E3E7757C525DED71
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          Target ID:23
                          Start time:09:18:12
                          Start date:27/04/2023
                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                          Imagebase:0x22a71a10000
                          File size:64096 bytes
                          MD5 hash:2B5D765B33C67EBA41E9F47954227BC3
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          Target ID:24
                          Start time:09:18:12
                          Start date:27/04/2023
                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe
                          Imagebase:0x1ced1030000
                          File size:107112 bytes
                          MD5 hash:CB86BA6B2759BF478ADD7A1612C183D5
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          Target ID:25
                          Start time:09:18:12
                          Start date:27/04/2023
                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
                          Imagebase:0x21d93d60000
                          File size:44640 bytes
                          MD5 hash:59FCE79E9D81AB9E2ED4C3561205F5DF
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          Target ID:26
                          Start time:09:18:12
                          Start date:27/04/2023
                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe
                          Imagebase:0x16bbf4d0000
                          File size:96864 bytes
                          MD5 hash:2B6A31DFD7C9ED8B413DBDAB800F10F3
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          Target ID:27
                          Start time:09:18:12
                          Start date:27/04/2023
                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                          Imagebase:0x7ff790740000
                          File size:2739304 bytes
                          MD5 hash:B46100977911A0C9FB1C3E5F16A5017D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          Target ID:28
                          Start time:09:18:12
                          Start date:27/04/2023
                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
                          Imagebase:0x1ebbe670000
                          File size:42080 bytes
                          MD5 hash:11D8A500C4C0FBAF20EBDB8CDF6EA452
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          Target ID:29
                          Start time:09:18:13
                          Start date:27/04/2023
                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe
                          Imagebase:0x25f43230000
                          File size:126560 bytes
                          MD5 hash:F31014EE4DE7FE48E9B7C9BE94CFB45F
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          Target ID:30
                          Start time:09:18:13
                          Start date:27/04/2023
                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
                          Imagebase:0x7ff627f20000
                          File size:3226720 bytes
                          MD5 hash:AC610BC00AF71E7C5B89F5AC0F65DAFA
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          Target ID:31
                          Start time:09:18:13
                          Start date:27/04/2023
                          Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe
                          Imagebase:0x28ff7240000
                          File size:152680 bytes
                          MD5 hash:EDA1875528E99782E9A2C0001BB4C5A9
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          Execution Graph

                          Execution Coverage

                          Dynamic/Packed Code Coverage

                          Signature Coverage

                          Execution Coverage:15.4%
                          Dynamic/Decrypted Code Coverage:100%
                          Signature Coverage:0%
                          Total number of Nodes:16
                          Total number of Limit Nodes:1
                          Show Legend
                          Hide Nodes/Edges
                          execution_graph 14996 7ff9a5ba29a2 14997 7ff9a5bbd1a0 VirtualAllocEx 14996->14997 14999 7ff9a5bbd2d5 14997->14999 15013 7ff9a5ba2a92 15014 7ff9a5bbd350 MessageBoxA 15013->15014 15016 7ff9a5bbd5d1 15014->15016 15000 7ff9a5ba2e21 15001 7ff9a5ba2df4 15000->15001 15002 7ff9a5ba2e3b LoadLibraryA 15000->15002 15004 7ff9a5ba2fc5 15002->15004 15005 7ff9a5bbae01 15006 7ff9a5bbae20 CreateProcessW 15005->15006 15008 7ff9a5bbb0b7 15006->15008 15009 7ff9a5ba337a 15010 7ff9a5ba33a5 VirtualProtect 15009->15010 15012 7ff9a5ba34cd 15010->15012

                          Executed Functions

                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.333489409.00007FF9A5BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5BA0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff9a5ba0000_file.jbxd
                          Similarity
                          • API ID:
                          • String ID: D$_
                          • API String ID: 0-2196656589
                          • Opcode ID: cd41fbab329bee5cec290bcd3d2095ae0998a11f3df3dcef99a0defd73db7d25
                          • Instruction ID: 1bd6a9f53a17b637190d2358f184e2e4a27c60949a6cf787884f19600d3f8513
                          • Opcode Fuzzy Hash: cd41fbab329bee5cec290bcd3d2095ae0998a11f3df3dcef99a0defd73db7d25
                          • Instruction Fuzzy Hash: 1BD2D871E0A249EFEB10CBA8CA817DCB7F0EF16711F2445A5E145EB281D678AF14EB05
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.333489409.00007FF9A5BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5BA0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff9a5ba0000_file.jbxd
                          Similarity
                          • API ID:
                          • String ID: 6\_H
                          • API String ID: 0-3565561740
                          • Opcode ID: 531ff1dd3006f254bf3099d1c0d7d79f51c94bd3e9ec797d9685ac502830be35
                          • Instruction ID: 8c8cbc4cf1ce65c04994fbe86a73e9ece62814c8ab787fc65cf4fece9be6c1e1
                          • Opcode Fuzzy Hash: 531ff1dd3006f254bf3099d1c0d7d79f51c94bd3e9ec797d9685ac502830be35
                          • Instruction Fuzzy Hash: 1DD25430A0DB494FD319DB2884956B577E1FF86302B1486BEE4CAC72A2DE74F846C781
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 851 7ff9a5bb8b51-7ff9a5bb8b85 852 7ff9a5bb8b87-7ff9a5bb8bb2 851->852 853 7ff9a5bb8bcf-7ff9a5bb8c04 call 7ff9a5bad000 * 2 851->853 854 7ff9a5bb8bb8-7ff9a5bb8bcc 852->854 855 7ff9a5bb8f60-7ff9a5bb8f6a 852->855 863 7ff9a5bb8dcc-7ff9a5bb8dcd 853->863 864 7ff9a5bb8c0a-7ff9a5bb8c29 call 7ff9a5baec60 853->864 854->853 860 7ff9a5bb8f6c-7ff9a5bb8f81 855->860 862 7ff9a5bb8f83-7ff9a5bb8fb9 860->862 874 7ff9a5bb8fbb-7ff9a5bb901c 862->874 875 7ff9a5bb8f50-7ff9a5bb8f5f 862->875 867 7ff9a5bb8dce-7ff9a5bb8ddc 863->867 876 7ff9a5bb8c43-7ff9a5bb8c7a 864->876 877 7ff9a5bb8c2b-7ff9a5bb8c3c 864->877 870 7ff9a5bb8de2-7ff9a5bb8df7 call 7ff9a5bad000 867->870 871 7ff9a5bb8e80-7ff9a5bb8e9f call 7ff9a5baec60 867->871 881 7ff9a5bb8dfb-7ff9a5bb8e22 call 7ff9a5ba80a0 870->881 882 7ff9a5bb8ebb-7ff9a5bb8ec2 871->882 883 7ff9a5bb8ea0-7ff9a5bb8ea3 871->883 922 7ff9a5bb90dd-7ff9a5bb90e7 874->922 898 7ff9a5bb8c7b-7ff9a5bb8c98 876->898 877->876 900 7ff9a5bb8e23-7ff9a5bb8e39 881->900 890 7ff9a5bb8ec4-7ff9a5bb8ec7 882->890 891 7ff9a5bb8f1b-7ff9a5bb8f32 call 7ff9a5ba90d0 882->891 887 7ff9a5bb8ed1 883->887 888 7ff9a5bb8ea5-7ff9a5bb8eb9 883->888 899 7ff9a5bb8ed2-7ff9a5bb8ee1 887->899 888->882 896 7ff9a5bb8f48-7ff9a5bb8f4d 890->896 897 7ff9a5bb8ec9-7ff9a5bb8ecc 890->897 891->855 906 7ff9a5bb8f34-7ff9a5bb8f45 891->906 896->875 903 7ff9a5bb8ecd 897->903 917 7ff9a5bb8cb5-7ff9a5bb8cb6 898->917 918 7ff9a5bb8c9a-7ff9a5bb8cb3 898->918 911 7ff9a5bb8ee9-7ff9a5bb8efb 899->911 904 7ff9a5bb8e3a-7ff9a5bb8e47 call 7ff9a5bab400 900->904 903->887 904->883 915 7ff9a5bb8e49-7ff9a5bb8e4c 904->915 906->896 911->860 914 7ff9a5bb8efd-7ff9a5bb8f02 911->914 914->862 919 7ff9a5bb8f04-7ff9a5bb8f10 call 7ff9a5ba9470 914->919 915->903 921 7ff9a5bb8e4e-7ff9a5bb8e61 915->921 920 7ff9a5bb8cb8-7ff9a5bb8cbf 917->920 918->920 929 7ff9a5bb8f15-7ff9a5bb8f19 919->929 920->898 925 7ff9a5bb8cc1-7ff9a5bb8cff 920->925 921->899 926 7ff9a5bb8e63-7ff9a5bb8e68 921->926 927 7ff9a5bb9021-7ff9a5bb902c 922->927 928 7ff9a5bb90ed-7ff9a5bb9118 922->928 943 7ff9a5bb8d01-7ff9a5bb8d21 925->943 944 7ff9a5bb8d6e-7ff9a5bb8d75 925->944 926->911 930 7ff9a5bb8e6a-7ff9a5bb8e7b call 7ff9a5ba9470 926->930 931 7ff9a5bb9032-7ff9a5bb904a 927->931 932 7ff9a5bb918b-7ff9a5bb9205 927->932 946 7ff9a5bb9181-7ff9a5bb918a 928->946 947 7ff9a5bb911a-7ff9a5bb9152 928->947 929->891 930->929 936 7ff9a5bb9052-7ff9a5bb9076 931->936 953 7ff9a5bb9207-7ff9a5bb921f 932->953 954 7ff9a5bb920f-7ff9a5bb921f 932->954 957 7ff9a5bb9078-7ff9a5bb9097 936->957 958 7ff9a5bb9099-7ff9a5bb909b 936->958 960 7ff9a5bb8d23-7ff9a5bb8d47 943->960 961 7ff9a5bb8d56-7ff9a5bb8d6c 943->961 944->867 948 7ff9a5bb8d77-7ff9a5bb8d7a 944->948 984 7ff9a5bb915a-7ff9a5bb9180 947->984 948->881 951 7ff9a5bb8d7c-7ff9a5bb8db2 948->951 951->900 985 7ff9a5bb8db4-7ff9a5bb8db9 951->985 955 7ff9a5bb9221-7ff9a5bb9234 953->955 956 7ff9a5bb9270-7ff9a5bb92ac 953->956 954->955 954->956 966 7ff9a5bb9236-7ff9a5bb924e 955->966 967 7ff9a5bb9250-7ff9a5bb926b 955->967 982 7ff9a5bb92b6-7ff9a5bb92c1 956->982 983 7ff9a5bb92ae-7ff9a5bb92b2 956->983 964 7ff9a5bb909e-7ff9a5bb90ab 957->964 958->964 979 7ff9a5bb8d53-7ff9a5bb8d54 960->979 980 7ff9a5bb8d49-7ff9a5bb8d4f 960->980 961->943 961->944 970 7ff9a5bb90c2-7ff9a5bb90d4 964->970 971 7ff9a5bb90ad-7ff9a5bb90c0 964->971 966->967 993 7ff9a5bb940b-7ff9a5bb941d 967->993 978 7ff9a5bb90d5-7ff9a5bb90da 970->978 971->978 978->922 979->961 980->960 986 7ff9a5bb8d51 980->986 987 7ff9a5bb92c3-7ff9a5bb92d1 982->987 988 7ff9a5bb92db-7ff9a5bb92e6 982->988 983->982 984->946 985->904 991 7ff9a5bb8dbb-7ff9a5bb8dc7 call 7ff9a5ba9470 985->991 986->961 987->988 998 7ff9a5bb92d3-7ff9a5bb92d9 987->998 994 7ff9a5bb92e8-7ff9a5bb92fb 988->994 995 7ff9a5bb9337-7ff9a5bb9344 call 7ff9a5bab408 988->995 991->863 999 7ff9a5bb9317-7ff9a5bb9332 994->999 1000 7ff9a5bb92fd-7ff9a5bb9315 994->1000 1004 7ff9a5bb9368-7ff9a5bb9380 call 7ff9a5ba5000 call 7ff9a5bab410 995->1004 1005 7ff9a5bb9346-7ff9a5bb9366 call 7ff9a5ba5000 call 7ff9a5bab418 995->1005 998->988 1013 7ff9a5bb9402-7ff9a5bb940a call 7ff9a5bb941e 999->1013 1000->999 1016 7ff9a5bb9385-7ff9a5bb9386 1004->1016 1019 7ff9a5bb9388-7ff9a5bb93a9 1005->1019 1013->993 1016->1019 1022 7ff9a5bb93b3-7ff9a5bb93cb 1019->1022 1023 7ff9a5bb93ab-7ff9a5bb93b2 1019->1023 1025 7ff9a5bb93e7-7ff9a5bb93ff 1022->1025 1026 7ff9a5bb93cd-7ff9a5bb93e5 1022->1026 1023->1022 1025->1013 1026->1025
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.333489409.00007FF9A5BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5BA0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff9a5ba0000_file.jbxd
                          Similarity
                          • API ID:
                          • String ID: N6^L
                          • API String ID: 0-557519953
                          • Opcode ID: ec586b8355ba782149702babc44ab5e7f36a45600f9e7d3df719125495120e02
                          • Instruction ID: d998a28f61cfb900f3791cea0c491abf948ade7f5792ea04f8aa1fe513ba325c
                          • Opcode Fuzzy Hash: ec586b8355ba782149702babc44ab5e7f36a45600f9e7d3df719125495120e02
                          • Instruction Fuzzy Hash: 26624A70A0DB498FEB58EB28C4596B977E1FF56701F0405BEE08AC72A2DE74B846C741
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1288 7ff9a5bada89-7ff9a5badaa9 1290 7ff9a5badaf3-7ff9a5badb0a call 7ff9a5ba90d0 call 7ff9a5ba9830 1288->1290 1291 7ff9a5badaab-7ff9a5badad4 1288->1291 1292 7ff9a5badb9a 1290->1292 1301 7ff9a5badb10-7ff9a5badb1e 1290->1301 1291->1292 1293 7ff9a5badada-7ff9a5badaf1 1291->1293 1296 7ff9a5badb9e-7ff9a5badbab 1292->1296 1293->1290 1298 7ff9a5badbed-7ff9a5badbf0 1296->1298 1299 7ff9a5badbad-7ff9a5badbb9 1296->1299 1303 7ff9a5badbdf-7ff9a5badbec 1298->1303 1302 7ff9a5badbbf-7ff9a5badbcc 1299->1302 1304 7ff9a5badb8f-7ff9a5badb99 1301->1304 1305 7ff9a5badb20-7ff9a5badb22 1301->1305 1306 7ff9a5badc16-7ff9a5badc53 call 7ff9a5bad000 * 2 call 7ff9a5ba90d0 1302->1306 1307 7ff9a5badbce-7ff9a5badbd5 1302->1307 1303->1298 1305->1296 1308 7ff9a5badb24 1305->1308 1324 7ff9a5bade26-7ff9a5bade37 1306->1324 1325 7ff9a5badc59-7ff9a5badc74 1306->1325 1309 7ff9a5badbd6-7ff9a5badbde 1307->1309 1311 7ff9a5badb26-7ff9a5badb2f 1308->1311 1312 7ff9a5badb6a-7ff9a5badb78 1308->1312 1309->1303 1314 7ff9a5badb31-7ff9a5badb4e 1311->1314 1315 7ff9a5badb88-7ff9a5badb8e 1311->1315 1312->1292 1316 7ff9a5badb7a-7ff9a5badb86 1312->1316 1314->1302 1320 7ff9a5badb50-7ff9a5badb55 1314->1320 1315->1304 1316->1315 1320->1309 1322 7ff9a5badb57-7ff9a5badb69 call 7ff9a5ba9470 1320->1322 1322->1312 1338 7ff9a5bade79-7ff9a5bade8c 1324->1338 1339 7ff9a5bade39-7ff9a5bade6b 1324->1339 1327 7ff9a5badc76-7ff9a5badc79 1325->1327 1328 7ff9a5badccd-7ff9a5badcd4 1325->1328 1330 7ff9a5badc7b-7ff9a5badc9b 1327->1330 1331 7ff9a5badcfa-7ff9a5badd2e 1327->1331 1332 7ff9a5badd49-7ff9a5badd51 1328->1332 1342 7ff9a5badcd6-7ff9a5badce4 1330->1342 1343 7ff9a5badc9d-7ff9a5badccb 1330->1343 1331->1332 1335 7ff9a5badd53-7ff9a5badd58 1332->1335 1336 7ff9a5baddc2-7ff9a5baddd5 1332->1336 1345 7ff9a5baddd9-7ff9a5badde5 call 7ff9a5ba5fa0 1335->1345 1346 7ff9a5badd5a-7ff9a5badd9e call 7ff9a5ba9470 1335->1346 1336->1345 1340 7ff9a5bade9d-7ff9a5badebc 1338->1340 1341 7ff9a5bade8e-7ff9a5bade9a 1338->1341 1339->1338 1348 7ff9a5bade6d-7ff9a5bade76 1339->1348 1349 7ff9a5badecd-7ff9a5badee6 1340->1349 1350 7ff9a5badebe-7ff9a5badeca 1340->1350 1341->1340 1342->1331 1343->1328 1355 7ff9a5baddea-7ff9a5baddfa 1345->1355 1346->1324 1361 7ff9a5badda4-7ff9a5baddc1 1346->1361 1348->1338 1357 7ff9a5badee8-7ff9a5badef3 1349->1357 1358 7ff9a5badef6-7ff9a5badf0b 1349->1358 1350->1349 1355->1324 1360 7ff9a5baddfc-7ff9a5bade25 1355->1360 1357->1358 1361->1336
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.333489409.00007FF9A5BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5BA0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff9a5ba0000_file.jbxd
                          Similarity
                          • API ID:
                          • String ID: _\_H
                          • API String ID: 0-2460524293
                          • Opcode ID: 3471197fefec2fb817ab429c78ce824ba400a3c0fe0a08fb18fe4336578a6d28
                          • Instruction ID: a18599d4f9488cd5d908e42fa4f4498479145e2220a1ddb314529ef256ebe3e8
                          • Opcode Fuzzy Hash: 3471197fefec2fb817ab429c78ce824ba400a3c0fe0a08fb18fe4336578a6d28
                          • Instruction Fuzzy Hash: 85E1AB31A0DB864FE31DDB2884952B577E2FF92702B5446BED4CAC7292DE74B842C781
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000000.00000002.333489409.00007FF9A5BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5BA0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff9a5ba0000_file.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f8a6f9d4c9fa04efc0877e6568c69e81d475ec1e2bf8418e5c0862f359b3eeb8
                          • Instruction ID: b36dc8b1cf1158b8bbd9d13ac48229bff660e2b04f25db6381c1c01b3252f81f
                          • Opcode Fuzzy Hash: f8a6f9d4c9fa04efc0877e6568c69e81d475ec1e2bf8418e5c0862f359b3eeb8
                          • Instruction Fuzzy Hash: 4772CA31A0EA4A4FE359DB28C4996B577E1FF96302B1005BEE0CEC7192DE65F846C781
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000000.00000002.333489409.00007FF9A5BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5BA0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff9a5ba0000_file.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 08493e7a3a0a8cb77df03515b5131385948fa212c6f81c0bc01fd0d3feb26678
                          • Instruction ID: 15f8998c4f3d231bd691cd9e004047397020c4b719c6354b3de3bd36c607bfe2
                          • Opcode Fuzzy Hash: 08493e7a3a0a8cb77df03515b5131385948fa212c6f81c0bc01fd0d3feb26678
                          • Instruction Fuzzy Hash: 20620030A19A098FE319EF28C488AB673A1FF95705F60067DD48BC7696DAB5FC42C740
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000000.00000002.333489409.00007FF9A5BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5BA0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff9a5ba0000_file.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0a230ad07dfacb6bd7172cd2daeee092a55928be9fa6c2d4cf0d887b12d90214
                          • Instruction ID: 8ef45d4f24253a591d62c8f7a27a047d74aba38a8763a061b8f931a45e811d53
                          • Opcode Fuzzy Hash: 0a230ad07dfacb6bd7172cd2daeee092a55928be9fa6c2d4cf0d887b12d90214
                          • Instruction Fuzzy Hash: 9B528930A0EB894FE759DB2884996B57BE1EF46701B1505BED0CEC71A3DEA8F806C741
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000000.00000002.333489409.00007FF9A5BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5BA0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff9a5ba0000_file.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9df22ef16fe1820c8d883d51f0446e8ef5fb785ed52085245ad7a19a07d1ea6a
                          • Instruction ID: dac0bd1a7a0a8a8c81092a3b5f987229a930e8d37db6d03eca78728a289bd397
                          • Opcode Fuzzy Hash: 9df22ef16fe1820c8d883d51f0446e8ef5fb785ed52085245ad7a19a07d1ea6a
                          • Instruction Fuzzy Hash: 7F52D630B0AA094FEB68EB28D4957B977E1EF56701B1441BEE48EC7192DE64FC42C781
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1184 7ff9a5bbae01-7ff9a5bbaecb 1188 7ff9a5bbaee7-7ff9a5bbaef7 1184->1188 1189 7ff9a5bbaecd-7ff9a5bbaee4 1184->1189 1190 7ff9a5bbaf13-7ff9a5bbaf62 1188->1190 1191 7ff9a5bbaef9-7ff9a5bbaf10 1188->1191 1189->1188 1192 7ff9a5bbaf64-7ff9a5bbaf84 1190->1192 1193 7ff9a5bbaf8a-7ff9a5bbb0b5 CreateProcessW 1190->1193 1191->1190 1192->1193 1198 7ff9a5bbb0b7 1193->1198 1199 7ff9a5bbb0bd-7ff9a5bbb158 call 7ff9a5bbb159 1193->1199 1198->1199
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.333489409.00007FF9A5BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5BA0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff9a5ba0000_file.jbxd
                          Similarity
                          • API ID: CreateProcess
                          • String ID:
                          • API String ID: 963392458-0
                          • Opcode ID: d30746b786eefa561c3f5b4a31e9c7dca545b6e2f5116aeac8712474bbe88895
                          • Instruction ID: fcce860eeb5b4d19370f57a8aac8c55f216b783d2f1198e298b94caadecd46ad
                          • Opcode Fuzzy Hash: d30746b786eefa561c3f5b4a31e9c7dca545b6e2f5116aeac8712474bbe88895
                          • Instruction Fuzzy Hash: F2B1C470908A5C8FDB98DF18D898BE9BBF1FB69311F1011AED44EE3251DA75A980CF40
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1205 7ff9a5ba29b2-7ff9a5bbaecb 1209 7ff9a5bbaee7-7ff9a5bbaef7 1205->1209 1210 7ff9a5bbaecd-7ff9a5bbaee4 1205->1210 1211 7ff9a5bbaf13-7ff9a5bbaf62 1209->1211 1212 7ff9a5bbaef9-7ff9a5bbaf10 1209->1212 1210->1209 1213 7ff9a5bbaf64-7ff9a5bbaf84 1211->1213 1214 7ff9a5bbaf8a-7ff9a5bbb0b5 CreateProcessW 1211->1214 1212->1211 1213->1214 1219 7ff9a5bbb0b7 1214->1219 1220 7ff9a5bbb0bd-7ff9a5bbb158 call 7ff9a5bbb159 1214->1220 1219->1220
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.333489409.00007FF9A5BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5BA0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff9a5ba0000_file.jbxd
                          Similarity
                          • API ID: CreateProcess
                          • String ID:
                          • API String ID: 963392458-0
                          • Opcode ID: 6a2307dfe4ad352fcdd6f1e2dfbf7d414b8a291211255e643845dbe6bcbefd6d
                          • Instruction ID: 7cc5309464209ef6d791d0eee9b9940b504f33b70ba4bcecb3890acee9bbaa47
                          • Opcode Fuzzy Hash: 6a2307dfe4ad352fcdd6f1e2dfbf7d414b8a291211255e643845dbe6bcbefd6d
                          • Instruction Fuzzy Hash: F6B1B470908A1D8FDB98DF58D898BE9B7F1FB69311F1011AED44EE3251DAB5A980CF40
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1226 7ff9a5ba2a92-7ff9a5bbd401 1230 7ff9a5bbd403-7ff9a5bbd422 1226->1230 1231 7ff9a5bbd476-7ff9a5bbd4b5 1226->1231 1230->1231 1234 7ff9a5bbd424-7ff9a5bbd42e 1230->1234 1235 7ff9a5bbd4b7-7ff9a5bbd4d6 1231->1235 1236 7ff9a5bbd52a-7ff9a5bbd5cf MessageBoxA 1231->1236 1237 7ff9a5bbd468-7ff9a5bbd470 1234->1237 1238 7ff9a5bbd430-7ff9a5bbd443 1234->1238 1235->1236 1246 7ff9a5bbd4d8-7ff9a5bbd4e2 1235->1246 1244 7ff9a5bbd5d1 1236->1244 1245 7ff9a5bbd5d7-7ff9a5bbd640 call 7ff9a5bbd65c 1236->1245 1237->1231 1239 7ff9a5bbd447-7ff9a5bbd45a 1238->1239 1240 7ff9a5bbd445 1238->1240 1239->1239 1243 7ff9a5bbd45c-7ff9a5bbd464 1239->1243 1240->1239 1243->1237 1244->1245 1257 7ff9a5bbd642 1245->1257 1258 7ff9a5bbd647-7ff9a5bbd65b 1245->1258 1247 7ff9a5bbd4e4-7ff9a5bbd4f7 1246->1247 1248 7ff9a5bbd51c-7ff9a5bbd524 1246->1248 1250 7ff9a5bbd4fb-7ff9a5bbd50e 1247->1250 1251 7ff9a5bbd4f9 1247->1251 1248->1236 1250->1250 1252 7ff9a5bbd510-7ff9a5bbd518 1250->1252 1251->1250 1252->1248 1257->1258
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.333489409.00007FF9A5BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5BA0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff9a5ba0000_file.jbxd
                          Similarity
                          • API ID: Message
                          • String ID:
                          • API String ID: 2030045667-0
                          • Opcode ID: f107ab5281cc01db3ea099926959bab380e9433bd645bca620f8800e95e70ec5
                          • Instruction ID: 140d36ff8de5e6b3e6bfd6c359152de37c9c1605adcd7aea4d53e7c0bfff01db
                          • Opcode Fuzzy Hash: f107ab5281cc01db3ea099926959bab380e9433bd645bca620f8800e95e70ec5
                          • Instruction Fuzzy Hash: F2A14070918A4D8FDBA8DF28C8597E977E1FB59311F10413EE84ECB291DBB4A941CB42
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1259 7ff9a5ba2e21-7ff9a5ba2e39 1260 7ff9a5ba2df4-7ff9a5ba2df8 1259->1260 1261 7ff9a5ba2e3b-7ff9a5ba2ed4 1259->1261 1262 7ff9a5ba2dfa 1260->1262 1263 7ff9a5ba2dff-7ff9a5ba2e1e 1260->1263 1268 7ff9a5ba2ed6-7ff9a5ba2ef5 1261->1268 1269 7ff9a5ba2f49-7ff9a5ba2fc3 LoadLibraryA 1261->1269 1262->1263 1268->1269 1272 7ff9a5ba2ef7-7ff9a5ba2f01 1268->1272 1276 7ff9a5ba2fc5 1269->1276 1277 7ff9a5ba2fcb-7ff9a5ba3038 call 7ff9a5ba3054 1269->1277 1273 7ff9a5ba2f03-7ff9a5ba2f16 1272->1273 1274 7ff9a5ba2f3b-7ff9a5ba2f43 1272->1274 1278 7ff9a5ba2f18 1273->1278 1279 7ff9a5ba2f1a-7ff9a5ba2f2d 1273->1279 1274->1269 1276->1277 1286 7ff9a5ba303a 1277->1286 1287 7ff9a5ba303f-7ff9a5ba3053 1277->1287 1278->1279 1279->1279 1280 7ff9a5ba2f2f-7ff9a5ba2f37 1279->1280 1280->1274 1286->1287
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.333489409.00007FF9A5BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5BA0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff9a5ba0000_file.jbxd
                          Similarity
                          • API ID: LibraryLoad
                          • String ID:
                          • API String ID: 1029625771-0
                          • Opcode ID: 2dee287f900f0b4462669db072716d54a23e84889b0a734bf444d31212519d6e
                          • Instruction ID: c8275e013a7e9b595744c84563214774351261128b2f0b0008cff5a562fe9180
                          • Opcode Fuzzy Hash: 2dee287f900f0b4462669db072716d54a23e84889b0a734bf444d31212519d6e
                          • Instruction Fuzzy Hash: 39818670908A8D8FDFA8EF28D8457E97BE1FF59311F00412AE84DC7292DB75A585CB81
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1362 7ff9a5ba337a-7ff9a5ba33a3 1363 7ff9a5ba33a5-7ff9a5ba33ad 1362->1363 1364 7ff9a5ba33ae-7ff9a5ba34cb VirtualProtect 1362->1364 1363->1364 1368 7ff9a5ba34d3-7ff9a5ba352d 1364->1368 1369 7ff9a5ba34cd 1364->1369 1369->1368
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.333489409.00007FF9A5BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5BA0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff9a5ba0000_file.jbxd
                          Similarity
                          • API ID: ProtectVirtual
                          • String ID:
                          • API String ID: 544645111-0
                          • Opcode ID: 0771ed81859e1a0e90f2c556a63ab5899f624ed8d53b9d89a3d15701df738270
                          • Instruction ID: 6fbbbb3a79e066fcfdfe2394caeff88286a922f65f11fd2e8abd08ccca960778
                          • Opcode Fuzzy Hash: 0771ed81859e1a0e90f2c556a63ab5899f624ed8d53b9d89a3d15701df738270
                          • Instruction Fuzzy Hash: 47516B7090864D8FDB55DFA8C885BEDBBF1FB66310F1042AAD049E3252DB74A885CB41
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1372 7ff9a5ba29a2-7ff9a5bbd2d3 VirtualAllocEx 1376 7ff9a5bbd2d5 1372->1376 1377 7ff9a5bbd2db-7ff9a5bbd327 1372->1377 1376->1377
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.333489409.00007FF9A5BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5BA0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff9a5ba0000_file.jbxd
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: 622ab3b10386658f67e145827734409c78a4d4933cfabc62d4dd5ec5cc36b7e0
                          • Instruction ID: a0f36e7e6bfa33807b7bc449faf20ff0a3cde38761e2b1dd66a48f158087a765
                          • Opcode Fuzzy Hash: 622ab3b10386658f67e145827734409c78a4d4933cfabc62d4dd5ec5cc36b7e0
                          • Instruction Fuzzy Hash: 0951E470908A1C8FDF98DF58C885BE9BBF1FB6A311F1051AAD04DE3251DA74A985CF44
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000000.00000002.333602249.00007FF9A5C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5C60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff9a5c60000_file.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c0089eadc3497a713c5b2f3fdab0866065b0c07a766653e399c29a0470c4a328
                          • Instruction ID: bf4abd1f79801a3eef13280b315ce6826359bd1b4047e315377becc9f87be5b0
                          • Opcode Fuzzy Hash: c0089eadc3497a713c5b2f3fdab0866065b0c07a766653e399c29a0470c4a328
                          • Instruction Fuzzy Hash: 6AB13A7391F7C25FE765D62888462657FF0EF63610F0405BEC0C9EB496E954794AC382
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Non-executed Functions

                          Memory Dump Source
                          • Source File: 00000000.00000002.333489409.00007FF9A5BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5BA0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff9a5ba0000_file.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8c9ac96493995bb4b9bbd62889c4dfb841aa340c55210642b8f7d73137cecaae
                          • Instruction ID: 06a5312ee0278c8cf9011249fe2a449f5423dc37db45723480c93e38bd3cede1
                          • Opcode Fuzzy Hash: 8c9ac96493995bb4b9bbd62889c4dfb841aa340c55210642b8f7d73137cecaae
                          • Instruction Fuzzy Hash: 42825330A1E6868FE759CB2484853B57BE1EF96302F1541BDD4CECB5D3DAA8B846C780
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000000.00000002.333489409.00007FF9A5BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5BA0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff9a5ba0000_file.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2f67070a8c4ab8ee5de52ca52130d61c3eeaaeb6f0025a81e83b9d6eca0e418a
                          • Instruction ID: d5c16b7ebd83fbe32c7b52203682f0af8d0c4ef8f65317bd82cb7ead52b8d08d
                          • Opcode Fuzzy Hash: 2f67070a8c4ab8ee5de52ca52130d61c3eeaaeb6f0025a81e83b9d6eca0e418a
                          • Instruction Fuzzy Hash: CA81B630908A8D8FEFA8EF28D8557E97BE0FF1A311F10416AD84DC7292DB74A945CB41
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000000.00000002.333489409.00007FF9A5BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5BA0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff9a5ba0000_file.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 430af1f83b2fc5ac85fb21c08aa9f8124cde5e7c03f344153b7ee1ececfa746b
                          • Instruction ID: 2d09b7c2fe98152d20ff21f88c8be81b2c942415e72259113a48e9f288c7160b
                          • Opcode Fuzzy Hash: 430af1f83b2fc5ac85fb21c08aa9f8124cde5e7c03f344153b7ee1ececfa746b
                          • Instruction Fuzzy Hash: 9081CA30908A8D8FDBA8EF28D8457E97BE0FF5A311F10416AE94DC7292DB74A545CB81
                          Uniqueness

                          Uniqueness Score: -1.00%