Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Scan.exe

Overview

General Information

Sample name:Scan.exe
Analysis ID:1431280
MD5:42832db85ef430c08794a3b8125c6739
SHA1:a9e8838247edac1e67a61406839b1c05821735f9
SHA256:5a351a6f459836b952ae45a564add378ddad3b6b725e7b63f831b84f679c3818
Tags:exe
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected UAC Bypass using CMSTP
.NET source code references suspicious native API functions
Found potential dummy code loops (likely to delay analysis)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
PE file does not import any functions
Potential time zone aware malware
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Scan.exe (PID: 2380 cmdline: "C:\Users\user\Desktop\Scan.exe" MD5: 42832DB85EF430C08794A3B8125C6739)
    • conhost.exe (PID: 5020 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
    Process Memory Space: Scan.exe PID: 2380JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      Process Memory Space: Scan.exe PID: 2380JoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: Scan.exeReversingLabs: Detection: 13%

        Exploits

        barindex
        Source: Yara matchFile source: 00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Scan.exe PID: 2380, type: MEMORYSTR
        Source: Scan.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: C:\Users\user\Desktop\Scan.exeProcess Stats: CPU usage > 49%
        Source: C:\Users\user\Desktop\Scan.exeCode function: 0_2_00007FF848F3C2D90_2_00007FF848F3C2D9
        Source: C:\Users\user\Desktop\Scan.exeCode function: 0_2_00007FF848F3F2E90_2_00007FF848F3F2E9
        Source: C:\Users\user\Desktop\Scan.exeCode function: 0_2_00007FF848F321300_2_00007FF848F32130
        Source: C:\Users\user\Desktop\Scan.exeCode function: 0_2_00007FF848F34B080_2_00007FF848F34B08
        Source: C:\Users\user\Desktop\Scan.exeCode function: 0_2_00007FF848F453D80_2_00007FF848F453D8
        Source: C:\Users\user\Desktop\Scan.exeCode function: 0_2_00007FF848F396900_2_00007FF848F39690
        Source: C:\Users\user\Desktop\Scan.exeCode function: 0_2_00007FF848F396980_2_00007FF848F39698
        Source: C:\Users\user\Desktop\Scan.exeCode function: 0_2_00007FF848F310990_2_00007FF848F31099
        Source: C:\Users\user\Desktop\Scan.exeCode function: 0_2_00007FF848F3C7610_2_00007FF848F3C761
        Source: C:\Users\user\Desktop\Scan.exeCode function: 0_2_00007FF848F44C190_2_00007FF848F44C19
        Source: C:\Users\user\Desktop\Scan.exeCode function: 0_2_00007FF848F454310_2_00007FF848F45431
        Source: C:\Users\user\Desktop\Scan.exeCode function: 0_2_00007FF848F40C8A0_2_00007FF848F40C8A
        Source: Scan.exeStatic PE information: No import functions for PE file found
        Source: Scan.exe, 00000000.00000000.1978205571.00000123279D8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameAracewed: vs Scan.exe
        Source: Scan.exeBinary or memory string: OriginalFilenameAracewed: vs Scan.exe
        Source: classification engineClassification label: mal76.expl.evad.winEXE@2/0@0/0
        Source: C:\Users\user\Desktop\Scan.exeMutant created: NULL
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5020:120:WilError_03
        Source: Scan.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: Scan.exeStatic file information: TRID: Win64 Executable Console Net Framework (206006/5) 48.58%
        Source: C:\Users\user\Desktop\Scan.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: Scan.exeReversingLabs: Detection: 13%
        Source: C:\Users\user\Desktop\Scan.exeFile read: C:\Users\user\Desktop\Scan.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\Scan.exe "C:\Users\user\Desktop\Scan.exe"
        Source: C:\Users\user\Desktop\Scan.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\Scan.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
        Source: C:\Users\user\Desktop\Scan.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
        Source: Scan.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: Scan.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: Scan.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
        Source: Scan.exeStatic PE information: 0xC318C86A [Thu Sep 21 01:01:30 2073 UTC]
        Source: C:\Users\user\Desktop\Scan.exeCode function: 0_2_00007FF84900026B push esp; retf 4810h0_2_00007FF849000312
        Source: C:\Users\user\Desktop\Scan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: Yara matchFile source: Process Memory Space: Scan.exe PID: 2380, type: MEMORYSTR
        Source: Scan.exe, 00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
        Source: Scan.exe, 00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
        Source: C:\Users\user\Desktop\Scan.exeMemory allocated: 12327EA0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeMemory allocated: 12341740000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeWindow / User API: threadDelayed 1628Jump to behavior
        Source: C:\Users\user\Desktop\Scan.exeWindow / User API: threadDelayed 8343Jump to behavior
        Source: C:\Users\user\Desktop\Scan.exe TID: 2520Thread sleep count: 1628 > 30Jump to behavior
        Source: C:\Users\user\Desktop\Scan.exe TID: 2520Thread sleep time: -1628000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Scan.exe TID: 2788Thread sleep count: 8343 > 30Jump to behavior
        Source: C:\Users\user\Desktop\Scan.exe TID: 2788Thread sleep time: -8343000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeSystem information queried: CurrentTimeZoneInformationJump to behavior
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: Scan.exe, 00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
        Source: Scan.exe, 00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmmouse.sys
        Source: Scan.exe, 00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
        Source: Scan.exe, 00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: Scan.exe, 00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmhgfs.sys
        Source: Scan.exe, 00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
        Source: Scan.exe, 00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
        Source: Scan.exe, 00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\'C:\WINDOWS\system32\drivers\vmmouse.sys&C:\WINDOWS\system32\drivers\vmhgfs.sys
        Source: Scan.exe, 00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noValueButYesKey)C:\WINDOWS\system32\drivers\VBoxMouse.sys
        Source: Scan.exe, 00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\VBoxMouse.sys
        Source: Scan.exe, 00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
        Source: Scan.exe, 00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II

        Anti Debugging

        barindex
        Source: C:\Users\user\Desktop\Scan.exeProcess Stats: CPU usage > 42% for more than 60s
        Source: C:\Users\user\Desktop\Scan.exeProcess token adjusted: DebugJump to behavior
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: C:\Users\user\Desktop\Scan.exeMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: Scan.exe, setPercentGroupSeparatorDefaultMemberAttribute.csReference to suspicious API methods: ((DigitShapesCollapsed)Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibrary(WriteWaiterSignaledAction14(UseUserOverrideFunc7.AnsiCodePageSTAThreadAttribute)), WriteWaiterSignaledAction14(UseUserOverrideFunc7.setNumberDecimalSeparatorWriteHalfLittleEndian)), typeof(DigitShapesCollapsed)))("Address", out var _)
        Source: Scan.exe, setPercentGroupSeparatorDefaultMemberAttribute.csReference to suspicious API methods: ((DigitShapesCollapsed)Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibrary(WriteWaiterSignaledAction14(UseUserOverrideFunc7.AnsiCodePageSTAThreadAttribute)), WriteWaiterSignaledAction14(UseUserOverrideFunc7.setNumberDecimalSeparatorWriteHalfLittleEndian)), typeof(DigitShapesCollapsed)))("Address", out var _)
        Source: Scan.exe, setPercentGroupSeparatorDefaultMemberAttribute.csReference to suspicious API methods: VirtualProtect(procAddress, (uint)array.Length, 64u, out var EnsureSufficientExecutionStackgetFullyQualifiedName)
        Source: C:\Users\user\Desktop\Scan.exeQueries volume information: C:\Users\user\Desktop\Scan.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Scan.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Native API
        1
        DLL Side-Loading
        1
        Process Injection
        121
        Virtualization/Sandbox Evasion
        OS Credential Dumping1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        1
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        DLL Side-Loading
        1
        Disable or Modify Tools
        LSASS Memory21
        Security Software Discovery
        Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
        Process Injection
        Security Account Manager121
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        Obfuscated Files or Information
        NTDS1
        Application Window Discovery
        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        Timestomp
        LSA Secrets13
        System Information Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        DLL Side-Loading
        Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        Scan.exe13%ReversingLabsWin64.Trojan.Generic
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No contacted domains info
        No contacted IP infos
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1431280
        Start date and time:2024-04-24 19:15:05 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 6m 20s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:5
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:Scan.exe
        Detection:MAL
        Classification:mal76.expl.evad.winEXE@2/0@0/0
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 93%
        • Number of executed functions: 15
        • Number of non-executed functions: 1
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Override analysis time to 240s for sample files taking high CPU consumption
        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • VT rate limit hit for: Scan.exe
        TimeTypeDescription
        19:16:23API Interceptor1483821x Sleep call for process: Scan.exe modified
        No context
        No context
        No context
        No context
        No context
        No created / dropped files found
        File type:PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
        Entropy (8bit):7.988940440788159
        TrID:
        • Win64 Executable Console Net Framework (206006/5) 48.58%
        • Win64 Executable Console (202006/5) 47.64%
        • Win64 Executable (generic) (12005/4) 2.83%
        • Generic Win/DOS Executable (2004/3) 0.47%
        • DOS Executable Generic (2002/1) 0.47%
        File name:Scan.exe
        File size:621'949 bytes
        MD5:42832db85ef430c08794a3b8125c6739
        SHA1:a9e8838247edac1e67a61406839b1c05821735f9
        SHA256:5a351a6f459836b952ae45a564add378ddad3b6b725e7b63f831b84f679c3818
        SHA512:b63cee7040bba9071af33e8443578f470bdef4187d0c829ce731d1b2b829b5d3aff9d697401fa2518ed20f69cb36803987a1ebc0ef9f5b4a274c89b107bce3ed
        SSDEEP:12288:n2ye0UL1HmM2i3M27fC7YYwcxHvuUTkqFnSw1bKteUOIgX7hISySSL:9eZBHmMNM27fFcFuKkqFnS6Gtx4X7OSC
        TLSH:21D42382AECB4FAAEFB7873D5CE7C1163331F79556BAC20F1A6490752AC17118364389
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...j............."...0.@G............... ....@...... ....................................`................................
        Icon Hash:00928e8e8686b000
        Entrypoint:0x400000
        Entrypoint Section:
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows cui
        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Time Stamp:0xC318C86A [Thu Sep 21 01:01:30 2073 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:
        Instruction
        dec ebp
        pop edx
        nop
        add byte ptr [ebx], al
        add byte ptr [eax], al
        add byte ptr [eax+eax], al
        add byte ptr [eax], al
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x80000xbc4.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
        IMAGE_DIRECTORY_ENTRY_DEBUG0x66820x38.text
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x00x0
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x20000x47400x48009331bd2fb09a6e2d2cfc93bdd459b76fFalse0.5166558159722222data5.845232931641596IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rsrc0x80000xbc40xc00a0b0daaf4359ed19da096d2f6cfbc843False0.2975260416666667data4.087863214616218IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_VERSION0x80b80x490data0.4794520547945205
        RT_VERSION0x85480x490dataEnglishUnited States0.4794520547945205
        RT_MANIFEST0x89d80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States
        No network behavior found

        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:19:15:49
        Start date:24/04/2024
        Path:C:\Users\user\Desktop\Scan.exe
        Wow64 process (32bit):false
        Commandline:"C:\Users\user\Desktop\Scan.exe"
        Imagebase:0x123279d0000
        File size:621'949 bytes
        MD5 hash:42832DB85EF430C08794A3B8125C6739
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.4451724749.000001232976D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
        Reputation:low
        Has exited:false

        Target ID:1
        Start time:19:15:49
        Start date:24/04/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff6d64d0000
        File size:862'208 bytes
        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Reset < >

          Execution Graph

          Execution Coverage:10.5%
          Dynamic/Decrypted Code Coverage:100%
          Signature Coverage:0%
          Total number of Nodes:30
          Total number of Limit Nodes:2
          execution_graph 16152 7ff848f33629 16153 7ff848f3363f 16152->16153 16156 7ff848f32dc0 16153->16156 16155 7ff848f336a0 16159 7ff848f32de0 16156->16159 16157 7ff848f32e2f 16157->16155 16158 7ff848f32f70 LoadLibraryA 16160 7ff848f32fc4 16158->16160 16159->16157 16159->16158 16159->16159 16160->16155 16165 7ff848f30cd9 16166 7ff848f30d0f 16165->16166 16177 7ff848f305c0 16166->16177 16168 7ff848f30d67 16169 7ff848f305c0 LoadLibraryA 16168->16169 16170 7ff848f30d88 16169->16170 16171 7ff848f305c0 LoadLibraryA 16170->16171 16172 7ff848f30d9d 16171->16172 16173 7ff848f305c0 LoadLibraryA 16172->16173 16174 7ff848f30e3a 16173->16174 16175 7ff848f305c0 LoadLibraryA 16174->16175 16176 7ff848f30e4f 16175->16176 16179 7ff848f32dc0 16177->16179 16178 7ff848f32e2f 16178->16168 16179->16178 16180 7ff848f32f70 LoadLibraryA 16179->16180 16181 7ff848f32fc4 16180->16181 16181->16168 16161 7ff848f333c4 16162 7ff848f333cd VirtualProtect 16161->16162 16164 7ff848f33491 16162->16164 16148 7ff848f30925 16149 7ff848f3093c FreeConsole 16148->16149 16151 7ff848f309be 16149->16151
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.4458653382.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff848f30000_Scan.jbxd
          Similarity
          • API ID:
          • String ID: $t9$x6t9$x6t9
          • API String ID: 0-3224664513
          • Opcode ID: bf0b20d303143d75ca3f08b2ba88a7c2422eb7f0994f77f4f4bf4cde6cdbb900
          • Instruction ID: 520049b4245120eecead3fd15e96df8508434a131bbd896a60135712906fb173
          • Opcode Fuzzy Hash: bf0b20d303143d75ca3f08b2ba88a7c2422eb7f0994f77f4f4bf4cde6cdbb900
          • Instruction Fuzzy Hash: B2C2C430A0DA598FE799EB28C455AB877E1FF65740F1400BAD04ED72E2DF28AC85CB45
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.4458653382.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff848f30000_Scan.jbxd
          Similarity
          • API ID:
          • String ID: #L_L$x6t9$x6t9
          • API String ID: 0-242472046
          • Opcode ID: 89b9e102f554a39c60538bc4f280ac5df41caa8ea2e8993299ed699013132ace
          • Instruction ID: 31a9fd62a20805aefdba168a842baf4aef3eae849f5ca1c31079009e9a97e989
          • Opcode Fuzzy Hash: 89b9e102f554a39c60538bc4f280ac5df41caa8ea2e8993299ed699013132ace
          • Instruction Fuzzy Hash: 6EB22230A1CB494FE359EB2884914B5B7E1FF95341F1445BED88AC72E6DF38A846C781
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.4458653382.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff848f30000_Scan.jbxd
          Similarity
          • API ID:
          • String ID: "33$Zt9$Zt9
          • API String ID: 0-1349775563
          • Opcode ID: b54ef3b3922c7e24ecc54cd22040fa24e516c591dda75365943f475e3733105c
          • Instruction ID: b751a25bd71451748390d629598ca11ad43b3f83c74a63a1680ccb95107bb8b0
          • Opcode Fuzzy Hash: b54ef3b3922c7e24ecc54cd22040fa24e516c591dda75365943f475e3733105c
          • Instruction Fuzzy Hash: 06A1E523B1E5699ED741B77CB8151E97B60EF863B5B0402B7D188CB0D3DE1CA44683A9
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 951 7ff848f32130-7ff848f35121 call 7ff848f34fe0 958 7ff848f35144-7ff848f35153 951->958 959 7ff848f35123-7ff848f35139 call 7ff848f34fe0 call 7ff848f35030 958->959 960 7ff848f35155-7ff848f3516f call 7ff848f34fe0 call 7ff848f35030 958->960 969 7ff848f3513b-7ff848f35142 959->969 970 7ff848f35170-7ff848f351c0 959->970 969->958 974 7ff848f351cc-7ff848f35203 970->974 975 7ff848f351c2-7ff848f351c7 call 7ff848f34788 970->975 978 7ff848f35209-7ff848f35214 974->978 979 7ff848f353ff-7ff848f35469 974->979 975->974 980 7ff848f35288-7ff848f3528d 978->980 981 7ff848f35216-7ff848f35224 978->981 1011 7ff848f3546b-7ff848f35471 979->1011 1012 7ff848f35486-7ff848f354b0 979->1012 982 7ff848f3528f-7ff848f3529b 980->982 983 7ff848f35300-7ff848f3530a 980->983 981->979 985 7ff848f3522a-7ff848f35239 981->985 982->979 986 7ff848f352a1-7ff848f352b4 982->986 988 7ff848f3532c-7ff848f35334 983->988 989 7ff848f3530c-7ff848f35319 call 7ff848f347a8 983->989 990 7ff848f3523b-7ff848f3526b 985->990 991 7ff848f3526d-7ff848f35278 985->991 993 7ff848f35337-7ff848f35342 986->993 988->993 1004 7ff848f3531e-7ff848f3532a 989->1004 990->991 998 7ff848f352b9-7ff848f352bc 990->998 991->979 992 7ff848f3527e-7ff848f35286 991->992 992->980 992->981 993->979 995 7ff848f35348-7ff848f35358 993->995 995->979 1000 7ff848f3535e-7ff848f3536b 995->1000 1001 7ff848f352be-7ff848f352ce 998->1001 1002 7ff848f352d2-7ff848f352da 998->1002 1000->979 1005 7ff848f35371-7ff848f35391 1000->1005 1001->1002 1002->979 1006 7ff848f352e0-7ff848f352ff 1002->1006 1004->988 1005->979 1014 7ff848f35393-7ff848f353a2 1005->1014 1015 7ff848f35473-7ff848f35484 1011->1015 1016 7ff848f354b1-7ff848f35505 1011->1016 1017 7ff848f353ed-7ff848f353fe 1014->1017 1018 7ff848f353a4-7ff848f353af 1014->1018 1015->1011 1015->1012 1026 7ff848f35519-7ff848f35551 1016->1026 1027 7ff848f35507-7ff848f35517 1016->1027 1018->1017 1024 7ff848f353b1-7ff848f353e8 call 7ff848f347a8 1018->1024 1024->1017 1034 7ff848f355a8-7ff848f355af 1026->1034 1035 7ff848f35553-7ff848f35559 1026->1035 1027->1026 1027->1027 1037 7ff848f355f2-7ff848f3561b 1034->1037 1038 7ff848f355b1-7ff848f355b2 1034->1038 1035->1034 1036 7ff848f3555b-7ff848f3555c 1035->1036 1039 7ff848f3555f-7ff848f35562 1036->1039 1040 7ff848f355b5-7ff848f355b8 1038->1040 1041 7ff848f35568-7ff848f35575 1039->1041 1042 7ff848f3561c-7ff848f35631 1039->1042 1040->1042 1043 7ff848f355ba-7ff848f355cb 1040->1043 1045 7ff848f355a1-7ff848f355a6 1041->1045 1046 7ff848f35577-7ff848f3559e 1041->1046 1053 7ff848f3563b-7ff848f356c1 1042->1053 1054 7ff848f35633-7ff848f3563a 1042->1054 1047 7ff848f355e9-7ff848f355f0 1043->1047 1048 7ff848f355cd-7ff848f355d3 1043->1048 1045->1034 1045->1039 1046->1045 1047->1037 1047->1040 1048->1042 1052 7ff848f355d5-7ff848f355e5 1048->1052 1052->1047 1054->1053
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.4458653382.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff848f30000_Scan.jbxd
          Similarity
          • API ID:
          • String ID: fH$d
          • API String ID: 0-722599082
          • Opcode ID: 93c7f9932e4ce7fcc14f645e12245ea814f86bc51e9774ef4f4ada40972ccfbb
          • Instruction ID: 7d921e02655775470bf91d3a4da5176c17628c8aea7641c086f5cdb23ec20418
          • Opcode Fuzzy Hash: 93c7f9932e4ce7fcc14f645e12245ea814f86bc51e9774ef4f4ada40972ccfbb
          • Instruction Fuzzy Hash: BD223331A1CA4A4FE349EB2894825B177E1FF99354F1442BAC44AC72D7EE29F843C785
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1062 7ff848f34b08-7ff848f34c41 1085 7ff848f34c43-7ff848f34c49 1062->1085 1087 7ff848f34c4b-7ff848f34cae 1085->1087 1090 7ff848f34f26-7ff848f34f59 1087->1090 1091 7ff848f34cb4-7ff848f34d11 1087->1091 1098 7ff848f34f5b-7ff848f34f62 1090->1098 1099 7ff848f34f63-7ff848f34f7e 1090->1099 1113 7ff848f34d13-7ff848f34d24 call 7ff848f346b8 1091->1113 1098->1099 1102 7ff848f34fb2-7ff848f34fe1 1099->1102 1103 7ff848f34f80-7ff848f34f82 1099->1103 1117 7ff848f34fe4-7ff848f3501a 1102->1117 1105 7ff848f34f8c-7ff848f34f92 1103->1105 1106 7ff848f34f84-7ff848f34f87 call 7ff848f34788 1103->1106 1109 7ff848f34fa1-7ff848f34fb1 1105->1109 1110 7ff848f34f94-7ff848f34f9f 1105->1110 1106->1105 1110->1109 1118 7ff848f34d29-7ff848f34d40 1113->1118 1117->1117 1119 7ff848f3501c 1117->1119 1121 7ff848f34da2-7ff848f34db5 1118->1121 1122 7ff848f34d42-7ff848f34da0 call 7ff848f348d0 * 2 call 7ff848f348d8 1121->1122 1123 7ff848f34db7-7ff848f34db9 1121->1123 1122->1121 1125 7ff848f34e12-7ff848f34e25 1123->1125 1126 7ff848f34dbb-7ff848f34e10 call 7ff848f348d0 * 2 call 7ff848f30208 1125->1126 1127 7ff848f34e27-7ff848f34e29 1125->1127 1126->1125 1129 7ff848f34ece-7ff848f34ee1 1127->1129 1132 7ff848f34e2e-7ff848f34e60 call 7ff848f348d0 1129->1132 1133 7ff848f34ee7-7ff848f34ef0 1129->1133 1143 7ff848f34e7a-7ff848f34e7b 1132->1143 1144 7ff848f34e62-7ff848f34e78 1132->1144 1139 7ff848f34ef7-7ff848f34f0d 1133->1139 1148 7ff848f34f14-7ff848f34f25 1139->1148 1147 7ff848f34e7d-7ff848f34e9c call 7ff848f32130 1143->1147 1144->1147 1155 7ff848f34ea1-7ff848f34ec7 call 7ff848f34790 1147->1155 1157 7ff848f34ecc 1155->1157 1157->1129
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.4458653382.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff848f30000_Scan.jbxd
          Similarity
          • API ID:
          • String ID: fish$h_H
          • API String ID: 0-944816005
          • Opcode ID: 8f4fb1257fa4b8f57028e910264c6a50856a95dab8564add2ca956e159b3ee12
          • Instruction ID: d0a13561780177b0c701020a6a93c7f61432538fd962e8c05cc00149957e04ca
          • Opcode Fuzzy Hash: 8f4fb1257fa4b8f57028e910264c6a50856a95dab8564add2ca956e159b3ee12
          • Instruction Fuzzy Hash: 15023B31E0DA864FE359AB78A8151B577E0FFA6390F0441BFD08AC71D7EE18AD068385
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.4458653382.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff848f30000_Scan.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 3e031b795e7888c00cb6ac9009f3f0f047799b37601184d05fed1c829c95ee74
          • Instruction ID: 0125e4334fa607adaf52092d3f0c744f3f0d69bad0a3d1c0ca14001bd204ef18
          • Opcode Fuzzy Hash: 3e031b795e7888c00cb6ac9009f3f0f047799b37601184d05fed1c829c95ee74
          • Instruction Fuzzy Hash: 46A2133091CB4A8FE719EB28C4944A5BBE1FF95341F1445BED48AC72A6EB38E946C740
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.4458653382.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff848f30000_Scan.jbxd
          Similarity
          • API ID:
          • String ID: mZM
          • API String ID: 0-4154083876
          • Opcode ID: 6d4a0f1f4c1c55948fe542fd0737e9e84c8cfe60cad26461622147cbb55a8d78
          • Instruction ID: bf175ba3a254b07fba58e150d6f97052e5ace1dc2862b9fdd574bbf8f3643c52
          • Opcode Fuzzy Hash: 6d4a0f1f4c1c55948fe542fd0737e9e84c8cfe60cad26461622147cbb55a8d78
          • Instruction Fuzzy Hash: B5415C3250D3890FD71EAB7488521B57BE6EB82320F1582BFD086C71E7DE2868478392
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.4458653382.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff848f30000_Scan.jbxd
          Similarity
          • API ID:
          • String ID: mZM
          • API String ID: 0-4154083876
          • Opcode ID: fb6c1cb70a80bdd66df22e851e29b8161b0c641de98b03ab97bdfd4844636ae7
          • Instruction ID: 87d18200c7f19de12763284b4f8cd3518b1c8ca8ede77cc58ca4cabfee3c59bf
          • Opcode Fuzzy Hash: fb6c1cb70a80bdd66df22e851e29b8161b0c641de98b03ab97bdfd4844636ae7
          • Instruction Fuzzy Hash: 21413B3190D7891FD71EAF7488511A67FE6EB86310F1582BFD08ACB1E7DE3858468392
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.4458653382.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff848f30000_Scan.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 0a34dd43ce6e41482de63346f6088323f992809a94c2614285bdaba33acbeea0
          • Instruction ID: eb0bd3295d777a51cb4317bba44620071a93beb9b1a513ed4a99793db058b208
          • Opcode Fuzzy Hash: 0a34dd43ce6e41482de63346f6088323f992809a94c2614285bdaba33acbeea0
          • Instruction Fuzzy Hash: 42723430A1CB5A4FE359EB2884415B577E1FFA5340F1446BED48AC72E6DF28E886C781
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.4458653382.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff848f30000_Scan.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 7545d771d6e13572728b40fe7501fbf9e2773f1dcc8bdf68fab42c99a6a727a5
          • Instruction ID: cc0737bf5f17a814b142a781c9d254ab0346749b3568393320f2842758b322ea
          • Opcode Fuzzy Hash: 7545d771d6e13572728b40fe7501fbf9e2773f1dcc8bdf68fab42c99a6a727a5
          • Instruction Fuzzy Hash: 4B52B330A1CA098FDB68FB289495A7977E1FF59341F1401BEE44AC76D2DF24EC428B85
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.4458653382.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff848f30000_Scan.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: c5379bd3eefaae1342e9c15a114eaf618e48eca062696c6806fe3e06e9b9d6bd
          • Instruction ID: 8e31b62d87afef47d5a47c26e48d1296ac00eddf6a6962f9e904b85710458f06
          • Opcode Fuzzy Hash: c5379bd3eefaae1342e9c15a114eaf618e48eca062696c6806fe3e06e9b9d6bd
          • Instruction Fuzzy Hash: 30F1643190CB864FE319DB2884A51B5B7D2FF95341F1446BFD4CAC72E2EF28A8428785
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 918 7ff848f32dc0-7ff848f32e2d 924 7ff848f32e2f-7ff848f32e3f 918->924 925 7ff848f32e40-7ff848f32e9d 918->925 929 7ff848f32eba-7ff848f32eec 925->929 930 7ff848f32e9f-7ff848f32eb9 925->930 933 7ff848f32eee-7ff848f32f15 929->933 934 7ff848f32f5f-7ff848f32fc2 LoadLibraryA 929->934 930->929 933->934 939 7ff848f32f17-7ff848f32f1a 933->939 937 7ff848f32fca-7ff848f32ff6 call 7ff848f3301a 934->937 938 7ff848f32fc4 934->938 946 7ff848f32ff8-7ff848f32ffe 937->946 947 7ff848f33013-7ff848f33019 937->947 938->937 941 7ff848f32f1c-7ff848f32f2f 939->941 942 7ff848f32f54-7ff848f32f5c 939->942 944 7ff848f32f33-7ff848f32f46 941->944 945 7ff848f32f31 941->945 942->934 944->944 948 7ff848f32f48-7ff848f32f50 944->948 945->944 949 7ff848f33000 946->949 950 7ff848f33005-7ff848f33012 946->950 948->942 949->950 950->947
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.4458653382.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff848f30000_Scan.jbxd
          Similarity
          • API ID: LibraryLoad
          • String ID: $
          • API String ID: 1029625771-3993045852
          • Opcode ID: 1e7b205c1748be15e33084565695b3758b013b0400b9e3fffe6e2eb1da7f714e
          • Instruction ID: 014a2620e7faf4f202acf43666ccebaab1ec5fb2d4b6f3de3b13a091fdbd1982
          • Opcode Fuzzy Hash: 1e7b205c1748be15e33084565695b3758b013b0400b9e3fffe6e2eb1da7f714e
          • Instruction Fuzzy Hash: 7E81C23090CA4D8FEB98EF28D8567A57BE1FF59351F14427BE80DC7292CB74A8458781
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.4459305751.00007FF849000000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849000000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff849000000_Scan.jbxd
          Similarity
          • API ID:
          • String ID: A
          • API String ID: 0-3554254475
          • Opcode ID: fac0287f822eb43272a190d9cf534e993ad9d3b8b6e85088e5fdcdd0b51c6393
          • Instruction ID: 64e2e2b086f94929b2ed1291777bfb541f3a3b82492447c369a097b696dd9908
          • Opcode Fuzzy Hash: fac0287f822eb43272a190d9cf534e993ad9d3b8b6e85088e5fdcdd0b51c6393
          • Instruction Fuzzy Hash: A6620A72C0DAC64FEB66EB2498555B4BBB0FF56344F1845FAC089CB093FA28A846C751
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.4458653382.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff848f30000_Scan.jbxd
          Similarity
          • API ID: ProtectVirtual
          • String ID:
          • API String ID: 544645111-0
          • Opcode ID: 1c5f7ec304c128321b4a553cfa68231a5f0664f68328f8db52dc7bb1cf4b9bc1
          • Instruction ID: c165684e3e3d3aaa7d1aa7f5b5703e3dde58b44f565e151426215ac26caf19ee
          • Opcode Fuzzy Hash: 1c5f7ec304c128321b4a553cfa68231a5f0664f68328f8db52dc7bb1cf4b9bc1
          • Instruction Fuzzy Hash: 0031E53190CA4C9FDB18EBA8984A6F9BBE1FB55321F04426FD049C3292CB646856CB95
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.4458653382.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff848f30000_Scan.jbxd
          Similarity
          • API ID: ConsoleFree
          • String ID:
          • API String ID: 771614528-0
          • Opcode ID: 2f92f1b603840c8bed0f5acedd8eb04975eabc4a9ce049f4abe9c7a40661701e
          • Instruction ID: 8f657afa81bb30b6bbcb055cf10257250a12d13d8eaeb3e76302b08b39fd5a2b
          • Opcode Fuzzy Hash: 2f92f1b603840c8bed0f5acedd8eb04975eabc4a9ce049f4abe9c7a40661701e
          • Instruction Fuzzy Hash: D021717190CA088FEB68EF59D84A7EA7BE0EB65311F00416FD049C3592DB75A445CB51
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.4458653382.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff848f30000_Scan.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: baffe8d3a2089e7b67b94371784351bc3b486da3339cf44f604c8b8c7bc5ad57
          • Instruction ID: 256d2ba639abead19d433ef12c81364d16f698cc5293ba65a67a4dd48b3dd73e
          • Opcode Fuzzy Hash: baffe8d3a2089e7b67b94371784351bc3b486da3339cf44f604c8b8c7bc5ad57
          • Instruction Fuzzy Hash: 3F512232A0D3950FD31EAA385C550A27FA5EBA722471A82EFD0C6CF1E7E514980B8391
          Uniqueness

          Uniqueness Score: -1.00%