Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
AutoInstall.exe

Overview

General Information

Sample Name:AutoInstall.exe
Analysis ID:593200
MD5:7700a0d1b07e63f054a730fbf9156ef0
SHA1:6995f2e5f4544b3e99489364bccc56084198c61d
SHA256:99b4df04fc5236a12bcf96a4c6ec797b2555189915050d7a0a1704f4f69ab770
Tags:exe
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Writes to foreign memory regions
Allocates memory in foreign processes
May check the online IP address of the machine
PE file contains section with special chars
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Creates a DirectInput object (often for capturing keystrokes)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Sigma detected: Suspicious DNS Query for IP Lookup Service APIs
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Detected potential crypto function
PE / OLE file has an invalid certificate
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
HTTP GET or POST without a user agent
Creates a process in suspended mode (likely to inject code)
IP address seen in connection with other malware
Enables debug privileges

Classification

  • System is w10x64
  • AutoInstall.exe (PID: 6564 cmdline: "C:\Users\user\Desktop\AutoInstall.exe" MD5: 7700A0D1B07E63F054A730FBF9156EF0)
    • conhost.exe (PID: 4876 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • AppLaunch.exe (PID: 64 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe MD5: 6807F903AC06FF7E1670181378690B22)
  • cleanup
No configs have been found
No yara matches

There are no malicious signatures, click here to show all signatures.

Source: DNS queryAuthor: Brandon George (blog post), Thomas Patzke (rule): Data: Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe, QueryName: ip-api.com

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: AutoInstall.exeVirustotal: Detection: 36%Perma Link
Source: AutoInstall.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
Source: Binary string: C:\projects\dotnetzip-semverd\src\Zip\obj\Release\DotNetZip.pdb source: AutoInstall.exe, 00000001.00000002.372821359.000000000010E000.00000004.00000010.00020000.00000000.sdmp, AutoInstall.exe, 00000001.00000003.372170576.00000000024B2000.00000040.00001000.00020000.00000000.sdmp, AppLaunch.exe, 00000003.00000002.640288132.0000000000402000.00000020.00000400.00020000.00000000.sdmp

Networking

barindex
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeDNS query: name: ip-api.com
Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
Source: AutoInstall.exeString found in binary or memory: http://aia.entrust.net/ts1-chain256.cer01
Source: AutoInstall.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: AutoInstall.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
Source: AutoInstall.exeString found in binary or memory: http://crl.entrust.net/2048ca.crl0
Source: AutoInstall.exeString found in binary or memory: http://crl.entrust.net/ts1ca.crl0
Source: AutoInstall.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
Source: AutoInstall.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
Source: AutoInstall.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: AutoInstall.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
Source: AppLaunch.exe, 00000003.00000002.641034119.0000000007116000.00000004.00000800.00020000.00000000.sdmp, AppLaunch.exe, 00000003.00000002.641051378.0000000007127000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
Source: AppLaunch.exe, 00000003.00000002.641034119.0000000007116000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
Source: AppLaunch.exe, 00000003.00000002.641034119.0000000007116000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com4
Source: AutoInstall.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: AutoInstall.exeString found in binary or memory: http://ocsp.digicert.com0N
Source: AutoInstall.exeString found in binary or memory: http://ocsp.entrust.net02
Source: AutoInstall.exeString found in binary or memory: http://ocsp.entrust.net03
Source: AppLaunch.exe, 00000003.00000002.641034119.0000000007116000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: AppLaunch.exe, 00000003.00000002.640288132.0000000000402000.00000020.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.codeplex.com/DotNetZip
Source: AutoInstall.exeString found in binary or memory: http://www.digicert.com/CPS0
Source: AutoInstall.exeString found in binary or memory: http://www.entrust.net/rpa0
Source: AutoInstall.exeString found in binary or memory: http://www.entrust.net/rpa03
Source: AutoInstall.exeString found in binary or memory: https://www.digicert.com/CPS0
Source: unknownDNS traffic detected: queries for: ip-api.com
Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
Source: AutoInstall.exe, 00000001.00000002.379164276.0000000000B1A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

System Summary

barindex
Source: AutoInstall.exeStatic PE information: section name: .pyX$d
Source: AutoInstall.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
Source: AutoInstall.exe, 00000001.00000002.372821359.000000000010E000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZip.dll@ vs AutoInstall.exe
Source: AutoInstall.exe, 00000001.00000002.372821359.000000000010E000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePennyWise.exe4 vs AutoInstall.exe
Source: AutoInstall.exe, 00000001.00000003.372170576.00000000024B2000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZip.dll@ vs AutoInstall.exe
Source: AutoInstall.exe, 00000001.00000003.372170576.00000000024B2000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePennyWise.exe4 vs AutoInstall.exe
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 3_2_055D14783_2_055D1478
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 3_2_055D1DA03_2_055D1DA0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 3_2_055DBF803_2_055DBF80
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 3_2_055DDEE03_2_055DDEE0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 3_2_055DC8503_2_055DC850
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 3_2_055D08603_2_055D0860
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 3_2_055D0B403_2_055D0B40
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 3_2_055D156F3_2_055D156F
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 3_2_055D20D83_2_055D20D8
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 3_2_055DBC383_2_055DBC38
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 3_2_055D1E513_2_055D1E51
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 3_2_055D0B7A3_2_055D0B7A
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 3_2_055D0B303_2_055D0B30
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 3_2_09D76E503_2_09D76E50
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 3_2_09D76E403_2_09D76E40
Source: AutoInstall.exeStatic PE information: invalid certificate
Source: AutoInstall.exeVirustotal: Detection: 36%
Source: C:\Users\user\Desktop\AutoInstall.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\AutoInstall.exe "C:\Users\user\Desktop\AutoInstall.exe"
Source: C:\Users\user\Desktop\AutoInstall.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\AutoInstall.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
Source: C:\Users\user\Desktop\AutoInstall.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeMutant created: \Sessions\1\BaseNamedObjects\9D16FBEF0D8A8F87529DE06A1C43C737
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4876:120:WilError_01
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeFile created: C:\Users\user\AppData\Local\8d96007aa6619f065c7ec2509ce5f96dJump to behavior
Source: classification engineClassification label: mal76.troj.evad.winEXE@4/0@1/1
Source: 1.3.AutoInstall.exe.24b0000.0.unpack, u000fu2001.csCryptographic APIs: 'CreateDecryptor'
Source: 3.2.AppLaunch.exe.400000.0.unpack, u000fu2001.csCryptographic APIs: 'CreateDecryptor'
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: AutoInstall.exeStatic file information: File size 4344320 > 1048576
Source: AutoInstall.exeStatic PE information: Raw size of .iXgHkK is bigger than: 0x100000 < 0x3eae00
Source: Binary string: C:\projects\dotnetzip-semverd\src\Zip\obj\Release\DotNetZip.pdb source: AutoInstall.exe, 00000001.00000002.372821359.000000000010E000.00000004.00000010.00020000.00000000.sdmp, AutoInstall.exe, 00000001.00000003.372170576.00000000024B2000.00000040.00001000.00020000.00000000.sdmp, AppLaunch.exe, 00000003.00000002.640288132.0000000000402000.00000020.00000400.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: 1.3.AutoInstall.exe.24b0000.0.unpack, u0003u2001.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 3.2.AppLaunch.exe.400000.0.unpack, u0003u2001.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 3_2_055D63F2 push D800035Eh; ret 3_2_055D6421
Source: AutoInstall.exeStatic PE information: section name: .iXgHkK
Source: AutoInstall.exeStatic PE information: section name: .pyX$d
Source: initial sampleStatic PE information: section name: .pyX$d entropy: 7.40228735958
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\AutoInstall.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe base: 400000Jump to behavior
Source: C:\Users\user\Desktop\AutoInstall.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe base: F65008Jump to behavior
Source: C:\Users\user\Desktop\AutoInstall.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe base: 400000 protect: page execute and read and writeJump to behavior
Source: C:\Users\user\Desktop\AutoInstall.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Users\user\Desktop\AutoInstall.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe VolumeInformationJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: C:\Users\user\Desktop\AutoInstall.exeCode function: 1_2_00409C7C GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,1_2_00409C7C
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts111
Windows Management Instrumentation
Path Interception311
Process Injection
1
Masquerading
1
Input Capture
1
System Time Discovery
Remote Services1
Input Capture
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts11
Virtualization/Sandbox Evasion
LSASS Memory11
Security Software Discovery
Remote Desktop Protocol11
Archive Collected Data
Exfiltration Over Bluetooth1
Ingress Tool Transfer
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Disable or Modify Tools
Security Account Manager1
Query Registry
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
Non-Application Layer Protocol
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)311
Process Injection
NTDS11
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput CaptureScheduled Transfer2
Application Layer Protocol
SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
Deobfuscate/Decode Files or Information
LSA Secrets1
Remote System Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.common2
Obfuscated Files or Information
Cached Domain Credentials1
System Network Configuration Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup Items11
Software Packing
DCSync14
System Information Discovery
Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
AutoInstall.exe37%VirustotalBrowse
No Antivirus matches
SourceDetectionScannerLabelLinkDownload
1.3.AutoInstall.exe.24b0000.0.unpack100%AviraHEUR/AGEN.1203048Download File
3.2.AppLaunch.exe.400000.0.unpack100%AviraHEUR/AGEN.1203048Download File
No Antivirus matches
SourceDetectionScannerLabelLink
http://ocsp.entrust.net030%URL Reputationsafe
http://ocsp.entrust.net020%URL Reputationsafe
http://ip-api.com40%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
ip-api.com
208.95.112.1
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    http://ip-api.com/line/?fields=hostingfalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://aia.entrust.net/ts1-chain256.cer01AutoInstall.exefalse
        high
        http://www.codeplex.com/DotNetZipAppLaunch.exe, 00000003.00000002.640288132.0000000000402000.00000020.00000400.00020000.00000000.sdmpfalse
          high
          http://crl.entrust.net/ts1ca.crl0AutoInstall.exefalse
            high
            http://ocsp.entrust.net03AutoInstall.exefalse
            • URL Reputation: safe
            unknown
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameAppLaunch.exe, 00000003.00000002.641034119.0000000007116000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.entrust.net/rpa0AutoInstall.exefalse
                high
                http://ocsp.entrust.net02AutoInstall.exefalse
                • URL Reputation: safe
                unknown
                http://www.entrust.net/rpa03AutoInstall.exefalse
                  high
                  http://crl.entrust.net/2048ca.crl0AutoInstall.exefalse
                    high
                    http://ip-api.comAppLaunch.exe, 00000003.00000002.641034119.0000000007116000.00000004.00000800.00020000.00000000.sdmp, AppLaunch.exe, 00000003.00000002.641051378.0000000007127000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://ip-api.com4AppLaunch.exe, 00000003.00000002.641034119.0000000007116000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      208.95.112.1
                      ip-api.comUnited States
                      53334TUT-ASUSfalse
                      Joe Sandbox Version:34.0.0 Boulder Opal
                      Analysis ID:593200
                      Start date and time:2022-03-21 12:17:49 +01:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 8m 15s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Sample file name:AutoInstall.exe
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:20
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal76.troj.evad.winEXE@4/0@1/1
                      EGA Information:
                      • Successful, ratio: 50%
                      HDC Information:Failed
                      HCA Information:
                      • Successful, ratio: 72%
                      • Number of executed functions: 22
                      • Number of non-executed functions: 5
                      Cookbook Comments:
                      • Adjust boot time
                      • Enable AMSI
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                      • Excluded IPs from analysis (whitelisted): 23.211.6.115
                      • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, sls.update.microsoft.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                      • Execution Graph export aborted for target AutoInstall.exe, PID 6564 because there are no executed function
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      No simulations
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      208.95.112.1Votrerelev#U00e9fiscal.vbsGet hashmaliciousBrowse
                      • ip-api.com/json/
                      RE32GGHQRv.exeGet hashmaliciousBrowse
                      • ip-api.com/json/
                      Dep_08643.msiGet hashmaliciousBrowse
                      • ip-api.com/json/
                      postbank.apkGet hashmaliciousBrowse
                      • www.ip-api.com/json
                      postbank.apkGet hashmaliciousBrowse
                      • www.ip-api.com/json
                      postbank.apkGet hashmaliciousBrowse
                      • www.ip-api.com/json
                      postbank.apkGet hashmaliciousBrowse
                      • www.ip-api.com/json
                      postbank.apkGet hashmaliciousBrowse
                      • www.ip-api.com/json
                      postbank.apkGet hashmaliciousBrowse
                      • www.ip-api.com/json
                      postbank.apkGet hashmaliciousBrowse
                      • www.ip-api.com/json
                      postbank.apkGet hashmaliciousBrowse
                      • www.ip-api.com/json
                      OyLImUdEwH.exeGet hashmaliciousBrowse
                      • ip-api.com/json/
                      PUPrfS3p8A.exeGet hashmaliciousBrowse
                      • ip-api.com/json/
                      X6vZL6Tj7s.exeGet hashmaliciousBrowse
                      • ip-api.com/json/
                      dDbTUabIt8.exeGet hashmaliciousBrowse
                      • ip-api.com/json/
                      HKoLuz7ekJ.exeGet hashmaliciousBrowse
                      • ip-api.com/json/
                      yLuLadKu7U.exeGet hashmaliciousBrowse
                      • ip-api.com/json/
                      XmNlGswk9G.exeGet hashmaliciousBrowse
                      • ip-api.com/json/
                      IRjzcACEyl.exeGet hashmaliciousBrowse
                      • ip-api.com/json/
                      postbank.apkGet hashmaliciousBrowse
                      • www.ip-api.com/json
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      ip-api.comVotrerelev#U00e9fiscal.vbsGet hashmaliciousBrowse
                      • 208.95.112.1
                      RE32GGHQRv.exeGet hashmaliciousBrowse
                      • 208.95.112.1
                      Dep_08643.msiGet hashmaliciousBrowse
                      • 208.95.112.1
                      OyLImUdEwH.exeGet hashmaliciousBrowse
                      • 208.95.112.1
                      PUPrfS3p8A.exeGet hashmaliciousBrowse
                      • 208.95.112.1
                      X6vZL6Tj7s.exeGet hashmaliciousBrowse
                      • 208.95.112.1
                      dDbTUabIt8.exeGet hashmaliciousBrowse
                      • 208.95.112.1
                      HKoLuz7ekJ.exeGet hashmaliciousBrowse
                      • 208.95.112.1
                      yLuLadKu7U.exeGet hashmaliciousBrowse
                      • 208.95.112.1
                      XmNlGswk9G.exeGet hashmaliciousBrowse
                      • 208.95.112.1
                      IRjzcACEyl.exeGet hashmaliciousBrowse
                      • 208.95.112.1
                      nNDkOcUjO5.exeGet hashmaliciousBrowse
                      • 208.95.112.1
                      zggoXCqQwb.exeGet hashmaliciousBrowse
                      • 208.95.112.1
                      zggoXCqQwb.exeGet hashmaliciousBrowse
                      • 208.95.112.1
                      buNv7CAzE2.exeGet hashmaliciousBrowse
                      • 208.95.112.1
                      d764.exeGet hashmaliciousBrowse
                      • 208.95.112.1
                      ZYtIZq9FwF.exeGet hashmaliciousBrowse
                      • 208.95.112.1
                      ZYtIZq9FwF.exeGet hashmaliciousBrowse
                      • 208.95.112.1
                      TuKQGeAi2w.exeGet hashmaliciousBrowse
                      • 208.95.112.1
                      4618FB57958C19496E668916D769CB40E6BB0A0AF0FBB.exeGet hashmaliciousBrowse
                      • 208.95.112.1
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      TUT-ASUSVotrerelev#U00e9fiscal.vbsGet hashmaliciousBrowse
                      • 208.95.112.1
                      RE32GGHQRv.exeGet hashmaliciousBrowse
                      • 208.95.112.1
                      Dep_08643.msiGet hashmaliciousBrowse
                      • 208.95.112.1
                      postbank.apkGet hashmaliciousBrowse
                      • 208.95.112.1
                      postbank.apkGet hashmaliciousBrowse
                      • 208.95.112.1
                      postbank.apkGet hashmaliciousBrowse
                      • 208.95.112.1
                      postbank.apkGet hashmaliciousBrowse
                      • 208.95.112.1
                      postbank.apkGet hashmaliciousBrowse
                      • 208.95.112.1
                      postbank.apkGet hashmaliciousBrowse
                      • 208.95.112.1
                      postbank.apkGet hashmaliciousBrowse
                      • 208.95.112.1
                      postbank.apkGet hashmaliciousBrowse
                      • 208.95.112.1
                      OyLImUdEwH.exeGet hashmaliciousBrowse
                      • 208.95.112.1
                      PUPrfS3p8A.exeGet hashmaliciousBrowse
                      • 208.95.112.1
                      X6vZL6Tj7s.exeGet hashmaliciousBrowse
                      • 208.95.112.1
                      dDbTUabIt8.exeGet hashmaliciousBrowse
                      • 208.95.112.1
                      HKoLuz7ekJ.exeGet hashmaliciousBrowse
                      • 208.95.112.1
                      yLuLadKu7U.exeGet hashmaliciousBrowse
                      • 208.95.112.1
                      XmNlGswk9G.exeGet hashmaliciousBrowse
                      • 208.95.112.1
                      IRjzcACEyl.exeGet hashmaliciousBrowse
                      • 208.95.112.1
                      nNDkOcUjO5.exeGet hashmaliciousBrowse
                      • 208.95.112.1
                      No context
                      No context
                      No created / dropped files found
                      File type:PE32 executable (console) Intel 80386, for MS Windows
                      Entropy (8bit):5.8762873630378625
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.94%
                      • Win16/32 Executable Delphi generic (2074/23) 0.02%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:AutoInstall.exe
                      File size:4344320
                      MD5:7700a0d1b07e63f054a730fbf9156ef0
                      SHA1:6995f2e5f4544b3e99489364bccc56084198c61d
                      SHA256:99b4df04fc5236a12bcf96a4c6ec797b2555189915050d7a0a1704f4f69ab770
                      SHA512:9d063f2e37a35e20a322a4ab2be24884a245a40c4924b618a83f69515a62b15a954393717961f79c77945f2b692ea5d26d829153a8ece04c4ff774a48dc8607e
                      SSDEEP:98304:IDWrdQJJ6qOobDtlLCSvKBXRAtiX2CVQmYRx6uiNnA9gEEtwPpAK3q2M:D6KPktlvIAtSNn6gFtYrzM
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....b8b..................@..<......;.........A...@..........................0B............................................
                      Icon Hash:00828e8e8686b000
                      Entrypoint:0x40953b
                      Entrypoint Section:.text
                      Digitally signed:true
                      Imagebase:0x400000
                      Subsystem:windows cui
                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
                      DLL Characteristics:TERMINAL_SERVER_AWARE, NX_COMPAT
                      Time Stamp:0x6238628B [Mon Mar 21 11:33:31 2022 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:99c2cae0b7316add27de679470515124
                      Signature Valid:false
                      Signature Issuer:CN=DigiCert SHA2 Assured ID Code Signing CA, OU=www.digicert.com, O=DigiCert Inc, C=US
                      Signature Validation Error:The digital signature of the object did not verify
                      Error Number:-2146869232
                      Not Before, Not After
                      • 4/13/2021 5:00:00 PM 4/16/2024 4:59:59 PM
                      Subject Chain
                      • CN=Nvidia Corporation, OU=IT-MIS, O=Nvidia Corporation, L=Santa Clara, S=California, C=US
                      Version:3
                      Thumbprint MD5:991A62097E637843EA62029BF4E829BC
                      Thumbprint SHA-1:F518FAD5DEC9E0500DA1C1598C4B0FFC0268B2D0
                      Thumbprint SHA-256:A4870BB5FEB7028CCB0E50936E9138F528FF3CCD001D44C7D268A69685455FE8
                      Serial:0266ADFA176389D9B4301AC87EFD6A96
                      Instruction
                      call 00007F5E64D0882Eh
                      jmp 00007F5E64D07F19h
                      push ebp
                      mov ebp, esp
                      mov eax, dword ptr [ebp+08h]
                      push esi
                      mov ecx, dword ptr [eax+3Ch]
                      add ecx, eax
                      movzx eax, word ptr [ecx+14h]
                      lea edx, dword ptr [ecx+18h]
                      add edx, eax
                      movzx eax, word ptr [ecx+06h]
                      imul esi, eax, 28h
                      add esi, edx
                      cmp edx, esi
                      je 00007F5E64D080BBh
                      mov ecx, dword ptr [ebp+0Ch]
                      cmp ecx, dword ptr [edx+0Ch]
                      jc 00007F5E64D080ACh
                      mov eax, dword ptr [edx+08h]
                      add eax, dword ptr [edx+0Ch]
                      cmp ecx, eax
                      jc 00007F5E64D080AEh
                      add edx, 28h
                      cmp edx, esi
                      jne 00007F5E64D0808Ch
                      xor eax, eax
                      pop esi
                      pop ebp
                      ret
                      mov eax, edx
                      jmp 00007F5E64D0809Bh
                      push esi
                      call 00007F5E64D08B0Bh
                      test eax, eax
                      je 00007F5E64D080C2h
                      mov eax, dword ptr fs:[00000018h]
                      mov esi, 008211E4h
                      mov edx, dword ptr [eax+04h]
                      jmp 00007F5E64D080A6h
                      cmp edx, eax
                      je 00007F5E64D080B2h
                      xor eax, eax
                      mov ecx, edx
                      lock cmpxchg dword ptr [esi], ecx
                      test eax, eax
                      jne 00007F5E64D08092h
                      xor al, al
                      pop esi
                      ret
                      mov al, 01h
                      pop esi
                      ret
                      push ebp
                      mov ebp, esp
                      cmp dword ptr [ebp+08h], 00000000h
                      jne 00007F5E64D080A9h
                      mov byte ptr [008211E8h], 00000001h
                      call 00007F5E64D08580h
                      call 00007F5E64D0A8FEh
                      test al, al
                      jne 00007F5E64D080A6h
                      xor al, al
                      pop ebp
                      ret
                      call 00007F5E64D1386Eh
                      test al, al
                      jne 00007F5E64D080ACh
                      push 00000000h
                      call 00007F5E64D0A905h
                      pop ecx
                      jmp 00007F5E64D0808Bh
                      mov al, 01h
                      pop ebp
                      ret
                      push ebp
                      mov ebp, esp
                      cmp byte ptr [008211E9h], 00000000h
                      je 00007F5E64D080A6h
                      mov al, 01h
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x41f12c0x3c.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x4228000x2200
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x41ced80x40.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x4100000x154.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x23fe50x24000False0.55852593316data6.58598139573IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      .iXgHkK0x250000x3eac390x3eae00unknownunknownunknownunknownIMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      .rdata0x4100000xf8d80xfa00False0.546984375data5.65055331195IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x4200000x1ce80x1000False0.18994140625data3.03654885505IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                      .pyX$d0x4220000x9100xa00False0.881640625data7.40228735958IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      DLLImport
                      USER32.dllGetSysColorBrush, MessageBeep, MessageBoxA, GetSystemMetrics, SendNotifyMessageA
                      KERNEL32.dllTlsSetValue, CreateFileW, HeapSize, GetProcessHeap, SetStdHandle, SetEnvironmentVariableW, GetLastError, GetCurrentProcessId, GetCurrentThreadId, GetModuleHandleA, GetProcAddress, MultiByteToWideChar, FreeConsole, GetConsoleWindow, WideCharToMultiByte, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, EncodePointer, DecodePointer, LCMapStringEx, GetStringTypeW, GetCPInfo, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, FreeEnvironmentStringsW, RaiseException, RtlUnwind, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, WriteConsoleW, TlsFree, FreeLibrary, LoadLibraryExW, GetStdHandle, WriteFile, GetModuleFileNameW, ExitProcess, GetModuleHandleExW, GetCommandLineA, GetCommandLineW, HeapAlloc, HeapFree, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetFileType, CloseHandle, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, ReadFile, GetFileSizeEx, SetFilePointerEx, ReadConsoleW, HeapReAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW
                      TimestampSource PortDest PortSource IPDest IP
                      Mar 21, 2022 13:19:19.080195904 CET4977580192.168.2.6208.95.112.1
                      Mar 21, 2022 13:19:19.109673977 CET8049775208.95.112.1192.168.2.6
                      Mar 21, 2022 13:19:19.109812975 CET4977580192.168.2.6208.95.112.1
                      Mar 21, 2022 13:19:19.119479895 CET4977580192.168.2.6208.95.112.1
                      Mar 21, 2022 13:19:19.149487019 CET8049775208.95.112.1192.168.2.6
                      Mar 21, 2022 13:19:19.292432070 CET4977580192.168.2.6208.95.112.1
                      Mar 21, 2022 13:19:58.370439053 CET8049775208.95.112.1192.168.2.6
                      TimestampSource PortDest PortSource IPDest IP
                      Mar 21, 2022 13:19:18.970336914 CET5285853192.168.2.68.8.8.8
                      Mar 21, 2022 13:19:18.989157915 CET53528588.8.8.8192.168.2.6
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                      Mar 21, 2022 13:19:18.970336914 CET192.168.2.68.8.8.80x45cdStandard query (0)ip-api.comA (IP address)IN (0x0001)
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                      Mar 21, 2022 13:19:18.989157915 CET8.8.8.8192.168.2.60x45cdNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)
                      • ip-api.com
                      Session IDSource IPSource PortDestination IPDestination PortProcess
                      0192.168.2.649775208.95.112.180C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      TimestampkBytes transferredDirectionData
                      Mar 21, 2022 13:19:19.119479895 CET1097OUTGET /line/?fields=hosting HTTP/1.1
                      Host: ip-api.com
                      Connection: Keep-Alive
                      Mar 21, 2022 13:19:19.149487019 CET1097INHTTP/1.1 200 OK
                      Date: Mon, 21 Mar 2022 12:19:18 GMT
                      Content-Type: text/plain; charset=utf-8
                      Content-Length: 5
                      Access-Control-Allow-Origin: *
                      X-Ttl: 60
                      X-Rl: 44
                      Data Raw: 74 72 75 65 0a
                      Data Ascii: true


                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:1
                      Start time:13:18:59
                      Start date:21/03/2022
                      Path:C:\Users\user\Desktop\AutoInstall.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\AutoInstall.exe"
                      Imagebase:0x400000
                      File size:4344320 bytes
                      MD5 hash:7700A0D1B07E63F054A730FBF9156EF0
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low

                      Target ID:2
                      Start time:13:19:00
                      Start date:21/03/2022
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff6406f0000
                      File size:625664 bytes
                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      Target ID:3
                      Start time:13:19:02
                      Start date:21/03/2022
                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      Imagebase:0x1050000
                      File size:98912 bytes
                      MD5 hash:6807F903AC06FF7E1670181378690B22
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:.Net C# or VB.NET
                      Reputation:high

                      Reset < >

                        Execution Graph

                        Execution Coverage:13.5%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:80
                        Total number of Limit Nodes:3
                        execution_graph 18397 9d70910 18398 9d70919 18397->18398 18399 9d709a1 18398->18399 18401 9d70c21 18398->18401 18402 9d70c3f 18401->18402 18406 9d74f29 18402->18406 18415 9d74f38 18402->18415 18403 9d70ca0 18403->18399 18408 9d74f9b 18406->18408 18407 9d7514f 18441 9d74e88 18407->18441 18410 9d7517d 18408->18410 18424 9d75c97 18408->18424 18429 9d75ca8 18408->18429 18433 9d75c70 18408->18433 18437 9d75c80 18408->18437 18410->18403 18417 9d74f9b 18415->18417 18416 9d7514f 18418 9d74e88 MessageBoxW 18416->18418 18419 9d7517d 18417->18419 18420 9d75c97 DuplicateHandle 18417->18420 18421 9d75c80 2 API calls 18417->18421 18422 9d75c70 2 API calls 18417->18422 18423 9d75ca8 DuplicateHandle 18417->18423 18418->18419 18419->18403 18420->18416 18421->18416 18422->18416 18423->18416 18426 9d75cac 18424->18426 18428 9d75cf4 18424->18428 18425 9d75cd5 18425->18407 18426->18425 18445 9d7589c 18426->18445 18428->18407 18430 9d75cb8 18429->18430 18431 9d75cd5 18430->18431 18432 9d7589c DuplicateHandle 18430->18432 18431->18407 18432->18431 18434 9d75c89 18433->18434 18459 9d7588c 18434->18459 18438 9d75c89 18437->18438 18439 9d7588c 2 API calls 18438->18439 18440 9d75c94 18439->18440 18440->18407 18442 9d77ff0 MessageBoxW 18441->18442 18444 9d7807c 18442->18444 18444->18410 18446 9d758a7 18445->18446 18450 9d75f18 18446->18450 18453 9d75f08 18446->18453 18447 9d75e6d 18447->18425 18456 9d7592c 18450->18456 18454 9d75f46 18453->18454 18455 9d7592c DuplicateHandle 18453->18455 18454->18447 18455->18454 18457 9d75f80 DuplicateHandle 18456->18457 18458 9d75f46 18457->18458 18458->18447 18460 9d75897 18459->18460 18461 9d76962 18460->18461 18463 9d766ac 18460->18463 18465 9d766b7 18463->18465 18464 9d76a41 18464->18461 18465->18464 18466 9d75ca8 DuplicateHandle 18465->18466 18467 9d76a5b 18466->18467 18470 9d76794 18467->18470 18469 9d76a64 18471 9d7679f 18470->18471 18472 9d76d7b 18471->18472 18474 9d767b0 18471->18474 18472->18469 18475 9d76db0 OleInitialize 18474->18475 18476 9d76e14 18475->18476 18476->18472 18477 9d7699f 18480 9d766bc 18477->18480 18481 9d766c7 18480->18481 18485 9d77b61 18481->18485 18489 9d77b70 18481->18489 18482 9d769ac 18486 9d77bbf 18485->18486 18493 9d7681c 18486->18493 18490 9d77bbf 18489->18490 18491 9d7681c EnumThreadWindows 18490->18491 18492 9d77c40 18491->18492 18492->18482 18494 9d77c60 EnumThreadWindows 18493->18494 18496 9d77c40 18494->18496 18496->18482 18497 55d7d70 18498 55d7d8e 18497->18498 18501 55d794c 18498->18501 18500 55d7dc5 18503 55d9890 LoadLibraryA 18501->18503 18504 55d9989 18503->18504

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 115 55d1478-55d14e2 116 55d14e8-55d1518 115->116 117 55d195a-55d1987 115->117 116->117 118 55d151e-55d152c 116->118 125 55d1989-55d1991 117->125 126 55d19a1-55d19c7 117->126 118->117 119 55d1532-55d1547 118->119 121 55d15f8-55d15fb 119->121 123 55d1601-55d1628 121->123 124 55d1570-55d1576 121->124 129 55d168c-55d1693 123->129 130 55d162a-55d162f 123->130 127 55d1578-55d159e 124->127 128 55d15a4-55d15c3 124->128 125->126 133 55d1993-55d19a0 125->133 147 55d19c9-55d19d9 126->147 148 55d1a06-55d1a1e 126->148 127->128 128->117 134 55d15c9-55d15ea 128->134 131 55d1695-55d169e 129->131 132 55d16a3-55d16ad 129->132 130->129 135 55d1631-55d163f 130->135 136 55d1722-55d1729 131->136 132->117 138 55d16b3-55d16c1 132->138 134->117 139 55d15f0-55d15f7 134->139 135->117 140 55d1645-55d1660 135->140 141 55d177b-55d179b 136->141 142 55d172b-55d1736 136->142 138->117 144 55d16c7-55d16da 138->144 139->121 140->117 145 55d1666-55d167c 140->145 168 55d179e-55d17dd 141->168 142->141 146 55d1738-55d174a 142->146 144->117 149 55d16e0-55d16f3 144->149 145->117 150 55d1682-55d168a 145->150 156 55d176d-55d1779 146->156 157 55d174c-55d174f 146->157 158 55d19db-55d19ee 147->158 159 55d19f5-55d19fc 147->159 161 55d1a3a-55d1a3e 148->161 162 55d1a20-55d1a33 148->162 149->117 151 55d16f9-55d1717 149->151 150->129 150->135 151->136 156->168 157->117 167 55d1755-55d175d 157->167 158->159 164 55d19fe-55d1a05 159->164 165 55d1a45-55d1ab2 159->165 161->148 166 55d1a40-55d1a44 161->166 162->161 167->117 169 55d1763-55d176b 167->169 172 55d186a-55d187d 168->172 173 55d17e3-55d1867 168->173 169->156 169->157 176 55d1938-55d1942 172->176 177 55d1883-55d18a7 172->177 173->172 187 55d18ae-55d18bd 177->187 187->176 188 55d18bf-55d18d6 187->188 190 55d18dd-55d192b 188->190 191 55d18d8 188->191 196 55d192d 190->196 197 55d1935-55d1936 190->197 191->190 196->197 197->176
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.640922867.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_55d0000_AppLaunch.jbxd
                        Similarity
                        • API ID:
                        • String ID: ,Lyl
                        • API String ID: 0-148460786
                        • Opcode ID: a954b1494ab577acae299ce882b2ff7946abc212f0395969c46d1e28016bf2fa
                        • Instruction ID: 3a9e40badcd3e4098c4225e6ba43d897b195b890e5d455034234a13ebaece6b5
                        • Opcode Fuzzy Hash: a954b1494ab577acae299ce882b2ff7946abc212f0395969c46d1e28016bf2fa
                        • Instruction Fuzzy Hash: 45F17F31E045298FDB24CB68C890AACFBF2FF85305F19C1A9D059AB256D734AD85CF64
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 238 55ddee0-55ddefb 239 55de12d-55de155 238->239 240 55ddf01-55ddf08 238->240 254 55de15c-55de274 239->254 241 55ddf0a-55ddf13 240->241 242 55ddf14-55ddf33 240->242 243 55ddf39-55ddf5a 242->243 244 55de120-55de12c 242->244 246 55ddf5c-55ddf60 243->246 247 55ddf62-55ddf90 243->247 246->247 248 55ddf92 246->248 251 55ddf95-55de01b call 55dd118 247->251 248->251 311 55de01d call 55de2ba 251->311 312 55de01d call 55d5956 251->312 313 55de01d call 55dded0 251->313 314 55de01d call 55ddee0 251->314 289 55de27d-55de2c8 254->289 290 55de276-55de27c 254->290 266 55de023-55de031 call 55dd628 271 55de090-55de094 266->271 272 55de033-55de035 266->272 274 55de0d7-55de0de 271->274 275 55de096-55de0a3 271->275 276 55de079-55de088 272->276 277 55de0e0-55de0e7 274->277 278 55de0f2-55de0f6 274->278 280 55de0a5-55de0aa 275->280 281 55de0b7-55de0c9 275->281 276->271 279 55de08a 276->279 277->278 283 55de0e9 277->283 286 55de118-55de11d 278->286 287 55de0f8-55de0ff 278->287 284 55de08c-55de08e 279->284 285 55de037-55de043 279->285 280->281 288 55de0ac-55de0b5 280->288 281->286 295 55de0cb-55de0d5 281->295 283->278 284->271 284->285 285->254 292 55de049-55de078 285->292 286->244 287->286 291 55de101-55de117 287->291 288->286 304 55de2ca 289->304 305 55de2d2-55de2d6 289->305 290->289 292->276 295->286 304->305 306 55de2d8-55de2e4 305->306 307 55de2f2 305->307 308 55de2ec 306->308 309 55de2e6-55de2e9 306->309 310 55de2f3 307->310 308->307 309->308 310->310 311->266 312->266 313->266 314->266
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.640922867.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_55d0000_AppLaunch.jbxd
                        Similarity
                        • API ID:
                        • String ID: <yl
                        • API String ID: 0-385778458
                        • Opcode ID: b6ff50495b411cd00fd379017ed3bcca0990993f96b13e5e1d7462efbefc56c6
                        • Instruction ID: 8b71ef8e59c0d78c58d50bca36b86e4a795e285b91c65609acd235293ba6c4fc
                        • Opcode Fuzzy Hash: b6ff50495b411cd00fd379017ed3bcca0990993f96b13e5e1d7462efbefc56c6
                        • Instruction Fuzzy Hash: D2D15E71E002098FCB14DFA8C885AAEFBF6FF88314F15855AD515AB351DB34A946CBA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1603 55d1da0-55d1de2 1607 55d1ded-55d1df8 1603->1607 1608 55d1de4-55d1deb call 55d1cd0 1603->1608 1608->1607 1611 55d1df9-55d1e0f 1608->1611 1613 55d1e17-55d1e1f 1611->1613 1614 55d1e25-55d1e7a 1613->1614 1615 55d2081-55d209a 1613->1615 1624 55d1e7c-55d1e83 1614->1624 1625 55d1e8b-55d1e90 1614->1625 1616 55d20a1-55d20a9 1615->1616 1620 55d20aa 1616->1620 1620->1620 1624->1625 1626 55d1e9a-55d1e9c 1625->1626 1627 55d1e92-55d1e96 1625->1627 1628 55d1eaf-55d1f95 1626->1628 1629 55d1e9e-55d1ea7 1626->1629 1627->1626 1631 55d1e98 1627->1631 1646 55d202d-55d207c call 55d1b70 1628->1646 1647 55d1f9b-55d1fa1 1628->1647 1629->1628 1631->1626 1646->1615 1648 55d1fb0-55d1fb9 1647->1648 1649 55d1fa3-55d1fa8 1647->1649 1651 55d209c 1648->1651 1652 55d1fbf-55d1ffa 1648->1652 1649->1648 1651->1616 1653 55d1ffc-55d2001 1652->1653 1654 55d2009-55d2012 1652->1654 1653->1654 1654->1651 1655 55d2018-55d2027 1654->1655 1655->1646 1655->1647
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.640922867.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_55d0000_AppLaunch.jbxd
                        Similarity
                        • API ID:
                        • String ID: `xl
                        • API String ID: 0-952570869
                        • Opcode ID: 3abc697cd6708ee37344f523b72f826fa15f45a1151314a02a3d4481910693fb
                        • Instruction ID: 30df36133b79a88817b7ea1e311ca83fa3e1755fcb08d4456baf30b2d384df5e
                        • Opcode Fuzzy Hash: 3abc697cd6708ee37344f523b72f826fa15f45a1151314a02a3d4481910693fb
                        • Instruction Fuzzy Hash: 15817C36F105249FD714DB69CC84AAEB7E3BFC8614F1A8564E40ADB765DB30AC01CB90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000003.00000002.640922867.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_55d0000_AppLaunch.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8eb34b43a434cfe48ea7ff7c952bd20c6b0ab70c0e1ef3870a4a0bab3b458964
                        • Instruction ID: c20ec78b1e5fee22afcc8b04839b914ea0c83bb1df0c534b46fedc0b989cf0a3
                        • Opcode Fuzzy Hash: 8eb34b43a434cfe48ea7ff7c952bd20c6b0ab70c0e1ef3870a4a0bab3b458964
                        • Instruction Fuzzy Hash: 1332AE35A006298FDB24CF69D885AADB7F2FF88304F15C569E009EB355DB34A941CFA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000003.00000002.640922867.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_55d0000_AppLaunch.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b50d8a78d24e2c261eaf7ecc77baebeb7ce9388fd2fdfbee502f3c2aae5b8cc4
                        • Instruction ID: 33781cbeae689e0063848c76fe3cdc1670c57d4ca3ec6dde04cd15bf70e59e23
                        • Opcode Fuzzy Hash: b50d8a78d24e2c261eaf7ecc77baebeb7ce9388fd2fdfbee502f3c2aae5b8cc4
                        • Instruction Fuzzy Hash: BEE1BF35E106298FCB14CF79D8856ADBBF2BFC8314F01C569E409EB355DB34A9058BA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000003.00000002.640922867.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_55d0000_AppLaunch.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 22e6738118bfe67573e4738716839b5929d0d4d81a5b92de223c169c4f7ea9ef
                        • Instruction ID: 7c7f12c20790e476aa0a7c2b82b0fe3ed17e7e22b71711155447966b9ceae788
                        • Opcode Fuzzy Hash: 22e6738118bfe67573e4738716839b5929d0d4d81a5b92de223c169c4f7ea9ef
                        • Instruction Fuzzy Hash: 46E1BD35E006298FCB24CF79D8856ADB7F2BFC8314F018569E40AEB355DB34A9058BA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000003.00000002.640922867.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_55d0000_AppLaunch.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 753a07b5ea28d2064d982d95a3df0c9f1521aa5e97fdd84575506e73ae3a88fa
                        • Instruction ID: 4387c02381ff41d6aa96911ec682e7bc0c2227586f274f09b55fc3c099ef69ce
                        • Opcode Fuzzy Hash: 753a07b5ea28d2064d982d95a3df0c9f1521aa5e97fdd84575506e73ae3a88fa
                        • Instruction Fuzzy Hash: 7EB13B71E042198FDB24CFE9C8857EDFBF2BF88304F148529E815A7294DB749846CBA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000003.00000002.640922867.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_55d0000_AppLaunch.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 71357f3bf77638972046832af278931454e39affc909bde27a42792f3e3835e4
                        • Instruction ID: 000b678f49ca2a79bee4a62ec31dec0aa5f894aed8773c375a97d8f65b845ea0
                        • Opcode Fuzzy Hash: 71357f3bf77638972046832af278931454e39affc909bde27a42792f3e3835e4
                        • Instruction Fuzzy Hash: F7B15B72E042098FDB20CFA9C9857EDFBF2BF88714F148529D819A7294DB749846CB91
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000003.00000002.640922867.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_55d0000_AppLaunch.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3bf60e0799a4a80c39506aee61b76668e57e1ebada6bdd4b761634f74b3cdcac
                        • Instruction ID: 78906cac6774ac045ce10c60e4c11e281f4d0c438985a076c80f36ba0eced8ec
                        • Opcode Fuzzy Hash: 3bf60e0799a4a80c39506aee61b76668e57e1ebada6bdd4b761634f74b3cdcac
                        • Instruction Fuzzy Hash: 5B918031E046298FDB24CF68C890AADF7B2FF85304F29C5A9D059AB255D734AD82CF54
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000003.00000002.640922867.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_55d0000_AppLaunch.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5959c09f9d24bf83ccdd882d87a77e822cf495cbd1671971472b6deb55c827ab
                        • Instruction ID: 13e94b4dfcfd48e6362bf81951012f98009b985227a3a7a82d9509bd10cc5afe
                        • Opcode Fuzzy Hash: 5959c09f9d24bf83ccdd882d87a77e822cf495cbd1671971472b6deb55c827ab
                        • Instruction Fuzzy Hash: 8E81F979E4010E9FDF14CFAAE5859ADBBF1BF48314F10A559D412EB2A0DB31A941CF60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 9d7592c-9d76014 DuplicateHandle 2 9d76016-9d7601c 0->2 3 9d7601d-9d7603a 0->3 2->3
                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,09D75F46,?,?,?,?,?), ref: 09D76007
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.641203722.0000000009D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 09D70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_9d70000_AppLaunch.jbxd
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID: HW
                        • API String ID: 3793708945-4244388116
                        • Opcode ID: 1f4dcf3e7b8e071c5b5e44f39faa515f356f82b00f6a985e52b8ea21084f7ba4
                        • Instruction ID: 715274c9a066f6796cff53ce4cd76705fa726ae3ded42cb73696cfe43a093ae0
                        • Opcode Fuzzy Hash: 1f4dcf3e7b8e071c5b5e44f39faa515f356f82b00f6a985e52b8ea21084f7ba4
                        • Instruction Fuzzy Hash: E02103B59003489FDB10CF9AD984AEEFBF8EB48324F54841AE954A3310D374A944CFA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 6 9d767b0-9d76e12 OleInitialize 8 9d76e14-9d76e1a 6->8 9 9d76e1b-9d76e38 6->9 8->9
                        APIs
                        • OleInitialize.OLE32(00000000), ref: 09D76E05
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.641203722.0000000009D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 09D70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_9d70000_AppLaunch.jbxd
                        Similarity
                        • API ID: Initialize
                        • String ID: dW
                        • API String ID: 2538663250-2358443097
                        • Opcode ID: e4a09660df741046dbdb345d36c71796f601c4053f20331736fc64df227dbbab
                        • Instruction ID: a40ad59cfef144db7751c0afcbc014fc2061e64f9e78e9e2b1b63527e6254c80
                        • Opcode Fuzzy Hash: e4a09660df741046dbdb345d36c71796f601c4053f20331736fc64df227dbbab
                        • Instruction Fuzzy Hash: 271103B19007488FCB10DF99D588BDEFBF8EB48324F14845AE959A7610E374A944CFA2
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 199 55d9884-55d98e7 200 55d98e9-55d990e 199->200 201 55d993b-55d9987 LoadLibraryA 199->201 200->201 206 55d9910-55d9912 200->206 204 55d9989-55d998f 201->204 205 55d9990-55d99c1 201->205 204->205 211 55d99d1 205->211 212 55d99c3-55d99c7 205->212 208 55d9935-55d9938 206->208 209 55d9914-55d991e 206->209 208->201 213 55d9920 209->213 214 55d9922-55d9931 209->214 217 55d99d2 211->217 212->211 215 55d99c9 212->215 213->214 214->214 216 55d9933 214->216 215->211 216->208 217->217
                        APIs
                        • LoadLibraryA.KERNELBASE(?), ref: 055D9977
                        Memory Dump Source
                        • Source File: 00000003.00000002.640922867.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_55d0000_AppLaunch.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: ba949c4ec00c26614d0ddfcdc9e6901bb36e2d9361aaec1f77b2317ee2eb1e91
                        • Instruction ID: 4d9719da12e5f061dcda2b6cb0e814345c1c38656b1b7d5728f7fbdaa6e064bc
                        • Opcode Fuzzy Hash: ba949c4ec00c26614d0ddfcdc9e6901bb36e2d9361aaec1f77b2317ee2eb1e91
                        • Instruction Fuzzy Hash: 484105B2D002589FDB24CFA9C8857DEFBF1BB48714F14852AD815A7344D7749846CFA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 218 55d794c-55d98e7 220 55d98e9-55d990e 218->220 221 55d993b-55d9987 LoadLibraryA 218->221 220->221 226 55d9910-55d9912 220->226 224 55d9989-55d998f 221->224 225 55d9990-55d99c1 221->225 224->225 231 55d99d1 225->231 232 55d99c3-55d99c7 225->232 228 55d9935-55d9938 226->228 229 55d9914-55d991e 226->229 228->221 233 55d9920 229->233 234 55d9922-55d9931 229->234 237 55d99d2 231->237 232->231 235 55d99c9 232->235 233->234 234->234 236 55d9933 234->236 235->231 236->228 237->237
                        APIs
                        • LoadLibraryA.KERNELBASE(?), ref: 055D9977
                        Memory Dump Source
                        • Source File: 00000003.00000002.640922867.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_55d0000_AppLaunch.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: 38109c0fb691d6bad4e7562fc83246a3269daa667057b79cc3cd9d17850123b9
                        • Instruction ID: a3a1665e20148f3955bb5da4ab170cb94a039de1d3797ae9ce8d96526d5c0880
                        • Opcode Fuzzy Hash: 38109c0fb691d6bad4e7562fc83246a3269daa667057b79cc3cd9d17850123b9
                        • Instruction Fuzzy Hash: DA4138B1D002589FDB24CFA9C88579EFBF1FB48714F14852AE815A7344D7749846CFA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 935 9d77c59-9d77c5d 936 9d77c76-9d77c78 935->936 937 9d77c5f-9d77c73 935->937 938 9d77ce7-9d77d14 936->938 939 9d77c7a-9d77ca2 936->939 937->936 940 9d77ca4 939->940 941 9d77cae-9d77cde EnumThreadWindows 939->941 944 9d77cac 940->944 941->938 942 9d77ce0-9d77ce6 941->942 942->938 944->941
                        APIs
                        • EnumThreadWindows.USER32(?,00000000,?,?,?,?,00000E28,?,?,09D77C40,080A6D30,07134FA0), ref: 09D77CD1
                        Memory Dump Source
                        • Source File: 00000003.00000002.641203722.0000000009D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 09D70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_9d70000_AppLaunch.jbxd
                        Similarity
                        • API ID: EnumThreadWindows
                        • String ID:
                        • API String ID: 2941952884-0
                        • Opcode ID: 191ac51fff541250eca6af1a14c9e84b6a59320c0320f5972ebd2b94c7eb194f
                        • Instruction ID: ea51ba6bb79ebe31a3409d0610ebbd0c148e8d2195d86a33cdf7208fc2b21425
                        • Opcode Fuzzy Hash: 191ac51fff541250eca6af1a14c9e84b6a59320c0320f5972ebd2b94c7eb194f
                        • Instruction Fuzzy Hash: AB213871D002598FDB10CFA9C884BEEFBF5BB88324F14842AD855A3750D774A945CF65
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 946 9d75f78-9d76014 DuplicateHandle 947 9d76016-9d7601c 946->947 948 9d7601d-9d7603a 946->948 947->948
                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,09D75F46,?,?,?,?,?), ref: 09D76007
                        Memory Dump Source
                        • Source File: 00000003.00000002.641203722.0000000009D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 09D70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_9d70000_AppLaunch.jbxd
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID:
                        • API String ID: 3793708945-0
                        • Opcode ID: 7e2489659bdffee23228a83849288d2a0fbc433c9c470e9c361b104cbb07b27b
                        • Instruction ID: 8308dadd33046e795a0485f796ebb44783be5809bffb068370d196ed029e99d6
                        • Opcode Fuzzy Hash: 7e2489659bdffee23228a83849288d2a0fbc433c9c470e9c361b104cbb07b27b
                        • Instruction Fuzzy Hash: 0821E2B5900248EFDB10CFA9D984AEEFFF4EB48324F14841AE954A3751D374A945CF61
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 951 9d7681c-9d77ca2 953 9d77ca4 951->953 954 9d77cae-9d77cde EnumThreadWindows 951->954 957 9d77cac 953->957 955 9d77ce7-9d77d14 954->955 956 9d77ce0-9d77ce6 954->956 956->955 957->954
                        APIs
                        • EnumThreadWindows.USER32(?,00000000,?,?,?,?,00000E28,?,?,09D77C40,080A6D30,07134FA0), ref: 09D77CD1
                        Memory Dump Source
                        • Source File: 00000003.00000002.641203722.0000000009D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 09D70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_9d70000_AppLaunch.jbxd
                        Similarity
                        • API ID: EnumThreadWindows
                        • String ID:
                        • API String ID: 2941952884-0
                        • Opcode ID: 7b31dc812caceb83e51efebe8260721d4a09bc65c6f136c7ce6bac575435ca5d
                        • Instruction ID: cf9a1fecbce7fbd097ae76c0d5288b9bc2fa35e30b47c0ebd8599ea82085e66a
                        • Opcode Fuzzy Hash: 7b31dc812caceb83e51efebe8260721d4a09bc65c6f136c7ce6bac575435ca5d
                        • Instruction Fuzzy Hash: F62104719002198FDB10CF9AC884BEEFBF9FB88224F14842AE854A3750D774A945CFA5
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 969 9d77fe9-9d78033 970 9d78035-9d78038 969->970 971 9d7803b-9d7803f 969->971 970->971 972 9d78047-9d7807a MessageBoxW 971->972 973 9d78041-9d78044 971->973 974 9d78083-9d78097 972->974 975 9d7807c-9d78082 972->975 973->972 975->974
                        APIs
                        • MessageBoxW.USER32(?,00000000,00000000,?,?,?,?,?,?,?,09D7517D,?,?,?), ref: 09D7806D
                        Memory Dump Source
                        • Source File: 00000003.00000002.641203722.0000000009D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 09D70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_9d70000_AppLaunch.jbxd
                        Similarity
                        • API ID: Message
                        • String ID:
                        • API String ID: 2030045667-0
                        • Opcode ID: 401d5f3c7d1a523ae9e6b91b835d366ac9993468dcca601a9ce719f190b8ba32
                        • Instruction ID: c74394aed4d69dc2d9b081880daf7f49d9064f26139eedbd0483bf6d1a189eeb
                        • Opcode Fuzzy Hash: 401d5f3c7d1a523ae9e6b91b835d366ac9993468dcca601a9ce719f190b8ba32
                        • Instruction Fuzzy Hash: CB2132B59003499FCB20CF99D988ADEFBB4FB88314F14852EE859A7600D375A945CFA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 960 9d74e88-9d78033 962 9d78035-9d78038 960->962 963 9d7803b-9d7803f 960->963 962->963 964 9d78047-9d7807a MessageBoxW 963->964 965 9d78041-9d78044 963->965 966 9d78083-9d78097 964->966 967 9d7807c-9d78082 964->967 965->964 967->966
                        APIs
                        • MessageBoxW.USER32(?,00000000,00000000,?,?,?,?,?,?,?,09D7517D,?,?,?), ref: 09D7806D
                        Memory Dump Source
                        • Source File: 00000003.00000002.641203722.0000000009D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 09D70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_9d70000_AppLaunch.jbxd
                        Similarity
                        • API ID: Message
                        • String ID:
                        • API String ID: 2030045667-0
                        • Opcode ID: 9408a9d29eb8415cab4b748fa8fac60598b00e1afbc913786cf4c0bea4192ade
                        • Instruction ID: 64bdb565ca1d88714140e97e37b19220bc27f6327785263eec97e465f52a631a
                        • Opcode Fuzzy Hash: 9408a9d29eb8415cab4b748fa8fac60598b00e1afbc913786cf4c0bea4192ade
                        • Instruction Fuzzy Hash: 3C2113B59003599FCB10CF9AD988BDEFBB4FB88314F14852EE819A7600D375A945CBA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 977 9d76da9-9d76e12 OleInitialize 978 9d76e14-9d76e1a 977->978 979 9d76e1b-9d76e38 977->979 978->979
                        APIs
                        • OleInitialize.OLE32(00000000), ref: 09D76E05
                        Memory Dump Source
                        • Source File: 00000003.00000002.641203722.0000000009D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 09D70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_9d70000_AppLaunch.jbxd
                        Similarity
                        • API ID: Initialize
                        • String ID:
                        • API String ID: 2538663250-0
                        • Opcode ID: 443d32cea809e2fc5705d079a2d611b5b97d6044d619773359ee7f6cd555ffb0
                        • Instruction ID: 592432651271262e2064aff0cc3e7d49367ea8341ae6fe1c4e33d0244a30c598
                        • Opcode Fuzzy Hash: 443d32cea809e2fc5705d079a2d611b5b97d6044d619773359ee7f6cd555ffb0
                        • Instruction Fuzzy Hash: 211136B48003888FDB10CFA9C588BDEFFF4EB48324F148459D455A3610D374A944CFA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000003.00000002.640785674.00000000054CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 054CD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_54cd000_AppLaunch.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0ad47ce8318038dbc9c4d0af7e91763e312e3b955efb40fb07ff2c901ee03e5f
                        • Instruction ID: 4e5ca78e9ed2af25744a1bde3fe025e24974045fd39b98c7074a5375f7f6d2aa
                        • Opcode Fuzzy Hash: 0ad47ce8318038dbc9c4d0af7e91763e312e3b955efb40fb07ff2c901ee03e5f
                        • Instruction Fuzzy Hash: 022124B9A04284DFDB44DF10D9C4B67BF62FBD8224F2485FED9090B206C336D856C6A1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000003.00000002.640785674.00000000054CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 054CD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_54cd000_AppLaunch.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5c7f4f13aee4dd2d28d0ff9ce2ed98ebdb6cfc1b470272758c5b2a475dd69952
                        • Instruction ID: 3790fb0ced0369ce34d4fc9319b34997031810cb80809f100b494cc38a646505
                        • Opcode Fuzzy Hash: 5c7f4f13aee4dd2d28d0ff9ce2ed98ebdb6cfc1b470272758c5b2a475dd69952
                        • Instruction Fuzzy Hash: C5119D76904284CFDB01CF10D9C4B66BF72FB84224F2486EAD8490B656C336D45ACBA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.640922867.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_55d0000_AppLaunch.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID: 0-3916222277
                        • Opcode ID: 7158fdd8bcb193c60c308e305a21c82cfed1b2c332cbba1caf6ecf3df515c224
                        • Instruction ID: b9f1f1435e67039b2545e3e69a317db4466ac83a780f19df4e51772f7e396d97
                        • Opcode Fuzzy Hash: 7158fdd8bcb193c60c308e305a21c82cfed1b2c332cbba1caf6ecf3df515c224
                        • Instruction Fuzzy Hash: C851C076B001198FCB24CBADD8845AEF7B2FFC8221B15817AE619D7754DB31EC418BA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000003.00000002.641203722.0000000009D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 09D70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_9d70000_AppLaunch.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 82cf10b707ca1e31267e8857f1bdeec32460784a9ad36f34bc6f2d3e255be1e6
                        • Instruction ID: a7c78431e7a922e53a1335a9c527cd27858a90759a145323b6d25ea801d37e1b
                        • Opcode Fuzzy Hash: 82cf10b707ca1e31267e8857f1bdeec32460784a9ad36f34bc6f2d3e255be1e6
                        • Instruction Fuzzy Hash: C012D7F18117868BE310CF26F888599BB61F745329B904228EA651BAD1F7B4124FEF46
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000003.00000002.640922867.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_55d0000_AppLaunch.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e12e9bd9e876f6ac39b50d9f6c643a354d5588a98933c0a02c776372ca5ee6a8
                        • Instruction ID: 35fa33e09dd3a6beceb6cb2fe7f280df9acea3dbdd9bb8143481877bc2ccca1f
                        • Opcode Fuzzy Hash: e12e9bd9e876f6ac39b50d9f6c643a354d5588a98933c0a02c776372ca5ee6a8
                        • Instruction Fuzzy Hash: 92914971E042099FDB20DFA9C9847EEFBF2BF88324F158129E405A7294DB749845CFA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000003.00000002.641203722.0000000009D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 09D70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_9d70000_AppLaunch.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d5bffdd29f23d645cd1b71126efc5c86ed13a026fc19d226bc004fed0a9ebf2c
                        • Instruction ID: 7c9514a2935e55269b72d92b5dc1cb72a96289fc27dffe175047b5aa89e1a609
                        • Opcode Fuzzy Hash: d5bffdd29f23d645cd1b71126efc5c86ed13a026fc19d226bc004fed0a9ebf2c
                        • Instruction Fuzzy Hash: 60C13DB18117868BE710CF66F888199BB71FB85329F504228F9652B6D0F7B4124FEF46
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000003.00000002.640922867.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_55d0000_AppLaunch.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 00b1b14ee16a393fc95b7a2159e18b55443e42ebe18f7529bea2b62769e8759d
                        • Instruction ID: 5a76aa39ad72a164c13898811e367209faef9c42d56e10788773325b69595f04
                        • Opcode Fuzzy Hash: 00b1b14ee16a393fc95b7a2159e18b55443e42ebe18f7529bea2b62769e8759d
                        • Instruction Fuzzy Hash: A0617C32F105249FD714DB69CC84EAEB7A3BFC8614F2A8164E40A9B765DF31AC01CB94
                        Uniqueness

                        Uniqueness Score: -1.00%