Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Q9FAsn6SG6

Overview

General Information

Sample Name:Q9FAsn6SG6 (renamed file extension from none to exe)
Analysis ID:620828
MD5:c61f9a9059f8b8bd0e69f7df4cb09786
SHA1:70fffde0debf4559859617d49dc48c54df3c156d
SHA256:84a5a26f1748c3ad1f0b98c438908e8dc842eacc6390484527ee1fe7e56264f5
Tags:32exetrojan
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Writes to foreign memory regions
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Machine Learning detection for sample
Allocates memory in foreign processes
May check the online IP address of the machine
Injects a PE file into a foreign processes
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
PE file contains sections with non-standard names
Contains capabilities to detect virtual machines
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
PE / OLE file has an invalid certificate
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
HTTP GET or POST without a user agent
Creates a process in suspended mode (likely to inject code)
IP address seen in connection with other malware
Entry point lies outside standard sections
Enables debug privileges

Classification

  • System is w10x64
  • Q9FAsn6SG6.exe (PID: 6712 cmdline: "C:\Users\user\Desktop\Q9FAsn6SG6.exe" MD5: C61F9A9059F8B8BD0E69F7DF4CB09786)
    • conhost.exe (PID: 6728 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • AppLaunch.exe (PID: 6780 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe MD5: 6807F903AC06FF7E1670181378690B22)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Q9FAsn6SG6.exeAvira: detected
Source: Q9FAsn6SG6.exeVirustotal: Detection: 69%Perma Link
Source: Q9FAsn6SG6.exeMetadefender: Detection: 31%Perma Link
Source: Q9FAsn6SG6.exeReversingLabs: Detection: 69%
Source: Q9FAsn6SG6.exeJoe Sandbox ML: detected
Source: Q9FAsn6SG6.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE

Networking

barindex
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeDNS query: name: ip-api.com
Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
Source: Q9FAsn6SG6.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCodeSigningCA-1.crt0
Source: Q9FAsn6SG6.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: Q9FAsn6SG6.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: Q9FAsn6SG6.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: Q9FAsn6SG6.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: Q9FAsn6SG6.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
Source: Q9FAsn6SG6.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: Q9FAsn6SG6.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: Q9FAsn6SG6.exeString found in binary or memory: http://crl3.digicert.com/assured-cs-g1.crl00
Source: Q9FAsn6SG6.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: Q9FAsn6SG6.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: Q9FAsn6SG6.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: Q9FAsn6SG6.exeString found in binary or memory: http://crl4.digicert.com/assured-cs-g1.crl0L
Source: Q9FAsn6SG6.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: Q9FAsn6SG6.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
Source: AppLaunch.exe, 00000002.00000002.532195437.0000000006B47000.00000004.00000800.00020000.00000000.sdmp, AppLaunch.exe, 00000002.00000002.532225269.0000000006B5A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
Source: AppLaunch.exe, 00000002.00000002.532195437.0000000006B47000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
Source: AppLaunch.exe, 00000002.00000002.532195437.0000000006B47000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com4
Source: Q9FAsn6SG6.exeString found in binary or memory: http://ocsp.comodoca.com0
Source: Q9FAsn6SG6.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: Q9FAsn6SG6.exeString found in binary or memory: http://ocsp.digicert.com0L
Source: Q9FAsn6SG6.exeString found in binary or memory: http://ocsp.digicert.com0O
Source: Q9FAsn6SG6.exeString found in binary or memory: http://ocsp.sectigo.com0
Source: Q9FAsn6SG6.exeString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
Source: Q9FAsn6SG6.exeString found in binary or memory: http://s2.symcb.com0
Source: AppLaunch.exe, 00000002.00000002.532195437.0000000006B47000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: Q9FAsn6SG6.exeString found in binary or memory: http://sv.symcb.com/sv.crl0a
Source: Q9FAsn6SG6.exeString found in binary or memory: http://sv.symcb.com/sv.crt0
Source: Q9FAsn6SG6.exeString found in binary or memory: http://sv.symcd.com0&
Source: Q9FAsn6SG6.exeString found in binary or memory: http://www.digicert.com/CPS0
Source: Q9FAsn6SG6.exeString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: Q9FAsn6SG6.exeString found in binary or memory: http://www.symauth.com/cps0(
Source: Q9FAsn6SG6.exeString found in binary or memory: http://www.symauth.com/rpa00
Source: Q9FAsn6SG6.exeString found in binary or memory: http://www.vmware.com/0
Source: Q9FAsn6SG6.exeString found in binary or memory: http://www.vmware.com/0/
Source: Q9FAsn6SG6.exeString found in binary or memory: https://d.symcb.com/cps0%
Source: Q9FAsn6SG6.exeString found in binary or memory: https://d.symcb.com/rpa0
Source: Q9FAsn6SG6.exeString found in binary or memory: https://pidgin.im0
Source: Q9FAsn6SG6.exeString found in binary or memory: https://sectigo.com/CPS0
Source: Q9FAsn6SG6.exeString found in binary or memory: https://www.digicert.com/CPS0
Source: unknownDNS traffic detected: queries for: ip-api.com
Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
Source: Q9FAsn6SG6.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: Q9FAsn6SG6.exe, 00000000.00000002.268728178.0000000000E33000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePennyWise.exe4 vs Q9FAsn6SG6.exe
Source: Q9FAsn6SG6.exe, 00000000.00000003.268281523.000000000314E000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePennyWise.exe4 vs Q9FAsn6SG6.exe
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F214992_2_04F21499
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F281C02_2_04F281C0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F2C3D02_2_04F2C3D0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F2E3302_2_04F2E330
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F2CCA02_2_04F2CCA0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F21DD02_2_04F21DD0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F208582_2_04F20858
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F20B382_2_04F20B38
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F215902_2_04F21590
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F210912_2_04F21091
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F2C0882_2_04F2C088
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F281B02_2_04F281B0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F221082_2_04F22108
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F21E812_2_04F21E81
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F20B722_2_04F20B72
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F20B282_2_04F20B28
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_091175302_2_09117530
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_091175202_2_09117520
Source: Q9FAsn6SG6.exeStatic PE information: invalid certificate
Source: Q9FAsn6SG6.exeVirustotal: Detection: 69%
Source: Q9FAsn6SG6.exeMetadefender: Detection: 31%
Source: Q9FAsn6SG6.exeReversingLabs: Detection: 69%
Source: C:\Users\user\Desktop\Q9FAsn6SG6.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\Q9FAsn6SG6.exe "C:\Users\user\Desktop\Q9FAsn6SG6.exe"
Source: C:\Users\user\Desktop\Q9FAsn6SG6.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Q9FAsn6SG6.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
Source: C:\Users\user\Desktop\Q9FAsn6SG6.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeMutant created: \Sessions\1\BaseNamedObjects\9D16FBEF0D8A8F87529DE06A1C43C737
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6728:120:WilError_01
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeFile created: C:\Users\user\AppData\Local\86fddf902dc7d50e1674857833db815dJump to behavior
Source: classification engineClassification label: mal88.troj.evad.winEXE@4/0@1/1
Source: 0.3.Q9FAsn6SG6.exe.3130000.0.unpack, u0002u2002.csCryptographic APIs: 'CreateDecryptor'
Source: 2.2.AppLaunch.exe.400000.0.unpack, u0002u2002.csCryptographic APIs: 'CreateDecryptor'
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: Q9FAsn6SG6.exeStatic file information: File size 3677592 > 1048576
Source: Q9FAsn6SG6.exeStatic PE information: Raw size of JICeboQ is bigger than: 0x100000 < 0x106000
Source: Q9FAsn6SG6.exeStatic PE information: Raw size of gTx1qw is bigger than: 0x100000 < 0x226000
Source: Q9FAsn6SG6.exeStatic PE information: real checksum: 0x2ff should be: 0x388ceb
Source: Q9FAsn6SG6.exeStatic PE information: section name: JICeboQ
Source: Q9FAsn6SG6.exeStatic PE information: section name: zcPlt
Source: Q9FAsn6SG6.exeStatic PE information: section name: rrF5ta
Source: Q9FAsn6SG6.exeStatic PE information: section name: IKbga
Source: Q9FAsn6SG6.exeStatic PE information: section name: 03AAoc
Source: Q9FAsn6SG6.exeStatic PE information: section name: 6maTqw
Source: Q9FAsn6SG6.exeStatic PE information: section name: PKmYta
Source: Q9FAsn6SG6.exeStatic PE information: section name: gTx1qw
Source: Q9FAsn6SG6.exeStatic PE information: section name: 9YRtc
Source: initial sampleStatic PE information: section where entry point is pointing to: gTx1qw
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
Source: C:\Users\user\Desktop\Q9FAsn6SG6.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\Users\user\Desktop\Q9FAsn6SG6.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
Source: C:\Users\user\Desktop\Q9FAsn6SG6.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
Source: C:\Users\user\Desktop\Q9FAsn6SG6.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
Source: C:\Users\user\Desktop\Q9FAsn6SG6.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
Source: AppLaunch.exe, 00000002.00000003.277565209.0000000004FF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware
Source: Q9FAsn6SG6.exeBinary or memory string: noreply@vmware.com0
Source: Q9FAsn6SG6.exeBinary or memory string: http://www.vmware.com/0
Source: Q9FAsn6SG6.exeBinary or memory string: VMware, Inc.1!0
Source: AppLaunch.exe, 00000002.00000003.277565209.0000000004FF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMware_19TXUL2Win32_VideoControllerHW9_2_HAVideoController120060621000000.000000-00083625117display.infMSBDAZ6UOZVBZPCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colors9KEWZH9_68E0
Source: AppLaunch.exe, 00000002.00000002.531934997.0000000004FB7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMware_19TXUL2Win32_VideoControllerHW9_2_HAVideoController120060621000000.000000-00083625117display.infMSBDAZ6UOZVBZPCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colors9KEWZH9_
Source: Q9FAsn6SG6.exeBinary or memory string: http://www.vmware.com/0/
Source: Q9FAsn6SG6.exeBinary or memory string: VMware, Inc.1
Source: Q9FAsn6SG6.exeBinary or memory string: VMware, Inc.0
Source: AppLaunch.exe, 00000002.00000002.531934997.0000000004FB7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\Q9FAsn6SG6.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe base: 400000Jump to behavior
Source: C:\Users\user\Desktop\Q9FAsn6SG6.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe base: 9B9008Jump to behavior
Source: C:\Users\user\Desktop\Q9FAsn6SG6.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe base: 400000 protect: page execute and read and writeJump to behavior
Source: C:\Users\user\Desktop\Q9FAsn6SG6.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Users\user\Desktop\Q9FAsn6SG6.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe VolumeInformationJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts111
Windows Management Instrumentation
Path Interception311
Process Injection
1
Masquerading
OS Credential Dumping321
Security Software Discovery
Remote Services11
Archive Collected Data
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts22
Virtualization/Sandbox Evasion
LSASS Memory22
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Ingress Tool Transfer
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Disable or Modify Tools
Security Account Manager1
Remote System Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
Non-Application Layer Protocol
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)311
Process Injection
NTDS1
System Network Configuration Discovery
Distributed Component Object ModelInput CaptureScheduled Transfer2
Application Layer Protocol
SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
Deobfuscate/Decode Files or Information
LSA Secrets13
System Information Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Q9FAsn6SG6.exe69%VirustotalBrowse
Q9FAsn6SG6.exe31%MetadefenderBrowse
Q9FAsn6SG6.exe69%ReversingLabsWin32.Trojan.FormBook
Q9FAsn6SG6.exe100%AviraTR/AD.GenSteal.jziki
Q9FAsn6SG6.exe100%Joe Sandbox ML
No Antivirus matches
SourceDetectionScannerLabelLinkDownload
2.2.AppLaunch.exe.400000.0.unpack100%AviraHEUR/AGEN.1203048Download File
0.3.Q9FAsn6SG6.exe.3130000.0.unpack100%AviraHEUR/AGEN.1203048Download File
No Antivirus matches
SourceDetectionScannerLabelLink
https://sectigo.com/CPS00%URL Reputationsafe
http://ocsp.sectigo.com00%URL Reputationsafe
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
https://pidgin.im00%URL Reputationsafe
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
http://ip-api.com40%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
ip-api.com
208.95.112.1
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    http://ip-api.com/line/?fields=hostingfalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      https://sectigo.com/CPS0Q9FAsn6SG6.exefalse
      • URL Reputation: safe
      unknown
      http://www.vmware.com/0Q9FAsn6SG6.exefalse
        high
        http://ocsp.sectigo.com0Q9FAsn6SG6.exefalse
        • URL Reputation: safe
        unknown
        http://www.symauth.com/rpa00Q9FAsn6SG6.exefalse
          high
          http://ip-api.comAppLaunch.exe, 00000002.00000002.532195437.0000000006B47000.00000004.00000800.00020000.00000000.sdmp, AppLaunch.exe, 00000002.00000002.532225269.0000000006B5A000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.vmware.com/0/Q9FAsn6SG6.exefalse
              high
              http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0sQ9FAsn6SG6.exefalse
              • URL Reputation: safe
              unknown
              https://pidgin.im0Q9FAsn6SG6.exefalse
              • URL Reputation: safe
              unknown
              http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#Q9FAsn6SG6.exefalse
              • URL Reputation: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameAppLaunch.exe, 00000002.00000002.532195437.0000000006B47000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.symauth.com/cps0(Q9FAsn6SG6.exefalse
                  high
                  http://ip-api.com4AppLaunch.exe, 00000002.00000002.532195437.0000000006B47000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  208.95.112.1
                  ip-api.comUnited States
                  53334TUT-ASUSfalse
                  Joe Sandbox Version:34.0.0 Boulder Opal
                  Analysis ID:620828
                  Start date and time: 05/05/202209:34:272022-05-05 09:34:27 +02:00
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 7m 28s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Sample file name:Q9FAsn6SG6 (renamed file extension from none to exe)
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:26
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal88.troj.evad.winEXE@4/0@1/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HDC Information:Failed
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 25
                  • Number of non-executed functions: 6
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                  • Excluded IPs from analysis (whitelisted): 104.208.16.94
                  • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com, arc.msn.com, onedsblobprdcus16.centralus.cloudapp.azure.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  No simulations
                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  208.95.112.1Installer.exeGet hashmaliciousBrowse
                  • ip-api.com/line/?fields=hosting
                  CryptoMiner.exeGet hashmaliciousBrowse
                  • ip-api.com/line/?fields=hosting
                  Installer.exeGet hashmaliciousBrowse
                  • ip-api.com/line/?fields=hosting
                  Setup.exeGet hashmaliciousBrowse
                  • ip-api.com/line/?fields=hosting
                  stealerium.exeGet hashmaliciousBrowse
                  • ip-api.com/line/?fields=hosting
                  68e7a0fa9f7dbbb34bc4bad97690ea72.exeGet hashmaliciousBrowse
                  • ip-api.com/line/?fields=hosting
                  EmREC8knFr.exeGet hashmaliciousBrowse
                  • ip-api.com/json/
                  EmREC8knFr.exeGet hashmaliciousBrowse
                  • ip-api.com/json/
                  Lap3wu6XE6.exeGet hashmaliciousBrowse
                  • ip-api.com/line/?fields=hosting
                  Lap3wu6XE6.exeGet hashmaliciousBrowse
                  • ip-api.com/line/?fields=hosting
                  n0kzfrxxSq.exeGet hashmaliciousBrowse
                  • ip-api.com/json
                  7nSmJgc4Js.exeGet hashmaliciousBrowse
                  • ip-api.com/json/
                  7K7RXavQ4A.exeGet hashmaliciousBrowse
                  • ip-api.com/json/
                  7K7RXavQ4A.exeGet hashmaliciousBrowse
                  • ip-api.com/json/
                  fYPaF7a8nQ.exeGet hashmaliciousBrowse
                  • ip-api.com/json
                  zfsn3.msiGet hashmaliciousBrowse
                  • ip-api.com/json/
                  YaWL8CYUZq.exeGet hashmaliciousBrowse
                  • ip-api.com/json/
                  2k70nO2s4q.exeGet hashmaliciousBrowse
                  • ip-api.com/json/
                  P26IuX5m9O.exeGet hashmaliciousBrowse
                  • ip-api.com/json/
                  HX3zxEsik4.exeGet hashmaliciousBrowse
                  • ip-api.com/json/
                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  ip-api.comInstaller.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  CryptoMiner.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  Installer.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  Setup.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  stealerium.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  68e7a0fa9f7dbbb34bc4bad97690ea72.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  EmREC8knFr.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  EmREC8knFr.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  Lap3wu6XE6.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  Lap3wu6XE6.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  n0kzfrxxSq.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  7nSmJgc4Js.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  7K7RXavQ4A.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  7K7RXavQ4A.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  fYPaF7a8nQ.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  zfsn3.msiGet hashmaliciousBrowse
                  • 208.95.112.1
                  YaWL8CYUZq.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  2k70nO2s4q.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  P26IuX5m9O.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  HX3zxEsik4.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  TUT-ASUSInstaller.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  CryptoMiner.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  Installer.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  Setup.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  stealerium.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  68e7a0fa9f7dbbb34bc4bad97690ea72.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  EmREC8knFr.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  EmREC8knFr.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  Lap3wu6XE6.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  Lap3wu6XE6.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  n0kzfrxxSq.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  7nSmJgc4Js.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  7K7RXavQ4A.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  7K7RXavQ4A.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  fYPaF7a8nQ.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  zfsn3.msiGet hashmaliciousBrowse
                  • 208.95.112.1
                  p73tzehj.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  YaWL8CYUZq.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  2k70nO2s4q.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  P26IuX5m9O.exeGet hashmaliciousBrowse
                  • 208.95.112.1
                  No context
                  No context
                  No created / dropped files found
                  File type:PE32 executable (console) Intel 80386, for MS Windows
                  Entropy (8bit):6.364458086173346
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:Q9FAsn6SG6.exe
                  File size:3677592
                  MD5:c61f9a9059f8b8bd0e69f7df4cb09786
                  SHA1:70fffde0debf4559859617d49dc48c54df3c156d
                  SHA256:84a5a26f1748c3ad1f0b98c438908e8dc842eacc6390484527ee1fe7e56264f5
                  SHA512:6a838d9663517e1f89bf47f9ba85b72cd431f0d61c4db97e69516ffa313d8bdfc9f619eb51ead5215786e523b43cde3186300cf3bfab7408d580c66cd7d00453
                  SSDEEP:98304:xjFJEyX5ZYpLKwYXA8NMLgJ0CYkL1N5qV0O8:ZFSyJZ8LYEgCCYkDxO8
                  TLSH:61067DB32B45629FC1313039FC92CA0E66101275931F7623EBD83978E59F9D12AC9F96
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......k\8./=V./=V./=V.;VU.!=V.;VS..=V.;VR.9=V.}HR.>=V.}HU.;=V.}HS.e=V.;VW.*=V./=W.r=V..HS..=V..HT..=V.Rich/=V........................
                  Icon Hash:00828e8e8686b000
                  Entrypoint:0x6230b1
                  Entrypoint Section:gTx1qw
                  Digitally signed:true
                  Imagebase:0x400000
                  Subsystem:windows cui
                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                  DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE
                  Time Stamp:0x129 [Thu Jan 1 00:04:57 1970 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:6
                  OS Version Minor:0
                  File Version Major:6
                  File Version Minor:0
                  Subsystem Version Major:6
                  Subsystem Version Minor:0
                  Import Hash:25a9be81ed1ff039b036d3155dd64335
                  Signature Valid:false
                  Signature Issuer:CN=Sectigo RSA Code Signing CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
                  Signature Validation Error:The digital signature of the object did not verify
                  Error Number:-2146869232
                  Not Before, Not After
                  • 3/21/2021 5:00:00 PM 3/21/2024 4:59:59 PM
                  Subject Chain
                  • CN=Gary Kramlich, O=Gary Kramlich, STREET=2653 N 54TH ST, L=MILWAUKEE, S=Wisconsin, PostalCode=53210, C=US
                  Version:3
                  Thumbprint MD5:394B591BC2CE78B7CF207BF4082E62F4
                  Thumbprint SHA-1:ADFA744AA074FB5DC57EE6445A3E18D606C7BF96
                  Thumbprint SHA-256:AE7DB8B64E8ABD9D36876F049B9770D90C0868D7FE1A2D37CF327DF69FA2DBFE
                  Serial:00F6AD45188E5566AA317BE23B4B8B2C2F
                  Instruction
                  push ebp
                  call 00007F9C6CD76B0Ch
                  pop ebp
                  sub ebp, 000CC0B7h
                  call 00007F9C6CD76B54h
                  pop eax
                  sub eax, 002230C3h
                  jmp 00007F9C6CD76C40h
                  jmp 00007F9C6CD76B0Dh
                  jmp 00007F9C6CD76ADEh
                  jmp 00007F9C6CD76B28h
                  jmp 00007F9C6CD76B67h
                  mov eax, eax
                  jmp 00007F9C6CD81F88h
                  jmp 00007F9C6CD8307Ah
                  add byte ptr [eax], al
                  or byte ptr [eax], al
                  add byte ptr [eax], al
                  cmp byte ptr [ecx], al
                  or byte ptr [eax], al
                  add byte ptr [eax], al
                  insb
                  add ah, cl
                  add byte ptr [ecx+eax+00000006h], dh
                  or al, byte ptr [eax]
                  add byte ptr [eax], al
                  hlt
                  xlatb
                  inc ebx
                  add edx, edx
                  in al, B1h
                  outsd
                  push es
                  add byte ptr [eax], al
                  add byte ptr [ecx], al
                  loope 00007F9C6CD82012h
                  xlatb
                  or al, 00h
                  add byte ptr [eax], al
                  rcr byte ptr [ecx], 1
                  rcr dword ptr [ecx], 1
                  adc byte ptr [eax], 0000000Ah
                  add byte ptr [eax], al
                  add byte ptr [esi-38h], dl
                  pushfd
                  dec dword ptr [edx]
                  add byte ptr [eax], al
                  add byte ptr [edx-7Ah], ch
                  inc edi
                  enter 6484h, 78h
                  add dword ptr [eax-29h], edx
                  or al, 00h
                  add byte ptr [eax], al
                  pop es
                  xchg eax, edx
                  or dword ptr [edx+ecx+00000A7Fh], eax
                  add dh, bl
                  jp 00007F9C6CD81FD9h
                  jno 00007F9C6CD81FCCh
                  add byte ptr [eax], al
                  add byte ptr [esi], bl
                  cmc
                  iretd
                  pop ecx
                  loopne 00007F9C6CD81F95h
                  fcomp3 st(0)
                  push eax
                  xlatb
                  or al, 00h
                  add byte ptr [eax], al
                  imul edx, dword ptr [ebx], 09h
                  test byte ptr [esi-62h], cl
                  or al, byte ptr [eax]
                  add byte ptr [eax], al
                  mov byte ptr [0A71F35Bh], al
                  add byte ptr [eax], al
                  add byte ptr [esi], bh
                  adc al, 33h
                  cmp al, byte ptr [eax+50017476h]
                  xlatb
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x1560390x50PKmYta
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x37d0000x8db9YRtc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x37d4680x4930
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  JICeboQ0x10000x105e350x106000False0.412188580928data5.62380807968IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  zcPlt0x1070000x250750x25200False0.550301188973data6.5843436682IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  rrF5ta0x12d0000x1f3a00x1f400False0.363data6.07842695634IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  IKbga0x14d0000x1cf00x1000False0.188720703125data3.05371407432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                  03AAoc0x14f0000x2ddc0x2e00False0.790336277174data6.70270981078IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  6maTqw0x1520000x40000x4000False0.0673828125data1.21393364646IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                  PKmYta0x1560000x10000x200False0.16015625data1.14259413026IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                  gTx1qw0x1570000x2260000x226000unknownunknownunknownunknownIMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  9YRtc0x37d0000x8db0xa00False0.29296875data5.06332684426IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountry
                  RT_MANIFEST0x37d0580x883XML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminatorsEnglishUnited States
                  DLLImport
                  kernel32.dllGetModuleHandleA
                  USER32.dllFindWindowA
                  Language of compilation systemCountry where language is spokenMap
                  EnglishUnited States
                  TimestampSource PortDest PortSource IPDest IP
                  May 5, 2022 09:35:45.140758038 CEST4974680192.168.2.3208.95.112.1
                  May 5, 2022 09:35:45.170057058 CEST8049746208.95.112.1192.168.2.3
                  May 5, 2022 09:35:45.170218945 CEST4974680192.168.2.3208.95.112.1
                  May 5, 2022 09:35:45.171499968 CEST4974680192.168.2.3208.95.112.1
                  May 5, 2022 09:35:45.209554911 CEST8049746208.95.112.1192.168.2.3
                  May 5, 2022 09:35:45.315737009 CEST4974680192.168.2.3208.95.112.1
                  May 5, 2022 09:36:50.641114950 CEST8049746208.95.112.1192.168.2.3
                  May 5, 2022 09:36:50.641221046 CEST4974680192.168.2.3208.95.112.1
                  May 5, 2022 09:37:02.769387960 CEST8049746208.95.112.1192.168.2.3
                  TimestampSource PortDest PortSource IPDest IP
                  May 5, 2022 09:35:45.085983992 CEST5742153192.168.2.38.8.8.8
                  May 5, 2022 09:35:45.104326963 CEST53574218.8.8.8192.168.2.3
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                  May 5, 2022 09:35:45.085983992 CEST192.168.2.38.8.8.80x277fStandard query (0)ip-api.comA (IP address)IN (0x0001)
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                  May 5, 2022 09:35:45.104326963 CEST8.8.8.8192.168.2.30x277fNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)
                  • ip-api.com
                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  0192.168.2.349746208.95.112.180C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  TimestampkBytes transferredDirectionData
                  May 5, 2022 09:35:45.171499968 CEST1141OUTGET /line/?fields=hosting HTTP/1.1
                  Host: ip-api.com
                  Connection: Keep-Alive
                  May 5, 2022 09:35:45.209554911 CEST1141INHTTP/1.1 200 OK
                  Date: Thu, 05 May 2022 07:35:44 GMT
                  Content-Type: text/plain; charset=utf-8
                  Content-Length: 5
                  Access-Control-Allow-Origin: *
                  X-Ttl: 60
                  X-Rl: 44
                  Data Raw: 74 72 75 65 0a
                  Data Ascii: true


                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:09:35:38
                  Start date:05/05/2022
                  Path:C:\Users\user\Desktop\Q9FAsn6SG6.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\Q9FAsn6SG6.exe"
                  Imagebase:0xe60000
                  File size:3677592 bytes
                  MD5 hash:C61F9A9059F8B8BD0E69F7DF4CB09786
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:low

                  Target ID:1
                  Start time:09:35:39
                  Start date:05/05/2022
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff7c9170000
                  File size:625664 bytes
                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:2
                  Start time:09:35:40
                  Start date:05/05/2022
                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  Imagebase:0xdd0000
                  File size:98912 bytes
                  MD5 hash:6807F903AC06FF7E1670181378690B22
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Reputation:high

                  Reset < >

                    Execution Graph

                    Execution Coverage:14.8%
                    Dynamic/Decrypted Code Coverage:100%
                    Signature Coverage:3.1%
                    Total number of Nodes:97
                    Total number of Limit Nodes:2
                    execution_graph 18747 9111040 18748 9111049 18747->18748 18749 91110d1 18748->18749 18752 9111794 18748->18752 18759 9111709 18748->18759 18753 91117a2 18752->18753 18754 9111752 18752->18754 18765 91155e0 18754->18765 18774 9115618 18754->18774 18783 9115609 18754->18783 18755 9111788 18755->18749 18761 91116ee 18759->18761 18760 9111788 18760->18749 18761->18759 18762 91155e0 3 API calls 18761->18762 18763 9115609 3 API calls 18761->18763 18764 9115618 3 API calls 18761->18764 18762->18760 18763->18760 18764->18760 18768 91155e5 18765->18768 18766 911582f 18809 91151f4 18766->18809 18769 911585d 18768->18769 18792 9116350 18768->18792 18796 9116360 18768->18796 18800 9116388 18768->18800 18804 9116377 18768->18804 18769->18755 18777 9115642 18774->18777 18775 911582f 18776 91151f4 MessageBoxW 18775->18776 18778 911585d 18776->18778 18777->18778 18779 9116350 2 API calls 18777->18779 18780 9116360 2 API calls 18777->18780 18781 9116377 DuplicateHandle 18777->18781 18782 9116388 DuplicateHandle 18777->18782 18778->18755 18779->18775 18780->18775 18781->18775 18782->18775 18784 9115642 18783->18784 18787 911585d 18784->18787 18788 9116350 2 API calls 18784->18788 18789 9116360 2 API calls 18784->18789 18790 9116377 DuplicateHandle 18784->18790 18791 9116388 DuplicateHandle 18784->18791 18785 911582f 18786 91151f4 MessageBoxW 18785->18786 18786->18787 18787->18755 18788->18785 18789->18785 18790->18785 18791->18785 18793 9116369 18792->18793 18813 9115e0c 18793->18813 18797 9116369 18796->18797 18798 9115e0c 2 API calls 18797->18798 18799 9116374 18798->18799 18799->18766 18801 9116398 18800->18801 18802 91163b5 18801->18802 18830 9115e1c 18801->18830 18802->18766 18806 911638c 18804->18806 18808 91163d4 18804->18808 18805 91163b5 18805->18766 18806->18805 18807 9115e1c DuplicateHandle 18806->18807 18807->18805 18808->18766 18810 91186d0 MessageBoxW 18809->18810 18812 911875c 18810->18812 18812->18769 18814 9115e17 18813->18814 18815 9116374 18814->18815 18817 9116ddc 18814->18817 18815->18766 18818 9116de7 18817->18818 18819 9116388 DuplicateHandle 18818->18819 18822 9117121 18818->18822 18820 911713b 18819->18820 18823 9116eb4 18820->18823 18822->18815 18824 9116ebf 18823->18824 18825 911745b 18824->18825 18827 9116ed0 18824->18827 18825->18822 18828 9117490 OleInitialize 18827->18828 18829 91174f4 18828->18829 18829->18825 18831 9115e27 18830->18831 18834 91165f8 18831->18834 18837 91155fc 18834->18837 18838 9116660 DuplicateHandle 18837->18838 18839 911654d 18838->18839 18839->18802 18840 4f281c0 18841 4f281de 18840->18841 18844 4f265a8 18841->18844 18843 4f28215 18845 4f29ce0 LoadLibraryA 18844->18845 18847 4f29dd9 18845->18847 18719 911707f 18722 9116dec 18719->18722 18723 9116df7 18722->18723 18728 9118241 18723->18728 18732 9118339 18723->18732 18739 9118250 18723->18739 18724 911708c 18729 911829f 18728->18729 18743 9116f3c 18729->18743 18733 91182eb 18732->18733 18734 911833f EnumThreadWindows 18732->18734 18736 9116f3c EnumThreadWindows 18733->18736 18737 91183c0 18734->18737 18738 9118320 18736->18738 18737->18724 18738->18724 18740 911829f 18739->18740 18741 9116f3c EnumThreadWindows 18740->18741 18742 9118320 18741->18742 18742->18724 18744 9118340 EnumThreadWindows 18743->18744 18746 9118320 18744->18746 18746->18724
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.531720579.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_4f20000_AppLaunch.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID: 4 $4 $"$"
                    • API String ID: 1029625771-2362696517
                    • Opcode ID: 6c98a33a492bb8c727d526eb655120d19585bf7f3e6ca06c6c347758dcc4d91e
                    • Instruction ID: 114bbbfad3397af3a525d28c2bef729293d2a82d9973a33b214f512add41db24
                    • Opcode Fuzzy Hash: 6c98a33a492bb8c727d526eb655120d19585bf7f3e6ca06c6c347758dcc4d91e
                    • Instruction Fuzzy Hash: 40F21A70E05129CFDB64DF68C994ADDB7B2EF98304F1089A5C509AB754DB30AE82DF81
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.531720579.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_4f20000_AppLaunch.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID: 4 $4 $"$"
                    • API String ID: 1029625771-2362696517
                    • Opcode ID: 1b22767b29f877780b68ae3a856e8d282a03fd0c9dcd28d68e1b021b66f71468
                    • Instruction ID: 2195bb699dc163900e6d505d6972e7e07802ad4a182a10c54ec81225d2ea0ba3
                    • Opcode Fuzzy Hash: 1b22767b29f877780b68ae3a856e8d282a03fd0c9dcd28d68e1b021b66f71468
                    • Instruction Fuzzy Hash: 93E24F70E05228CFDB64DF64C994ADDB7B2FF98304F1089A5C509AB654DB30AE86DF81
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1242 4f2e330-4f2e34b 1243 4f2e351-4f2e358 1242->1243 1244 4f2e57d-4f2e5a5 1242->1244 1245 4f2e364-4f2e383 1243->1245 1246 4f2e35a-4f2e363 1243->1246 1258 4f2e5ac-4f2e6c4 1244->1258 1247 4f2e570-4f2e57c 1245->1247 1248 4f2e389-4f2e3aa 1245->1248 1250 4f2e3b2-4f2e3e0 1248->1250 1251 4f2e3ac-4f2e3b0 1248->1251 1255 4f2e3e5-4f2e46b call 4f2d568 1250->1255 1251->1250 1253 4f2e3e2 1251->1253 1253->1255 1314 4f2e46d call 4f2e330 1255->1314 1315 4f2e46d call 4f2e320 1255->1315 1316 4f2e46d call 4f2e70a 1255->1316 1317 4f2e46d call 4f25dcd 1255->1317 1281 4f2e6c6-4f2e6cc 1258->1281 1282 4f2e6cd-4f2e718 1258->1282 1271 4f2e473-4f2e481 call 4f2da78 1275 4f2e483-4f2e485 1271->1275 1276 4f2e4e0-4f2e4e4 1271->1276 1280 4f2e4c9-4f2e4d8 1275->1280 1278 4f2e4e6-4f2e4f3 1276->1278 1279 4f2e527-4f2e52e 1276->1279 1286 4f2e507-4f2e519 1278->1286 1287 4f2e4f5-4f2e4fa 1278->1287 1283 4f2e542-4f2e546 1279->1283 1284 4f2e530-4f2e537 1279->1284 1280->1276 1285 4f2e4da 1280->1285 1281->1282 1306 4f2e722-4f2e726 1282->1306 1307 4f2e71a 1282->1307 1291 4f2e568-4f2e56d 1283->1291 1292 4f2e548-4f2e54f 1283->1292 1284->1283 1288 4f2e539 1284->1288 1289 4f2e487-4f2e493 1285->1289 1290 4f2e4dc-4f2e4de 1285->1290 1286->1291 1299 4f2e51b-4f2e525 1286->1299 1287->1286 1293 4f2e4fc-4f2e505 1287->1293 1288->1283 1289->1258 1298 4f2e499-4f2e4c8 1289->1298 1290->1276 1290->1289 1291->1247 1292->1291 1297 4f2e551-4f2e567 1292->1297 1293->1291 1298->1280 1299->1291 1308 4f2e742 1306->1308 1309 4f2e728-4f2e734 1306->1309 1307->1306 1313 4f2e743 1308->1313 1310 4f2e736-4f2e739 1309->1310 1311 4f2e73c 1309->1311 1310->1311 1311->1308 1313->1313 1314->1271 1315->1271 1316->1271 1317->1271
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.531720579.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_4f20000_AppLaunch.jbxd
                    Similarity
                    • API ID:
                    • String ID: @A$T=
                    • API String ID: 0-2612569566
                    • Opcode ID: aadf62b8cdc2d910827659f8729e487008b78002db7fb69a0fdc62a476f8e090
                    • Instruction ID: ed35c8290ad96f8d8d8d5dea6507162cd026fffe7dbc2e3c05004e2db89128a0
                    • Opcode Fuzzy Hash: aadf62b8cdc2d910827659f8729e487008b78002db7fb69a0fdc62a476f8e090
                    • Instruction Fuzzy Hash: FDD16D71E002199FCB14DFA8C584AAEFBF2FF48314F25851AE519AB351DB34E946CB90
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1318 4f20858-4f208bb 1323 4f208c3-4f208e8 1318->1323 1325 4f208ea-4f2091a 1323->1325 1326 4f2091d-4f2096b 1323->1326 1325->1326 1327 4f20974-4f2097f 1326->1327 1328 4f2096d-4f20972 1326->1328 1330 4f20982-4f2098c 1327->1330 1328->1330 1332 4f209ae-4f209b2 1330->1332 1333 4f2098e-4f209ab 1330->1333 1335 4f209b4-4f209b9 1332->1335 1336 4f209bb-4f209c6 1332->1336 1333->1332 1337 4f209c9-4f209f6 1335->1337 1336->1337 1343 4f20a17-4f20a23 1337->1343 1344 4f209f8-4f20a12 1337->1344 1347 4f20a92-4f20abf 1343->1347 1348 4f20a25-4f20a33 1343->1348 1345 4f20ac2-4f20ad0 1344->1345 1347->1345 1350 4f20a63-4f20a90 1348->1350 1351 4f20a35-4f20a61 1348->1351 1350->1345 1351->1345
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.531720579.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_4f20000_AppLaunch.jbxd
                    Similarity
                    • API ID:
                    • String ID: OuP^$vrP^
                    • API String ID: 0-231419041
                    • Opcode ID: 73fbd92e5b79978c3d6f8aad529b143590e5b09cad735661d1be06664fcbdb32
                    • Instruction ID: 82ecf1726932e55ff21b69da22c7bb6ee675079de99e13ff6996a85c37aae0d5
                    • Opcode Fuzzy Hash: 73fbd92e5b79978c3d6f8aad529b143590e5b09cad735661d1be06664fcbdb32
                    • Instruction Fuzzy Hash: 308108B9E4021E9FDF14CFA9D9849AEB7F1BF48300F10A515D506EB290DB31A941CF21
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1500 4f20b38-4f20baf 1502 4f20bb1 1500->1502 1503 4f20bb6-4f20bce 1500->1503 1502->1503 1505 4f21197-4f211b2 1503->1505 1506 4f20bd4-4f20d71 1503->1506 1508 4f21236-4f2127f 1505->1508 1509 4f211b8-4f211d8 1505->1509 1564 4f20d73-4f20dad 1506->1564 1565 4f20daf-4f20db1 1506->1565 1521 4f21291-4f21299 1508->1521 1522 4f21281-4f2128c 1508->1522 1514 4f2147b 1509->1514 1515 4f211de-4f211e6 1509->1515 1520 4f21480-4f21489 1514->1520 1515->1514 1517 4f211ec-4f21201 1515->1517 1517->1514 1519 4f21207-4f21231 1517->1519 1519->1520 1524 4f21496 1520->1524 1525 4f2148b 1520->1525 1527 4f2129b-4f212bc 1521->1527 1528 4f212be 1521->1528 1526 4f21334-4f21380 1522->1526 1533 4f21497 1524->1533 1525->1524 1537 4f21411-4f21479 1526->1537 1538 4f21386-4f213b2 1526->1538 1530 4f212c5-4f212c7 1527->1530 1528->1530 1535 4f212d3-4f212f3 1530->1535 1536 4f212c9-4f212d1 1530->1536 1533->1533 1535->1526 1542 4f212f5-4f212fe 1535->1542 1536->1526 1537->1520 1538->1514 1546 4f213b8-4f213bf 1538->1546 1542->1514 1544 4f21304-4f21332 1542->1544 1544->1526 1544->1542 1546->1514 1547 4f213c5-4f213d1 1546->1547 1547->1514 1549 4f213d7-4f213e3 1547->1549 1549->1514 1550 4f213e9-4f2140f 1549->1550 1550->1520 1564->1565 1566 4f20db3-4f20db5 1565->1566 1567 4f20db7-4f20dc1 1565->1567 1569 4f20dc3-4f20ddb 1566->1569 1567->1569 1571 4f20de1-4f20de9 1569->1571 1572 4f20ddd-4f20ddf 1569->1572 1574 4f20deb-4f20df0 1571->1574 1572->1574 1575 4f20df2-4f20dfd 1574->1575 1576 4f20e03-4f20e31 1574->1576 1575->1576 1580 4f20e33-4f20e40 1576->1580 1581 4f20e6e-4f20e7d 1576->1581 1580->1581 1585 4f20e42-4f20e53 1580->1585 1582 4f20e86-4f20f07 1581->1582 1583 4f20e7f 1581->1583 1595 4f20f49-4f20f57 1582->1595 1596 4f20f09-4f20f47 1582->1596 1583->1582 1589 4f20e55-4f20e57 1585->1589 1590 4f20e59-4f20e68 1585->1590 1589->1581 1590->1581 1599 4f20f62-4f21028 call 4f21dd0 1595->1599 1596->1599 1617 4f2102e call 4f22700 1599->1617 1618 4f2102e call 4f226ef 1599->1618 1607 4f21034-4f21036 1608 4f21064-4f21080 1607->1608 1609 4f21038-4f21054 1607->1609 1612 4f21082 1608->1612 1613 4f2108e-4f2108f 1608->1613 1614 4f21060-4f21062 1609->1614 1612->1613 1613->1505 1614->1608 1614->1609 1617->1607 1618->1607
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.531720579.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_4f20000_AppLaunch.jbxd
                    Similarity
                    • API ID:
                    • String ID: %M,
                    • API String ID: 0-3015641868
                    • Opcode ID: ebcdececbe9f696b6d96ac78bef0e0b26d7d29b34f4bfbad8172d599284d520a
                    • Instruction ID: 07b8147f78cd2d9d7644ee4d70581b8b00d56f0b52f706a3f225a5ef4aa087ac
                    • Opcode Fuzzy Hash: ebcdececbe9f696b6d96ac78bef0e0b26d7d29b34f4bfbad8172d599284d520a
                    • Instruction Fuzzy Hash: 1E328F71E01629CFDB14CF69D985AAEB7F2BF88304F118669D00AEB354DB34A942CF51
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1755 4f20b28-4f20baf 1757 4f20bb1 1755->1757 1758 4f20bb6-4f20bce 1755->1758 1757->1758 1760 4f21197-4f211b2 1758->1760 1761 4f20bd4-4f20d71 1758->1761 1763 4f21236-4f2127f 1760->1763 1764 4f211b8-4f211d8 1760->1764 1819 4f20d73-4f20dad 1761->1819 1820 4f20daf-4f20db1 1761->1820 1776 4f21291-4f21299 1763->1776 1777 4f21281-4f2128c 1763->1777 1769 4f2147b 1764->1769 1770 4f211de-4f211e6 1764->1770 1775 4f21480-4f21489 1769->1775 1770->1769 1772 4f211ec-4f21201 1770->1772 1772->1769 1774 4f21207-4f21231 1772->1774 1774->1775 1779 4f21496 1775->1779 1780 4f2148b 1775->1780 1782 4f2129b-4f212bc 1776->1782 1783 4f212be 1776->1783 1781 4f21334-4f21380 1777->1781 1788 4f21497 1779->1788 1780->1779 1792 4f21411-4f21479 1781->1792 1793 4f21386-4f213b2 1781->1793 1785 4f212c5-4f212c7 1782->1785 1783->1785 1790 4f212d3-4f212f3 1785->1790 1791 4f212c9-4f212d1 1785->1791 1788->1788 1790->1781 1797 4f212f5-4f212fe 1790->1797 1791->1781 1792->1775 1793->1769 1801 4f213b8-4f213bf 1793->1801 1797->1769 1799 4f21304-4f21332 1797->1799 1799->1781 1799->1797 1801->1769 1802 4f213c5-4f213d1 1801->1802 1802->1769 1804 4f213d7-4f213e3 1802->1804 1804->1769 1805 4f213e9-4f2140f 1804->1805 1805->1775 1819->1820 1821 4f20db3-4f20db5 1820->1821 1822 4f20db7-4f20dc1 1820->1822 1824 4f20dc3-4f20ddb 1821->1824 1822->1824 1826 4f20de1-4f20de9 1824->1826 1827 4f20ddd-4f20ddf 1824->1827 1829 4f20deb-4f20df0 1826->1829 1827->1829 1830 4f20df2-4f20dfd 1829->1830 1831 4f20e03-4f20e31 1829->1831 1830->1831 1835 4f20e33-4f20e40 1831->1835 1836 4f20e6e-4f20e7d 1831->1836 1835->1836 1840 4f20e42-4f20e53 1835->1840 1837 4f20e86-4f20f07 1836->1837 1838 4f20e7f 1836->1838 1850 4f20f49-4f20f57 1837->1850 1851 4f20f09-4f20f47 1837->1851 1838->1837 1844 4f20e55-4f20e57 1840->1844 1845 4f20e59-4f20e68 1840->1845 1844->1836 1845->1836 1854 4f20f62-4f21028 call 4f21dd0 1850->1854 1851->1854 1871 4f2102e call 4f22700 1854->1871 1872 4f2102e call 4f226ef 1854->1872 1862 4f21034-4f21036 1863 4f21064-4f21080 1862->1863 1864 4f21038-4f21054 1862->1864 1867 4f21082 1863->1867 1868 4f2108e-4f2108f 1863->1868 1869 4f21060-4f21062 1864->1869 1867->1868 1868->1760 1869->1863 1869->1864 1871->1862 1872->1862
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.531720579.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_4f20000_AppLaunch.jbxd
                    Similarity
                    • API ID:
                    • String ID: %M,
                    • API String ID: 0-3015641868
                    • Opcode ID: 3964205ade23f1443af2a06dd4f908234a42b05a38d3cba59be5853a999a6434
                    • Instruction ID: dc8f8bec6d5236dc91d5084bb751d792113793fdda09ca7c95ccaa89602f9417
                    • Opcode Fuzzy Hash: 3964205ade23f1443af2a06dd4f908234a42b05a38d3cba59be5853a999a6434
                    • Instruction Fuzzy Hash: 85E1BE31E016298FDB14CF79D945AAEB7F2BF88304F018669D409EB354DB34A945CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1874 4f20b72-4f20b88 1876 4f20b95-4f20baf 1874->1876 1877 4f20b8a-4f20b94 1874->1877 1878 4f20bb1 1876->1878 1879 4f20bb6-4f20bce 1876->1879 1878->1879 1881 4f21197-4f211b2 1879->1881 1882 4f20bd4-4f20d71 1879->1882 1884 4f21236-4f2127f 1881->1884 1885 4f211b8-4f211d8 1881->1885 1940 4f20d73-4f20dad 1882->1940 1941 4f20daf-4f20db1 1882->1941 1897 4f21291-4f21299 1884->1897 1898 4f21281-4f2128c 1884->1898 1890 4f2147b 1885->1890 1891 4f211de-4f211e6 1885->1891 1896 4f21480-4f21489 1890->1896 1891->1890 1893 4f211ec-4f21201 1891->1893 1893->1890 1895 4f21207-4f21231 1893->1895 1895->1896 1900 4f21496 1896->1900 1901 4f2148b 1896->1901 1903 4f2129b-4f212bc 1897->1903 1904 4f212be 1897->1904 1902 4f21334-4f21380 1898->1902 1909 4f21497 1900->1909 1901->1900 1913 4f21411-4f21479 1902->1913 1914 4f21386-4f213b2 1902->1914 1906 4f212c5-4f212c7 1903->1906 1904->1906 1911 4f212d3-4f212f3 1906->1911 1912 4f212c9-4f212d1 1906->1912 1909->1909 1911->1902 1918 4f212f5-4f212fe 1911->1918 1912->1902 1913->1896 1914->1890 1922 4f213b8-4f213bf 1914->1922 1918->1890 1920 4f21304-4f21332 1918->1920 1920->1902 1920->1918 1922->1890 1923 4f213c5-4f213d1 1922->1923 1923->1890 1925 4f213d7-4f213e3 1923->1925 1925->1890 1926 4f213e9-4f2140f 1925->1926 1926->1896 1940->1941 1942 4f20db3-4f20db5 1941->1942 1943 4f20db7-4f20dc1 1941->1943 1945 4f20dc3-4f20ddb 1942->1945 1943->1945 1947 4f20de1-4f20de9 1945->1947 1948 4f20ddd-4f20ddf 1945->1948 1950 4f20deb-4f20df0 1947->1950 1948->1950 1951 4f20df2-4f20dfd 1950->1951 1952 4f20e03-4f20e31 1950->1952 1951->1952 1956 4f20e33-4f20e40 1952->1956 1957 4f20e6e-4f20e7d 1952->1957 1956->1957 1961 4f20e42-4f20e53 1956->1961 1958 4f20e86-4f20f07 1957->1958 1959 4f20e7f 1957->1959 1971 4f20f49-4f20f57 1958->1971 1972 4f20f09-4f20f47 1958->1972 1959->1958 1965 4f20e55-4f20e57 1961->1965 1966 4f20e59-4f20e68 1961->1966 1965->1957 1966->1957 1975 4f20f62-4f21028 call 4f21dd0 1971->1975 1972->1975 1993 4f2102e call 4f22700 1975->1993 1994 4f2102e call 4f226ef 1975->1994 1983 4f21034-4f21036 1984 4f21064-4f21080 1983->1984 1985 4f21038-4f21054 1983->1985 1988 4f21082 1984->1988 1989 4f2108e-4f2108f 1984->1989 1990 4f21060-4f21062 1985->1990 1988->1989 1989->1881 1990->1984 1990->1985 1993->1983 1994->1983
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.531720579.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_4f20000_AppLaunch.jbxd
                    Similarity
                    • API ID:
                    • String ID: %M,
                    • API String ID: 0-3015641868
                    • Opcode ID: ba9a53e02d6616dc700bb5945811d2138ce274558998b951b63da3f143a25a97
                    • Instruction ID: 3abddc0d8e14a91879217ad84bbce558a5618d210dbb894f9d86eb89dbc90ac6
                    • Opcode Fuzzy Hash: ba9a53e02d6616dc700bb5945811d2138ce274558998b951b63da3f143a25a97
                    • Instruction Fuzzy Hash: B9D1CD31E016298FDB24CF79D945AAEB7F2BF88305F018669D009EB354DB34A941CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.531720579.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_4f20000_AppLaunch.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: cc1c8a80850909445e4c5085eadcc0ab38d4721f820bd989adcd2162dfba3d54
                    • Instruction ID: 3546be8d4e4d44e9388f5d280f035b7f4bf992df749de81fbdba691d38ee87ab
                    • Opcode Fuzzy Hash: cc1c8a80850909445e4c5085eadcc0ab38d4721f820bd989adcd2162dfba3d54
                    • Instruction Fuzzy Hash: E2F16071E04139CFCB14CF68CA85BACBBF2AF84304F1985A9D059AB255D734AD86CF54
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.531720579.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_4f20000_AppLaunch.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8b9e2d83f11abc6927f055ac0f84e1a8836f17f558772b7006a8ed51fc3be462
                    • Instruction ID: d5b862b9d7eb8d82d8c0aa78c17b61d03259636de0c9aacff777a7affc708b44
                    • Opcode Fuzzy Hash: 8b9e2d83f11abc6927f055ac0f84e1a8836f17f558772b7006a8ed51fc3be462
                    • Instruction Fuzzy Hash: 31B16E70E00659CFDB10CFA9CA857EEBBF2AF88314F148529D419A7354EB74A946CF81
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.531720579.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_4f20000_AppLaunch.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c9b745e42cd5e02f4f3ebaa7bec9a220dc5f27eb0c3d755ae168201be3d34c65
                    • Instruction ID: 23926a253dd8034d4748e71d05159c267f2147c4f0be1e37a3810d39e9634079
                    • Opcode Fuzzy Hash: c9b745e42cd5e02f4f3ebaa7bec9a220dc5f27eb0c3d755ae168201be3d34c65
                    • Instruction Fuzzy Hash: 7BB18E70E00659CFDB10CFA8CA857DDBBF2BF48314F148529E819A7354EB74A846CB91
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.531720579.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_4f20000_AppLaunch.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5f142424a16eb852031a268857f08456c45ce48e74351e3dc244c3b822bda27d
                    • Instruction ID: 2a88df22aa562a30a8a4720b628d45c4783fdd69cc315c5d9603baf45a7ac862
                    • Opcode Fuzzy Hash: 5f142424a16eb852031a268857f08456c45ce48e74351e3dc244c3b822bda27d
                    • Instruction Fuzzy Hash: 00818A32F105248FC754DB69CE84A9EB7E3AFC8714F1A8564E409EB765DB30EC428B90
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.531720579.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_4f20000_AppLaunch.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5d847f2594ce33ce0bfa9e559b6f17eb2520e4ba27ea6db47ff38060716b6de6
                    • Instruction ID: e693d01c057ad7917c0b991bf8beab8ff3d55b6833205cba572db672b503a050
                    • Opcode Fuzzy Hash: 5d847f2594ce33ce0bfa9e559b6f17eb2520e4ba27ea6db47ff38060716b6de6
                    • Instruction Fuzzy Hash: F3916171E00129CFCB14CF68CA81BADB7B2BF84304F29C6A8D015AB695D734AD86CF55
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1995 4f265a8-4f29d37 1997 4f29d8b-4f29dd7 LoadLibraryA 1995->1997 1998 4f29d39-4f29d5e 1995->1998 2002 4f29de0-4f29e11 1997->2002 2003 4f29dd9-4f29ddf 1997->2003 1998->1997 2001 4f29d60-4f29d62 1998->2001 2004 4f29d64-4f29d6e 2001->2004 2005 4f29d85-4f29d88 2001->2005 2010 4f29e13-4f29e17 2002->2010 2011 4f29e21 2002->2011 2003->2002 2007 4f29d72-4f29d81 2004->2007 2008 4f29d70 2004->2008 2005->1997 2007->2007 2012 4f29d83 2007->2012 2008->2007 2010->2011 2013 4f29e19 2010->2013 2014 4f29e22 2011->2014 2012->2005 2013->2011 2014->2014
                    APIs
                    • LoadLibraryA.KERNELBASE(?), ref: 04F29DC7
                    Memory Dump Source
                    • Source File: 00000002.00000002.531720579.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_4f20000_AppLaunch.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID:
                    • API String ID: 1029625771-0
                    • Opcode ID: 605750ae06d9e115b61f6e0f00cc8b3e9348e5dcf92ee7466817a6eccc80a9e2
                    • Instruction ID: fe80674df95c6aef70d421c821b86454224ea25faa38b439c7e6581e8139adcc
                    • Opcode Fuzzy Hash: 605750ae06d9e115b61f6e0f00cc8b3e9348e5dcf92ee7466817a6eccc80a9e2
                    • Instruction Fuzzy Hash: C6414AB0E006589FDB10CFA9C984BDEBBF1FB48314F148529D859A7344D7B4A846CF91
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2015 9118339-911833d 2016 91182eb-911831b call 9116f3c 2015->2016 2017 911833f-9118382 2015->2017 2028 9118320-911832d 2016->2028 2018 9118384 2017->2018 2019 911838e-91183be EnumThreadWindows 2017->2019 2023 911838c 2018->2023 2021 91183c0-91183c6 2019->2021 2022 91183c7-91183f4 2019->2022 2021->2022 2023->2019
                    APIs
                    • EnumThreadWindows.USER32(?,00000000,?,?,?,?,00000E28,?,?,09118320,07AD6D24,06B65A44), ref: 091183B1
                    Memory Dump Source
                    • Source File: 00000002.00000002.532403993.0000000009110000.00000040.00000800.00020000.00000000.sdmp, Offset: 09110000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_9110000_AppLaunch.jbxd
                    Similarity
                    • API ID: EnumThreadWindows
                    • String ID:
                    • API String ID: 2941952884-0
                    • Opcode ID: 771dd4333b315be9830da70d5fce5c0d403fbc01dfc8daa8bbd70e27bd76839c
                    • Instruction ID: 50451b62b019f4748d71f009bfc8451646f28ad13104e4a1285968409a771aab
                    • Opcode Fuzzy Hash: 771dd4333b315be9830da70d5fce5c0d403fbc01dfc8daa8bbd70e27bd76839c
                    • Instruction Fuzzy Hash: E7313371A1020A9FDB10CF99D844BEEFBF5FB88328F14852AE419A7350D774A945CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2029 91155fc-91166f4 DuplicateHandle 2031 91166f6-91166fc 2029->2031 2032 91166fd-911671a 2029->2032 2031->2032
                    APIs
                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,09116626,?,?,?,?,?), ref: 091166E7
                    Memory Dump Source
                    • Source File: 00000002.00000002.532403993.0000000009110000.00000040.00000800.00020000.00000000.sdmp, Offset: 09110000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_9110000_AppLaunch.jbxd
                    Similarity
                    • API ID: DuplicateHandle
                    • String ID:
                    • API String ID: 3793708945-0
                    • Opcode ID: b3ffeddddd64ab45336efc241c90126696686365717c8732242ae19648ff4210
                    • Instruction ID: 9366affbc8c07c47254a222cfd5b1270598c6b67ac467f9c42c100fddfb5c31c
                    • Opcode Fuzzy Hash: b3ffeddddd64ab45336efc241c90126696686365717c8732242ae19648ff4210
                    • Instruction Fuzzy Hash: 2B21E6B5D00209EFDB10CF9AD984ADEBBF8EB48354F54842AE914B3350D374A954CFA5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2035 9116658-91166f4 DuplicateHandle 2036 91166f6-91166fc 2035->2036 2037 91166fd-911671a 2035->2037 2036->2037
                    APIs
                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,09116626,?,?,?,?,?), ref: 091166E7
                    Memory Dump Source
                    • Source File: 00000002.00000002.532403993.0000000009110000.00000040.00000800.00020000.00000000.sdmp, Offset: 09110000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_9110000_AppLaunch.jbxd
                    Similarity
                    • API ID: DuplicateHandle
                    • String ID:
                    • API String ID: 3793708945-0
                    • Opcode ID: 52dfcdbdac34c9430d07b973dcc0c6567fc27a5a2b54250038b01d5ad9b68952
                    • Instruction ID: c6f69e7b940892edff404a00211cccb1ab786756fef71779a2bbcabb6cb62522
                    • Opcode Fuzzy Hash: 52dfcdbdac34c9430d07b973dcc0c6567fc27a5a2b54250038b01d5ad9b68952
                    • Instruction Fuzzy Hash: 182103B5D00209AFDB10CFA9D884AEEBFF4FB48314F14852AE915A3310C374A954CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2040 9116f3c-9118382 2042 9118384 2040->2042 2043 911838e-91183be EnumThreadWindows 2040->2043 2046 911838c 2042->2046 2044 91183c0-91183c6 2043->2044 2045 91183c7-91183f4 2043->2045 2044->2045 2046->2043
                    APIs
                    • EnumThreadWindows.USER32(?,00000000,?,?,?,?,00000E28,?,?,09118320,07AD6D24,06B65A44), ref: 091183B1
                    Memory Dump Source
                    • Source File: 00000002.00000002.532403993.0000000009110000.00000040.00000800.00020000.00000000.sdmp, Offset: 09110000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_9110000_AppLaunch.jbxd
                    Similarity
                    • API ID: EnumThreadWindows
                    • String ID:
                    • API String ID: 2941952884-0
                    • Opcode ID: 0a2938e014d7b8a73eb0e6ab8693d216a4da5b12a1cb15ae860b3843b65c7bb0
                    • Instruction ID: 0533fde19dc11901b62c69ba06abad65eaa7bc816688e71211d8028aba992ad9
                    • Opcode Fuzzy Hash: 0a2938e014d7b8a73eb0e6ab8693d216a4da5b12a1cb15ae860b3843b65c7bb0
                    • Instruction Fuzzy Hash: 62212971E102099FDB14CF9AC848BEEFBF5EB88314F04882AD455A7340D774A945CFA5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2049 91151f4-9118713 2051 9118715-9118718 2049->2051 2052 911871b-911871f 2049->2052 2051->2052 2053 9118721-9118724 2052->2053 2054 9118727-911875a MessageBoxW 2052->2054 2053->2054 2055 9118763-9118777 2054->2055 2056 911875c-9118762 2054->2056 2056->2055
                    APIs
                    • MessageBoxW.USER32(?,00000000,00000000,?,?,?,?,?,?,?,0911585D,?,?,?), ref: 0911874D
                    Memory Dump Source
                    • Source File: 00000002.00000002.532403993.0000000009110000.00000040.00000800.00020000.00000000.sdmp, Offset: 09110000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_9110000_AppLaunch.jbxd
                    Similarity
                    • API ID: Message
                    • String ID:
                    • API String ID: 2030045667-0
                    • Opcode ID: 4d63112c8f49ea7f05d6b8b7c4976cfbb10fd6eb2077eb17676df2464ddc7c84
                    • Instruction ID: 5ab46f19f7c59a447aa046b1f230b924f982201d38ef0d72183971733ac79371
                    • Opcode Fuzzy Hash: 4d63112c8f49ea7f05d6b8b7c4976cfbb10fd6eb2077eb17676df2464ddc7c84
                    • Instruction Fuzzy Hash: DE2102B5D01309AFCB10CF9AD884ADEFBB5FB88354F14856EE819A7600C374A945CBA5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • MessageBoxW.USER32(?,00000000,00000000,?,?,?,?,?,?,?,0911585D,?,?,?), ref: 0911874D
                    Memory Dump Source
                    • Source File: 00000002.00000002.532403993.0000000009110000.00000040.00000800.00020000.00000000.sdmp, Offset: 09110000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_9110000_AppLaunch.jbxd
                    Similarity
                    • API ID: Message
                    • String ID:
                    • API String ID: 2030045667-0
                    • Opcode ID: dfb50e202ebb816f448ec6c21c1db2e4fa4591aa683c9ffea0b53a3c8ea55db1
                    • Instruction ID: 2921c2c22c53b4110e458420401acd2460d7fd628f555415747f1ecc3f28f9d3
                    • Opcode Fuzzy Hash: dfb50e202ebb816f448ec6c21c1db2e4fa4591aa683c9ffea0b53a3c8ea55db1
                    • Instruction Fuzzy Hash: 3D21F0B5D01709AFDB14CF99D884ADEFBB5FB88314F14856EE819A7200C374A949CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • OleInitialize.OLE32(00000000), ref: 091174E5
                    Memory Dump Source
                    • Source File: 00000002.00000002.532403993.0000000009110000.00000040.00000800.00020000.00000000.sdmp, Offset: 09110000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_9110000_AppLaunch.jbxd
                    Similarity
                    • API ID: Initialize
                    • String ID:
                    • API String ID: 2538663250-0
                    • Opcode ID: 9d95e081f831e1452f9e5f15b9111771cf3ccd4f6f01ceb31daaf1a8855acbac
                    • Instruction ID: 27b04e516f713c00f66338f950fe023f2d054af144b83fd25bb97c699bd274af
                    • Opcode Fuzzy Hash: 9d95e081f831e1452f9e5f15b9111771cf3ccd4f6f01ceb31daaf1a8855acbac
                    • Instruction Fuzzy Hash: 3E1103B19047499FCB20DFA9D488B9EBBF8EB48328F14881AD519A7740D374A944CFA5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • OleInitialize.OLE32(00000000), ref: 091174E5
                    Memory Dump Source
                    • Source File: 00000002.00000002.532403993.0000000009110000.00000040.00000800.00020000.00000000.sdmp, Offset: 09110000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_9110000_AppLaunch.jbxd
                    Similarity
                    • API ID: Initialize
                    • String ID:
                    • API String ID: 2538663250-0
                    • Opcode ID: 0dc3a446dc7f2259dc3af2ef8db6cecb8c59c8e546375cd1dd5653ff727da450
                    • Instruction ID: c1870358e08b44191fcac8cdc553864320358ac2bcbb5d1a688aab176ba751e4
                    • Opcode Fuzzy Hash: 0dc3a446dc7f2259dc3af2ef8db6cecb8c59c8e546375cd1dd5653ff727da450
                    • Instruction Fuzzy Hash: B211F2B1D006499FDB24CFA9D489BDEBBF4EB48324F24881AD519A3650C378A945CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.531542882.0000000000D6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D6D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_d6d000_AppLaunch.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: aaceaa588ad8b47e49dc388b24dc7da225835c7dcc1cde7b08e09f02e4af14ea
                    • Instruction ID: 5cd3201b0835817e672cdc197c8a56d05975cffcb1fdf8cccd06f51d8d9cf01c
                    • Opcode Fuzzy Hash: aaceaa588ad8b47e49dc388b24dc7da225835c7dcc1cde7b08e09f02e4af14ea
                    • Instruction Fuzzy Hash: 2F213AB1A04248DFDB05DF54E8C0F16BF66FB98324F248569E9094B246C336D856C7B2
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.531542882.0000000000D6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D6D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_d6d000_AppLaunch.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 229705350ce13a5b282d8c1804e29b2062b75cb22bf5dbe879fac031c9242c1d
                    • Instruction ID: fd36fc41a9af38ee39413ecea789a23c33dfdd7d6eed2168971183b62f348c78
                    • Opcode Fuzzy Hash: 229705350ce13a5b282d8c1804e29b2062b75cb22bf5dbe879fac031c9242c1d
                    • Instruction Fuzzy Hash: B7214871A04340DFCB11CF14E8C0B26BF66FB98318F248569E8064B606C336D855CBB2
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.531542882.0000000000D6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D6D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_d6d000_AppLaunch.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5a368cc5c02d0b3c716e3061d2d03e1c83b6206fc9b52232e2685b0d252f8fbb
                    • Instruction ID: a16f3837f2a7a65d8bf31fca4ec390ce98e25079cae9b1dae4df0162df65c12c
                    • Opcode Fuzzy Hash: 5a368cc5c02d0b3c716e3061d2d03e1c83b6206fc9b52232e2685b0d252f8fbb
                    • Instruction Fuzzy Hash: 4411D376904280CFCF11CF10D5C4B16BF72FB99324F28C6A9D80A4B616C336D856CBA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.531542882.0000000000D6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D6D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_d6d000_AppLaunch.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5a368cc5c02d0b3c716e3061d2d03e1c83b6206fc9b52232e2685b0d252f8fbb
                    • Instruction ID: f53bf1661b39301aebed19d334604334a6f115a705315b580f31d9cdc831ed9b
                    • Opcode Fuzzy Hash: 5a368cc5c02d0b3c716e3061d2d03e1c83b6206fc9b52232e2685b0d252f8fbb
                    • Instruction Fuzzy Hash: 0211D376904284CFCB11CF50E5C4B16BF72FB94320F28C6A9D8494B656C336D85ACBA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.531720579.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_4f20000_AppLaunch.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID: 0-3916222277
                    • Opcode ID: 122c9dd2c8670b89407f38a9ea05bc111e667b1959431e07876f17d6e6c4903b
                    • Instruction ID: 1c242038c883c43c29a483bb6d3af511f873d377c578caea7cfc68aa19ae9110
                    • Opcode Fuzzy Hash: 122c9dd2c8670b89407f38a9ea05bc111e667b1959431e07876f17d6e6c4903b
                    • Instruction Fuzzy Hash: B4510231F001258FCB14CFADC9845AEB7B2EBC8215B16C579D609DB399EB31EC528B90
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.531720579.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_4f20000_AppLaunch.jbxd
                    Similarity
                    • API ID:
                    • String ID: %M,
                    • API String ID: 0-3015641868
                    • Opcode ID: 58f43f20c113a1f9c60315556ae6e46ab200f0bd00e0701a16cf2f0e9d11c9ca
                    • Instruction ID: 69c420f83bf6cd9c4b910ba246d63a86188a706a7d4731f20863cf4ce7687565
                    • Opcode Fuzzy Hash: 58f43f20c113a1f9c60315556ae6e46ab200f0bd00e0701a16cf2f0e9d11c9ca
                    • Instruction Fuzzy Hash: 76413978E5111ECFDF10CFA8E981AADB7B1BF49300F15A619E016EB240DB30A545CB54
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.532403993.0000000009110000.00000040.00000800.00020000.00000000.sdmp, Offset: 09110000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_9110000_AppLaunch.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c914eaa19dede59c87e5edf61f8884be16f22336b74bf166e7f3eb904fb320ef
                    • Instruction ID: 2908290f0fc8807e5cea7564aa365267a8157ccc4a4b1bbbf32d5788f1fc0965
                    • Opcode Fuzzy Hash: c914eaa19dede59c87e5edf61f8884be16f22336b74bf166e7f3eb904fb320ef
                    • Instruction Fuzzy Hash: 161293F14117868BE710CF66ED981893BA1B7C6328F904218F2616BAD1D7BC158ACFC6
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.531720579.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_4f20000_AppLaunch.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c32316b98343e35d3f1faadfe46af2a6ed05bbd1dc81fcc2607a3aadf187adb4
                    • Instruction ID: 250885a411f6c7a052f1075e7a4f5d070931ac0d1178bb5adb3c92553978aadc
                    • Opcode Fuzzy Hash: c32316b98343e35d3f1faadfe46af2a6ed05bbd1dc81fcc2607a3aadf187adb4
                    • Instruction Fuzzy Hash: 4E915071E00259DFDF24CFA9CA857DEBBF2AF48314F148529E409A7394DB74A846CB81
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.532403993.0000000009110000.00000040.00000800.00020000.00000000.sdmp, Offset: 09110000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_9110000_AppLaunch.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c5306076b2f6f4eb44b2f9febd4d421f14b4673094bfe74116975e22b8274059
                    • Instruction ID: 9cc5f642df9f33b21d2639c21af2427a5eff6e8edcbcaab15a256d40ff620fa7
                    • Opcode Fuzzy Hash: c5306076b2f6f4eb44b2f9febd4d421f14b4673094bfe74116975e22b8274059
                    • Instruction Fuzzy Hash: 89C11BB18117868BD710CF66ED981897BB1BBC6328F504718F2616BAD0D7BC158ACFC6
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.531720579.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_4f20000_AppLaunch.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 6a5a30aec7156a9c26c4aaae6a79a05076c2af2357e40ade23e177e8664b650e
                    • Instruction ID: 6a090703554ce4d0d6663cd4c411ecb7b4ffd8bbb4745c5b204a0cb9269da415
                    • Opcode Fuzzy Hash: 6a5a30aec7156a9c26c4aaae6a79a05076c2af2357e40ade23e177e8664b650e
                    • Instruction Fuzzy Hash: 7C616832F105258BC714DB69CE84A9EB7E3AFC8714F1A8564E419AB765DF30EC028B90
                    Uniqueness

                    Uniqueness Score: -1.00%