Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Q9FAsn6SG6

Overview

General Information

Sample Name:Q9FAsn6SG6 (renamed file extension from none to exe)
Analysis ID:620828
MD5:c61f9a9059f8b8bd0e69f7df4cb09786
SHA1:70fffde0debf4559859617d49dc48c54df3c156d
SHA256:84a5a26f1748c3ad1f0b98c438908e8dc842eacc6390484527ee1fe7e56264f5
Tags:32exetrojan
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Writes to foreign memory regions
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Machine Learning detection for sample
Allocates memory in foreign processes
May check the online IP address of the machine
Injects a PE file into a foreign processes
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
PE file contains sections with non-standard names
Contains capabilities to detect virtual machines
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
PE / OLE file has an invalid certificate
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
HTTP GET or POST without a user agent
Creates a process in suspended mode (likely to inject code)
IP address seen in connection with other malware
Entry point lies outside standard sections
Enables debug privileges

Classification

  • System is w10x64
  • Q9FAsn6SG6.exe (PID: 6712 cmdline: "C:\Users\user\Desktop\Q9FAsn6SG6.exe" MD5: C61F9A9059F8B8BD0E69F7DF4CB09786)
    • conhost.exe (PID: 6728 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • AppLaunch.exe (PID: 6780 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe MD5: 6807F903AC06FF7E1670181378690B22)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Q9FAsn6SG6.exeAvira: detected
Source: Q9FAsn6SG6.exeVirustotal: Detection: 69%Perma Link
Source: Q9FAsn6SG6.exeMetadefender: Detection: 31%Perma Link
Source: Q9FAsn6SG6.exeReversingLabs: Detection: 69%
Source: Q9FAsn6SG6.exeJoe Sandbox ML: detected
Source: Q9FAsn6SG6.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE

Networking

barindex
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeDNS query: name: ip-api.com
Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
Source: Q9FAsn6SG6.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCodeSigningCA-1.crt0
Source: Q9FAsn6SG6.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: Q9FAsn6SG6.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: Q9FAsn6SG6.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: Q9FAsn6SG6.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: Q9FAsn6SG6.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
Source: Q9FAsn6SG6.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: Q9FAsn6SG6.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: Q9FAsn6SG6.exeString found in binary or memory: http://crl3.digicert.com/assured-cs-g1.crl00
Source: Q9FAsn6SG6.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: Q9FAsn6SG6.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: Q9FAsn6SG6.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: Q9FAsn6SG6.exeString found in binary or memory: http://crl4.digicert.com/assured-cs-g1.crl0L
Source: Q9FAsn6SG6.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: Q9FAsn6SG6.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
Source: AppLaunch.exe, 00000002.00000002.532195437.0000000006B47000.00000004.00000800.00020000.00000000.sdmp, AppLaunch.exe, 00000002.00000002.532225269.0000000006B5A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
Source: AppLaunch.exe, 00000002.00000002.532195437.0000000006B47000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
Source: AppLaunch.exe, 00000002.00000002.532195437.0000000006B47000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com4
Source: Q9FAsn6SG6.exeString found in binary or memory: http://ocsp.comodoca.com0
Source: Q9FAsn6SG6.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: Q9FAsn6SG6.exeString found in binary or memory: http://ocsp.digicert.com0L
Source: Q9FAsn6SG6.exeString found in binary or memory: http://ocsp.digicert.com0O
Source: Q9FAsn6SG6.exeString found in binary or memory: http://ocsp.sectigo.com0
Source: Q9FAsn6SG6.exeString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
Source: Q9FAsn6SG6.exeString found in binary or memory: http://s2.symcb.com0
Source: AppLaunch.exe, 00000002.00000002.532195437.0000000006B47000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: Q9FAsn6SG6.exeString found in binary or memory: http://sv.symcb.com/sv.crl0a
Source: Q9FAsn6SG6.exeString found in binary or memory: http://sv.symcb.com/sv.crt0
Source: Q9FAsn6SG6.exeString found in binary or memory: http://sv.symcd.com0&
Source: Q9FAsn6SG6.exeString found in binary or memory: http://www.digicert.com/CPS0
Source: Q9FAsn6SG6.exeString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: Q9FAsn6SG6.exeString found in binary or memory: http://www.symauth.com/cps0(
Source: Q9FAsn6SG6.exeString found in binary or memory: http://www.symauth.com/rpa00
Source: Q9FAsn6SG6.exeString found in binary or memory: http://www.vmware.com/0
Source: Q9FAsn6SG6.exeString found in binary or memory: http://www.vmware.com/0/
Source: Q9FAsn6SG6.exeString found in binary or memory: https://d.symcb.com/cps0%
Source: Q9FAsn6SG6.exeString found in binary or memory: https://d.symcb.com/rpa0
Source: Q9FAsn6SG6.exeString found in binary or memory: https://pidgin.im0
Source: Q9FAsn6SG6.exeString found in binary or memory: https://sectigo.com/CPS0
Source: Q9FAsn6SG6.exeString found in binary or memory: https://www.digicert.com/CPS0
Source: unknownDNS traffic detected: queries for: ip-api.com
Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
Source: Q9FAsn6SG6.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: Q9FAsn6SG6.exe, 00000000.00000002.268728178.0000000000E33000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePennyWise.exe4 vs Q9FAsn6SG6.exe
Source: Q9FAsn6SG6.exe, 00000000.00000003.268281523.000000000314E000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePennyWise.exe4 vs Q9FAsn6SG6.exe
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F21499
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F281C0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F2C3D0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F2E330
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F2CCA0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F21DD0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F20858
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F20B38
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F21590
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F21091
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F2C088
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F281B0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F22108
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F21E81
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F20B72
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_04F20B28
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_09117530
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 2_2_09117520
Source: Q9FAsn6SG6.exeStatic PE information: invalid certificate
Source: Q9FAsn6SG6.exeVirustotal: Detection: 69%
Source: Q9FAsn6SG6.exeMetadefender: Detection: 31%
Source: Q9FAsn6SG6.exeReversingLabs: Detection: 69%
Source: C:\Users\user\Desktop\Q9FAsn6SG6.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: unknownProcess created: C:\Users\user\Desktop\Q9FAsn6SG6.exe "C:\Users\user\Desktop\Q9FAsn6SG6.exe"
Source: C:\Users\user\Desktop\Q9FAsn6SG6.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Q9FAsn6SG6.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
Source: C:\Users\user\Desktop\Q9FAsn6SG6.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeMutant created: \Sessions\1\BaseNamedObjects\9D16FBEF0D8A8F87529DE06A1C43C737
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6728:120:WilError_01
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeFile created: C:\Users\user\AppData\Local\86fddf902dc7d50e1674857833db815dJump to behavior
Source: classification engineClassification label: mal88.troj.evad.winEXE@4/0@1/1
Source: 0.3.Q9FAsn6SG6.exe.3130000.0.unpack, u0002u2002.csCryptographic APIs: 'CreateDecryptor'
Source: 2.2.AppLaunch.exe.400000.0.unpack, u0002u2002.csCryptographic APIs: 'CreateDecryptor'
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: Q9FAsn6SG6.exeStatic file information: File size 3677592 > 1048576
Source: Q9FAsn6SG6.exeStatic PE information: Raw size of JICeboQ is bigger than: 0x100000 < 0x106000
Source: Q9FAsn6SG6.exeStatic PE information: Raw size of gTx1qw is bigger than: 0x100000 < 0x226000
Source: Q9FAsn6SG6.exeStatic PE information: real checksum: 0x2ff should be: 0x388ceb
Source: Q9FAsn6SG6.exeStatic PE information: section name: JICeboQ
Source: Q9FAsn6SG6.exeStatic PE information: section name: zcPlt
Source: Q9FAsn6SG6.exeStatic PE information: section name: rrF5ta
Source: Q9FAsn6SG6.exeStatic PE information: section name: IKbga
Source: Q9FAsn6SG6.exeStatic PE information: section name: 03AAoc
Source: Q9FAsn6SG6.exeStatic PE information: section name: 6maTqw
Source: Q9FAsn6SG6.exeStatic PE information: section name: PKmYta
Source: Q9FAsn6SG6.exeStatic PE information: section name: gTx1qw
Source: Q9FAsn6SG6.exeStatic PE information: section name: 9YRtc
Source: initial sampleStatic PE information: section where entry point is pointing to: gTx1qw
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
Source: C:\Users\user\Desktop\Q9FAsn6SG6.exeSystem information queried: FirmwareTableInformation
Source: C:\Users\user\Desktop\Q9FAsn6SG6.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Source: C:\Users\user\Desktop\Q9FAsn6SG6.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc
Source: C:\Users\user\Desktop\Q9FAsn6SG6.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion
Source: C:\Users\user\Desktop\Q9FAsn6SG6.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
Source: AppLaunch.exe, 00000002.00000003.277565209.0000000004FF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware
Source: Q9FAsn6SG6.exeBinary or memory string: noreply@vmware.com0
Source: Q9FAsn6SG6.exeBinary or memory string: http://www.vmware.com/0
Source: Q9FAsn6SG6.exeBinary or memory string: VMware, Inc.1!0
Source: AppLaunch.exe, 00000002.00000003.277565209.0000000004FF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMware_19TXUL2Win32_VideoControllerHW9_2_HAVideoController120060621000000.000000-00083625117display.infMSBDAZ6UOZVBZPCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colors9KEWZH9_68E0
Source: AppLaunch.exe, 00000002.00000002.531934997.0000000004FB7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMware_19TXUL2Win32_VideoControllerHW9_2_HAVideoController120060621000000.000000-00083625117display.infMSBDAZ6UOZVBZPCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colors9KEWZH9_
Source: Q9FAsn6SG6.exeBinary or memory string: http://www.vmware.com/0/
Source: Q9FAsn6SG6.exeBinary or memory string: VMware, Inc.1
Source: Q9FAsn6SG6.exeBinary or memory string: VMware, Inc.0
Source: AppLaunch.exe, 00000002.00000002.531934997.0000000004FB7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess token adjusted: Debug
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeMemory allocated: page read and write | page guard

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\Q9FAsn6SG6.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe base: 400000
Source: C:\Users\user\Desktop\Q9FAsn6SG6.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe base: 9B9008
Source: C:\Users\user\Desktop\Q9FAsn6SG6.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe base: 400000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Q9FAsn6SG6.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Q9FAsn6SG6.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts111
Windows Management Instrumentation
Path Interception311
Process Injection
1
Masquerading
OS Credential Dumping321
Security Software Discovery
Remote Services11
Archive Collected Data
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts22
Virtualization/Sandbox Evasion
LSASS Memory22
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Ingress Tool Transfer
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Disable or Modify Tools
Security Account Manager1
Remote System Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
Non-Application Layer Protocol
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)311
Process Injection
NTDS1
System Network Configuration Discovery
Distributed Component Object ModelInput CaptureScheduled Transfer2
Application Layer Protocol
SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
Deobfuscate/Decode Files or Information
LSA Secrets13
System Information Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Q9FAsn6SG6.exe69%VirustotalBrowse
Q9FAsn6SG6.exe31%MetadefenderBrowse
Q9FAsn6SG6.exe69%ReversingLabsWin32.Trojan.FormBook
Q9FAsn6SG6.exe100%AviraTR/AD.GenSteal.jziki
Q9FAsn6SG6.exe100%Joe Sandbox ML
No Antivirus matches
SourceDetectionScannerLabelLinkDownload
2.2.AppLaunch.exe.400000.0.unpack100%AviraHEUR/AGEN.1203048Download File
0.3.Q9FAsn6SG6.exe.3130000.0.unpack100%AviraHEUR/AGEN.1203048Download File
No Antivirus matches
SourceDetectionScannerLabelLink
https://sectigo.com/CPS00%URL Reputationsafe
http://ocsp.sectigo.com00%URL Reputationsafe
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
https://pidgin.im00%URL Reputationsafe
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
http://ip-api.com40%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
ip-api.com
208.95.112.1
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    http://ip-api.com/line/?fields=hostingfalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      https://sectigo.com/CPS0Q9FAsn6SG6.exefalse
      • URL Reputation: safe
      unknown
      http://www.vmware.com/0Q9FAsn6SG6.exefalse
        high
        http://ocsp.sectigo.com0Q9FAsn6SG6.exefalse
        • URL Reputation: safe
        unknown
        http://www.symauth.com/rpa00Q9FAsn6SG6.exefalse
          high
          http://ip-api.comAppLaunch.exe, 00000002.00000002.532195437.0000000006B47000.00000004.00000800.00020000.00000000.sdmp, AppLaunch.exe, 00000002.00000002.532225269.0000000006B5A000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.vmware.com/0/Q9FAsn6SG6.exefalse
              high
              http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0sQ9FAsn6SG6.exefalse
              • URL Reputation: safe
              unknown
              https://pidgin.im0Q9FAsn6SG6.exefalse
              • URL Reputation: safe
              unknown
              http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#Q9FAsn6SG6.exefalse
              • URL Reputation: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameAppLaunch.exe, 00000002.00000002.532195437.0000000006B47000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.symauth.com/cps0(Q9FAsn6SG6.exefalse
                  high
                  http://ip-api.com4AppLaunch.exe, 00000002.00000002.532195437.0000000006B47000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  208.95.112.1
                  ip-api.comUnited States
                  53334TUT-ASUSfalse
                  Joe Sandbox Version:34.0.0 Boulder Opal
                  Analysis ID:620828
                  Start date and time: 05/05/202209:34:272022-05-05 09:34:27 +02:00
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 7m 28s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Sample file name:Q9FAsn6SG6 (renamed file extension from none to exe)
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:26
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal88.troj.evad.winEXE@4/0@1/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HDC Information:Failed
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                  • Excluded IPs from analysis (whitelisted): 104.208.16.94
                  • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com, arc.msn.com, onedsblobprdcus16.centralus.cloudapp.azure.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  No simulations
                  No context
                  No context
                  No context
                  No context
                  No context
                  No created / dropped files found
                  File type:PE32 executable (console) Intel 80386, for MS Windows
                  Entropy (8bit):6.364458086173346
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:Q9FAsn6SG6.exe
                  File size:3677592
                  MD5:c61f9a9059f8b8bd0e69f7df4cb09786
                  SHA1:70fffde0debf4559859617d49dc48c54df3c156d
                  SHA256:84a5a26f1748c3ad1f0b98c438908e8dc842eacc6390484527ee1fe7e56264f5
                  SHA512:6a838d9663517e1f89bf47f9ba85b72cd431f0d61c4db97e69516ffa313d8bdfc9f619eb51ead5215786e523b43cde3186300cf3bfab7408d580c66cd7d00453
                  SSDEEP:98304:xjFJEyX5ZYpLKwYXA8NMLgJ0CYkL1N5qV0O8:ZFSyJZ8LYEgCCYkDxO8
                  TLSH:61067DB32B45629FC1313039FC92CA0E66101275931F7623EBD83978E59F9D12AC9F96
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......k\8./=V./=V./=V.;VU.!=V.;VS..=V.;VR.9=V.}HR.>=V.}HU.;=V.}HS.e=V.;VW.*=V./=W.r=V..HS..=V..HT..=V.Rich/=V........................
                  Icon Hash:00828e8e8686b000
                  Entrypoint:0x6230b1
                  Entrypoint Section:gTx1qw
                  Digitally signed:true
                  Imagebase:0x400000
                  Subsystem:windows cui
                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                  DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE
                  Time Stamp:0x129 [Thu Jan 1 00:04:57 1970 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:6
                  OS Version Minor:0
                  File Version Major:6
                  File Version Minor:0
                  Subsystem Version Major:6
                  Subsystem Version Minor:0
                  Import Hash:25a9be81ed1ff039b036d3155dd64335
                  Signature Valid:false
                  Signature Issuer:CN=Sectigo RSA Code Signing CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
                  Signature Validation Error:The digital signature of the object did not verify
                  Error Number:-2146869232
                  Not Before, Not After
                  • 3/21/2021 5:00:00 PM 3/21/2024 4:59:59 PM
                  Subject Chain
                  • CN=Gary Kramlich, O=Gary Kramlich, STREET=2653 N 54TH ST, L=MILWAUKEE, S=Wisconsin, PostalCode=53210, C=US
                  Version:3
                  Thumbprint MD5:394B591BC2CE78B7CF207BF4082E62F4
                  Thumbprint SHA-1:ADFA744AA074FB5DC57EE6445A3E18D606C7BF96
                  Thumbprint SHA-256:AE7DB8B64E8ABD9D36876F049B9770D90C0868D7FE1A2D37CF327DF69FA2DBFE
                  Serial:00F6AD45188E5566AA317BE23B4B8B2C2F
                  Instruction
                  push ebp
                  call 00007F9C6CD76B0Ch
                  pop ebp
                  sub ebp, 000CC0B7h
                  call 00007F9C6CD76B54h
                  pop eax
                  sub eax, 002230C3h
                  jmp 00007F9C6CD76C40h
                  jmp 00007F9C6CD76B0Dh
                  jmp 00007F9C6CD76ADEh
                  jmp 00007F9C6CD76B28h
                  jmp 00007F9C6CD76B67h
                  mov eax, eax
                  jmp 00007F9C6CD81F88h
                  jmp 00007F9C6CD8307Ah
                  add byte ptr [eax], al
                  or byte ptr [eax], al
                  add byte ptr [eax], al
                  cmp byte ptr [ecx], al
                  or byte ptr [eax], al
                  add byte ptr [eax], al
                  insb
                  add ah, cl
                  add byte ptr [ecx+eax+00000006h], dh
                  or al, byte ptr [eax]
                  add byte ptr [eax], al
                  hlt
                  xlatb
                  inc ebx
                  add edx, edx
                  in al, B1h
                  outsd
                  push es
                  add byte ptr [eax], al
                  add byte ptr [ecx], al
                  loope 00007F9C6CD82012h
                  xlatb
                  or al, 00h
                  add byte ptr [eax], al
                  rcr byte ptr [ecx], 1
                  rcr dword ptr [ecx], 1
                  adc byte ptr [eax], 0000000Ah
                  add byte ptr [eax], al
                  add byte ptr [esi-38h], dl
                  pushfd
                  dec dword ptr [edx]
                  add byte ptr [eax], al
                  add byte ptr [edx-7Ah], ch
                  inc edi
                  enter 6484h, 78h
                  add dword ptr [eax-29h], edx
                  or al, 00h
                  add byte ptr [eax], al
                  pop es
                  xchg eax, edx
                  or dword ptr [edx+ecx+00000A7Fh], eax
                  add dh, bl
                  jp 00007F9C6CD81FD9h
                  jno 00007F9C6CD81FCCh
                  add byte ptr [eax], al
                  add byte ptr [esi], bl
                  cmc
                  iretd
                  pop ecx
                  loopne 00007F9C6CD81F95h
                  fcomp3 st(0)
                  push eax
                  xlatb
                  or al, 00h
                  add byte ptr [eax], al
                  imul edx, dword ptr [ebx], 09h
                  test byte ptr [esi-62h], cl
                  or al, byte ptr [eax]
                  add byte ptr [eax], al
                  mov byte ptr [0A71F35Bh], al
                  add byte ptr [eax], al
                  add byte ptr [esi], bh
                  adc al, 33h
                  cmp al, byte ptr [eax+50017476h]
                  xlatb
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x1560390x50PKmYta
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x37d0000x8db9YRtc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x37d4680x4930
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  JICeboQ0x10000x105e350x106000False0.412188580928data5.62380807968IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  zcPlt0x1070000x250750x25200False0.550301188973data6.5843436682IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  rrF5ta0x12d0000x1f3a00x1f400False0.363data6.07842695634IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  IKbga0x14d0000x1cf00x1000False0.188720703125data3.05371407432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                  03AAoc0x14f0000x2ddc0x2e00False0.790336277174data6.70270981078IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  6maTqw0x1520000x40000x4000False0.0673828125data1.21393364646IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                  PKmYta0x1560000x10000x200False0.16015625data1.14259413026IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                  gTx1qw0x1570000x2260000x226000unknownunknownunknownunknownIMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  9YRtc0x37d0000x8db0xa00False0.29296875data5.06332684426IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountry
                  RT_MANIFEST0x37d0580x883XML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminatorsEnglishUnited States
                  DLLImport
                  kernel32.dllGetModuleHandleA
                  USER32.dllFindWindowA
                  Language of compilation systemCountry where language is spokenMap
                  EnglishUnited States
                  TimestampSource PortDest PortSource IPDest IP
                  May 5, 2022 09:35:45.140758038 CEST4974680192.168.2.3208.95.112.1
                  May 5, 2022 09:35:45.170057058 CEST8049746208.95.112.1192.168.2.3
                  May 5, 2022 09:35:45.170218945 CEST4974680192.168.2.3208.95.112.1
                  May 5, 2022 09:35:45.171499968 CEST4974680192.168.2.3208.95.112.1
                  May 5, 2022 09:35:45.209554911 CEST8049746208.95.112.1192.168.2.3
                  May 5, 2022 09:35:45.315737009 CEST4974680192.168.2.3208.95.112.1
                  May 5, 2022 09:36:50.641114950 CEST8049746208.95.112.1192.168.2.3
                  May 5, 2022 09:36:50.641221046 CEST4974680192.168.2.3208.95.112.1
                  May 5, 2022 09:37:02.769387960 CEST8049746208.95.112.1192.168.2.3
                  TimestampSource PortDest PortSource IPDest IP
                  May 5, 2022 09:35:45.085983992 CEST5742153192.168.2.38.8.8.8
                  May 5, 2022 09:35:45.104326963 CEST53574218.8.8.8192.168.2.3
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                  May 5, 2022 09:35:45.085983992 CEST192.168.2.38.8.8.80x277fStandard query (0)ip-api.comA (IP address)IN (0x0001)
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                  May 5, 2022 09:35:45.104326963 CEST8.8.8.8192.168.2.30x277fNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)
                  • ip-api.com
                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  0192.168.2.349746208.95.112.180C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  TimestampkBytes transferredDirectionData
                  May 5, 2022 09:35:45.171499968 CEST1141OUTGET /line/?fields=hosting HTTP/1.1
                  Host: ip-api.com
                  Connection: Keep-Alive
                  May 5, 2022 09:35:45.209554911 CEST1141INHTTP/1.1 200 OK
                  Date: Thu, 05 May 2022 07:35:44 GMT
                  Content-Type: text/plain; charset=utf-8
                  Content-Length: 5
                  Access-Control-Allow-Origin: *
                  X-Ttl: 60
                  X-Rl: 44
                  Data Raw: 74 72 75 65 0a
                  Data Ascii: true


                  Click to jump to process

                  Target ID:0
                  Start time:09:35:38
                  Start date:05/05/2022
                  Path:C:\Users\user\Desktop\Q9FAsn6SG6.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\Q9FAsn6SG6.exe"
                  Imagebase:0xe60000
                  File size:3677592 bytes
                  MD5 hash:C61F9A9059F8B8BD0E69F7DF4CB09786
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:low

                  Target ID:1
                  Start time:09:35:39
                  Start date:05/05/2022
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff7c9170000
                  File size:625664 bytes
                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:2
                  Start time:09:35:40
                  Start date:05/05/2022
                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  Imagebase:0xdd0000
                  File size:98912 bytes
                  MD5 hash:6807F903AC06FF7E1670181378690B22
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Reputation:high

                  No disassembly