Edit tour

Windows Analysis Report
smphost.exe

Overview

General Information

Sample name:smphost.exe
Analysis ID:1457829
MD5:e45d667483ba3bb5aa44892dfb48d544
SHA1:413143564579a24e58606287b5e2a9f25c787197
SHA256:8d3e747289e59d3cbf1e01d616609f02e79d5d3c6da373de60cd664fb078f539
Infos:

Detection

Score:5
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Found large amount of non-executed APIs
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • smphost.exe (PID: 6308 cmdline: "C:\Users\user\Desktop\smphost.exe" -install MD5: E45D667483BA3BB5AA44892DFB48D544)
    • conhost.exe (PID: 6292 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • smphost.exe (PID: 1596 cmdline: "C:\Users\user\Desktop\smphost.exe" /install MD5: E45D667483BA3BB5AA44892DFB48D544)
    • conhost.exe (PID: 6984 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • smphost.exe (PID: 5312 cmdline: "C:\Users\user\Desktop\smphost.exe" /load MD5: E45D667483BA3BB5AA44892DFB48D544)
    • conhost.exe (PID: 6600 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: smphost.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Threading.Thread\Release\net8.0\System.Threading.Thread.pdb source: smphost.exe, 00000000.00000002.1715556914.000001F3939C0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742165250.000001E1054D0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764299433.0000024382710000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: D:\Work\2. My work\HTB challenge\Sherlock\testdot\MyProject\obj\Release\net8.0\win-x64\MyProject.pdbSHA256y3AL source: smphost.exe, 00000000.00000002.1714991161.000001F391FC0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1739794160.000001A06EA30000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1763792490.0000024380CF0000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Text.Encoding.Extensions\Release\net8.0\System.Text.Encoding.Extensions.pdbSHA256{) source: smphost.exe, 00000000.00000002.1715583575.000001F3939F0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742271842.000001E105520000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764264627.00000243826E0000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: /_/artifacts/obj/System.Runtime.InteropServices.RuntimeInformation/Release/net8.0-windows/System.Runtime.InteropServices.RuntimeInformation.pdb source: smphost.exe, 00000000.00000002.1715632159.000001F393A03000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742290115.000001E105533000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764322414.0000024382743000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: System.ComponentModel.ni.pdb source: smphost.exe, 00000000.00000002.1715503280.000001F393980000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742118778.000001E105490000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764131819.0000024382670000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: System.Runtime.InteropServices.ni.pdb source: smphost.exe, 00000000.00000002.1715736841.000001F393A31000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1715632159.000001F393A03000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742290115.000001E105533000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742349500.000001E105561000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764322414.0000024382743000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764383091.0000024382771000.00000020.00000001.00040000.00000003.sdmp
Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Threading\Release\net8.0\System.Threading.pdb source: smphost.exe, 00000000.00000002.1715067433.000001F391FE1000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1715556914.000001F3939C0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742165250.000001E1054D0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742209820.000001E105501000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764299433.0000024382710000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1763881416.0000024380D61000.00000020.00000001.00040000.00000003.sdmp
Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Threading.Thread\Release\net8.0\System.Threading.Thread.pdbSHA256 source: smphost.exe, 00000000.00000002.1715556914.000001F3939C0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742165250.000001E1054D0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764299433.0000024382710000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: /_/artifacts/obj/System.Runtime.InteropServices.RuntimeInformation/Release/net8.0-windows/System.Runtime.InteropServices.RuntimeInformation.pdbSHA256 source: smphost.exe, 00000000.00000002.1715632159.000001F393A03000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742290115.000001E105533000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764322414.0000024382743000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: D:\a\_work\1\s\artifacts\obj\coreclr\windows.x64.Release\Corehost.Static\singlefilehost.pdb source: smphost.exe
Source: Binary string: D:\a\_work\1\s\artifacts\obj\coreclr\System.Private.CoreLib\x64\Release\System.Private.CoreLib.pdb source: smphost.exe, 00000000.00000002.1715888577.0000023428590000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1716854358.0000023429231000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740160225.000001E103760000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740972052.000001E104401000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417430000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1765424900.00000284180D1000.00000020.00000001.00040000.00000003.sdmp
Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Collections\Release\net8.0\System.Collections.pdb source: smphost.exe, 00000000.00000002.1715367778.000001F3938F0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1715418035.000001F393941000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1739896230.000001A06EAB1000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1739845347.000001A06EA60000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1763828539.0000024380D10000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764051477.0000024382631000.00000020.00000001.00040000.00000003.sdmp
Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.ComponentModel\Release\net8.0\System.ComponentModel.pdb source: smphost.exe, 00000000.00000002.1715503280.000001F393980000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742118778.000001E105490000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764131819.0000024382670000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Runtime\Release\net8.0\System.Runtime.pdbSHA256 source: smphost.exe, 00000000.00000002.1715007675.000001F391FD0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1739811229.000001A06EA40000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1763810613.0000024380D00000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: /_/artifacts/obj/System.Configuration/Release/net8.0-windows/System.Configuration.pdb source: smphost.exe, 00000000.00000002.1715503280.000001F393987000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742118778.000001E105497000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764131819.0000024382677000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Threading.ThreadPool\Release\net8.0\System.Threading.ThreadPool.pdbSHA256{) source: smphost.exe, 00000000.00000002.1715556914.000001F3939C0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742165250.000001E1054D0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764299433.0000024382710000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Console\Release\net8.0-windows\System.Console.pdb source: smphost.exe, smphost.exe, 00000004.00000002.1764131819.0000024382677000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764192887.00000243826B1000.00000020.00000001.00040000.00000003.sdmp
Source: Binary string: D:\a\_work\1\s\artifacts\obj\coreclr\windows.x64.Release\dlls\mscordac\mscordaccore.pdb source: smphost.exe, smphost.exe, 00000000.00000000.1711977986.00007FF648CE5000.00000002.00000001.01000000.00000003.sdmp, smphost.exe, 00000002.00000000.1736354417.00007FF648CE5000.00000002.00000001.01000000.00000003.sdmp, smphost.exe, 00000004.00000002.1769623643.00007FF648CE5000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: System.Console.ni.pdb source: smphost.exe, smphost.exe, 00000004.00000002.1764131819.0000024382677000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764192887.00000243826B1000.00000020.00000001.00040000.00000003.sdmp
Source: Binary string: /_/artifacts/obj/System.Threading.Timer/Release/net8.0-windows/System.Threading.Timer.pdb source: smphost.exe, 00000000.00000002.1715556914.000001F3939C0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742165250.000001E1054D0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764299433.0000024382710000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: System.Threading.ni.pdb source: smphost.exe, 00000000.00000002.1715067433.000001F391FE1000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1715556914.000001F3939C0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742165250.000001E1054D0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742209820.000001E105501000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764299433.0000024382710000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1763881416.0000024380D61000.00000020.00000001.00040000.00000003.sdmp
Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Runtime\Release\net8.0\System.Runtime.pdb source: smphost.exe, 00000000.00000002.1715007675.000001F391FD0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1739811229.000001A06EA40000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1763810613.0000024380D00000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: /_/artifacts/obj/System.Configuration/Release/net8.0-windows/System.Configuration.pdbSHA256> source: smphost.exe, 00000000.00000002.1715503280.000001F393987000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742118778.000001E105497000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764131819.0000024382677000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Threading.ThreadPool\Release\net8.0\System.Threading.ThreadPool.pdb source: smphost.exe, 00000000.00000002.1715556914.000001F3939C0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742165250.000001E1054D0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764299433.0000024382710000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Runtime.InteropServices\Release\net8.0\System.Runtime.InteropServices.pdb source: smphost.exe, 00000000.00000002.1715736841.000001F393A31000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1715632159.000001F393A03000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742290115.000001E105533000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742349500.000001E105561000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764322414.0000024382743000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764383091.0000024382771000.00000020.00000001.00040000.00000003.sdmp
Source: Binary string: System.Collections.ni.pdb source: smphost.exe, 00000000.00000002.1715367778.000001F3938F0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1715418035.000001F393941000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1739896230.000001A06EAB1000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1739845347.000001A06EA60000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1763828539.0000024380D10000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764051477.0000024382631000.00000020.00000001.00040000.00000003.sdmp
Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Text.Encoding.Extensions\Release\net8.0\System.Text.Encoding.Extensions.pdb source: smphost.exe, 00000000.00000002.1715583575.000001F3939F0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742271842.000001E105520000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764264627.00000243826E0000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: System.Private.CoreLib.ni.pdb source: smphost.exe, 00000000.00000002.1715888577.0000023428590000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1716854358.0000023429231000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740160225.000001E103760000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740972052.000001E104401000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417430000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1765424900.00000284180D1000.00000020.00000001.00040000.00000003.sdmp
Source: Binary string: D:\Work\2. My work\HTB challenge\Sherlock\testdot\MyProject\obj\Release\net8.0\win-x64\MyProject.pdb source: smphost.exe, 00000000.00000002.1714991161.000001F391FC0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1739794160.000001A06EA30000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1763792490.0000024380CF0000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: /_/artifacts/obj/System.Threading.Timer/Release/net8.0-windows/System.Threading.Timer.pdbSHA256 source: smphost.exe, 00000000.00000002.1715556914.000001F3939C0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742165250.000001E1054D0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764299433.0000024382710000.00000002.00000001.00040000.00000003.sdmp
Source: smphost.exeString found in binary or memory: http://.css
Source: smphost.exeString found in binary or memory: http://.jpg
Source: smphost.exeString found in binary or memory: http://html4/loose.dtd
Source: smphost.exe, 00000000.00000002.1715888577.0000023428590000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1716854358.0000023429231000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740160225.000001E103760000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740972052.000001E104401000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417430000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1765424900.00000284180D1000.00000020.00000001.00040000.00000003.sdmpString found in binary or memory: https://aka.ms/GlobalizationInvariantMode
Source: smphost.exe, 00000000.00000002.1715888577.0000023428590000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1715888577.0000023428D12000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1716854358.00000234299A5000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1716854358.0000023429231000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740160225.000001E103760000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740160225.000001E103EE2000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740972052.000001E104B75000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740972052.000001E104401000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417BB2000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1765424900.0000028418845000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417430000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1765424900.00000284180D1000.00000020.00000001.00040000.00000003.sdmpString found in binary or memory: https://aka.ms/binaryformatter
Source: smphost.exeString found in binary or memory: https://aka.ms/dotnet-core-applaunch?
Source: smphost.exe, 00000000.00000002.1715888577.0000023428590000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1715888577.0000023428D12000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1716854358.00000234299A5000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1716854358.0000023429231000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740160225.000001E103760000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740160225.000001E103EE2000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740972052.000001E104B75000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740972052.000001E104401000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417BB2000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1765424900.0000028418845000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417430000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1765424900.00000284180D1000.00000020.00000001.00040000.00000003.sdmpString found in binary or memory: https://aka.ms/dotnet-illink/com
Source: smphost.exe, 00000000.00000002.1715888577.0000023428590000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1715888577.0000023428D12000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1716854358.00000234299A5000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1716854358.0000023429231000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740160225.000001E103760000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740160225.000001E103EE2000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740972052.000001E104B75000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740972052.000001E104401000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417BB2000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1765424900.0000028418845000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417430000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1765424900.00000284180D1000.00000020.00000001.00040000.00000003.sdmpString found in binary or memory: https://aka.ms/dotnet-illink/nativehost
Source: smphost.exe, 00000000.00000002.1715888577.0000023428D12000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1716854358.00000234299A5000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740160225.000001E103EE2000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740972052.000001E104B75000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417BB2000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1765424900.0000028418845000.00000020.00000001.00040000.00000003.sdmpString found in binary or memory: https://aka.ms/dotnet-illink/nativehostt
Source: smphost.exe, 00000004.00000002.1765424900.0000028418845000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1766755844.0000028418D60000.00000004.00001000.00020000.00000000.sdmp, smphost.exe, 00000004.00000002.1764299433.0000024382710000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764322414.0000024382743000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764383091.0000024382771000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1763881416.0000024380D61000.00000020.00000001.00040000.00000003.sdmpString found in binary or memory: https://aka.ms/dotnet-warnings/
Source: smphost.exeString found in binary or memory: https://aka.ms/dotnet/app-launch-failed
Source: smphost.exeString found in binary or memory: https://aka.ms/dotnet/app-launch-failedRequired:
Source: smphost.exeString found in binary or memory: https://aka.ms/dotnet/download
Source: smphost.exeString found in binary or memory: https://aka.ms/dotnet/download%s%sInstall
Source: smphost.exeString found in binary or memory: https://aka.ms/dotnet/info
Source: smphost.exeString found in binary or memory: https://aka.ms/dotnet/sdk-not-found
Source: smphost.exe, 00000004.00000002.1765424900.00000284180D1000.00000020.00000001.00040000.00000003.sdmpString found in binary or memory: https://aka.ms/nativeaot-compatibility
Source: smphost.exe, smphost.exe, 00000004.00000002.1763810613.0000024380D00000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1763828539.0000024380D10000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764051477.0000024382631000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417BB2000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764322414.0000024382740000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1765424900.0000028418845000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417430000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764131819.0000024382677000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764192887.00000243826B1000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764299433.0000024382710000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764322414.0000024382743000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764383091.0000024382771000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1763881416.0000024380D61000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764264627.00000243826E0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764131819.0000024382670000.00000002.00000001.00040000.00000003.sdmpString found in binary or memory: https://github.com/dotnet/runtime
Source: smphost.exe, 00000000.00000002.1715888577.0000023428590000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1716854358.0000023429231000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740160225.000001E103760000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740972052.000001E104401000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417430000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1765424900.00000284180D1000.00000020.00000001.00040000.00000003.sdmpString found in binary or memory: https://github.com/dotnet/runtime/blob/bbc898f3e5678135b242faeb6eefd8b24bf04f3c/src/native/corehost/
Source: smphost.exe, 00000000.00000002.1715888577.0000023428590000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1716854358.0000023429231000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740160225.000001E103760000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740972052.000001E104401000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417430000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1765424900.00000284180D1000.00000020.00000001.00040000.00000003.sdmpString found in binary or memory: https://github.com/dotnet/runtime/issues/71847
Source: smphost.exe, 00000000.00000002.1715888577.0000023428590000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1716854358.0000023429231000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740160225.000001E103760000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740972052.000001E104401000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417430000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1765424900.00000284180D1000.00000020.00000001.00040000.00000003.sdmpString found in binary or memory: https://github.com/mono/linker/issues/378
Source: smphost.exe, 00000000.00000002.1715888577.0000023428590000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1716854358.0000023429231000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740160225.000001E103760000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740972052.000001E104401000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417430000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1765424900.00000284180D1000.00000020.00000001.00040000.00000003.sdmpString found in binary or memory: https://github.com/mono/linker/pull/649
Source: smphost.exeStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Source: smphost.exeBinary or memory string: OriginalFilename vs smphost.exe
Source: smphost.exe, 00000000.00000002.1715275035.000001F3938B1000.00000020.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Console.dll@ vs smphost.exe
Source: smphost.exe, 00000000.00000002.1715367778.000001F3938F0000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Collections.dll@ vs smphost.exe
Source: smphost.exe, 00000000.00000002.1715888577.0000023428590000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Private.CoreLib.dll@ vs smphost.exe
Source: smphost.exe, 00000000.00000002.1715067433.000001F391FE1000.00000020.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Threading.dll@ vs smphost.exe
Source: smphost.exe, 00000000.00000002.1715503280.000001F393987000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Configuration.dll@ vs smphost.exe
Source: smphost.exe, 00000000.00000002.1715503280.000001F393987000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Console.dll@ vs smphost.exe
Source: smphost.exe, 00000000.00000002.1715583575.000001F3939F0000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Text.Encoding.Extensions.dll@ vs smphost.exe
Source: smphost.exe, 00000000.00000002.1715556914.000001F3939C0000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Threading.Thread.dll@ vs smphost.exe
Source: smphost.exe, 00000000.00000002.1715556914.000001F3939C0000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Threading.ThreadPool.dll@ vs smphost.exe
Source: smphost.exe, 00000000.00000002.1715556914.000001F3939C0000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Threading.Timer.dll@ vs smphost.exe
Source: smphost.exe, 00000000.00000002.1715556914.000001F3939C0000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Threading.dll@ vs smphost.exe
Source: smphost.exe, 00000000.00000002.1715418035.000001F393941000.00000020.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Collections.dll@ vs smphost.exe
Source: smphost.exe, 00000000.00000000.1711977986.00007FF648CE5000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamemscordaccore.dll@ vs smphost.exe
Source: smphost.exe, 00000000.00000000.1711977986.00007FF648CE5000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMyProject.dll4 vs smphost.exe
Source: smphost.exe, 00000000.00000002.1715736841.000001F393A31000.00000020.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Runtime.InteropServices.dll@ vs smphost.exe
Source: smphost.exe, 00000000.00000002.1715632159.000001F393A03000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Runtime.InteropServices.RuntimeInformation.dll@ vs smphost.exe
Source: smphost.exe, 00000000.00000002.1715632159.000001F393A03000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Runtime.InteropServices.dll@ vs smphost.exe
Source: smphost.exe, 00000000.00000002.1715007675.000001F391FD0000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Runtime.dll@ vs smphost.exe
Source: smphost.exe, 00000000.00000002.1715503280.000001F393980000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.ComponentModel.dll@ vs smphost.exe
Source: smphost.exe, 00000000.00000002.1714991161.000001F391FC0000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameMyProject.dll4 vs smphost.exe
Source: smphost.exe, 00000000.00000002.1716854358.0000023429231000.00000020.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Private.CoreLib.dll@ vs smphost.exe
Source: smphost.exeBinary or memory string: OriginalFilename vs smphost.exe
Source: smphost.exe, 00000002.00000002.1739794160.000001A06EA30000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameMyProject.dll4 vs smphost.exe
Source: smphost.exe, 00000002.00000002.1742290115.000001E105533000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Runtime.InteropServices.RuntimeInformation.dll@ vs smphost.exe
Source: smphost.exe, 00000002.00000002.1742290115.000001E105533000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Runtime.InteropServices.dll@ vs smphost.exe
Source: smphost.exe, 00000002.00000002.1742349500.000001E105561000.00000020.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Runtime.InteropServices.dll@ vs smphost.exe
Source: smphost.exe, 00000002.00000000.1736354417.00007FF648CE5000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamemscordaccore.dll@ vs smphost.exe
Source: smphost.exe, 00000002.00000000.1736354417.00007FF648CE5000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMyProject.dll4 vs smphost.exe
Source: smphost.exe, 00000002.00000002.1742118778.000001E105497000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Configuration.dll@ vs smphost.exe
Source: smphost.exe, 00000002.00000002.1742118778.000001E105497000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Console.dll@ vs smphost.exe
Source: smphost.exe, 00000002.00000002.1739990269.000001A06EAF1000.00000020.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Console.dll@ vs smphost.exe
Source: smphost.exe, 00000002.00000002.1739896230.000001A06EAB1000.00000020.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Collections.dll@ vs smphost.exe
Source: smphost.exe, 00000002.00000002.1740160225.000001E103760000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Private.CoreLib.dll@ vs smphost.exe
Source: smphost.exe, 00000002.00000002.1742165250.000001E1054D0000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Threading.Thread.dll@ vs smphost.exe
Source: smphost.exe, 00000002.00000002.1742165250.000001E1054D0000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Threading.ThreadPool.dll@ vs smphost.exe
Source: smphost.exe, 00000002.00000002.1742165250.000001E1054D0000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Threading.Timer.dll@ vs smphost.exe
Source: smphost.exe, 00000002.00000002.1742165250.000001E1054D0000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Threading.dll@ vs smphost.exe
Source: smphost.exe, 00000002.00000002.1739811229.000001A06EA40000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Runtime.dll@ vs smphost.exe
Source: smphost.exe, 00000002.00000002.1742209820.000001E105501000.00000020.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Threading.dll@ vs smphost.exe
Source: smphost.exe, 00000002.00000002.1742118778.000001E105490000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.ComponentModel.dll@ vs smphost.exe
Source: smphost.exe, 00000002.00000002.1742271842.000001E105520000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Text.Encoding.Extensions.dll@ vs smphost.exe
Source: smphost.exe, 00000002.00000002.1739845347.000001A06EA60000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Collections.dll@ vs smphost.exe
Source: smphost.exe, 00000002.00000002.1740972052.000001E104401000.00000020.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Private.CoreLib.dll@ vs smphost.exe
Source: smphost.exeBinary or memory string: OriginalFilename vs smphost.exe
Source: smphost.exe, 00000004.00000002.1763810613.0000024380D00000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Runtime.dll@ vs smphost.exe
Source: smphost.exe, 00000004.00000002.1763828539.0000024380D10000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Collections.dll@ vs smphost.exe
Source: smphost.exe, 00000004.00000002.1764051477.0000024382631000.00000020.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Collections.dll@ vs smphost.exe
Source: smphost.exe, 00000004.00000002.1769623643.00007FF648CE5000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamemscordaccore.dll@ vs smphost.exe
Source: smphost.exe, 00000004.00000002.1769623643.00007FF648CE5000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMyProject.dll4 vs smphost.exe
Source: smphost.exe, 00000004.00000002.1764531949.0000028417430000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Private.CoreLib.dll@ vs smphost.exe
Source: smphost.exe, 00000004.00000002.1764131819.0000024382677000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Configuration.dll@ vs smphost.exe
Source: smphost.exe, 00000004.00000002.1764131819.0000024382677000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Console.dll@ vs smphost.exe
Source: smphost.exe, 00000004.00000002.1764192887.00000243826B1000.00000020.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Console.dll@ vs smphost.exe
Source: smphost.exe, 00000004.00000002.1763792490.0000024380CF0000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameMyProject.dll4 vs smphost.exe
Source: smphost.exe, 00000004.00000002.1765424900.00000284180D1000.00000020.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Private.CoreLib.dll@ vs smphost.exe
Source: smphost.exe, 00000004.00000002.1764299433.0000024382710000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Threading.Thread.dll@ vs smphost.exe
Source: smphost.exe, 00000004.00000002.1764299433.0000024382710000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Threading.ThreadPool.dll@ vs smphost.exe
Source: smphost.exe, 00000004.00000002.1764299433.0000024382710000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Threading.Timer.dll@ vs smphost.exe
Source: smphost.exe, 00000004.00000002.1764299433.0000024382710000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Threading.dll@ vs smphost.exe
Source: smphost.exe, 00000004.00000002.1764322414.0000024382743000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Runtime.InteropServices.RuntimeInformation.dll@ vs smphost.exe
Source: smphost.exe, 00000004.00000002.1764322414.0000024382743000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Runtime.InteropServices.dll@ vs smphost.exe
Source: smphost.exe, 00000004.00000002.1764383091.0000024382771000.00000020.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Runtime.InteropServices.dll@ vs smphost.exe
Source: smphost.exe, 00000004.00000002.1763881416.0000024380D61000.00000020.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Threading.dll@ vs smphost.exe
Source: smphost.exe, 00000004.00000002.1764264627.00000243826E0000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.Text.Encoding.Extensions.dll@ vs smphost.exe
Source: smphost.exe, 00000004.00000002.1764131819.0000024382670000.00000002.00000001.00040000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.ComponentModel.dll@ vs smphost.exe
Source: classification engineClassification label: clean5.winEXE@6/3@0/0
Source: C:\Users\user\Desktop\smphost.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6292:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6984:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6600:120:WilError_03
Source: smphost.exeStatic file information: TRID: Win64 Executable Console Net Framework (206006/5) 46.24%
Source: C:\Users\user\Desktop\smphost.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: smphost.exeString found in binary or memory: overflow:hidden;img src="http://addEventListenerresponsible for s.js"></script>
Source: smphost.exeString found in binary or memory: Morph - Structs/AddrExp
Source: smphost.exeString found in binary or memory: prejitIndirect call transformExpand patchpointsPre-importImportationProfile instrumentationProfile incorporationPost-importProfile instrumentation prepMorph - Add internal blocksAllocate ObjectsMorph - InitMorph - InliningMerge callfinally chainsClone finallyRemove empty tryRemove empty finallyMorph - Structs/AddrExpEarly livenessUpdate finally target flagsUpdate flow graph early passIdentify candidates for implicit byref copy omissionMorph - ByRefsPhysical promotionForward SubstitutionMorph - FinishGS CookieMorph - Promote StructsMorph - GlobalTail mergeMerge throw blocksCompute edge weights (1, false)Create EH funcletsOptimize control flowOptimize layoutInvert loopsPost-morph tail mergeRedundant zero InitsFind loopsCompute blocks reachabilitySet block weightsClear loop infoMorph array opsClone loopsUnroll loopsOptimize boolsFind oper orderHoist loop codeMark local varsSSA: topological sortSSA: Doms1Set block orderBuild SSA representationSSA: insert phisSSA: renameSSA: livenessSSA: DFOptimize index checksOptimize Valnum CSEsEarly Value PropagationDo value numberingRedundant branch optsAssertion propVN based copy propVN based intrinsic expansionUpdate flow graph opt passCompute edge weights (2, false)If conversionVN-based dead store removalExpand static initExpand TLS accessStress gtSplitTreeExpand runtime lookupsRationalize IRDo 'simple' loweringInsert GC PollsDetermine first cold blockPer block local var livenessGlobal local var livenessLocal var livenessLocal var liveness initCalculate stack level slotsLinear scan register allocLowering decompositionLowering nodeinfoLSRA resolvePlace 'align' instructionsLSRA build intervalsLSRA allocateEmit GC+EH tablesPost-EmitGenerate codeEmit code Compiled %d methods.
Source: smphost.exeString found in binary or memory: GC initialization failed with error 0x%08XVirtualAlloc2kernelbase.dllMapViewOfFile3string too longbad array new lengthApplication root path is empty. This shouldn't happenUsing internal fxrUsing internal hostpolicyPath containing probing policy and assemblies to probe for.<path>--additionalprobingpathPath to <application>.runtimeconfig.json file.--runtimeconfigPath to <application>.deps.json file.--depsfile--roll-forwardVersion of the installed Shared Framework to use to run the application.<version>--fx-versionPath to additional deps.json file.--additional-depsRoll forward to framework version (LatestPatch, Minor, LatestMinor, Major, LatestMajor, Disable)<value>sdk<obsolete><n>--roll-forward-on-no-candidate-fxUsing the provided arguments to determine the application to execute. %s %-*s %sFailed to parse supported options or their values:Parsed known arg %s = %sThe application to execute does not exist: '%s'dotnet exec needs a managed .dll or .exe extension. The application specified was '%s'Application '%s' does not exist.Application '%s' is not a managed executable.exec--- Executing in muxer mode...--- Executing in a native executable mode...--- Executing in split/FX mode...
Source: smphost.exeString found in binary or memory: %sNot foundhost-options: The path to an application .dll file to execute.path-to-application:Usage: dotnet [host-options] [path-to-application] -h|--help Displays this help.Common Options: --list-sdks Display the installed SDKs --list-runtimes Display the installed runtimesunordered_map/set too longinvalid string positionvector too long --info Display .NET information.invalid hash bucket count--- Invoked %s [version: %s]hostfxr_main_startupinfoInvalid startup info: host_path, dotnet_root, and app_path should not be null.A fatal error occurred while processing application bundlehostfxr_main_bundle_startupinfoget-native-search-directories.dev.json.jsonHosting components are already initialized. Re-initialization to execute an app is not allowed.Ignoring host interpreted additional probing path %s as it does not exist.|arch|/|tfm||arch|\|tfm|Runtime config is cfg=%s dev=%sSpecified runtimeconfig.json from [%s]App runtimeconfig.json from [%s]The specified runtimeconfig.json [%s] does not existIgnoring additional probing path %s as it does not exist..runtimeconfig.jsonDetecting mode... CoreCLR present in dotnet root [%s] and checking if [%s] file present=[%d].deps.jsonInvalid runtimeconfig.json [%s] [%s]DOTNET_ADDITIONAL_DEPSIt's invalid to use both '%s' and '%s' command line options.Invalid value for command line argument '%s'The specified deps.json [%s] does not existExecuting as a %s app as per config file [%s]self-containedframework-dependentHOSTFXR_PATH--list-runtimes--list-sdksUsing dotnet root path [%s]/?-?--help-hdotnet.dll The command could not be loaded, possibly because:
Source: smphost.exeString found in binary or memory: %sNot foundhost-options: The path to an application .dll file to execute.path-to-application:Usage: dotnet [host-options] [path-to-application] -h|--help Displays this help.Common Options: --list-sdks Display the installed SDKs --list-runtimes Display the installed runtimesunordered_map/set too longinvalid string positionvector too long --info Display .NET information.invalid hash bucket count--- Invoked %s [version: %s]hostfxr_main_startupinfoInvalid startup info: host_path, dotnet_root, and app_path should not be null.A fatal error occurred while processing application bundlehostfxr_main_bundle_startupinfoget-native-search-directories.dev.json.jsonHosting components are already initialized. Re-initialization to execute an app is not allowed.Ignoring host interpreted additional probing path %s as it does not exist.|arch|/|tfm||arch|\|tfm|Runtime config is cfg=%s dev=%sSpecified runtimeconfig.json from [%s]App runtimeconfig.json from [%s]The specified runtimeconfig.json [%s] does not existIgnoring additional probing path %s as it does not exist..runtimeconfig.jsonDetecting mode... CoreCLR present in dotnet root [%s] and checking if [%s] file present=[%d].deps.jsonInvalid runtimeconfig.json [%s] [%s]DOTNET_ADDITIONAL_DEPSIt's invalid to use both '%s' and '%s' command line options.Invalid value for command line argument '%s'The specified deps.json [%s] does not existExecuting as a %s app as per config file [%s]self-containedframework-dependentHOSTFXR_PATH--list-runtimes--list-sdksUsing dotnet root path [%s]/?-?--help-hdotnet.dll The command could not be loaded, possibly because:
Source: smphost.exeString found in binary or memory: https://aka.ms/dotnet/app-launch-failed
Source: smphost.exeString found in binary or memory: https://aka.ms/dotnet/app-launch-failedRequired:
Source: unknownProcess created: C:\Users\user\Desktop\smphost.exe "C:\Users\user\Desktop\smphost.exe" -install
Source: C:\Users\user\Desktop\smphost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Users\user\Desktop\smphost.exe "C:\Users\user\Desktop\smphost.exe" /install
Source: C:\Users\user\Desktop\smphost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Users\user\Desktop\smphost.exe "C:\Users\user\Desktop\smphost.exe" /load
Source: C:\Users\user\Desktop\smphost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\smphost.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\smphost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\smphost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\smphost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: smphost.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: smphost.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: smphost.exeStatic file information: File size 67515744 > 1048576
Source: smphost.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x617000
Source: smphost.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x17d400
Source: smphost.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x147000
Source: smphost.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: smphost.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: smphost.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: smphost.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: smphost.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: smphost.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: smphost.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: smphost.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Threading.Thread\Release\net8.0\System.Threading.Thread.pdb source: smphost.exe, 00000000.00000002.1715556914.000001F3939C0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742165250.000001E1054D0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764299433.0000024382710000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: D:\Work\2. My work\HTB challenge\Sherlock\testdot\MyProject\obj\Release\net8.0\win-x64\MyProject.pdbSHA256y3AL source: smphost.exe, 00000000.00000002.1714991161.000001F391FC0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1739794160.000001A06EA30000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1763792490.0000024380CF0000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Text.Encoding.Extensions\Release\net8.0\System.Text.Encoding.Extensions.pdbSHA256{) source: smphost.exe, 00000000.00000002.1715583575.000001F3939F0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742271842.000001E105520000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764264627.00000243826E0000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: /_/artifacts/obj/System.Runtime.InteropServices.RuntimeInformation/Release/net8.0-windows/System.Runtime.InteropServices.RuntimeInformation.pdb source: smphost.exe, 00000000.00000002.1715632159.000001F393A03000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742290115.000001E105533000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764322414.0000024382743000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: System.ComponentModel.ni.pdb source: smphost.exe, 00000000.00000002.1715503280.000001F393980000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742118778.000001E105490000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764131819.0000024382670000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: System.Runtime.InteropServices.ni.pdb source: smphost.exe, 00000000.00000002.1715736841.000001F393A31000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1715632159.000001F393A03000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742290115.000001E105533000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742349500.000001E105561000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764322414.0000024382743000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764383091.0000024382771000.00000020.00000001.00040000.00000003.sdmp
Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Threading\Release\net8.0\System.Threading.pdb source: smphost.exe, 00000000.00000002.1715067433.000001F391FE1000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1715556914.000001F3939C0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742165250.000001E1054D0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742209820.000001E105501000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764299433.0000024382710000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1763881416.0000024380D61000.00000020.00000001.00040000.00000003.sdmp
Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Threading.Thread\Release\net8.0\System.Threading.Thread.pdbSHA256 source: smphost.exe, 00000000.00000002.1715556914.000001F3939C0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742165250.000001E1054D0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764299433.0000024382710000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: /_/artifacts/obj/System.Runtime.InteropServices.RuntimeInformation/Release/net8.0-windows/System.Runtime.InteropServices.RuntimeInformation.pdbSHA256 source: smphost.exe, 00000000.00000002.1715632159.000001F393A03000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742290115.000001E105533000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764322414.0000024382743000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: D:\a\_work\1\s\artifacts\obj\coreclr\windows.x64.Release\Corehost.Static\singlefilehost.pdb source: smphost.exe
Source: Binary string: D:\a\_work\1\s\artifacts\obj\coreclr\System.Private.CoreLib\x64\Release\System.Private.CoreLib.pdb source: smphost.exe, 00000000.00000002.1715888577.0000023428590000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1716854358.0000023429231000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740160225.000001E103760000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740972052.000001E104401000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417430000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1765424900.00000284180D1000.00000020.00000001.00040000.00000003.sdmp
Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Collections\Release\net8.0\System.Collections.pdb source: smphost.exe, 00000000.00000002.1715367778.000001F3938F0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1715418035.000001F393941000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1739896230.000001A06EAB1000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1739845347.000001A06EA60000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1763828539.0000024380D10000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764051477.0000024382631000.00000020.00000001.00040000.00000003.sdmp
Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.ComponentModel\Release\net8.0\System.ComponentModel.pdb source: smphost.exe, 00000000.00000002.1715503280.000001F393980000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742118778.000001E105490000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764131819.0000024382670000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Runtime\Release\net8.0\System.Runtime.pdbSHA256 source: smphost.exe, 00000000.00000002.1715007675.000001F391FD0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1739811229.000001A06EA40000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1763810613.0000024380D00000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: /_/artifacts/obj/System.Configuration/Release/net8.0-windows/System.Configuration.pdb source: smphost.exe, 00000000.00000002.1715503280.000001F393987000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742118778.000001E105497000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764131819.0000024382677000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Threading.ThreadPool\Release\net8.0\System.Threading.ThreadPool.pdbSHA256{) source: smphost.exe, 00000000.00000002.1715556914.000001F3939C0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742165250.000001E1054D0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764299433.0000024382710000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Console\Release\net8.0-windows\System.Console.pdb source: smphost.exe, smphost.exe, 00000004.00000002.1764131819.0000024382677000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764192887.00000243826B1000.00000020.00000001.00040000.00000003.sdmp
Source: Binary string: D:\a\_work\1\s\artifacts\obj\coreclr\windows.x64.Release\dlls\mscordac\mscordaccore.pdb source: smphost.exe, smphost.exe, 00000000.00000000.1711977986.00007FF648CE5000.00000002.00000001.01000000.00000003.sdmp, smphost.exe, 00000002.00000000.1736354417.00007FF648CE5000.00000002.00000001.01000000.00000003.sdmp, smphost.exe, 00000004.00000002.1769623643.00007FF648CE5000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: System.Console.ni.pdb source: smphost.exe, smphost.exe, 00000004.00000002.1764131819.0000024382677000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764192887.00000243826B1000.00000020.00000001.00040000.00000003.sdmp
Source: Binary string: /_/artifacts/obj/System.Threading.Timer/Release/net8.0-windows/System.Threading.Timer.pdb source: smphost.exe, 00000000.00000002.1715556914.000001F3939C0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742165250.000001E1054D0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764299433.0000024382710000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: System.Threading.ni.pdb source: smphost.exe, 00000000.00000002.1715067433.000001F391FE1000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1715556914.000001F3939C0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742165250.000001E1054D0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742209820.000001E105501000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764299433.0000024382710000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1763881416.0000024380D61000.00000020.00000001.00040000.00000003.sdmp
Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Runtime\Release\net8.0\System.Runtime.pdb source: smphost.exe, 00000000.00000002.1715007675.000001F391FD0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1739811229.000001A06EA40000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1763810613.0000024380D00000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: /_/artifacts/obj/System.Configuration/Release/net8.0-windows/System.Configuration.pdbSHA256> source: smphost.exe, 00000000.00000002.1715503280.000001F393987000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742118778.000001E105497000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764131819.0000024382677000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Threading.ThreadPool\Release\net8.0\System.Threading.ThreadPool.pdb source: smphost.exe, 00000000.00000002.1715556914.000001F3939C0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742165250.000001E1054D0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764299433.0000024382710000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Runtime.InteropServices\Release\net8.0\System.Runtime.InteropServices.pdb source: smphost.exe, 00000000.00000002.1715736841.000001F393A31000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1715632159.000001F393A03000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742290115.000001E105533000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742349500.000001E105561000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764322414.0000024382743000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764383091.0000024382771000.00000020.00000001.00040000.00000003.sdmp
Source: Binary string: System.Collections.ni.pdb source: smphost.exe, 00000000.00000002.1715367778.000001F3938F0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1715418035.000001F393941000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1739896230.000001A06EAB1000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1739845347.000001A06EA60000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1763828539.0000024380D10000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764051477.0000024382631000.00000020.00000001.00040000.00000003.sdmp
Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Text.Encoding.Extensions\Release\net8.0\System.Text.Encoding.Extensions.pdb source: smphost.exe, 00000000.00000002.1715583575.000001F3939F0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742271842.000001E105520000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764264627.00000243826E0000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: System.Private.CoreLib.ni.pdb source: smphost.exe, 00000000.00000002.1715888577.0000023428590000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1716854358.0000023429231000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740160225.000001E103760000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740972052.000001E104401000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417430000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1765424900.00000284180D1000.00000020.00000001.00040000.00000003.sdmp
Source: Binary string: D:\Work\2. My work\HTB challenge\Sherlock\testdot\MyProject\obj\Release\net8.0\win-x64\MyProject.pdb source: smphost.exe, 00000000.00000002.1714991161.000001F391FC0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1739794160.000001A06EA30000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1763792490.0000024380CF0000.00000002.00000001.00040000.00000003.sdmp
Source: Binary string: /_/artifacts/obj/System.Threading.Timer/Release/net8.0-windows/System.Threading.Timer.pdbSHA256 source: smphost.exe, 00000000.00000002.1715556914.000001F3939C0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1742165250.000001E1054D0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764299433.0000024382710000.00000002.00000001.00040000.00000003.sdmp
Source: smphost.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: smphost.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: smphost.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: smphost.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: smphost.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: smphost.exeStatic PE information: section name: .CLR_UEF
Source: smphost.exeStatic PE information: section name: .didat
Source: smphost.exeStatic PE information: section name: Section
Source: smphost.exeStatic PE information: section name: _RDATA
Source: C:\Users\user\Desktop\smphost.exeCode function: 0_2_000001F3938B3630 push rax; iretd 0_2_000001F3938B3631
Source: C:\Users\user\Desktop\smphost.exeCode function: 0_2_000001F3938B21F8 push rcx; retf 0_2_000001F3938B2223
Source: C:\Users\user\Desktop\smphost.exeCode function: 2_2_000001A06EAF3630 push rax; iretd 2_2_000001A06EAF3631
Source: C:\Users\user\Desktop\smphost.exeCode function: 2_2_000001A06EAF21F8 push rcx; retf 2_2_000001A06EAF2223
Source: C:\Users\user\Desktop\smphost.exeCode function: 4_2_00000243826B3630 push rax; iretd 4_2_00000243826B3631
Source: C:\Users\user\Desktop\smphost.exeCode function: 4_2_00000243826B21F8 push rcx; retf 4_2_00000243826B2223
Source: C:\Users\user\Desktop\smphost.exeMemory allocated: 1F391FA0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\smphost.exeMemory allocated: 1A06EA10000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\smphost.exeMemory allocated: 24380CD0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\smphost.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\smphost.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\smphost.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\smphost.exeAPI coverage: 5.7 %
Source: C:\Users\user\Desktop\smphost.exeAPI coverage: 6.1 %
Source: C:\Users\user\Desktop\smphost.exeAPI coverage: 6.1 %
Source: C:\Users\user\Desktop\smphost.exe TID: 4416Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\smphost.exe TID: 6336Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\smphost.exe TID: 5216Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\smphost.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\smphost.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\smphost.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\smphost.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\smphost.exeCode function: 0_2_00007FF648ABAE0C GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF648ABAE0C
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Disable or Modify Tools
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
32
Virtualization/Sandbox Evasion
LSASS Memory32
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager2
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1457829 Sample: smphost.exe Startdate: 15/06/2024 Architecture: WINDOWS Score: 5 5 smphost.exe 1 2->5         started        7 smphost.exe 3 2->7         started        9 smphost.exe 1 2->9         started        process3 11 conhost.exe 5->11         started        13 conhost.exe 7->13         started        15 conhost.exe 9->15         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
smphost.exe0%ReversingLabs
smphost.exe3%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://html4/loose.dtd0%Avira URL Cloudsafe
https://aka.ms/dotnet-warnings/0%Avira URL Cloudsafe
https://github.com/dotnet/runtime/blob/bbc898f3e5678135b242faeb6eefd8b24bf04f3c/src/native/corehost/0%Avira URL Cloudsafe
https://aka.ms/dotnet/info0%Avira URL Cloudsafe
https://aka.ms/dotnet/download%s%sInstall0%Avira URL Cloudsafe
https://aka.ms/dotnet/info1%VirustotalBrowse
https://aka.ms/dotnet-warnings/0%VirustotalBrowse
https://github.com/dotnet/runtime/blob/bbc898f3e5678135b242faeb6eefd8b24bf04f3c/src/native/corehost/0%VirustotalBrowse
https://aka.ms/nativeaot-compatibility0%Avira URL Cloudsafe
https://github.com/dotnet/runtime/issues/718470%Avira URL Cloudsafe
https://aka.ms/dotnet-illink/com0%Avira URL Cloudsafe
https://aka.ms/dotnet/sdk-not-found0%Avira URL Cloudsafe
https://aka.ms/binaryformatter0%Avira URL Cloudsafe
https://aka.ms/GlobalizationInvariantMode0%Avira URL Cloudsafe
https://aka.ms/dotnet-illink/com0%VirustotalBrowse
https://aka.ms/dotnet/sdk-not-found0%VirustotalBrowse
https://aka.ms/nativeaot-compatibility0%VirustotalBrowse
https://aka.ms/dotnet/download%s%sInstall0%VirustotalBrowse
https://github.com/dotnet/runtime/issues/718470%VirustotalBrowse
https://aka.ms/dotnet/app-launch-failed0%Avira URL Cloudsafe
https://github.com/mono/linker/pull/6490%Avira URL Cloudsafe
http://.css0%Avira URL Cloudsafe
https://aka.ms/dotnet/app-launch-failed0%VirustotalBrowse
http://.jpg0%Avira URL Cloudsafe
https://aka.ms/binaryformatter0%VirustotalBrowse
https://aka.ms/dotnet-illink/nativehost0%Avira URL Cloudsafe
https://aka.ms/dotnet-illink/nativehostt0%Avira URL Cloudsafe
https://github.com/mono/linker/pull/6490%VirustotalBrowse
https://aka.ms/dotnet/app-launch-failedRequired:0%Avira URL Cloudsafe
https://aka.ms/dotnet-illink/nativehost0%VirustotalBrowse
https://aka.ms/dotnet-core-applaunch?0%Avira URL Cloudsafe
https://aka.ms/dotnet-illink/nativehostt0%VirustotalBrowse
https://aka.ms/GlobalizationInvariantMode0%VirustotalBrowse
https://aka.ms/dotnet/download0%Avira URL Cloudsafe
https://github.com/dotnet/runtime0%Avira URL Cloudsafe
https://github.com/mono/linker/issues/3780%Avira URL Cloudsafe
https://aka.ms/dotnet/app-launch-failedRequired:0%VirustotalBrowse
https://aka.ms/dotnet-core-applaunch?0%VirustotalBrowse
https://aka.ms/dotnet/download0%VirustotalBrowse
https://github.com/dotnet/runtime0%VirustotalBrowse
https://github.com/mono/linker/issues/3780%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://html4/loose.dtdsmphost.exefalse
  • Avira URL Cloud: safe
unknown
https://aka.ms/dotnet-warnings/smphost.exe, 00000004.00000002.1765424900.0000028418845000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1766755844.0000028418D60000.00000004.00001000.00020000.00000000.sdmp, smphost.exe, 00000004.00000002.1764299433.0000024382710000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764322414.0000024382743000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764383091.0000024382771000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1763881416.0000024380D61000.00000020.00000001.00040000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://aka.ms/dotnet/infosmphost.exefalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://aka.ms/dotnet/download%s%sInstallsmphost.exefalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://github.com/dotnet/runtime/blob/bbc898f3e5678135b242faeb6eefd8b24bf04f3c/src/native/corehost/smphost.exe, 00000000.00000002.1715888577.0000023428590000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1716854358.0000023429231000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740160225.000001E103760000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740972052.000001E104401000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417430000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1765424900.00000284180D1000.00000020.00000001.00040000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://aka.ms/nativeaot-compatibilitysmphost.exe, 00000004.00000002.1765424900.00000284180D1000.00000020.00000001.00040000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://github.com/dotnet/runtime/issues/71847smphost.exe, 00000000.00000002.1715888577.0000023428590000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1716854358.0000023429231000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740160225.000001E103760000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740972052.000001E104401000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417430000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1765424900.00000284180D1000.00000020.00000001.00040000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://aka.ms/dotnet-illink/comsmphost.exe, 00000000.00000002.1715888577.0000023428590000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1715888577.0000023428D12000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1716854358.00000234299A5000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1716854358.0000023429231000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740160225.000001E103760000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740160225.000001E103EE2000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740972052.000001E104B75000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740972052.000001E104401000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417BB2000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1765424900.0000028418845000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417430000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1765424900.00000284180D1000.00000020.00000001.00040000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://aka.ms/dotnet/sdk-not-foundsmphost.exefalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://aka.ms/binaryformattersmphost.exe, 00000000.00000002.1715888577.0000023428590000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1715888577.0000023428D12000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1716854358.00000234299A5000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1716854358.0000023429231000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740160225.000001E103760000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740160225.000001E103EE2000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740972052.000001E104B75000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740972052.000001E104401000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417BB2000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1765424900.0000028418845000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417430000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1765424900.00000284180D1000.00000020.00000001.00040000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://aka.ms/GlobalizationInvariantModesmphost.exe, 00000000.00000002.1715888577.0000023428590000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1716854358.0000023429231000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740160225.000001E103760000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740972052.000001E104401000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417430000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1765424900.00000284180D1000.00000020.00000001.00040000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://aka.ms/dotnet/app-launch-failedsmphost.exefalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://github.com/mono/linker/pull/649smphost.exe, 00000000.00000002.1715888577.0000023428590000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1716854358.0000023429231000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740160225.000001E103760000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740972052.000001E104401000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417430000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1765424900.00000284180D1000.00000020.00000001.00040000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://.csssmphost.exefalse
  • Avira URL Cloud: safe
unknown
http://.jpgsmphost.exefalse
  • Avira URL Cloud: safe
unknown
https://aka.ms/dotnet-illink/nativehostsmphost.exe, 00000000.00000002.1715888577.0000023428590000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1715888577.0000023428D12000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1716854358.00000234299A5000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1716854358.0000023429231000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740160225.000001E103760000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740160225.000001E103EE2000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740972052.000001E104B75000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740972052.000001E104401000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417BB2000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1765424900.0000028418845000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417430000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1765424900.00000284180D1000.00000020.00000001.00040000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://aka.ms/dotnet-illink/nativehosttsmphost.exe, 00000000.00000002.1715888577.0000023428D12000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1716854358.00000234299A5000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740160225.000001E103EE2000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740972052.000001E104B75000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417BB2000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1765424900.0000028418845000.00000020.00000001.00040000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://aka.ms/dotnet/app-launch-failedRequired:smphost.exefalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://aka.ms/dotnet-core-applaunch?smphost.exefalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://aka.ms/dotnet/downloadsmphost.exefalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://github.com/dotnet/runtimesmphost.exe, smphost.exe, 00000004.00000002.1763810613.0000024380D00000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1763828539.0000024380D10000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764051477.0000024382631000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417BB2000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764322414.0000024382740000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1765424900.0000028418845000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417430000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764131819.0000024382677000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764192887.00000243826B1000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764299433.0000024382710000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764322414.0000024382743000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764383091.0000024382771000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1763881416.0000024380D61000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764264627.00000243826E0000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764131819.0000024382670000.00000002.00000001.00040000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://github.com/mono/linker/issues/378smphost.exe, 00000000.00000002.1715888577.0000023428590000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000000.00000002.1716854358.0000023429231000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740160225.000001E103760000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000002.00000002.1740972052.000001E104401000.00000020.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1764531949.0000028417430000.00000002.00000001.00040000.00000003.sdmp, smphost.exe, 00000004.00000002.1765424900.00000284180D1000.00000020.00000001.00040000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1457829
Start date and time:2024-06-15 17:28:05 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 23s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run name:Cmdline fuzzy
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:smphost.exe
Detection:CLEAN
Classification:clean5.winEXE@6/3@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\smphost.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):39
Entropy (8bit):4.272331064905147
Encrypted:false
SSDEEP:3:jEDKUhL4U3XzWhZV:Ephb0T
MD5:FB9811737B94B41D3F4A672DE9F19C6B
SHA1:F544C656FFB55B927D03CBE0BDBEAE9CA3987758
SHA-256:D8C51A070B5DC2FE6B650D56904CECE141C57DE1E95D7819E2C5C540E1F741DA
SHA-512:D86671FC2E82E77D29AE3192D54FBCC4F4157A8DF4B3D6CBA0E3B2CC53DB58C357140D88BE1B5A9C58108B334843C7C1EB9FCBBED947B8F71A58917CABC08250
Malicious:false
Reputation:low
Preview:Usage: program.exe <IPAddress> <Port>..
File type:PE32+ executable (console) x86-64, for MS Windows
Entropy (8bit):6.722787238497629
TrID:
  • Win64 Executable Console Net Framework (206006/5) 46.24%
  • Win64 Executable Console (202006/5) 45.34%
  • Win64 Executable (generic) Net Framework (21505/4) 4.83%
  • Win64 Executable (generic) (12005/4) 2.69%
  • Generic Win/DOS Executable (2004/3) 0.45%
File name:smphost.exe
File size:67'515'744 bytes
MD5:e45d667483ba3bb5aa44892dfb48d544
SHA1:413143564579a24e58606287b5e2a9f25c787197
SHA256:8d3e747289e59d3cbf1e01d616609f02e79d5d3c6da373de60cd664fb078f539
SHA512:1a0a4552f02f85cc56a43a8c74bec73f560fd7ee87c1b54b9ae9177794439a8d2d84bb8815b94abb6e1969d849ae43f921b363a83fce23398b108d44536afb4b
SSDEEP:393216:7QeufzJiVW/FiAuner3UcOECuV59ZEXIYtr2hSudHlav8Qshg9owi0IaAh14a8GD:75utNiLcOjuV6pkH2EQshqXihYauM8a
TLSH:05E7AE15B3E80A16E63FC27DC2638102E7B1B4535362C6CF0558EE992F53BC1AB77266
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........r.)Z..zZ..zZ..zSk|zL..zZ..z[..z...{H..z...{F..z...{...z.k.{R..z.k.{W..zZ..zR..z...{O..z...{...z...{[..z...z[..z...{[..zRichZ..
Icon Hash:90cececece8e8eb0
Entrypoint:0x1405caa00
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Time Stamp:0x65F9E99A [Tue Mar 19 19:38:02 2024 UTC]
TLS Callbacks:0x405c9e90, 0x1, 0x405ca650, 0x1
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:b819c89ac9b569d0bbb77889674017b2
Instruction
dec eax
sub esp, 28h
call 00007F4CCC867398h
dec eax
add esp, 28h
jmp 00007F4CCC866DFFh
int3
int3
dec eax
sub esp, 28h
call 00007F4CCC557D68h
jmp 00007F4CCC866F94h
xor eax, eax
dec eax
add esp, 28h
ret
int3
int3
jmp 00007F4CCC866F7Ch
int3
int3
int3
dec eax
mov dword ptr [esp+10h], ebx
dec eax
mov dword ptr [esp+18h], esi
push edi
dec eax
sub esp, 10h
xor eax, eax
xor ecx, ecx
cpuid
inc esp
mov eax, ecx
inc ebp
xor ebx, ebx
inc esp
mov edx, edx
inc ecx
xor eax, 6C65746Eh
inc ecx
xor edx, 49656E69h
inc esp
mov ecx, ebx
mov esi, eax
xor ecx, ecx
inc ecx
lea eax, dword ptr [ebx+01h]
inc ebp
or edx, eax
cpuid
inc ecx
xor ecx, 756E6547h
mov dword ptr [esp], eax
inc ebp
or edx, ecx
mov dword ptr [esp+04h], ebx
mov edi, ecx
mov dword ptr [esp+08h], ecx
mov dword ptr [esp+0Ch], edx
jne 00007F4CCC866FEDh
dec eax
or dword ptr [001CC607h], FFFFFFFFh
and eax, 0FFF3FF0h
dec eax
mov dword ptr [001CC5EFh], 00008000h
cmp eax, 000106C0h
je 00007F4CCC866FBAh
cmp eax, 00020660h
je 00007F4CCC866FB3h
cmp eax, 00020670h
je 00007F4CCC866FACh
add eax, FFFCF9B0h
cmp eax, 20h
jnbe 00007F4CCC866FB6h
dec eax
mov ecx, 00010001h
add dword ptr [eax], eax
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x7933200xc4.rdata
IMAGE_DIRECTORY_ENTRY_IMPORT0x7933e40x168.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x8040000x146ef4.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x7b70000x3606c.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x94b0000x7e40.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x7065700x54.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x7067800x28.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x6205c00x140.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x6190000xec8.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x7930dc0x60.rdata
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x616e8c0x61700093ba23585b4c50dc30464f8c2e89a235unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.CLR_UEF0x6180000xdd0x2000f029650c707355fdeca72d623b2f059False0.4140625zlib compressed data3.101176305399617IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x6190000x17d2120x17d4004b5bff4c697d826c3d518f335b849539False0.41810258709016396data5.673676593462084IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x7970000x1ff340x980032458c4af1cb7f5dedc72b8a4039362dFalse0.19700863486842105DIY-Thermocam raw data (Lepton 2.x), scale -32619-31040, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 512.000000, slope 60934707261039714500608.0000003.3113409826855906IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x7b70000x3606c0x36200729e39f881ef69204e11a19a8aef23c8False0.5050068562355658data6.479757411344553IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.didat0x7ee0000x380x200fe9ee59259a2bf6e81918437d96b083fFalse0.068359375data0.42693031941489346IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Section0x7ef0000x80x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
_RDATA0x7f00000x134080x136005b0a1a761734007585458397271ec848False0.1876008064516129data5.489522104557175IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x8040000x146ef40x14700011070a5084e5933a3609d379a46f96e7False0.43213562571674313data6.358508485624431IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x94b0000x7e400x80004c1648f746054940bd1c6e8ed64e2f91False0.1563720703125data5.443061218573424IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_RCDATA0x8041900x24data1.2222222222222223
RT_RCDATA0x8041b40x24data1.2222222222222223
RT_RCDATA0x8041d80x146820PE32+ executable (DLL) (GUI) x86-64, for MS Windows0.43875598907470703
RT_VERSION0x94a9f80x2c0data0.4303977272727273
RT_MANIFEST0x94acb80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
DLLImport
KERNEL32.dllRaiseException, FreeLibrary, SetErrorMode, RaiseFailFastException, GetExitCodeProcess, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, AddVectoredExceptionHandler, MultiByteToWideChar, GetTickCount, FlushInstructionCache, QueryPerformanceFrequency, QueryPerformanceCounter, RtlLookupFunctionEntry, LocateXStateFeature, RtlDeleteFunctionTable, InterlockedPushEntrySList, InterlockedFlushSList, InitializeSListHead, GetTickCount64, DuplicateHandle, QueueUserAPC, WaitForSingleObjectEx, SetThreadPriority, GetThreadPriority, GetCurrentThreadId, TlsAlloc, GetCurrentThread, GetCurrentProcessId, CreateThread, GetModuleHandleW, WaitForMultipleObjectsEx, SignalObjectAndWait, RtlCaptureContext, SetThreadStackGuarantee, VirtualQuery, WriteFile, GetStdHandle, GetConsoleOutputCP, MapViewOfFileEx, UnmapViewOfFile, GetStringTypeExW, InterlockedPopEntrySList, ExitProcess, Sleep, CreateMemoryResourceNotification, VirtualAlloc, VirtualFree, VirtualProtect, SleepEx, SwitchToThread, SuspendThread, ResumeThread, InitializeContext, SetXStateFeaturesMask, RtlRestoreContext, CloseThreadpoolTimer, CreateThreadpoolTimer, SetThreadpoolTimer, ReadFile, GetFileSize, GetEnvironmentVariableW, SetEnvironmentVariableW, CreateEventW, SetEvent, ResetEvent, GetThreadContext, SetThreadContext, GetEnabledXStateFeatures, CopyContext, WerRegisterRuntimeExceptionModule, RtlInstallFunctionTableCallback, GetSystemDefaultLCID, GetUserDefaultLCID, RtlUnwind, HeapAlloc, HeapFree, GetProcessHeap, HeapCreate, HeapDestroy, GetEnvironmentStringsW, FreeEnvironmentStringsW, FormatMessageW, CreateSemaphoreExW, ReleaseSemaphore, GetACP, LCMapStringEx, LocalFree, VerSetConditionMask, VerifyVersionInfoW, QueryThreadCycleTime, GetLogicalProcessorInformationEx, SetThreadGroupAffinity, GetThreadGroupAffinity, GetProcessGroupAffinity, GetCurrentProcessorNumberEx, GetProcessAffinityMask, QueryInformationJobObject, CloseHandle, GetSystemTimeAsFileTime, GetModuleFileNameW, CreateProcessW, GetCPInfo, GetTempPathW, LoadLibraryExW, CreateFileW, GetFileAttributesExW, GetFullPathNameW, LoadLibraryExA, OutputDebugStringA, OpenEventW, ReleaseMutex, ExitThread, CreateMutexW, HeapReAlloc, CreateNamedPipeA, WaitForMultipleObjects, DisconnectNamedPipe, CreateFileA, CancelIoEx, GetOverlappedResult, ConnectNamedPipe, FlushFileBuffers, SetFilePointer, MapViewOfFile, GetActiveProcessorGroupCount, GetSystemTime, SetConsoleCtrlHandler, GetLocaleInfoEx, GetUserDefaultLocaleName, RtlAddFunctionTable, LoadLibraryW, CreateDirectoryW, RemoveDirectoryW, CreateActCtxW, ActivateActCtx, FindResourceW, GetWindowsDirectoryW, GetFileSizeEx, FindFirstFileExW, FindNextFileW, FindClose, LoadLibraryA, GetCurrentDirectoryW, IsWow64Process, EncodePointer, DecodePointer, CreateFileMappingA, TlsSetValue, TlsGetValue, GetSystemInfo, GetCurrentProcess, OutputDebugStringW, IsDebuggerPresent, LeaveCriticalSection, EnterCriticalSection, DeleteCriticalSection, InitializeCriticalSection, WideCharToMultiByte, GetCommandLineW, GetProcAddress, GetModuleHandleExW, SetThreadErrorMode, FlushProcessWriteBuffers, SetLastError, DebugBreak, WaitForSingleObject, GetNumaHighestNodeNumber, SetThreadAffinityMask, SetThreadIdealProcessorEx, GetThreadIdealProcessorEx, VirtualAllocExNuma, GetNumaProcessorNodeEx, VirtualUnlock, GetLargePageMinimum, IsProcessInJob, K32GetProcessMemoryInfo, GetLogicalProcessorInformation, GlobalMemoryStatusEx, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, WakeAllConditionVariable, SleepConditionVariableSRW, RtlVirtualUnwind, IsProcessorFeaturePresent, RtlUnwindEx, InitializeCriticalSectionAndSpinCount, TlsFree, RtlPcToFileHeader, TryAcquireSRWLockExclusive, GetExitCodeThread, GetStringTypeW, InitializeCriticalSectionEx, GetLastError, CreateFileMappingW
ADVAPI32.dllReportEventW, AdjustTokenPrivileges, RegGetValueW, SetKernelObjectSecurity, GetSidSubAuthorityCount, GetSidSubAuthority, GetTokenInformation, OpenProcessToken, DeregisterEventSource, RegisterEventSourceW, RegQueryValueExW, RegOpenKeyExW, RegCloseKey, EventRegister, SetThreadToken, RevertToSelf, OpenThreadToken, EventWriteTransfer, EventWrite, LookupPrivilegeValueW
ole32.dllCreateStreamOnHGlobal, CoRevokeInitializeSpy, CoGetClassObject, CoGetContextToken, CoGetObjectContext, CoUnmarshalInterface, CoMarshalInterface, CoGetMarshalSizeMax, CLSIDFromProgID, CoReleaseMarshalData, CoTaskMemFree, CoTaskMemAlloc, CoCreateGuid, CoInitializeEx, CoRegisterInitializeSpy, CoWaitForMultipleHandles, CoUninitialize, CoCreateFreeThreadedMarshaler
OLEAUT32.dllCreateErrorInfo, SysFreeString, GetErrorInfo, SetErrorInfo, SysStringLen, SysAllocString, SysAllocStringLen, SafeArrayGetDim, SafeArrayGetLBound, SafeArrayDestroy, QueryPathOfRegTypeLib, LoadTypeLibEx, SafeArrayGetVartype, VariantChangeType, VariantChangeTypeEx, VariantClear, VariantInit, VarCyFromDec, SafeArrayAllocDescriptorEx, GetRecordInfoFromTypeInfo, SafeArraySetRecordInfo, SafeArrayAllocData, SafeArrayGetElemsize, SysStringByteLen, SysAllocStringByteLen, SafeArrayCreateVector, SafeArrayPutElement, LoadRegTypeLib
USER32.dllLoadStringW, MessageBoxW
SHELL32.dllShellExecuteW
api-ms-win-crt-string-l1-1-0.dllstrncat_s, wcsncat_s, strcmp, wcsnlen, wcscat_s, towupper, iswascii, _strdup, strncpy, strnlen, wcstok_s, isdigit, isupper, isalpha, towlower, _wcsdup, iswspace, isspace, islower, strtok_s, _wcsnicmp, strcspn, __strncnt, strlen, wcscpy_s, toupper, wcsncpy_s, strcpy_s, strcat_s, strncpy_s, _strnicmp, tolower, wcsncmp, iswupper, strncmp, _stricmp, _wcsicmp
api-ms-win-crt-stdio-l1-1-0.dll__stdio_common_vsscanf, fflush, __acrt_iob_func, __stdio_common_vfprintf, __stdio_common_vswprintf, __stdio_common_vfwprintf, fputws, fputwc, _get_stream_buffer_pointers, _fseeki64, fread, fsetpos, ungetc, fgetpos, fgets, fgetc, fputc, _wfsopen, _wfopen, __p__commode, _set_fmode, __stdio_common_vsnprintf_s, setvbuf, _setmode, _dup, _fileno, ftell, fseek, fputs, __stdio_common_vsnwprintf_s, __stdio_common_vsprintf_s, fwrite, _flushall, fopen, fclose
api-ms-win-crt-runtime-l1-1-0.dll_crt_atexit, _cexit, _seh_filter_exe, _set_app_type, _register_onexit_function, _configure_wide_argv, _initialize_wide_environment, _get_initial_wide_environment, _initterm, _initterm_e, _exit, _invalid_parameter_noinfo_noreturn, __p___argc, __p___wargv, _c_exit, _register_thread_local_exe_atexit_callback, _initialize_onexit_table, _beginthreadex, terminate, _controlfp_s, _wcserror_s, _invalid_parameter_noinfo, _errno, exit, abort
api-ms-win-crt-convert-l1-1-0.dll_atoi64, _ltow_s, _wtoi, strtoul, _wcstoui64, atol, _itow_s, strtoull, wcstoul
api-ms-win-crt-heap-l1-1-0.dllfree, _set_new_mode, calloc, malloc, realloc
api-ms-win-crt-utility-l1-1-0.dllqsort
api-ms-win-crt-math-l1-1-0.dllasinhf, atanhf, cbrtf, acoshf, cosh, cbrt, coshf, exp, expf, acosh, atanh, floor, floorf, fma, fmaf, cosf, _fdopen, cos, ceilf, _copysignf, _isnanf, trunc, truncf, ilogb, ilogbf, tanhf, ceil, fmod, fmodf, atanf, frexp, atan2f, atan2, log, log10, log10f, atan, asinf, log2, log2f, logf, pow, powf, sin, sinf, asin, sinh, sinhf, sqrt, sqrtf, tan, tanf, tanh, acosf, _copysign, asinh, _isnan, _finite, modf, modff, acos, __setusermatherr
api-ms-win-crt-time-l1-1-0.dll_time64, _gmtime64_s, wcsftime
api-ms-win-crt-environment-l1-1-0.dllgetenv
api-ms-win-crt-locale-l1-1-0.dll_unlock_locales, setlocale, __pctype_func, ___lc_locale_name_func, _lock_locales, ___lc_codepage_func, ___mb_cur_max_func, _configthreadlocale, localeconv
api-ms-win-crt-filesystem-l1-1-0.dll_wrename, _unlock_file, _wremove, _lock_file
NameOrdinalAddress
CLRJitAttachState30x1407abb38
DotNetRuntimeInfo40x140799590
MetaDataGetDispenser50x14056bef0
g_CLREngineMetrics20x140798d98
g_dacTable60x1406405f0
No network behavior found

Click to jump to process

Click to jump to process

  • File
  • Registry

Click to dive into process behavior distribution

Target ID:1
Start time:11:29:00
Start date:15/06/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:3
Start time:11:29:03
Start date:15/06/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:5
Start time:11:29:05
Start date:15/06/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Execution Graph

Execution Coverage

Dynamic/Packed Code Coverage

Signature Coverage

Execution Coverage:3.4%
Dynamic/Decrypted Code Coverage:0%
Signature Coverage:2.8%
Total number of Nodes:109
Total number of Limit Nodes:0
Show Legend
Hide Nodes/Edges
execution_graph 2738 1f3938ba3e0 2740 1f3938ba408 2738->2740 2739 1f3938ba487 2740->2739 2741 1f3938ba590 GetStdHandle 2740->2741 2741->2740 2710 1f3938bc630 GetStdHandle 2711 1f3938bc667 2710->2711 2712 1f3938bc697 GetStdHandle 2711->2712 2715 1f3938bc6dd 2711->2715 2713 1f3938bc6b0 2712->2713 2714 1f3938bc6c4 GetStdHandle 2713->2714 2713->2715 2714->2715 2625 1f3938b81b0 2626 1f3938b81ca 2625->2626 2627 1f3938b824d GetConsoleOutputCP 2626->2627 2628 1f3938b8222 2626->2628 2627->2628 2716 1f3938ba230 2717 1f3938ba246 GetStdHandle 2716->2717 2718 1f3938ba258 2716->2718 2718->2717 2617 1f3938b7ac0 2618 1f3938b7ae5 WriteFile 2617->2618 2620 1f3938b7d93 2618->2620 2621 1f3938b7500 2622 1f3938b7526 GetFileType 2621->2622 2624 1f3938b7556 2622->2624 2632 1f3938b7580 2633 1f3938b759f GetStdHandle 2632->2633 2634 1f3938b7599 2632->2634 2634->2633 2635 1f3938bad80 2636 1f3938bad91 2635->2636 2637 1f3938badac 2636->2637 2638 1f3938badb3 GetStdHandle 2636->2638 2639 1f3938baddf 2638->2639 2730 1f3938babc0 GetStdHandle 2731 1f3938babe0 2730->2731 2732 1f3938babf8 2731->2732 2733 1f3938bac5c GetStdHandle 2731->2733 2734 1f3938bac82 2733->2734 2742 1f3938bc000 2743 1f3938bc032 2742->2743 2744 1f3938bc094 GetStdHandle 2743->2744 2746 1f3938bc0ba 2743->2746 2744->2746 2745 1f3938bc11e 2746->2745 2747 1f3938bc2b4 GetStdHandle 2746->2747 2748 1f3938bc28b GetStdHandle 2746->2748 2750 1f3938bc2ec 2746->2750 2747->2750 2749 1f3938bc2ac 2748->2749 2749->2747 2749->2750 2751 1f3938bc35b 2750->2751 2752 1f3938bc44e GetStdHandle 2750->2752 2753 1f3938bc477 GetStdHandle 2750->2753 2754 1f3938bc465 2752->2754 2755 1f3938bc48b 2753->2755 2754->2753 2640 7ff648abaa00 2643 7ff648abae0c 2640->2643 2644 7ff648abae2f GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 2643->2644 2645 7ff648abaa09 2643->2645 2644->2645 2646 1f3938b8990 2647 1f3938b89a0 GetStdHandle 2646->2647 2649 1f3938b8a28 2647->2649 2652 1f3938bb2d0 2654 1f3938bb325 2652->2654 2653 1f3938bb3e8 2654->2653 2655 1f3938bb6e8 GetStdHandle 2654->2655 2658 1f3938bbb24 GetStdHandle 2654->2658 2666 1f3938bb73d 2654->2666 2655->2666 2657 1f3938bb859 2657->2658 2659 1f3938bb891 GetStdHandle 2657->2659 2662 1f3938bbbd5 2658->2662 2665 1f3938bb8d6 2659->2665 2660 1f3938bb7ba GetStdHandle 2660->2666 2664 1f3938bbc6f 2662->2664 2667 1f3938bbd11 GetStdHandle 2662->2667 2663 1f3938bb809 GetStdHandle 2663->2666 2666->2657 2666->2658 2666->2660 2666->2663 2670 1f3938bbd50 2667->2670 2668 1f3938bbd6c 2669 1f3938bbebd GetStdHandle 2671 1f3938bbedf 2669->2671 2670->2668 2670->2669 2672 1f3938ba6d0 2678 1f3938ba6ea 2672->2678 2673 1f3938ba7c3 GetStdHandle 2673->2678 2674 1f3938ba885 GetStdHandle 2674->2678 2675 1f3938ba7a7 2676 1f3938ba842 GetStdHandle 2676->2678 2677 1f3938ba904 GetStdHandle 2677->2678 2678->2673 2678->2674 2678->2675 2678->2676 2678->2677 2681 1f3938ba930 2678->2681 2679 1f3938ba9ac 2680 1f3938ba9e8 GetStdHandle 2680->2681 2681->2679 2681->2680 2682 1f3938baf10 2683 1f3938baf20 GetStdHandle 2682->2683 2684 1f3938baf46 GetStdHandle 2682->2684 2687 1f3938baf39 2683->2687 2684->2687 2686 1f3938baf3d 2687->2686 2688 1f3938bafb2 GetStdHandle 2687->2688 2689 1f3938bb010 GetStdHandle 2687->2689 2691 1f3938bafcb 2688->2691 2689->2691 2692 1f3938bb077 GetStdHandle 2691->2692 2693 1f3938bafe7 GetStdHandle 2691->2693 2696 1f3938bb000 2692->2696 2693->2696 2695 1f3938bb008 2696->2695 2697 1f3938bb12c GetStdHandle 2696->2697 2698 1f3938bb100 GetStdHandle 2696->2698 2701 1f3938bb119 2697->2701 2698->2701 2700 1f3938bb11d 2701->2700 2702 1f3938bb1f4 GetStdHandle 2701->2702 2703 1f3938bb193 GetStdHandle 2701->2703 2705 1f3938bb1ac 2702->2705 2703->2705 2706 1f3938bb1d1 GetStdHandle 2705->2706 2707 1f3938bb217 GetStdHandle 2705->2707 2709 1f3938bb1ea 2706->2709 2707->2709 2722 1f3938b8a50 GetStdHandle 2723 1f3938b8a68 2722->2723

Executed Functions

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 0 1f3938b7ac0-1f3938b7d86 WriteFile 28 1f3938b7d93-1f3938b7fbd 0->28
APIs
Memory Dump Source
  • Source File: 00000000.00000002.1715275035.000001F3938B1000.00000020.00000001.00040000.00000003.sdmp, Offset: 000001F3938B0000, based on PE: true
  • Associated: 00000000.00000002.1715258015.000001F3938B0000.00000002.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1715301514.000001F3938D4000.00000004.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1715318837.000001F3938D6000.00000008.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1715332428.000001F3938D7000.00000002.00001000.00040000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_1f3938b0000_smphost.jbxd
Similarity
  • API ID: FileWrite
  • String ID:
  • API String ID: 3934441357-0
  • Opcode ID: 49f48fa59b2717629d865ea2170825846ff6bc5e78181d8085553fcf3097608d
  • Instruction ID: 621f1644ea40c2d35c9b2f0f2c153728676299f8d1073bf091a24193622f4953
  • Opcode Fuzzy Hash: 49f48fa59b2717629d865ea2170825846ff6bc5e78181d8085553fcf3097608d
  • Instruction Fuzzy Hash: 25D12B77B01A149AE725CB62FC40BAE3374B748B99F544035DE6A53B64DFB8C98AC700

Control-flow Graph

APIs
Memory Dump Source
  • Source File: 00000000.00000002.1715275035.000001F3938B1000.00000020.00000001.00040000.00000003.sdmp, Offset: 000001F3938B0000, based on PE: true
  • Associated: 00000000.00000002.1715258015.000001F3938B0000.00000002.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1715301514.000001F3938D4000.00000004.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1715318837.000001F3938D6000.00000008.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1715332428.000001F3938D7000.00000002.00001000.00040000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_1f3938b0000_smphost.jbxd
Similarity
  • API ID: ConsoleOutput
  • String ID:
  • API String ID: 3985236979-0
  • Opcode ID: 0b3c3f01842f473c41a81062c82626f8eb6e6258c765146833008e0865d7a38c
  • Instruction ID: 7eed220a2c25bde1f7eee6637b69de6803241e9042e242903b6e6a301cadf627
  • Opcode Fuzzy Hash: 0b3c3f01842f473c41a81062c82626f8eb6e6258c765146833008e0865d7a38c
  • Instruction Fuzzy Hash: 83316977A04A5699F720CFA1EC047ED3379B748B5CF545025CE6E17A68CFB48A8AC300

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 63 1f3938b7500-1f3938b7549 GetFileType 66 1f3938b7556-1f3938b7579 63->66
APIs
Memory Dump Source
  • Source File: 00000000.00000002.1715275035.000001F3938B1000.00000020.00000001.00040000.00000003.sdmp, Offset: 000001F3938B0000, based on PE: true
  • Associated: 00000000.00000002.1715258015.000001F3938B0000.00000002.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1715301514.000001F3938D4000.00000004.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1715318837.000001F3938D6000.00000008.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1715332428.000001F3938D7000.00000002.00001000.00040000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_1f3938b0000_smphost.jbxd
Similarity
  • API ID: FileType
  • String ID:
  • API String ID: 3081899298-0
  • Opcode ID: ebb4d259578cd60c189fde5a0f87fbab5bd4408df9f1ae397a1001f96a96ae71
  • Instruction ID: af1dc84f1c615a7f8844cde6f20ba97f9f5e61fa367937409859a6554e17cb55
  • Opcode Fuzzy Hash: ebb4d259578cd60c189fde5a0f87fbab5bd4408df9f1ae397a1001f96a96ae71
  • Instruction Fuzzy Hash: C6F03C77704A149AEB259B72FC04BFA2234B788B59F804131DD2E43760DEB8C98EC300

Control-flow Graph

Memory Dump Source
  • Source File: 00000000.00000002.1718761407.00007FF5E8EC0000.00000020.00001000.00040000.00000000.sdmp, Offset: 00007FF5E8EC0000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff5e8ec0000_smphost.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 1d345a2c8c2bc33df6ebbf0f985dcef0f3f8099c895947693efbe9f4a171317d
  • Instruction ID: cf3dde0515b403a8c00f41df2c74a785152f5f27ba981f9a7e143541c721be93
  • Opcode Fuzzy Hash: 1d345a2c8c2bc33df6ebbf0f985dcef0f3f8099c895947693efbe9f4a171317d
  • Instruction Fuzzy Hash: F231A930C0898E8FDB84EF68C855ABDBBF1FF58301F140169D05DEB291DA75A951CB46

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 115 7ff5e8ec1a7e-7ff5e8ec1aab 117 7ff5e8ec1ab4-7ff5e8ec1ac4 call 7ff5e8ec1ac5 115->117
Memory Dump Source
  • Source File: 00000000.00000002.1718761407.00007FF5E8EC0000.00000020.00001000.00040000.00000000.sdmp, Offset: 00007FF5E8EC0000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff5e8ec0000_smphost.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: de798e3dbf89b46ecb5514c218aaec4f05bb0cc9551f99605798cc1af70c37f0
  • Instruction ID: 17d3ad85e4ef108eae4917bed613afa7b0b8153138932ece8857494cdf574aa1
  • Opcode Fuzzy Hash: de798e3dbf89b46ecb5514c218aaec4f05bb0cc9551f99605798cc1af70c37f0
  • Instruction Fuzzy Hash: 27F0F83090490D8FCF88EF88C494AACBBB1FB58311B60006ED01DD72A0CA369991CB00

Non-executed Functions

Control-flow Graph

APIs
Memory Dump Source
  • Source File: 00000000.00000002.1719140111.00007FF6484F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6484F0000, based on PE: true
  • Associated: 00000000.00000002.1719125009.00007FF6484F0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1719508335.00007FF648B09000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1719610256.00007FF648C87000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1719626437.00007FF648C8C000.00000008.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1719641142.00007FF648C8E000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1719641142.00007FF648C98000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1719641142.00007FF648C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1719641142.00007FF648CA0000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1719641142.00007FF648CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1719716613.00007FF648CA7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1719742228.00007FF648CE0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1719742228.00007FF648CE5000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff6484f0000_smphost.jbxd
Similarity
  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
  • String ID:
  • API String ID: 2933794660-0
  • Opcode ID: ba65f6a958aee0d3f0c3a7f6e6efc600877284dab9a37d7090099f024dbf0371
  • Instruction ID: 09c2bf7bc613e1aee28c9aade95d3ebbc967882e7963847e5c0160fe3d534a40
  • Opcode Fuzzy Hash: ba65f6a958aee0d3f0c3a7f6e6efc600877284dab9a37d7090099f024dbf0371
  • Instruction Fuzzy Hash: F4111C26B58F018AEB00EB71E8552A933B4F71A759F441E31DB6D86BA4EF78D1948340

Control-flow Graph

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1715275035.000001F3938B1000.00000020.00000001.00040000.00000003.sdmp, Offset: 000001F3938B0000, based on PE: true
  • Associated: 00000000.00000002.1715258015.000001F3938B0000.00000002.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1715301514.000001F3938D4000.00000004.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1715318837.000001F3938D6000.00000008.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1715332428.000001F3938D7000.00000002.00001000.00040000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_1f3938b0000_smphost.jbxd
Similarity
  • API ID: Handle
  • String ID: d
  • API String ID: 2519475695-2564639436
  • Opcode ID: 04f09340ac1d4f7a73af076a5bfaecf0aad1991f26a6c068942f7bac34692b0d
  • Instruction ID: 5f2846b3ef644c7838ff579b45db3414c78f277166f53f83834602ed6c51d8a7
  • Opcode Fuzzy Hash: 04f09340ac1d4f7a73af076a5bfaecf0aad1991f26a6c068942f7bac34692b0d
  • Instruction Fuzzy Hash: 7EA144B7209A4382EB155B25E8543BA33B9FB44BA9F446135D97A437A4DFFEC64C8300

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 419 1f3938bc000-1f3938bc04a 421 1f3938bc132-1f3938bc169 419->421 422 1f3938bc050-1f3938bc059 419->422 427 1f3938bc172-1f3938bc1a9 421->427 422->421 423 1f3938bc05f-1f3938bc061 422->423 423->421 424 1f3938bc067-1f3938bc077 423->424 426 1f3938bc07d-1f3938bc086 424->426 424->427 426->427 428 1f3938bc08c-1f3938bc08e 426->428 440 1f3938bc1b2-1f3938bc232 427->440 428->427 430 1f3938bc094-1f3938bc118 GetStdHandle 428->430 430->440 446 1f3938bc11e-1f3938bc131 430->446 449 1f3938bc24f-1f3938bc259 440->449 450 1f3938bc234-1f3938bc240 440->450 453 1f3938bc25b-1f3938bc266 449->453 454 1f3938bc277-1f3938bc279 449->454 451 1f3938bc36f-1f3938bc3b9 450->451 452 1f3938bc246-1f3938bc24a 450->452 456 1f3938bc3c2-1f3938bc40c 451->456 452->449 455 1f3938bc26c-1f3938bc275 453->455 453->456 457 1f3938bc27b-1f3938bc285 454->457 458 1f3938bc2b4-1f3938bc355 GetStdHandle 454->458 455->457 460 1f3938bc415-1f3938bc41b 456->460 459 1f3938bc28b-1f3938bc2ae GetStdHandle 457->459 457->460 480 1f3938bc441-1f3938bc44c 458->480 484 1f3938bc35b-1f3938bc36e 458->484 459->458 468 1f3938bc420-1f3938bc438 459->468 460->468 468->480 485 1f3938bc44e-1f3938bc46f GetStdHandle 480->485 486 1f3938bc477-1f3938bc498 GetStdHandle 480->486 485->486 491 1f3938bc471 485->491 489 1f3938bc4a0-1f3938bc4a7 486->489 490 1f3938bc49a 486->490 492 1f3938bc4a9-1f3938bc4fd 489->492 493 1f3938bc506-1f3938bc50d 489->493 490->489 491->486 492->493 494 1f3938bc50f-1f3938bc563 493->494 495 1f3938bc56c-1f3938bc59c 493->495 494->495 502 1f3938bc5ad-1f3938bc5cb 495->502 503 1f3938bc59e-1f3938bc5a4 495->503 505 1f3938bc5d4-1f3938bc5d8 502->505 503->505 506 1f3938bc5a6-1f3938bc5ac 503->506 505->506
APIs
Memory Dump Source
  • Source File: 00000000.00000002.1715275035.000001F3938B1000.00000020.00000001.00040000.00000003.sdmp, Offset: 000001F3938B0000, based on PE: true
  • Associated: 00000000.00000002.1715258015.000001F3938B0000.00000002.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1715301514.000001F3938D4000.00000004.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1715318837.000001F3938D6000.00000008.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1715332428.000001F3938D7000.00000002.00001000.00040000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_1f3938b0000_smphost.jbxd
Similarity
  • API ID: Handle
  • String ID:
  • API String ID: 2519475695-0
  • Opcode ID: 8be3169f8ff43b1310e7f7e9c82ba98c26c69ae8559d4fd44e70a2a5d480b0e4
  • Instruction ID: 9a1c166e0568467f3cc6c711673844aca31a29d8151a26f5410898cce6cfd720
  • Opcode Fuzzy Hash: 8be3169f8ff43b1310e7f7e9c82ba98c26c69ae8559d4fd44e70a2a5d480b0e4
  • Instruction Fuzzy Hash: F4F16DB7605A0386EB049BA5E8443FE237AB748F99F156035CD7A53B64DFF9868D8300

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 517 1f3938ba6d0-1f3938ba7a5 527 1f3938ba7b3-1f3938ba7bd 517->527 528 1f3938ba7a7-1f3938ba7b2 517->528 529 1f3938ba87f-1f3938ba8ab GetStdHandle 527->529 530 1f3938ba7c3-1f3938ba7e9 GetStdHandle 527->530 533 1f3938ba8b1-1f3938ba8ba 529->533 534 1f3938ba7ef-1f3938ba7f4 529->534 530->533 530->534 542 1f3938ba8bc-1f3938ba8da 533->542 543 1f3938ba8e3-1f3938ba8f5 533->543 536 1f3938ba7ff-1f3938ba80b 534->536 537 1f3938ba7f6-1f3938ba7fe 534->537 539 1f3938ba80d-1f3938ba80f 536->539 540 1f3938ba832-1f3938ba83c 536->540 539->540 541 1f3938ba811-1f3938ba830 539->541 544 1f3938ba8fe-1f3938ba92a GetStdHandle 540->544 545 1f3938ba842-1f3938ba868 GetStdHandle 540->545 541->540 551 1f3938ba873-1f3938ba87e 541->551 542->543 543->544 544->527 553 1f3938ba930-1f3938ba9aa 544->553 552 1f3938ba86e 545->552 545->553 552->527 562 1f3938ba9ac-1f3938ba9bf 553->562 563 1f3938ba9d8-1f3938ba9e2 553->563 566 1f3938ba9cc-1f3938ba9d3 562->566 567 1f3938ba9c1-1f3938ba9c7 562->567 564 1f3938baafa-1f3938bab00 563->564 565 1f3938ba9e8-1f3938baa0c GetStdHandle 563->565 568 1f3938bab05-1f3938bab09 564->568 573 1f3938baa12-1f3938baa16 565->573 574 1f3938baad3-1f3938baaf1 565->574 566->568 567->568 571 1f3938bab0b 568->571 572 1f3938bab15-1f3938bab55 568->572 571->572 580 1f3938bab61-1f3938bab80 572->580 581 1f3938bab57 572->581 573->574 575 1f3938baa1c-1f3938baa2a 573->575 574->564 577 1f3938baa2c-1f3938baa2e 575->577 578 1f3938baa30-1f3938baa33 575->578 577->578 582 1f3938baa39-1f3938baa3f 577->582 578->582 583 1f3938baaca-1f3938baace 578->583 581->580 584 1f3938baa5d-1f3938baa61 582->584 585 1f3938baa41-1f3938baa5b 582->585 583->563 587 1f3938baa93-1f3938baa9a 584->587 588 1f3938baa63-1f3938baa66 584->588 585->584 595 1f3938baac1-1f3938baac5 585->595 587->568 589 1f3938baa9c-1f3938baab4 587->589 591 1f3938baa6d-1f3938baa74 588->591 592 1f3938baa68-1f3938baa6b 588->592 589->568 591->563 594 1f3938baa7a-1f3938baa7f 591->594 592->591 596 1f3938baab8-1f3938baabc 592->596 594->563 597 1f3938baa85-1f3938baa88 594->597 595->563 596->563 598 1f3938baab6 597->598 599 1f3938baa8a-1f3938baa8d 597->599 598->587 599->563 599->587
APIs
Memory Dump Source
  • Source File: 00000000.00000002.1715275035.000001F3938B1000.00000020.00000001.00040000.00000003.sdmp, Offset: 000001F3938B0000, based on PE: true
  • Associated: 00000000.00000002.1715258015.000001F3938B0000.00000002.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1715301514.000001F3938D4000.00000004.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1715318837.000001F3938D6000.00000008.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1715332428.000001F3938D7000.00000002.00001000.00040000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_1f3938b0000_smphost.jbxd
Similarity
  • API ID: Handle
  • String ID:
  • API String ID: 2519475695-0
  • Opcode ID: c3e879d798494e0862c0c1eb295d9db67cf5b64f46037932294a99ea997a39b5
  • Instruction ID: 16dc6b8c2e7e8658e75f702c30b19a6790f8d1e9ef538a90c3a8443bfa97cfce
  • Opcode Fuzzy Hash: c3e879d798494e0862c0c1eb295d9db67cf5b64f46037932294a99ea997a39b5
  • Instruction Fuzzy Hash: AFD16BB3A18A439AE7149B65E8403FD33B8F744B58F542125DE7A03A94DFFAC689C701

Execution Graph

Execution Coverage

Dynamic/Packed Code Coverage

Signature Coverage

Execution Coverage:3.4%
Dynamic/Decrypted Code Coverage:100%
Signature Coverage:0%
Total number of Nodes:105
Total number of Limit Nodes:0
Show Legend
Hide Nodes/Edges
execution_graph 2625 1a06eaf7ac0 2626 1a06eaf7ae5 WriteFile 2625->2626 2628 1a06eaf7d93 2626->2628 2629 1a06eaf7500 2630 1a06eaf7526 GetFileType 2629->2630 2632 1a06eaf7556 2630->2632 2653 1a06eafabc0 GetStdHandle 2655 1a06eafabe0 2653->2655 2654 1a06eafabf8 2655->2654 2656 1a06eafac5c GetStdHandle 2655->2656 2657 1a06eafac82 2656->2657 2661 1a06eafc000 2662 1a06eafc032 2661->2662 2663 1a06eafc094 GetStdHandle 2662->2663 2665 1a06eafc0ba 2662->2665 2663->2665 2664 1a06eafc11e 2665->2664 2666 1a06eafc2b4 GetStdHandle 2665->2666 2667 1a06eafc28b GetStdHandle 2665->2667 2669 1a06eafc2ec 2665->2669 2666->2669 2668 1a06eafc2ac 2667->2668 2668->2666 2668->2669 2670 1a06eafc35b 2669->2670 2671 1a06eafc44e GetStdHandle 2669->2671 2672 1a06eafc477 GetStdHandle 2669->2672 2673 1a06eafc465 2671->2673 2674 1a06eafc48b 2672->2674 2673->2672 2682 1a06eaf7580 2683 1a06eaf759f GetStdHandle 2682->2683 2684 1a06eaf7599 2682->2684 2684->2683 2685 1a06eafad80 2686 1a06eafad91 2685->2686 2687 1a06eafadac 2686->2687 2688 1a06eafadb3 GetStdHandle 2686->2688 2689 1a06eafaddf 2688->2689 2636 1a06eaf8a50 GetStdHandle 2637 1a06eaf8a68 2636->2637 2690 1a06eaf8990 2691 1a06eaf89a0 GetStdHandle 2690->2691 2693 1a06eaf8a28 2691->2693 2696 1a06eafb2d0 2698 1a06eafb325 2696->2698 2697 1a06eafb3e8 2698->2697 2699 1a06eafb6e8 GetStdHandle 2698->2699 2708 1a06eafb73d 2698->2708 2709 1a06eafbb24 GetStdHandle 2698->2709 2699->2708 2701 1a06eafb859 2702 1a06eafb891 GetStdHandle 2701->2702 2701->2709 2705 1a06eafb8d6 2702->2705 2703 1a06eafb7ba GetStdHandle 2703->2708 2706 1a06eafb809 GetStdHandle 2706->2708 2707 1a06eafbc6f 2708->2701 2708->2703 2708->2706 2708->2709 2710 1a06eafbbd5 2709->2710 2710->2707 2711 1a06eafbd11 GetStdHandle 2710->2711 2713 1a06eafbd50 2711->2713 2712 1a06eafbd6c 2713->2712 2714 1a06eafbebd GetStdHandle 2713->2714 2715 1a06eafbedf 2714->2715 2716 1a06eafa6d0 2722 1a06eafa6ea 2716->2722 2717 1a06eafa7c3 GetStdHandle 2717->2722 2718 1a06eafa885 GetStdHandle 2718->2722 2719 1a06eafa842 GetStdHandle 2719->2722 2720 1a06eafa904 GetStdHandle 2720->2722 2721 1a06eafa7a7 2722->2717 2722->2718 2722->2719 2722->2720 2722->2721 2724 1a06eafa930 2722->2724 2723 1a06eafa9e8 GetStdHandle 2723->2724 2724->2723 2725 1a06eafa9ac 2724->2725 2726 1a06eafaf10 2727 1a06eafaf46 GetStdHandle 2726->2727 2728 1a06eafaf20 GetStdHandle 2726->2728 2732 1a06eafaf39 2727->2732 2728->2732 2730 1a06eafaf3d 2731 1a06eafb010 GetStdHandle 2735 1a06eafafcb 2731->2735 2732->2730 2732->2731 2733 1a06eafafb2 GetStdHandle 2732->2733 2733->2735 2736 1a06eafb077 GetStdHandle 2735->2736 2737 1a06eafafe7 GetStdHandle 2735->2737 2740 1a06eafb000 2736->2740 2737->2740 2739 1a06eafb008 2740->2739 2741 1a06eafb12c GetStdHandle 2740->2741 2742 1a06eafb100 GetStdHandle 2740->2742 2745 1a06eafb119 2741->2745 2742->2745 2744 1a06eafb11d 2745->2744 2746 1a06eafb1f4 GetStdHandle 2745->2746 2747 1a06eafb193 GetStdHandle 2745->2747 2749 1a06eafb1ac 2746->2749 2747->2749 2750 1a06eafb217 GetStdHandle 2749->2750 2751 1a06eafb1d1 GetStdHandle 2749->2751 2753 1a06eafb1ea 2750->2753 2751->2753 2675 1a06eafa3e0 2677 1a06eafa408 2675->2677 2676 1a06eafa487 2677->2676 2678 1a06eafa590 GetStdHandle 2677->2678 2678->2677 2621 1a06eaf81b0 2622 1a06eaf81ca 2621->2622 2623 1a06eaf824d GetConsoleOutputCP 2622->2623 2624 1a06eaf8222 2622->2624 2623->2624 2638 1a06eafc630 GetStdHandle 2639 1a06eafc667 2638->2639 2640 1a06eafc697 GetStdHandle 2639->2640 2643 1a06eafc6dd 2639->2643 2641 1a06eafc6b0 2640->2641 2642 1a06eafc6c4 GetStdHandle 2641->2642 2641->2643 2642->2643 2644 1a06eafa230 2645 1a06eafa258 2644->2645 2646 1a06eafa246 GetStdHandle 2644->2646 2645->2646

Executed Functions

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 0 1a06eaf7ac0-1a06eaf7d86 WriteFile 28 1a06eaf7d93-1a06eaf7fbd 0->28
APIs
Memory Dump Source
  • Source File: 00000002.00000002.1739990269.000001A06EAF1000.00000020.00000001.00040000.00000003.sdmp, Offset: 000001A06EAF0000, based on PE: true
  • Associated: 00000002.00000002.1739975143.000001A06EAF0000.00000002.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1740011948.000001A06EB14000.00000004.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1740027140.000001A06EB16000.00000008.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1740040480.000001A06EB17000.00000002.00001000.00040000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_1a06eaf0000_smphost.jbxd
Similarity
  • API ID: FileWrite
  • String ID:
  • API String ID: 3934441357-0
  • Opcode ID: 49f48fa59b2717629d865ea2170825846ff6bc5e78181d8085553fcf3097608d
  • Instruction ID: 6bf9a9401bd6d55a9123fe02ff60fa314bd7e479e6e0bf7f9d339f551a70cc08
  • Opcode Fuzzy Hash: 49f48fa59b2717629d865ea2170825846ff6bc5e78181d8085553fcf3097608d
  • Instruction Fuzzy Hash: A2D11976B02B149AE725CBA2FC507DE3374BB49BADF544025DE4E52B64DE38889BC700

Control-flow Graph

APIs
Memory Dump Source
  • Source File: 00000002.00000002.1739990269.000001A06EAF1000.00000020.00000001.00040000.00000003.sdmp, Offset: 000001A06EAF0000, based on PE: true
  • Associated: 00000002.00000002.1739975143.000001A06EAF0000.00000002.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1740011948.000001A06EB14000.00000004.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1740027140.000001A06EB16000.00000008.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1740040480.000001A06EB17000.00000002.00001000.00040000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_1a06eaf0000_smphost.jbxd
Similarity
  • API ID: ConsoleOutput
  • String ID:
  • API String ID: 3985236979-0
  • Opcode ID: 0b3c3f01842f473c41a81062c82626f8eb6e6258c765146833008e0865d7a38c
  • Instruction ID: 8ad3a5d851b30873e89a25e6b6e6d636f08bf28360a8cbc8eb83220e61e8b2d2
  • Opcode Fuzzy Hash: 0b3c3f01842f473c41a81062c82626f8eb6e6258c765146833008e0865d7a38c
  • Instruction Fuzzy Hash: BE3149B6B02B1499F722CBA1EC143DD3371BB4AB6CF584125DE0D56A58DF349CAAC301

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 63 1a06eaf7500-1a06eaf7549 GetFileType 66 1a06eaf7556-1a06eaf7579 63->66
APIs
Memory Dump Source
  • Source File: 00000002.00000002.1739990269.000001A06EAF1000.00000020.00000001.00040000.00000003.sdmp, Offset: 000001A06EAF0000, based on PE: true
  • Associated: 00000002.00000002.1739975143.000001A06EAF0000.00000002.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1740011948.000001A06EB14000.00000004.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1740027140.000001A06EB16000.00000008.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1740040480.000001A06EB17000.00000002.00001000.00040000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_1a06eaf0000_smphost.jbxd
Similarity
  • API ID: FileType
  • String ID:
  • API String ID: 3081899298-0
  • Opcode ID: ebb4d259578cd60c189fde5a0f87fbab5bd4408df9f1ae397a1001f96a96ae71
  • Instruction ID: 968663f6ff006cdde2e21a789b25819d88a7f8a3baab96abe3672aced6a6faa7
  • Opcode Fuzzy Hash: ebb4d259578cd60c189fde5a0f87fbab5bd4408df9f1ae397a1001f96a96ae71
  • Instruction Fuzzy Hash: 01F0E176701B1495EB169B71FC147DA6330BB4A7ADF444175DD0E42750DE38889FC301

Control-flow Graph

Memory Dump Source
  • Source File: 00000002.00000002.1743338105.00007FF5E8EA0000.00000020.00001000.00040000.00000000.sdmp, Offset: 00007FF5E8EA0000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_7ff5e8ea0000_smphost.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 47ef08e13fb22e31bac46cf215852ad0c6506c0fa4f0a4c93d46ea3d83bd4854
  • Instruction ID: 78d9a5f41f69d88648906e602d54c58679fed49de5ea6bad2afa08e853db745c
  • Opcode Fuzzy Hash: 47ef08e13fb22e31bac46cf215852ad0c6506c0fa4f0a4c93d46ea3d83bd4854
  • Instruction Fuzzy Hash: BA31BA30C0894D8FDB84EFA8C851ABD7BF1FF58302F1405A9D05EDB291DA74A951CB46

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 115 7ff5e8ea1a7e-7ff5e8ea1aab 117 7ff5e8ea1ab4-7ff5e8ea1ac4 call 7ff5e8ea1ac5 115->117
Memory Dump Source
  • Source File: 00000002.00000002.1743338105.00007FF5E8EA0000.00000020.00001000.00040000.00000000.sdmp, Offset: 00007FF5E8EA0000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_7ff5e8ea0000_smphost.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: de798e3dbf89b46ecb5514c218aaec4f05bb0cc9551f99605798cc1af70c37f0
  • Instruction ID: 28b6d545b825f87e306acd2f1e0a994bec59d116adf163360b54032bdda3535e
  • Opcode Fuzzy Hash: de798e3dbf89b46ecb5514c218aaec4f05bb0cc9551f99605798cc1af70c37f0
  • Instruction Fuzzy Hash: 7EF0F83090490D8FCF88EF88C494AACBBB1FB58312B6004AED01ED7290CA359991CB00

Non-executed Functions

Control-flow Graph

APIs
Strings
Memory Dump Source
  • Source File: 00000002.00000002.1739990269.000001A06EAF1000.00000020.00000001.00040000.00000003.sdmp, Offset: 000001A06EAF0000, based on PE: true
  • Associated: 00000002.00000002.1739975143.000001A06EAF0000.00000002.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1740011948.000001A06EB14000.00000004.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1740027140.000001A06EB16000.00000008.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1740040480.000001A06EB17000.00000002.00001000.00040000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_1a06eaf0000_smphost.jbxd
Similarity
  • API ID: Handle
  • String ID: d
  • API String ID: 2519475695-2564639436
  • Opcode ID: 04f09340ac1d4f7a73af076a5bfaecf0aad1991f26a6c068942f7bac34692b0d
  • Instruction ID: ac12f8379215e34a1020207ce128cab12f0cca14e87e6946dbd6ad77fa2c66c7
  • Opcode Fuzzy Hash: 04f09340ac1d4f7a73af076a5bfaecf0aad1991f26a6c068942f7bac34692b0d
  • Instruction Fuzzy Hash: 09A1F3F5302B4181EA169B65F8643DA33B1FF4EBBDF446225D91E426A4DF28CD66C302

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 419 1a06eafc000-1a06eafc04a 421 1a06eafc132-1a06eafc169 419->421 422 1a06eafc050-1a06eafc059 419->422 427 1a06eafc172-1a06eafc1a9 421->427 422->421 423 1a06eafc05f-1a06eafc061 422->423 423->421 425 1a06eafc067-1a06eafc077 423->425 426 1a06eafc07d-1a06eafc086 425->426 425->427 426->427 428 1a06eafc08c-1a06eafc08e 426->428 440 1a06eafc1b2-1a06eafc232 427->440 428->427 430 1a06eafc094-1a06eafc118 GetStdHandle 428->430 430->440 446 1a06eafc11e-1a06eafc131 430->446 449 1a06eafc24f-1a06eafc259 440->449 450 1a06eafc234-1a06eafc240 440->450 453 1a06eafc25b-1a06eafc266 449->453 454 1a06eafc277-1a06eafc279 449->454 451 1a06eafc36f-1a06eafc3b9 450->451 452 1a06eafc246-1a06eafc24a 450->452 456 1a06eafc3c2-1a06eafc40c 451->456 452->449 455 1a06eafc26c-1a06eafc275 453->455 453->456 457 1a06eafc27b-1a06eafc285 454->457 458 1a06eafc2b4-1a06eafc355 GetStdHandle 454->458 455->457 460 1a06eafc415-1a06eafc41b 456->460 459 1a06eafc28b-1a06eafc2ae GetStdHandle 457->459 457->460 480 1a06eafc441-1a06eafc44c 458->480 484 1a06eafc35b-1a06eafc36e 458->484 459->458 468 1a06eafc420-1a06eafc438 459->468 460->468 468->480 485 1a06eafc44e-1a06eafc46f GetStdHandle 480->485 486 1a06eafc477-1a06eafc498 GetStdHandle 480->486 485->486 491 1a06eafc471 485->491 489 1a06eafc49a 486->489 490 1a06eafc4a0-1a06eafc4a7 486->490 489->490 492 1a06eafc4a9-1a06eafc4fd 490->492 493 1a06eafc506-1a06eafc50d 490->493 491->486 492->493 494 1a06eafc50f-1a06eafc563 493->494 495 1a06eafc56c-1a06eafc59c 493->495 494->495 502 1a06eafc59e-1a06eafc5a4 495->502 503 1a06eafc5ad-1a06eafc5cb 495->503 505 1a06eafc5a6-1a06eafc5ac 502->505 506 1a06eafc5d4-1a06eafc5d8 502->506 503->506 506->505
APIs
Memory Dump Source
  • Source File: 00000002.00000002.1739990269.000001A06EAF1000.00000020.00000001.00040000.00000003.sdmp, Offset: 000001A06EAF0000, based on PE: true
  • Associated: 00000002.00000002.1739975143.000001A06EAF0000.00000002.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1740011948.000001A06EB14000.00000004.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1740027140.000001A06EB16000.00000008.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1740040480.000001A06EB17000.00000002.00001000.00040000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_1a06eaf0000_smphost.jbxd
Similarity
  • API ID: Handle
  • String ID:
  • API String ID: 2519475695-0
  • Opcode ID: 8be3169f8ff43b1310e7f7e9c82ba98c26c69ae8559d4fd44e70a2a5d480b0e4
  • Instruction ID: 2e254f280ea99e53ef37b87c1174086f2aea66b6602c8bd43383ad0747e7b00c
  • Opcode Fuzzy Hash: 8be3169f8ff43b1310e7f7e9c82ba98c26c69ae8559d4fd44e70a2a5d480b0e4
  • Instruction Fuzzy Hash: 12F141B5702B1186EB069FA2E8643EE2372BB4EFADF155125CD0E57764DF388856C302

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 517 1a06eafa6d0-1a06eafa7a5 527 1a06eafa7a7-1a06eafa7b2 517->527 528 1a06eafa7b3-1a06eafa7bd 517->528 529 1a06eafa87f-1a06eafa8ab GetStdHandle 528->529 530 1a06eafa7c3-1a06eafa7e9 GetStdHandle 528->530 533 1a06eafa7ef-1a06eafa7f4 529->533 534 1a06eafa8b1-1a06eafa8ba 529->534 530->533 530->534 536 1a06eafa7ff-1a06eafa80b 533->536 537 1a06eafa7f6-1a06eafa7fe 533->537 542 1a06eafa8bc-1a06eafa8da 534->542 543 1a06eafa8e3-1a06eafa8f5 534->543 539 1a06eafa80d-1a06eafa80f 536->539 540 1a06eafa832-1a06eafa83c 536->540 539->540 541 1a06eafa811-1a06eafa830 539->541 544 1a06eafa8fe-1a06eafa92a GetStdHandle 540->544 545 1a06eafa842-1a06eafa868 GetStdHandle 540->545 541->540 551 1a06eafa873-1a06eafa87e 541->551 542->543 543->544 544->528 553 1a06eafa930-1a06eafa9aa 544->553 552 1a06eafa86e 545->552 545->553 552->528 562 1a06eafa9ac-1a06eafa9bf 553->562 563 1a06eafa9d8-1a06eafa9e2 553->563 566 1a06eafa9cc-1a06eafa9d3 562->566 567 1a06eafa9c1-1a06eafa9c7 562->567 564 1a06eafaafa-1a06eafab00 563->564 565 1a06eafa9e8-1a06eafaa0c GetStdHandle 563->565 568 1a06eafab05-1a06eafab09 564->568 573 1a06eafaad3-1a06eafaaf1 565->573 574 1a06eafaa12-1a06eafaa16 565->574 566->568 567->568 571 1a06eafab0b 568->571 572 1a06eafab15-1a06eafab55 568->572 571->572 580 1a06eafab57 572->580 581 1a06eafab61-1a06eafab80 572->581 573->564 574->573 575 1a06eafaa1c-1a06eafaa2a 574->575 577 1a06eafaa2c-1a06eafaa2e 575->577 578 1a06eafaa30-1a06eafaa33 575->578 577->578 582 1a06eafaa39-1a06eafaa3f 577->582 578->582 583 1a06eafaaca-1a06eafaace 578->583 580->581 584 1a06eafaa5d-1a06eafaa61 582->584 585 1a06eafaa41-1a06eafaa5b 582->585 583->563 587 1a06eafaa93-1a06eafaa9a 584->587 588 1a06eafaa63-1a06eafaa66 584->588 585->584 595 1a06eafaac1-1a06eafaac5 585->595 587->568 589 1a06eafaa9c-1a06eafaab4 587->589 591 1a06eafaa6d-1a06eafaa74 588->591 592 1a06eafaa68-1a06eafaa6b 588->592 589->568 591->563 594 1a06eafaa7a-1a06eafaa7f 591->594 592->591 596 1a06eafaab8-1a06eafaabc 592->596 594->563 597 1a06eafaa85-1a06eafaa88 594->597 595->563 596->563 598 1a06eafaa8a-1a06eafaa8d 597->598 599 1a06eafaab6 597->599 598->563 598->587 599->587
APIs
Memory Dump Source
  • Source File: 00000002.00000002.1739990269.000001A06EAF1000.00000020.00000001.00040000.00000003.sdmp, Offset: 000001A06EAF0000, based on PE: true
  • Associated: 00000002.00000002.1739975143.000001A06EAF0000.00000002.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1740011948.000001A06EB14000.00000004.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1740027140.000001A06EB16000.00000008.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1740040480.000001A06EB17000.00000002.00001000.00040000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_1a06eaf0000_smphost.jbxd
Similarity
  • API ID: Handle
  • String ID:
  • API String ID: 2519475695-0
  • Opcode ID: c3e879d798494e0862c0c1eb295d9db67cf5b64f46037932294a99ea997a39b5
  • Instruction ID: e0d3df0a3bf06145813ce5348db8f13704cbc4e7e4ed47d2e0e4ce4abe748e95
  • Opcode Fuzzy Hash: c3e879d798494e0862c0c1eb295d9db67cf5b64f46037932294a99ea997a39b5
  • Instruction Fuzzy Hash: CFD17EB2B16B408AE7169B61E8503ED3371FB4EBADF145115DE4E02A94DF38DCA6C702

Execution Graph

Execution Coverage

Dynamic/Packed Code Coverage

Signature Coverage

Execution Coverage:3.4%
Dynamic/Decrypted Code Coverage:0%
Signature Coverage:0%
Total number of Nodes:105
Total number of Limit Nodes:0
Show Legend
Hide Nodes/Edges
execution_graph 2684 243826ba6d0 2690 243826ba6ea 2684->2690 2685 243826ba7c3 GetStdHandle 2685->2690 2686 243826ba885 GetStdHandle 2686->2690 2687 243826ba7a7 2688 243826ba842 GetStdHandle 2688->2690 2689 243826ba904 GetStdHandle 2689->2690 2690->2685 2690->2686 2690->2687 2690->2688 2690->2689 2692 243826ba930 2690->2692 2691 243826ba9e8 GetStdHandle 2691->2692 2692->2691 2693 243826ba9ac 2692->2693 2636 243826b8a50 GetStdHandle 2637 243826b8a68 2636->2637 2664 243826bb2d0 2666 243826bb325 2664->2666 2665 243826bb3e8 2666->2665 2667 243826bb6e8 GetStdHandle 2666->2667 2676 243826bb73d 2666->2676 2677 243826bbb24 GetStdHandle 2666->2677 2667->2676 2669 243826bb859 2671 243826bb891 GetStdHandle 2669->2671 2669->2677 2670 243826bb7ba GetStdHandle 2670->2676 2673 243826bb8d6 2671->2673 2674 243826bb809 GetStdHandle 2674->2676 2675 243826bbc6f 2676->2669 2676->2670 2676->2674 2676->2677 2678 243826bbbd5 2677->2678 2678->2675 2679 243826bbd11 GetStdHandle 2678->2679 2681 243826bbd50 2679->2681 2680 243826bbd6c 2681->2680 2682 243826bbebd GetStdHandle 2681->2682 2683 243826bbedf 2682->2683 2702 243826baf10 2703 243826baf20 GetStdHandle 2702->2703 2704 243826baf46 GetStdHandle 2702->2704 2707 243826baf39 2703->2707 2704->2707 2706 243826baf3d 2707->2706 2708 243826bafb2 GetStdHandle 2707->2708 2709 243826bb010 GetStdHandle 2707->2709 2711 243826bafcb 2708->2711 2709->2711 2712 243826bb077 GetStdHandle 2711->2712 2713 243826bafe7 GetStdHandle 2711->2713 2716 243826bb000 2712->2716 2713->2716 2715 243826bb008 2716->2715 2717 243826bb12c GetStdHandle 2716->2717 2718 243826bb100 GetStdHandle 2716->2718 2721 243826bb119 2717->2721 2718->2721 2720 243826bb11d 2721->2720 2722 243826bb1f4 GetStdHandle 2721->2722 2723 243826bb193 GetStdHandle 2721->2723 2725 243826bb1ac 2722->2725 2723->2725 2726 243826bb1d1 GetStdHandle 2725->2726 2727 243826bb217 GetStdHandle 2725->2727 2729 243826bb1ea 2726->2729 2727->2729 2742 243826b8990 2743 243826b89a0 GetStdHandle 2742->2743 2745 243826b8a28 2743->2745 2733 243826ba3e0 2735 243826ba408 2733->2735 2734 243826ba487 2735->2734 2736 243826ba590 GetStdHandle 2735->2736 2736->2735 2641 243826bc630 GetStdHandle 2642 243826bc667 2641->2642 2643 243826bc697 GetStdHandle 2642->2643 2646 243826bc6dd 2642->2646 2644 243826bc6b0 2643->2644 2645 243826bc6c4 GetStdHandle 2644->2645 2644->2646 2645->2646 2629 243826b81b0 2630 243826b81ca 2629->2630 2631 243826b824d GetConsoleOutputCP 2630->2631 2632 243826b8222 2630->2632 2631->2632 2647 243826ba230 2648 243826ba246 GetStdHandle 2647->2648 2649 243826ba258 2647->2649 2649->2648 2650 243826bc000 2651 243826bc032 2650->2651 2652 243826bc094 GetStdHandle 2651->2652 2654 243826bc0ba 2651->2654 2652->2654 2653 243826bc11e 2654->2653 2655 243826bc2b4 GetStdHandle 2654->2655 2656 243826bc28b GetStdHandle 2654->2656 2658 243826bc2ec 2654->2658 2655->2658 2657 243826bc2ac 2656->2657 2657->2655 2657->2658 2659 243826bc44e GetStdHandle 2658->2659 2660 243826bc477 GetStdHandle 2658->2660 2661 243826bc35b 2658->2661 2662 243826bc465 2659->2662 2663 243826bc48b 2660->2663 2662->2660 2621 243826b7ac0 2622 243826b7ae5 WriteFile 2621->2622 2624 243826b7d93 2622->2624 2625 243826b7500 2626 243826b7526 GetFileType 2625->2626 2628 243826b7556 2626->2628 2737 243826babc0 GetStdHandle 2738 243826babe0 2737->2738 2739 243826babf8 2738->2739 2740 243826bac5c GetStdHandle 2738->2740 2741 243826bac82 2740->2741 2746 243826b7580 2747 243826b759f GetStdHandle 2746->2747 2748 243826b7599 2746->2748 2748->2747 2749 243826bad80 2750 243826bad91 2749->2750 2751 243826badac 2750->2751 2752 243826badb3 GetStdHandle 2750->2752 2753 243826baddf 2752->2753

Executed Functions

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 0 243826b7ac0-243826b7d86 WriteFile 28 243826b7d93-243826b7fbd 0->28
APIs
Memory Dump Source
  • Source File: 00000004.00000002.1764192887.00000243826B1000.00000020.00000001.00040000.00000003.sdmp, Offset: 00000243826B0000, based on PE: true
  • Associated: 00000004.00000002.1764176442.00000243826B0000.00000002.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000004.00000002.1764214503.00000243826D4000.00000004.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000004.00000002.1764230331.00000243826D6000.00000008.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000004.00000002.1764245648.00000243826D7000.00000002.00001000.00040000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_4_2_243826b0000_smphost.jbxd
Similarity
  • API ID: FileWrite
  • String ID:
  • API String ID: 3934441357-0
  • Opcode ID: 49f48fa59b2717629d865ea2170825846ff6bc5e78181d8085553fcf3097608d
  • Instruction ID: 31b1fe3533c6d5fca3c225f797d21d9a35b6adb0f99d927af9310aedc9299ab0
  • Opcode Fuzzy Hash: 49f48fa59b2717629d865ea2170825846ff6bc5e78181d8085553fcf3097608d
  • Instruction Fuzzy Hash: 64D16B26B01A589AF764CF62FC04B9D7374BB48B99F514025EE4A67B64DF38CD8AC700

Control-flow Graph

APIs
Memory Dump Source
  • Source File: 00000004.00000002.1764192887.00000243826B1000.00000020.00000001.00040000.00000003.sdmp, Offset: 00000243826B0000, based on PE: true
  • Associated: 00000004.00000002.1764176442.00000243826B0000.00000002.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000004.00000002.1764214503.00000243826D4000.00000004.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000004.00000002.1764230331.00000243826D6000.00000008.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000004.00000002.1764245648.00000243826D7000.00000002.00001000.00040000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_4_2_243826b0000_smphost.jbxd
Similarity
  • API ID: ConsoleOutput
  • String ID:
  • API String ID: 3985236979-0
  • Opcode ID: 0b3c3f01842f473c41a81062c82626f8eb6e6258c765146833008e0865d7a38c
  • Instruction ID: d09c188830b900ff902c87869cdd956170274e460d2aee24913a3531ed5019c7
  • Opcode Fuzzy Hash: 0b3c3f01842f473c41a81062c82626f8eb6e6258c765146833008e0865d7a38c
  • Instruction Fuzzy Hash: B2313C26B00A549AF761CF61EC4879CB371BB48B58F554125EE4D2BA58DF788E8AC300

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 63 243826b7500-243826b7549 GetFileType 66 243826b7556-243826b7579 63->66
APIs
Memory Dump Source
  • Source File: 00000004.00000002.1764192887.00000243826B1000.00000020.00000001.00040000.00000003.sdmp, Offset: 00000243826B0000, based on PE: true
  • Associated: 00000004.00000002.1764176442.00000243826B0000.00000002.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000004.00000002.1764214503.00000243826D4000.00000004.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000004.00000002.1764230331.00000243826D6000.00000008.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000004.00000002.1764245648.00000243826D7000.00000002.00001000.00040000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_4_2_243826b0000_smphost.jbxd
Similarity
  • API ID: FileType
  • String ID:
  • API String ID: 3081899298-0
  • Opcode ID: ebb4d259578cd60c189fde5a0f87fbab5bd4408df9f1ae397a1001f96a96ae71
  • Instruction ID: d9e718ba3717b5f7c0d05ac6ee3fcb976565ae7e9c1c986c503135d3fe772224
  • Opcode Fuzzy Hash: ebb4d259578cd60c189fde5a0f87fbab5bd4408df9f1ae397a1001f96a96ae71
  • Instruction Fuzzy Hash: 7EF03C26700A589BFB61DB72FC08B996230BB88B55F404131ED0E56760DE78CD8AC300

Control-flow Graph

Memory Dump Source
  • Source File: 00000004.00000002.1768326676.00007FF5E8ED0000.00000020.00001000.00040000.00000000.sdmp, Offset: 00007FF5E8ED0000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_4_2_7ff5e8ed0000_smphost.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 2c2323d7513874ee7529f4164d76d84834422e559d7d13f1586b89d0653cd49e
  • Instruction ID: 4769a95d6900b7f971f6c6e1a2dd44e0cc4f4fbcadd417b950dac957ba49a3b8
  • Opcode Fuzzy Hash: 2c2323d7513874ee7529f4164d76d84834422e559d7d13f1586b89d0653cd49e
  • Instruction Fuzzy Hash: CC31B87080894E8FDB84EFA8C851ABDBBF2FF58301F040169D45DEB2D1DA35A965CB02

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 115 7ff5e8ed1a7e-7ff5e8ed1aab 117 7ff5e8ed1ab4-7ff5e8ed1ac4 call 7ff5e8ed1ac5 115->117
Memory Dump Source
  • Source File: 00000004.00000002.1768326676.00007FF5E8ED0000.00000020.00001000.00040000.00000000.sdmp, Offset: 00007FF5E8ED0000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_4_2_7ff5e8ed0000_smphost.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: de798e3dbf89b46ecb5514c218aaec4f05bb0cc9551f99605798cc1af70c37f0
  • Instruction ID: 6970d97fba6a5caf98bece2f8075d2bc741c7f3982b4ad686151a11385e8c848
  • Opcode Fuzzy Hash: de798e3dbf89b46ecb5514c218aaec4f05bb0cc9551f99605798cc1af70c37f0
  • Instruction Fuzzy Hash: E5F0F87090490D8FCF88EF98C494AACBBB1FB58311B60006ED01DD7390CA369991CB00

Non-executed Functions

Control-flow Graph

APIs
Strings
Memory Dump Source
  • Source File: 00000004.00000002.1764192887.00000243826B1000.00000020.00000001.00040000.00000003.sdmp, Offset: 00000243826B0000, based on PE: true
  • Associated: 00000004.00000002.1764176442.00000243826B0000.00000002.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000004.00000002.1764214503.00000243826D4000.00000004.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000004.00000002.1764230331.00000243826D6000.00000008.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000004.00000002.1764245648.00000243826D7000.00000002.00001000.00040000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_4_2_243826b0000_smphost.jbxd
Similarity
  • API ID: Handle
  • String ID: d
  • API String ID: 2519475695-2564639436
  • Opcode ID: 04f09340ac1d4f7a73af076a5bfaecf0aad1991f26a6c068942f7bac34692b0d
  • Instruction ID: a292dc51eb908e98527d9c8183e1ff06badfe949112818ebf6a1bb5467b9d740
  • Opcode Fuzzy Hash: 04f09340ac1d4f7a73af076a5bfaecf0aad1991f26a6c068942f7bac34692b0d
  • Instruction Fuzzy Hash: B5A15265201A4883FB94DB35F85C369B3A1FF48FA2F454215F95A5A7A4DFAECE84C300

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 419 243826bc000-243826bc04a 421 243826bc050-243826bc059 419->421 422 243826bc132-243826bc169 419->422 421->422 423 243826bc05f-243826bc061 421->423 426 243826bc172-243826bc1a9 422->426 423->422 424 243826bc067-243826bc077 423->424 424->426 427 243826bc07d-243826bc086 424->427 441 243826bc1b2-243826bc232 426->441 427->426 428 243826bc08c-243826bc08e 427->428 428->426 431 243826bc094-243826bc118 GetStdHandle 428->431 431->441 446 243826bc11e-243826bc131 431->446 449 243826bc24f-243826bc259 441->449 450 243826bc234-243826bc240 441->450 453 243826bc25b-243826bc266 449->453 454 243826bc277-243826bc279 449->454 451 243826bc36f-243826bc3b9 450->451 452 243826bc246-243826bc24a 450->452 455 243826bc3c2-243826bc40c 451->455 452->449 453->455 456 243826bc26c-243826bc275 453->456 457 243826bc27b-243826bc285 454->457 458 243826bc2b4-243826bc355 GetStdHandle 454->458 460 243826bc415-243826bc41b 455->460 456->457 459 243826bc28b-243826bc2ae GetStdHandle 457->459 457->460 481 243826bc441-243826bc44c 458->481 486 243826bc35b-243826bc36e 458->486 459->458 469 243826bc420-243826bc438 459->469 460->469 469->481 484 243826bc44e-243826bc46f GetStdHandle 481->484 485 243826bc477-243826bc498 GetStdHandle 481->485 484->485 489 243826bc471 484->489 490 243826bc4a0-243826bc4a7 485->490 491 243826bc49a 485->491 489->485 492 243826bc4a9-243826bc4fd 490->492 493 243826bc506-243826bc50d 490->493 491->490 492->493 494 243826bc50f-243826bc563 493->494 495 243826bc56c-243826bc59c 493->495 494->495 503 243826bc5ad-243826bc5cb 495->503 504 243826bc59e-243826bc5a4 495->504 506 243826bc5d4-243826bc5d8 503->506 504->506 507 243826bc5a6-243826bc5ac 504->507 506->507
APIs
Memory Dump Source
  • Source File: 00000004.00000002.1764192887.00000243826B1000.00000020.00000001.00040000.00000003.sdmp, Offset: 00000243826B0000, based on PE: true
  • Associated: 00000004.00000002.1764176442.00000243826B0000.00000002.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000004.00000002.1764214503.00000243826D4000.00000004.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000004.00000002.1764230331.00000243826D6000.00000008.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000004.00000002.1764245648.00000243826D7000.00000002.00001000.00040000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_4_2_243826b0000_smphost.jbxd
Similarity
  • API ID: Handle
  • String ID:
  • API String ID: 2519475695-0
  • Opcode ID: 8be3169f8ff43b1310e7f7e9c82ba98c26c69ae8559d4fd44e70a2a5d480b0e4
  • Instruction ID: aa16b5b6ad393185708af797c4965574d6ecb2cbc180f824a90ce7e1b7d62fb2
  • Opcode Fuzzy Hash: 8be3169f8ff43b1310e7f7e9c82ba98c26c69ae8559d4fd44e70a2a5d480b0e4
  • Instruction Fuzzy Hash: 62F18135700A488BFB40DFA6E8483ACA371BF48F95F154125ED4A6B764DFB98E85C340

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 517 243826ba6d0-243826ba7a5 527 243826ba7b3-243826ba7bd 517->527 528 243826ba7a7-243826ba7b2 517->528 529 243826ba87f-243826ba8ab GetStdHandle 527->529 530 243826ba7c3-243826ba7e9 GetStdHandle 527->530 533 243826ba8b1-243826ba8ba 529->533 534 243826ba7ef-243826ba7f4 529->534 530->533 530->534 542 243826ba8bc-243826ba8da 533->542 543 243826ba8e3-243826ba8f5 533->543 536 243826ba7ff-243826ba80b 534->536 537 243826ba7f6-243826ba7fe 534->537 538 243826ba80d-243826ba80f 536->538 539 243826ba832-243826ba83c 536->539 538->539 541 243826ba811-243826ba830 538->541 544 243826ba8fe-243826ba92a GetStdHandle 539->544 545 243826ba842-243826ba868 GetStdHandle 539->545 541->539 551 243826ba873-243826ba87e 541->551 542->543 543->544 544->527 553 243826ba930-243826ba9aa 544->553 552 243826ba86e 545->552 545->553 552->527 562 243826ba9ac-243826ba9bf 553->562 563 243826ba9d8-243826ba9e2 553->563 564 243826ba9cc-243826ba9d3 562->564 565 243826ba9c1-243826ba9c7 562->565 566 243826baafa-243826bab00 563->566 567 243826ba9e8-243826baa0c GetStdHandle 563->567 568 243826bab05-243826bab09 564->568 565->568 566->568 573 243826baa12-243826baa16 567->573 574 243826baad3-243826baaf1 567->574 571 243826bab0b 568->571 572 243826bab15-243826bab55 568->572 571->572 577 243826bab61-243826bab80 572->577 578 243826bab57 572->578 573->574 576 243826baa1c-243826baa2a 573->576 574->566 580 243826baa2c-243826baa2e 576->580 581 243826baa30-243826baa33 576->581 578->577 580->581 583 243826baa39-243826baa3f 580->583 582 243826baaca-243826baace 581->582 581->583 582->563 584 243826baa5d-243826baa61 583->584 585 243826baa41-243826baa5b 583->585 587 243826baa93-243826baa9a 584->587 588 243826baa63-243826baa66 584->588 585->584 594 243826baac1-243826baac5 585->594 587->568 593 243826baa9c-243826baab4 587->593 590 243826baa6d-243826baa74 588->590 591 243826baa68-243826baa6b 588->591 590->563 596 243826baa7a-243826baa7f 590->596 591->590 595 243826baab8-243826baabc 591->595 593->568 594->563 595->563 596->563 597 243826baa85-243826baa88 596->597 598 243826baab6 597->598 599 243826baa8a-243826baa8d 597->599 598->587 599->563 599->587
APIs
Memory Dump Source
  • Source File: 00000004.00000002.1764192887.00000243826B1000.00000020.00000001.00040000.00000003.sdmp, Offset: 00000243826B0000, based on PE: true
  • Associated: 00000004.00000002.1764176442.00000243826B0000.00000002.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000004.00000002.1764214503.00000243826D4000.00000004.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000004.00000002.1764230331.00000243826D6000.00000008.00000001.00040000.00000003.sdmpDownload File
  • Associated: 00000004.00000002.1764245648.00000243826D7000.00000002.00001000.00040000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_4_2_243826b0000_smphost.jbxd
Similarity
  • API ID: Handle
  • String ID:
  • API String ID: 2519475695-0
  • Opcode ID: c3e879d798494e0862c0c1eb295d9db67cf5b64f46037932294a99ea997a39b5
  • Instruction ID: df079da6ba8d6af0d6653c0bdeac14c39125e49209ba55094b1de48deb470fe6
  • Opcode Fuzzy Hash: c3e879d798494e0862c0c1eb295d9db67cf5b64f46037932294a99ea997a39b5
  • Instruction Fuzzy Hash: 4DD1AE36A14A488BFB54DB66E8483ACB3B0FB49B54F150115FE4A1AB94DFB9CEC5C700