Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
d3d11_hook.exe

Overview

General Information

Sample name:d3d11_hook.exe
Analysis ID:1545838
MD5:8176aa431cb8e5204cd512834dcb81b8
SHA1:8a92ae0db3cc9c7cd5dac2d75358fde13db60b52
SHA256:60dd5f2cab860dff3fa2a8dc9391ac1fc2de61c03f3d7af92d46bae7ce91b0db
Tags:exeuser-lontze7
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected suspicious sample
Contains functionality to inject threads in other processes
Found potential dummy code loops (likely to delay analysis)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)

Classification

  • System is w10x64
  • d3d11_hook.exe (PID: 3212 cmdline: "C:\Users\user\Desktop\d3d11_hook.exe" MD5: 8176AA431CB8E5204CD512834DCB81B8)
    • conhost.exe (PID: 4364 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.6% probability
Source: d3d11_hook.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\WeepingAngel\Desktop\CodeX Injector\Injectzor\CodeX DLL Loader\x64\Release\CodeX DLL injector.pdb source: d3d11_hook.exe
Source: Binary string: C:\Users\WeepingAngel\Desktop\CodeX Injector\Injectzor\CodeX DLL Loader\x64\Release\CodeX DLL injector.pdb%% source: d3d11_hook.exe
Source: C:\Users\user\Desktop\d3d11_hook.exeCode function: 0_2_00007FF7EFC612500_2_00007FF7EFC61250
Source: classification engineClassification label: mal52.evad.winEXE@2/1@0/0
Source: C:\Users\user\Desktop\d3d11_hook.exeCode function: 0_2_00007FF7EFC61250 _time64,srand,rand,SetConsoleTitleW,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,CreateToolhelp32Snapshot,Process32FirstW,_wcsicmp,Process32NextW,CloseHandle,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z,OpenProcess,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,VirtualAllocEx,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z,WriteProcessMemory,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,LoadLibraryW,CreateRemoteThread,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z,WaitForSingleObject,GetExitCodeThread,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z,GetLastError,GetLastError,?wcerr@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,SleepEx,GetLastError,?wcerr@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z,CloseHandle,CloseHandle,GetLastError,GetLastError,GetLastError,?wcerr@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z,CloseHandle,GetLastError,?wcerr@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,Sleep,_invalid_parameter_noinfo_noreturn,0_2_00007FF7EFC61250
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4364:120:WilError_03
Source: d3d11_hook.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\d3d11_hook.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\d3d11_hook.exe "C:\Users\user\Desktop\d3d11_hook.exe"
Source: C:\Users\user\Desktop\d3d11_hook.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\d3d11_hook.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\d3d11_hook.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\d3d11_hook.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\d3d11_hook.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\d3d11_hook.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\d3d11_hook.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\d3d11_hook.exeSection loaded: vcruntime140.dllJump to behavior
Source: d3d11_hook.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: d3d11_hook.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: d3d11_hook.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: d3d11_hook.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: d3d11_hook.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: d3d11_hook.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: d3d11_hook.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: d3d11_hook.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: d3d11_hook.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\WeepingAngel\Desktop\CodeX Injector\Injectzor\CodeX DLL Loader\x64\Release\CodeX DLL injector.pdb source: d3d11_hook.exe
Source: Binary string: C:\Users\WeepingAngel\Desktop\CodeX Injector\Injectzor\CodeX DLL Loader\x64\Release\CodeX DLL injector.pdb%% source: d3d11_hook.exe
Source: d3d11_hook.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: d3d11_hook.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: d3d11_hook.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: d3d11_hook.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: d3d11_hook.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\d3d11_hook.exeWindow / User API: threadDelayed 3895Jump to behavior
Source: C:\Users\user\Desktop\d3d11_hook.exeWindow / User API: threadDelayed 6104Jump to behavior
Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 8385Jump to behavior
Source: C:\Users\user\Desktop\d3d11_hook.exe TID: 3636Thread sleep count: 3895 > 30Jump to behavior
Source: C:\Users\user\Desktop\d3d11_hook.exe TID: 3636Thread sleep time: -3895000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\d3d11_hook.exe TID: 3636Thread sleep count: 6104 > 30Jump to behavior
Source: C:\Users\user\Desktop\d3d11_hook.exe TID: 3636Thread sleep time: -6104000s >= -30000sJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\d3d11_hook.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\d3d11_hook.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\d3d11_hook.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\d3d11_hook.exeProcess Stats: CPU usage > 42% for more than 60s
Source: C:\Users\user\Desktop\d3d11_hook.exeCode function: 0_2_00007FF7EFC62690 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7EFC62690
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\d3d11_hook.exeCode function: 0_2_00007FF7EFC62388 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF7EFC62388
Source: C:\Users\user\Desktop\d3d11_hook.exeCode function: 0_2_00007FF7EFC62690 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7EFC62690
Source: C:\Users\user\Desktop\d3d11_hook.exeCode function: 0_2_00007FF7EFC62834 SetUnhandledExceptionFilter,0_2_00007FF7EFC62834

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\d3d11_hook.exeCode function: 0_2_00007FF7EFC61250 _time64,srand,rand,SetConsoleTitleW,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,CreateToolhelp32Snapshot,Process32FirstW,_wcsicmp,Process32NextW,CloseHandle,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z,OpenProcess,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,VirtualAllocEx,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z,WriteProcessMemory,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,LoadLibraryW,CreateRemoteThread,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z,WaitForSingleObject,GetExitCodeThread,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z,GetLastError,GetLastError,?wcerr@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,SleepEx,GetLastError,?wcerr@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z,CloseHandle,CloseHandle,GetLastError,GetLastError,GetLastError,?wcerr@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z,CloseHandle,GetLastError,?wcerr@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,Sleep,_invalid_parameter_noinfo_noreturn,0_2_00007FF7EFC61250
Source: C:\Users\user\Desktop\d3d11_hook.exeCode function: 0_2_00007FF7EFC6256C GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF7EFC6256C
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
111
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
11
Process Injection
LSASS Memory11
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager111
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS2
Process Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials2
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
d3d11_hook.exe11%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1545838
Start date and time:2024-10-31 06:45:06 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 6m 26s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:9
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:d3d11_hook.exe
Detection:MAL
Classification:mal52.evad.winEXE@2/1@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 4
  • Number of non-executed functions: 3
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Override analysis time to 240000 for current running targets taking high CPU consumption
  • Exclude process from analysis (whitelisted): dllhost.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: d3d11_hook.exe
TimeTypeDescription
01:46:31API Interceptor25976x Sleep call for process: d3d11_hook.exe modified
01:48:05API Interceptor6790x Sleep call for process: conhost.exe modified
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\d3d11_hook.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):102855
Entropy (8bit):4.258365938035341
Encrypted:false
SSDEEP:48:fsR3cJIVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVm:fsBcJx
MD5:D01B2D17D1E256B9875024C07D047719
SHA1:D0B6B3A8B1A929E32858E8469713CE9ECB654EBB
SHA-256:61BE0B1B962987E5EA1A03B3B6F1D5C9AC83AA0FCE4348F9DD7D95A8FD0C48A2
SHA-512:0440F640844B02DFDADA15477D933619F4CDAC4F01D6EE7DAABCC0F6CD1A807FC1993B2AA960EC976FFD98596EFFD4491BD656FEB3DFEFAAB2314E76F6063A50
Malicious:false
Reputation:low
Preview:[+] Using predefined DLL path: C:\Windows\Temp\CodeX\Codex.dll..[+] Using predefined process name: GTA5.exe..[+] Attempting to get the process ID.....[-] Process not found, retrying.....[-] Process not found, retrying.....[-] Process not found, retrying.....[-] Process not found, retrying.....[-] Process not found, retrying.....[-] Process not found, retrying.....[-] Process not found, retrying.....[-] Process not found, retrying.....[-] Process not found, retrying.....[-] Process not found, retrying.....[-] Process not found, retrying.....[-] Process not found, retrying.....[-] Process not found, retrying.....[-] Process not found, retrying.....[-] Process not found, retrying.....[-] Process not found, retrying.....[-] Process not found, retrying.....[-] Process not found, retrying.....[-] Process not found, retrying.....[-] Process not found, retrying.....[-] Process not found, retrying.....[-] Process not found, retrying.....[-] Process not found, retrying.....[-] Process not found,
File type:PE32+ executable (console) x86-64, for MS Windows
Entropy (8bit):5.073220909158112
TrID:
  • Win64 Executable Console (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:d3d11_hook.exe
File size:22'016 bytes
MD5:8176aa431cb8e5204cd512834dcb81b8
SHA1:8a92ae0db3cc9c7cd5dac2d75358fde13db60b52
SHA256:60dd5f2cab860dff3fa2a8dc9391ac1fc2de61c03f3d7af92d46bae7ce91b0db
SHA512:b000a2a592de5f547af2252ae9879474c9acf4a0f5d082b34018a3f2382fe6c3fde9cdedfc2cfd5351847bbac503cb04c52dc0f97d33ff3032184e9b7277d7b3
SSDEEP:384:muVa1v0qNwv7gN0bc0lsfnXC0vHwNmirOWMTeVr4Xk6pa3S7tbT7:7aVtw6uJWvC0vHrna3S7t
TLSH:4CA2F607B7E609D5F172B374C8764A0AD676B8225B32E2DF2781455D0F76BD0AC3AB02
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......,.q.h...h...h...a...x...nA..b...nA..k...nA..r...nA..n....A..k...h........A..i....A..i....A..i...Richh..........................
Icon Hash:00928e8e8686b000
Entrypoint:0x140002130
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x66A657F9 [Sun Jul 28 14:38:49 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:1c6915d78935974aff0f1b3cde9c1c1f
Instruction
dec eax
sub esp, 28h
call 00007FA63C880818h
dec eax
add esp, 28h
jmp 00007FA63C880257h
int3
int3
dec eax
sub esp, 28h
call 00007FA63C880D5Ch
test eax, eax
je 00007FA63C880403h
dec eax
mov eax, dword ptr [00000030h]
dec eax
mov ecx, dword ptr [eax+08h]
jmp 00007FA63C8803E7h
dec eax
cmp ecx, eax
je 00007FA63C8803F6h
xor eax, eax
dec eax
cmpxchg dword ptr [00004028h], ecx
jne 00007FA63C8803D0h
xor al, al
dec eax
add esp, 28h
ret
mov al, 01h
jmp 00007FA63C8803D9h
int3
int3
int3
dec eax
sub esp, 28h
test ecx, ecx
jne 00007FA63C8803E9h
mov byte ptr [00004011h], 00000001h
call 00007FA63C880B69h
call 00007FA63C880888h
test al, al
jne 00007FA63C8803E6h
xor al, al
jmp 00007FA63C8803F6h
call 00007FA63C88087Bh
test al, al
jne 00007FA63C8803EBh
xor ecx, ecx
call 00007FA63C880870h
jmp 00007FA63C8803CCh
mov al, 01h
dec eax
add esp, 28h
ret
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
cmp byte ptr [00003FD8h], 00000000h
mov ebx, ecx
jne 00007FA63C880449h
cmp ecx, 01h
jnbe 00007FA63C88044Ch
call 00007FA63C880CD2h
test eax, eax
je 00007FA63C88040Ah
test ebx, ebx
jne 00007FA63C880406h
dec eax
lea ecx, dword ptr [00003FC2h]
call 00007FA63C880D72h
test eax, eax
jne 00007FA63C8803F2h
dec eax
lea ecx, dword ptr [00003FCAh]
call 00007FA63C880462h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x49640x104.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x80000x1e8.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x70000x270.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x90000x68.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x3e600x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3d200x140.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x30000x328.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x1e3b0x20003ca838bb7c832c32e3af63295ef3b04bFalse0.5601806640625data5.825810594858208IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x30000x27fe0x280020a3c521f9d50f02cac590a4f52a1cedFalse0.352734375data4.264143032365961IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x60000x7900x2003a8d18574b34f51470131502efe8b62fFalse0.251953125DOS executable (block device driver)2.2468040619716882IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x70000x2700x40002f0e7dbb67348ccc9983b20923ee05aFalse0.33984375PEX Binary Archive2.6819522768975532IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x80000x1e80x200aab75a50651b831a187cc100e6f72a34False0.537109375data4.750765792544915IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x90000x680x200529d3ecd9207788ca3c1c52837cfe596False0.228515625data1.4348517077546163IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0x80600x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
DLLImport
KERNEL32.dllWriteProcessMemory, WaitForSingleObject, OpenProcess, CreateToolhelp32Snapshot, GetExitCodeThread, Sleep, GetLastError, Process32NextW, Process32FirstW, CloseHandle, LoadLibraryW, VirtualAllocEx, CreateRemoteThread, SetConsoleTitleW, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetModuleHandleW, RtlCaptureContext
MSVCP140.dll??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z, ?getloc@ios_base@std@@QEBA?AVlocale@2@XZ, ?good@ios_base@std@@QEBA_NXZ, ?_Getcat@?$ctype@_W@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?widen@?$ctype@_W@std@@QEBA_WD@Z, ??Bid@locale@std@@QEAA_KXZ, ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z, ??1_Lockit@std@@QEAA@XZ, ??0_Lockit@std@@QEAA@H@Z, ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ, ?uncaught_exception@std@@YA_NXZ, ?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A, ?id@?$ctype@_W@std@@2V0locale@2@A, ?wcerr@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A, ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ, ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ, ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z, ?sputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAA_JPEB_W_J@Z
VCRUNTIME140_1.dll__CxxFrameHandler4
VCRUNTIME140.dllmemset, __current_exception_context, _CxxThrowException, __C_specific_handler, __std_terminate, __std_exception_copy, __std_exception_destroy, memcpy, __current_exception
api-ms-win-crt-utility-l1-1-0.dllrand, srand
api-ms-win-crt-string-l1-1-0.dll_wcsicmp
api-ms-win-crt-time-l1-1-0.dll_time64
api-ms-win-crt-runtime-l1-1-0.dll_initialize_onexit_table, _register_onexit_function, _register_thread_local_exe_atexit_callback, _c_exit, terminate, _cexit, _initterm_e, __p___argv, __p___argc, _exit, _invalid_parameter_noinfo_noreturn, _seh_filter_exe, exit, _initterm, _get_initial_narrow_environment, _initialize_narrow_environment, _configure_narrow_argv, _crt_atexit, _set_app_type
api-ms-win-crt-heap-l1-1-0.dllfree, malloc, _callnewh, _set_new_mode
api-ms-win-crt-math-l1-1-0.dll__setusermatherr
api-ms-win-crt-stdio-l1-1-0.dll_set_fmode, __p__commode
api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
TimestampSource PortDest PortSource IPDest IP
Oct 31, 2024 06:46:01.314659119 CET53635381.1.1.1192.168.2.6

Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:01:45:57
Start date:31/10/2024
Path:C:\Users\user\Desktop\d3d11_hook.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\d3d11_hook.exe"
Imagebase:0x7ff7efc60000
File size:22'016 bytes
MD5 hash:8176AA431CB8E5204CD512834DCB81B8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Target ID:1
Start time:01:45:57
Start date:31/10/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff66e660000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

Reset < >

    Execution Graph

    Execution Coverage:25.6%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:39.7%
    Total number of Nodes:237
    Total number of Limit Nodes:1
    execution_graph 818 7ff7efc62ce8 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N 819 7ff7efc62da9 _seh_filter_exe 615 7ff7efc61fb4 616 7ff7efc61fcd 615->616 617 7ff7efc6210b 616->617 618 7ff7efc61fd5 __scrt_acquire_startup_lock 616->618 725 7ff7efc62690 IsProcessorFeaturePresent 617->725 620 7ff7efc62115 618->620 626 7ff7efc61ff3 __scrt_release_startup_lock 618->626 621 7ff7efc62690 9 API calls 620->621 622 7ff7efc62120 621->622 624 7ff7efc62128 _exit 622->624 623 7ff7efc62018 625 7ff7efc6209e _get_initial_narrow_environment __p___argv __p___argc 635 7ff7efc61250 625->635 626->623 626->625 629 7ff7efc62096 _register_thread_local_exe_atexit_callback 626->629 629->625 632 7ff7efc620cb 633 7ff7efc620d5 632->633 634 7ff7efc620d0 _cexit 632->634 633->623 634->633 731 7ff7efc61e60 635->731 638 7ff7efc61300 rand 638->638 639 7ff7efc6134a SetConsoleTitleW 638->639 740 7ff7efc618a0 639->740 642 7ff7efc618a0 9 API calls 643 7ff7efc61383 642->643 754 7ff7efc61a80 643->754 645 7ff7efc6138b 646 7ff7efc618a0 9 API calls 645->646 647 7ff7efc6139e 646->647 648 7ff7efc618a0 9 API calls 647->648 649 7ff7efc613ad 648->649 650 7ff7efc61a80 29 API calls 649->650 651 7ff7efc613b5 650->651 652 7ff7efc618a0 9 API calls 651->652 653 7ff7efc613c8 652->653 654 7ff7efc613d0 CreateToolhelp32Snapshot 653->654 655 7ff7efc613ea Process32FirstW 654->655 656 7ff7efc61604 GetLastError 654->656 657 7ff7efc61441 CloseHandle 655->657 661 7ff7efc61404 655->661 658 7ff7efc618a0 9 API calls 656->658 657->661 662 7ff7efc61452 657->662 660 7ff7efc6161f ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K 658->660 659 7ff7efc61410 _wcsicmp 659->661 663 7ff7efc61429 Process32NextW 659->663 664 7ff7efc61a80 29 API calls 660->664 661->657 661->659 666 7ff7efc618a0 9 API calls 661->666 665 7ff7efc618a0 9 API calls 662->665 663->659 663->661 664->661 667 7ff7efc61465 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K 665->667 668 7ff7efc61645 SleepEx 666->668 669 7ff7efc61a80 29 API calls 667->669 668->654 670 7ff7efc61478 OpenProcess 669->670 671 7ff7efc61499 670->671 672 7ff7efc616f1 GetLastError 670->672 674 7ff7efc618a0 9 API calls 671->674 673 7ff7efc618a0 9 API calls 672->673 675 7ff7efc6170c ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K 673->675 676 7ff7efc614ac VirtualAllocEx 674->676 679 7ff7efc61a80 29 API calls 675->679 677 7ff7efc616b8 GetLastError 676->677 678 7ff7efc614d5 676->678 681 7ff7efc616c5 677->681 680 7ff7efc618a0 9 API calls 678->680 682 7ff7efc6171f 679->682 683 7ff7efc614e8 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX 680->683 684 7ff7efc618a0 9 API calls 681->684 685 7ff7efc618a0 9 API calls 682->685 687 7ff7efc61a80 29 API calls 683->687 688 7ff7efc616d3 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K 684->688 686 7ff7efc61732 Sleep 685->686 689 7ff7efc61749 686->689 690 7ff7efc61783 686->690 691 7ff7efc614fc WriteProcessMemory 687->691 692 7ff7efc61a80 29 API calls 688->692 693 7ff7efc6177e 689->693 698 7ff7efc61777 _invalid_parameter_noinfo_noreturn 689->698 787 7ff7efc61e40 690->787 694 7ff7efc616a9 GetLastError 691->694 695 7ff7efc61522 691->695 697 7ff7efc616e6 CloseHandle 692->697 784 7ff7efc61e9c 693->784 694->681 700 7ff7efc618a0 9 API calls 695->700 697->682 698->693 702 7ff7efc61535 CreateRemoteThread 700->702 703 7ff7efc6169a GetLastError 702->703 704 7ff7efc61564 702->704 703->681 705 7ff7efc618a0 9 API calls 704->705 706 7ff7efc61577 705->706 707 7ff7efc618a0 9 API calls 706->707 708 7ff7efc6158a ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX 707->708 709 7ff7efc61a80 29 API calls 708->709 710 7ff7efc6159e WaitForSingleObject GetExitCodeThread 709->710 711 7ff7efc61655 GetLastError 710->711 712 7ff7efc615c2 710->712 714 7ff7efc61662 711->714 713 7ff7efc618a0 9 API calls 712->713 715 7ff7efc615d5 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K 713->715 716 7ff7efc618a0 9 API calls 714->716 717 7ff7efc61a80 29 API calls 715->717 718 7ff7efc61670 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K 716->718 720 7ff7efc615ea 717->720 719 7ff7efc61a80 29 API calls 718->719 721 7ff7efc61683 CloseHandle CloseHandle 719->721 720->721 722 7ff7efc615f5 GetLastError 720->722 721->682 722->714 723 7ff7efc627e0 GetModuleHandleW 724 7ff7efc620c7 723->724 724->622 724->632 726 7ff7efc626b6 725->726 727 7ff7efc626c4 memset RtlCaptureContext RtlLookupFunctionEntry 726->727 728 7ff7efc626fe RtlVirtualUnwind 727->728 729 7ff7efc6273a memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 727->729 728->729 730 7ff7efc627ba 729->730 730->620 732 7ff7efc61e7a malloc 731->732 733 7ff7efc6129f _time64 srand 732->733 734 7ff7efc61e6b 732->734 733->638 734->732 735 7ff7efc61e8a 734->735 736 7ff7efc61e95 735->736 796 7ff7efc62524 735->796 799 7ff7efc62544 736->799 743 7ff7efc618d0 ?good@ios_base@std@ 740->743 742 7ff7efc61924 744 7ff7efc6193a ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 ?good@ios_base@std@ 742->744 752 7ff7efc61952 742->752 743->742 743->752 744->752 746 7ff7efc619af ?sputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAA_JPEB_W_J 747 7ff7efc619cc 746->747 748 7ff7efc6195c ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 746->748 747->748 753 7ff7efc619d5 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W 747->753 750 7ff7efc61a3e ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 748->750 751 7ff7efc61374 748->751 749 7ff7efc61986 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W 749->748 749->752 750->751 751->642 752->746 752->748 752->749 753->747 753->748 755 7ff7efc61ae0 ?good@ios_base@std@ 754->755 757 7ff7efc61b42 755->757 758 7ff7efc61b14 755->758 759 7ff7efc61b56 ?getloc@ios_base@std@@QEBA?AVlocale@2 ??0_Lockit@std@@QEAA@H ??Bid@locale@std@ 757->759 773 7ff7efc61b4c ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 757->773 758->757 760 7ff7efc61b2a ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 ?good@ios_base@std@ 758->760 762 7ff7efc61baf 759->762 760->757 765 7ff7efc61c2b ??1_Lockit@std@@QEAA 762->765 766 7ff7efc61bd3 762->766 767 7ff7efc61bc7 ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12 762->767 763 7ff7efc61d6e ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 764 7ff7efc61d78 763->764 770 7ff7efc61e40 8 API calls 764->770 768 7ff7efc61c41 765->768 766->765 772 7ff7efc61bea ?_Getcat@?$ctype@_W@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@ 766->772 767->766 769 7ff7efc61c95 768->769 771 7ff7efc61c78 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W 768->771 769->773 777 7ff7efc61d00 769->777 778 7ff7efc61cb0 ?widen@?$ctype@_W@std@@QEBA_WD ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W 769->778 774 7ff7efc61da0 770->774 771->768 771->769 775 7ff7efc61dbd 772->775 776 7ff7efc61c04 772->776 773->763 773->764 774->645 809 7ff7efc611c0 775->809 806 7ff7efc61dec 776->806 777->773 781 7ff7efc61d05 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W 777->781 778->769 781->773 781->777 783 7ff7efc61dc2 783->645 785 7ff7efc62564 free 784->785 788 7ff7efc61e49 787->788 789 7ff7efc61795 788->789 790 7ff7efc623bc IsProcessorFeaturePresent 788->790 789->723 791 7ff7efc623d4 790->791 812 7ff7efc62490 RtlCaptureContext 791->812 804 7ff7efc62504 796->804 798 7ff7efc62532 _CxxThrowException 805 7ff7efc610e0 799->805 801 7ff7efc62552 _CxxThrowException 802 7ff7efc62564 free 801->802 804->798 805->801 807 7ff7efc61e60 std::_Facet_Register 4 API calls 806->807 808 7ff7efc61c16 807->808 808->765 810 7ff7efc611ce Concurrency::cancel_current_task 809->810 811 7ff7efc611df __std_exception_copy 810->811 811->783 813 7ff7efc624aa RtlLookupFunctionEntry 812->813 814 7ff7efc623e7 813->814 815 7ff7efc624c0 RtlVirtualUnwind 813->815 816 7ff7efc62388 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 814->816 815->813 815->814 820 7ff7efc62bf4 821 7ff7efc62c2c __GSHandlerCheckCommon 820->821 822 7ff7efc62c58 821->822 823 7ff7efc62c47 __CxxFrameHandler4 821->823 823->822 852 7ff7efc62d54 ??1_Lockit@std@@QEAA 824 7ff7efc61070 __std_exception_destroy 825 7ff7efc61098 824->825 826 7ff7efc610a5 824->826 827 7ff7efc61e9c free 825->827 827->826 828 7ff7efc62130 831 7ff7efc6256c 828->831 832 7ff7efc62139 831->832 833 7ff7efc6258f GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 831->833 833->832 853 7ff7efc61010 __std_exception_copy 855 7ff7efc61a10 856 7ff7efc61a1e ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 855->856 857 7ff7efc61a3e ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 856->857 858 7ff7efc61a48 856->858 857->858 859 7ff7efc61ed0 860 7ff7efc61ee0 859->860 872 7ff7efc621bc 860->872 862 7ff7efc62690 9 API calls 863 7ff7efc61f85 862->863 864 7ff7efc61f04 _RTC_Initialize 869 7ff7efc61f67 864->869 880 7ff7efc6262c InitializeSListHead 864->880 869->862 871 7ff7efc61f75 869->871 873 7ff7efc621cd 872->873 874 7ff7efc621ff 872->874 875 7ff7efc6223c 873->875 878 7ff7efc621d2 __scrt_acquire_startup_lock 873->878 874->864 876 7ff7efc62690 9 API calls 875->876 877 7ff7efc62246 876->877 878->874 879 7ff7efc621ef _initialize_onexit_table 878->879 879->874 834 7ff7efc61f98 838 7ff7efc62834 SetUnhandledExceptionFilter 834->838 839 7ff7efc61ea4 840 7ff7efc61ebc 839->840 841 7ff7efc61ec6 839->841 842 7ff7efc61e9c free 840->842 842->841 843 7ff7efc62de0 845 7ff7efc62de8 843->845 844 7ff7efc62e35 845->844 846 7ff7efc61e9c free 845->846 846->845 882 7ff7efc617c0 883 7ff7efc61804 882->883 884 7ff7efc617d3 882->884 885 7ff7efc617fc 884->885 886 7ff7efc6181b _invalid_parameter_noinfo_noreturn ?uncaught_exception@std@ 884->886 887 7ff7efc61e9c free 885->887 888 7ff7efc6184d 886->888 889 7ff7efc61843 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 886->889 887->883 889->888 890 7ff7efc610c0 __std_exception_destroy 891 7ff7efc61d40 892 7ff7efc61d49 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 891->892 894 7ff7efc61d6e ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 892->894 895 7ff7efc61d78 892->895 894->895 896 7ff7efc61e40 8 API calls 895->896 897 7ff7efc61da0 896->897 847 7ff7efc620e2 848 7ff7efc627e0 GetModuleHandleW 847->848 849 7ff7efc620e9 848->849 850 7ff7efc62128 _exit 849->850 851 7ff7efc620ed 849->851

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_00007FF7EFC61DEC 16 Function_00007FF7EFC61E60 0->16 1 Function_00007FF7EFC6256C 2 Function_00007FF7EFC6236C 39 Function_00007FF7EFC62330 2->39 3 Function_00007FF7EFC6266C 4 Function_00007FF7EFC62D6E 5 Function_00007FF7EFC62CE8 6 Function_00007FF7EFC62BF4 45 Function_00007FF7EFC62B98 6->45 7 Function_00007FF7EFC61070 42 Function_00007FF7EFC61E9C 7->42 8 Function_00007FF7EFC61870 9 Function_00007FF7EFC62CDC 10 Function_00007FF7EFC628DC 11 Function_00007FF7EFC622D9 12 Function_00007FF7EFC627E0 13 Function_00007FF7EFC622E0 68 Function_00007FF7EFC62AC4 13->68 14 Function_00007FF7EFC610E0 15 Function_00007FF7EFC62DE0 15->42 49 Function_00007FF7EFC62524 16->49 69 Function_00007FF7EFC62544 16->69 17 Function_00007FF7EFC620E2 17->12 18 Function_00007FF7EFC62D62 19 Function_00007FF7EFC62388 20 Function_00007FF7EFC62688 21 Function_00007FF7EFC61010 22 Function_00007FF7EFC61110 23 Function_00007FF7EFC61A10 24 Function_00007FF7EFC62490 25 Function_00007FF7EFC61190 26 Function_00007FF7EFC62690 26->20 27 Function_00007FF7EFC62678 28 Function_00007FF7EFC62304 66 Function_00007FF7EFC6263C 28->66 29 Function_00007FF7EFC62504 30 Function_00007FF7EFC62384 31 Function_00007FF7EFC61000 31->39 32 Function_00007FF7EFC61A80 32->0 73 Function_00007FF7EFC611C0 32->73 76 Function_00007FF7EFC61E40 32->76 33 Function_00007FF7EFC62180 47 Function_00007FF7EFC62918 33->47 33->66 34 Function_00007FF7EFC62680 35 Function_00007FF7EFC6262C 36 Function_00007FF7EFC62DA9 37 Function_00007FF7EFC61FB4 37->12 37->13 37->26 37->27 37->28 37->33 37->34 55 Function_00007FF7EFC62248 37->55 61 Function_00007FF7EFC61250 37->61 70 Function_00007FF7EFC62144 37->70 38 Function_00007FF7EFC62834 40 Function_00007FF7EFC62130 40->1 41 Function_00007FF7EFC62D30 43 Function_00007FF7EFC6261C 44 Function_00007FF7EFC61F98 44->38 46 Function_00007FF7EFC62618 44->46 48 Function_00007FF7EFC61EA4 48->42 49->29 50 Function_00007FF7EFC62624 51 Function_00007FF7EFC628A0 52 Function_00007FF7EFC618A0 53 Function_00007FF7EFC61220 54 Function_00007FF7EFC62648 56 Function_00007FF7EFC62D48 57 Function_00007FF7EFC62DC7 58 Function_00007FF7EFC62D54 59 Function_00007FF7EFC62CD0 60 Function_00007FF7EFC61ED0 60->2 60->3 60->26 60->30 60->35 60->43 60->46 60->50 60->51 62 Function_00007FF7EFC62650 60->62 65 Function_00007FF7EFC621BC 60->65 60->66 61->16 61->32 61->42 61->52 61->76 62->54 78 Function_00007FF7EFC62640 62->78 63 Function_00007FF7EFC61150 64 Function_00007FF7EFC61050 65->26 65->68 67 Function_00007FF7EFC62D3C 69->14 70->68 71 Function_00007FF7EFC62844 72 Function_00007FF7EFC617C0 72->42 73->25 74 Function_00007FF7EFC610C0 75 Function_00007FF7EFC62CC0 76->19 76->24 77 Function_00007FF7EFC61D40 77->76

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 7ff7efc61250-7ff7efc612f9 call 7ff7efc61e60 _time64 srand 3 7ff7efc61300-7ff7efc61348 rand 0->3 3->3 4 7ff7efc6134a-7ff7efc613c8 SetConsoleTitleW call 7ff7efc618a0 * 2 call 7ff7efc61a80 call 7ff7efc618a0 * 2 call 7ff7efc61a80 call 7ff7efc618a0 3->4 19 7ff7efc613d0-7ff7efc613e4 CreateToolhelp32Snapshot 4->19 20 7ff7efc613ea-7ff7efc61402 Process32FirstW 19->20 21 7ff7efc61604-7ff7efc6162d GetLastError call 7ff7efc618a0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z call 7ff7efc61a80 19->21 22 7ff7efc61404-7ff7efc61408 20->22 23 7ff7efc61441-7ff7efc6144c CloseHandle 20->23 27 7ff7efc61632-7ff7efc61650 call 7ff7efc618a0 SleepEx 21->27 25 7ff7efc61410-7ff7efc61427 _wcsicmp 22->25 23->27 28 7ff7efc61452-7ff7efc61493 call 7ff7efc618a0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z call 7ff7efc61a80 OpenProcess 23->28 29 7ff7efc6143d 25->29 30 7ff7efc61429-7ff7efc61439 Process32NextW 25->30 27->19 39 7ff7efc61499-7ff7efc614cf call 7ff7efc618a0 VirtualAllocEx 28->39 40 7ff7efc616f1-7ff7efc6171a GetLastError call 7ff7efc618a0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z call 7ff7efc61a80 28->40 29->23 30->25 34 7ff7efc6143b 30->34 34->23 45 7ff7efc616b8-7ff7efc616be GetLastError 39->45 46 7ff7efc614d5-7ff7efc6151c call 7ff7efc618a0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z call 7ff7efc61a80 WriteProcessMemory 39->46 50 7ff7efc6171f-7ff7efc61747 call 7ff7efc618a0 Sleep 40->50 49 7ff7efc616c5-7ff7efc616ef call 7ff7efc618a0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z call 7ff7efc61a80 CloseHandle 45->49 63 7ff7efc616a9-7ff7efc616b6 GetLastError 46->63 64 7ff7efc61522-7ff7efc6155e call 7ff7efc618a0 CreateRemoteThread 46->64 49->50 57 7ff7efc61749-7ff7efc61760 50->57 58 7ff7efc61783-7ff7efc617b2 call 7ff7efc61e40 50->58 61 7ff7efc6177e call 7ff7efc61e9c 57->61 62 7ff7efc61762-7ff7efc61775 57->62 61->58 62->61 67 7ff7efc61777-7ff7efc6177d _invalid_parameter_noinfo_noreturn 62->67 63->49 72 7ff7efc6169a-7ff7efc616a7 GetLastError 64->72 73 7ff7efc61564-7ff7efc615bc call 7ff7efc618a0 * 2 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z call 7ff7efc61a80 WaitForSingleObject GetExitCodeThread 64->73 67->61 72->49 80 7ff7efc61655-7ff7efc6165b GetLastError 73->80 81 7ff7efc615c2-7ff7efc615ef call 7ff7efc618a0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z call 7ff7efc61a80 73->81 83 7ff7efc61662-7ff7efc6167e call 7ff7efc618a0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z call 7ff7efc61a80 80->83 90 7ff7efc61683-7ff7efc61695 CloseHandle * 2 81->90 91 7ff7efc615f5-7ff7efc61602 GetLastError 81->91 83->90 90->50 91->83
    APIs
      • Part of subcall function 00007FF7EFC61E60: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7EFC61E7A
    • _time64.API-MS-WIN-CRT-TIME-L1-1-0 ref: 00007FF7EFC612DE
    • srand.API-MS-WIN-CRT-UTILITY-L1-1-0 ref: 00007FF7EFC612E7
    • rand.API-MS-WIN-CRT-UTILITY-L1-1-0 ref: 00007FF7EFC61311
    • SetConsoleTitleW.KERNEL32 ref: 00007FF7EFC6135B
    • CreateToolhelp32Snapshot.KERNEL32 ref: 00007FF7EFC613D7
    • Process32FirstW.KERNEL32 ref: 00007FF7EFC613FA
    • _wcsicmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7EFC6141F
    • Process32NextW.KERNEL32 ref: 00007FF7EFC61431
    • CloseHandle.KERNELBASE ref: 00007FF7EFC61444
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF7EFC6146A
    • OpenProcess.KERNEL32 ref: 00007FF7EFC61482
    • VirtualAllocEx.KERNEL32 ref: 00007FF7EFC614C3
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF7EFC614EE
    • WriteProcessMemory.KERNEL32 ref: 00007FF7EFC61514
      • Part of subcall function 00007FF7EFC618A0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7EFC6191A
      • Part of subcall function 00007FF7EFC618A0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF7EFC6193A
      • Part of subcall function 00007FF7EFC618A0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7EFC6194A
      • Part of subcall function 00007FF7EFC618A0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF7EFC61A2D
      • Part of subcall function 00007FF7EFC618A0: ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF7EFC61A34
      • Part of subcall function 00007FF7EFC618A0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF7EFC61A41
    • CreateRemoteThread.KERNEL32 ref: 00007FF7EFC61552
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF7EFC61590
      • Part of subcall function 00007FF7EFC61A80: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7EFC61B0A
      • Part of subcall function 00007FF7EFC61A80: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF7EFC61B2A
      • Part of subcall function 00007FF7EFC61A80: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7EFC61B3A
      • Part of subcall function 00007FF7EFC61A80: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF7EFC61D5D
      • Part of subcall function 00007FF7EFC61A80: ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF7EFC61D64
      • Part of subcall function 00007FF7EFC61A80: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF7EFC61D71
    • WaitForSingleObject.KERNEL32 ref: 00007FF7EFC615A6
    • GetExitCodeThread.KERNEL32 ref: 00007FF7EFC615B4
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF7EFC615DC
      • Part of subcall function 00007FF7EFC61A80: ?getloc@ios_base@std@@QEBA?AVlocale@2@XZ.MSVCP140 ref: 00007FF7EFC61B65
      • Part of subcall function 00007FF7EFC61A80: ??0_Lockit@std@@QEAA@H@Z.MSVCP140 ref: 00007FF7EFC61B7A
      • Part of subcall function 00007FF7EFC61A80: ??Bid@locale@std@@QEAA_KXZ.MSVCP140 ref: 00007FF7EFC61B94
      • Part of subcall function 00007FF7EFC61A80: ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140 ref: 00007FF7EFC61BC7
      • Part of subcall function 00007FF7EFC61A80: ?_Getcat@?$ctype@_W@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z.MSVCP140 ref: 00007FF7EFC61BF4
      • Part of subcall function 00007FF7EFC61A80: std::_Facet_Register.LIBCPMT ref: 00007FF7EFC61C11
      • Part of subcall function 00007FF7EFC61A80: ??1_Lockit@std@@QEAA@XZ.MSVCP140 ref: 00007FF7EFC61C30
      • Part of subcall function 00007FF7EFC61A80: ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF7EFC61C89
      • Part of subcall function 00007FF7EFC61A80: ?widen@?$ctype@_W@std@@QEBA_WD@Z.MSVCP140 ref: 00007FF7EFC61CC7
    • GetLastError.KERNEL32 ref: 00007FF7EFC615F5
    • GetLastError.KERNEL32 ref: 00007FF7EFC61655
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF7EFC61675
    • CloseHandle.KERNEL32 ref: 00007FF7EFC61686
    • CloseHandle.KERNEL32 ref: 00007FF7EFC6168F
    • GetLastError.KERNEL32 ref: 00007FF7EFC6169A
    • GetLastError.KERNEL32 ref: 00007FF7EFC616A9
    • GetLastError.KERNEL32 ref: 00007FF7EFC616B8
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF7EFC616D8
    • CloseHandle.KERNEL32 ref: 00007FF7EFC616E9
    • GetLastError.KERNEL32 ref: 00007FF7EFC616F1
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF7EFC61711
    • Sleep.KERNEL32 ref: 00007FF7EFC61737
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7EFC61777
      • Part of subcall function 00007FF7EFC618A0: ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF7EFC61997
      • Part of subcall function 00007FF7EFC618A0: ?sputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAA_JPEB_W_J@Z.MSVCP140 ref: 00007FF7EFC619C1
      • Part of subcall function 00007FF7EFC618A0: ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF7EFC619E6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4575545159.00007FF7EFC61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7EFC60000, based on PE: true
    • Associated: 00000000.00000002.4575527868.00007FF7EFC60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4575564369.00007FF7EFC63000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4575582242.00007FF7EFC66000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4575600495.00007FF7EFC67000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7efc60000_d3d11_hook.jbxd
    Similarity
    • API ID: U?$char_traits@_W@std@@@std@@$??6?$basic_ostream@_V01@$ErrorLast$?good@ios_base@std@@CloseHandle$?sputc@?$basic_streambuf@_$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?uncaught_exception@std@@CreateLockit@std@@Osfx@?$basic_ostream@_ProcessProcess32ThreadV12@W@std@@$??0_??1_?getloc@ios_base@std@@?sputn@?$basic_streambuf@_?widen@?$ctype@_AllocBid@locale@std@@CodeConsoleExitFacet_FirstGetcat@?$ctype@_Getgloballocale@locale@std@@Locimp@12@MemoryNextObjectOpenRegisterRemoteSingleSleepSnapshotTitleToolhelp32V42@@Vfacet@locale@2@VirtualVlocale@2@WaitWrite_invalid_parameter_noinfo_noreturn_time64_wcsicmpmallocrandsrandstd::_
    • String ID: 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz$C:\Windows\Temp\CodeX\Codex.dll$GTA5.exe$[+] Attempting to get the process ID...$[+] DLL path written to the target process successfully.$[+] Injection complete. Waiting for 5 seconds before exit...$[+] Memory allocated in the target process successfully at address: $[+] Process found! Process ID: $[+] Process opened successfully.$[+] Remote thread created successfully.$[+] Remote thread exited with code: $[+] Remote thread handle: $[+] Using predefined DLL path: $[+] Using predefined process name: $[-] Failed to allocate memory in the target process. Error code: $[-] Failed to create remote thread. Error code: $[-] Failed to create snapshot. Error code: $[-] Failed to get remote thread exit code. Error code: $[-] Failed to open the process. Error code: $[-] Failed to write DLL path to the target process. Error code: $[-] LoadLibraryW failed in the remote process. Error code: $[-] Process not found, retrying...
    • API String ID: 1586405287-3973137909
    • Opcode ID: d864709ad7eff486cfa87d217bb6b743c1c15e7341b6d4bd11a1020e5b2b92c6
    • Instruction ID: 1cef3cc62c32043c9140bc75270cdc7e7a4ecd598657a56aa622aa20f42ff650
    • Opcode Fuzzy Hash: d864709ad7eff486cfa87d217bb6b743c1c15e7341b6d4bd11a1020e5b2b92c6
    • Instruction Fuzzy Hash: 10E10161B5C68282EA00BB15F8543F9A361BF84F91FE64136D90D47B75DF3CE40A83A2

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 92 7ff7efc61a80-7ff7efc61ade 93 7ff7efc61ae5 92->93 94 7ff7efc61ae0-7ff7efc61ae3 92->94 95 7ff7efc61ae7-7ff7efc61af7 93->95 94->95 96 7ff7efc61af9-7ff7efc61aff 95->96 97 7ff7efc61b00-7ff7efc61b12 ?good@ios_base@std@@QEBA_NXZ 95->97 96->97 98 7ff7efc61b44-7ff7efc61b4a 97->98 99 7ff7efc61b14-7ff7efc61b23 97->99 103 7ff7efc61b4c-7ff7efc61b51 98->103 104 7ff7efc61b56-7ff7efc61bad ?getloc@ios_base@std@@QEBA?AVlocale@2@XZ ??0_Lockit@std@@QEAA@H@Z ??Bid@locale@std@@QEAA_KXZ 98->104 101 7ff7efc61b25-7ff7efc61b28 99->101 102 7ff7efc61b42 99->102 101->102 105 7ff7efc61b2a-7ff7efc61b40 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ ?good@ios_base@std@@QEBA_NXZ 101->105 102->98 106 7ff7efc61d4e-7ff7efc61d6c ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 103->106 107 7ff7efc61bbe 104->107 108 7ff7efc61baf-7ff7efc61bba 104->108 105->98 110 7ff7efc61d6e-7ff7efc61d77 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ 106->110 111 7ff7efc61d78-7ff7efc61d87 106->111 109 7ff7efc61bc1-7ff7efc61bc5 107->109 112 7ff7efc61bbc 108->112 113 7ff7efc61c2b-7ff7efc61c3f ??1_Lockit@std@@QEAA@XZ 108->113 114 7ff7efc61bdb-7ff7efc61bde 109->114 115 7ff7efc61bc7-7ff7efc61bd1 ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ 109->115 110->111 116 7ff7efc61d89-7ff7efc61d8f 111->116 117 7ff7efc61d90-7ff7efc61dbc call 7ff7efc61e40 111->117 112->109 118 7ff7efc61c58-7ff7efc61c71 113->118 119 7ff7efc61c41-7ff7efc61c4a 113->119 114->113 121 7ff7efc61be0-7ff7efc61be8 114->121 120 7ff7efc61bd3-7ff7efc61bd7 115->120 115->121 116->117 122 7ff7efc61c73-7ff7efc61c76 118->122 123 7ff7efc61ca0-7ff7efc61ca5 118->123 119->118 132 7ff7efc61c4c-7ff7efc61c52 119->132 120->114 121->113 126 7ff7efc61bea-7ff7efc61bfe ?_Getcat@?$ctype@_W@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z 121->126 122->123 125 7ff7efc61c78-7ff7efc61c93 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 122->125 128 7ff7efc61cab-7ff7efc61cae 123->128 129 7ff7efc61d29-7ff7efc61d49 123->129 133 7ff7efc61cf8-7ff7efc61cfb 125->133 134 7ff7efc61c95 125->134 135 7ff7efc61dbd-7ff7efc61dd6 call 7ff7efc611c0 126->135 136 7ff7efc61c04-7ff7efc61c24 call 7ff7efc61dec 126->136 137 7ff7efc61d00-7ff7efc61d03 128->137 138 7ff7efc61cb0-7ff7efc61cf6 ?widen@?$ctype@_W@std@@QEBA_WD@Z ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 128->138 129->106 132->118 133->122 140 7ff7efc61c9a-7ff7efc61c9e 134->140 148 7ff7efc61dd8-7ff7efc61ddb 135->148 149 7ff7efc61de3 135->149 136->113 137->129 143 7ff7efc61d05-7ff7efc61d20 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 137->143 138->140 140->123 146 7ff7efc61d3b-7ff7efc61d3e 143->146 147 7ff7efc61d22-7ff7efc61d25 143->147 146->137 147->129 148->149
    APIs
    Strings
    • 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 00007FF7EFC61A8F
    Memory Dump Source
    • Source File: 00000000.00000002.4575545159.00007FF7EFC61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7EFC60000, based on PE: true
    • Associated: 00000000.00000002.4575527868.00007FF7EFC60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4575564369.00007FF7EFC63000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4575582242.00007FF7EFC66000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4575600495.00007FF7EFC67000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7efc60000_d3d11_hook.jbxd
    Similarity
    • API ID: U?$char_traits@_W@std@@@std@@$?sputc@?$basic_streambuf@_$?good@ios_base@std@@Lockit@std@@W@std@@$??0_??1_?flush@?$basic_ostream@_?getloc@ios_base@std@@?setstate@?$basic_ios@_?uncaught_exception@std@@?widen@?$ctype@_Bid@locale@std@@Facet_Getcat@?$ctype@_Getgloballocale@locale@std@@Locimp@12@Osfx@?$basic_ostream@_RegisterV12@V42@@Vfacet@locale@2@Vlocale@2@std::_
    • String ID: 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
    • API String ID: 973488623-3592501980
    • Opcode ID: f4b217718413ce5d1c228bac94fb45dc2f85e46fb42a744afe427fed60535a19
    • Instruction ID: 336bf2aa68e5d9c520220893ef08ce5478145dfc3f10e39f657b9e098967ed8f
    • Opcode Fuzzy Hash: f4b217718413ce5d1c228bac94fb45dc2f85e46fb42a744afe427fed60535a19
    • Instruction Fuzzy Hash: 25A10C3664CA8182EA149F16F490379A7A0FB85F86FA68532DE4E43B74CF3DD446C351

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 151 7ff7efc618a0-7ff7efc618cf 152 7ff7efc618d0-7ff7efc618d8 151->152 152->152 153 7ff7efc618da-7ff7efc618e9 152->153 154 7ff7efc618eb-7ff7efc618ee 153->154 155 7ff7efc618f5 153->155 154->155 156 7ff7efc618f0-7ff7efc618f3 154->156 157 7ff7efc618f7-7ff7efc61907 155->157 156->157 158 7ff7efc61909-7ff7efc6190f 157->158 159 7ff7efc61910-7ff7efc61922 ?good@ios_base@std@@QEBA_NXZ 157->159 158->159 160 7ff7efc61954-7ff7efc6195a 159->160 161 7ff7efc61924-7ff7efc61933 159->161 165 7ff7efc6195c-7ff7efc61961 160->165 166 7ff7efc61966-7ff7efc6197f 160->166 163 7ff7efc61935-7ff7efc61938 161->163 164 7ff7efc61952 161->164 163->164 167 7ff7efc6193a-7ff7efc61950 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ ?good@ios_base@std@@QEBA_NXZ 163->167 164->160 168 7ff7efc61a1e-7ff7efc61a3c ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 165->168 169 7ff7efc619af-7ff7efc619ca ?sputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAA_JPEB_W_J@Z 166->169 170 7ff7efc61981-7ff7efc61984 166->170 167->160 174 7ff7efc61a3e-7ff7efc61a47 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ 168->174 175 7ff7efc61a48-7ff7efc61a58 168->175 171 7ff7efc619cc 169->171 172 7ff7efc619f7 169->172 170->169 173 7ff7efc61986-7ff7efc619a1 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 170->173 178 7ff7efc619d0-7ff7efc619d3 171->178 179 7ff7efc619fa 172->179 180 7ff7efc619aa-7ff7efc619ad 173->180 181 7ff7efc619a3-7ff7efc619a8 173->181 174->175 176 7ff7efc61a5a-7ff7efc61a60 175->176 177 7ff7efc61a61-7ff7efc61a7b 175->177 176->177 182 7ff7efc619fe-7ff7efc61a0e 178->182 183 7ff7efc619d5-7ff7efc619f0 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 178->183 179->182 180->170 181->179 182->168 183->172 185 7ff7efc619f2-7ff7efc619f5 183->185 185->178
    APIs
    • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7EFC6191A
    • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF7EFC6193A
    • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7EFC6194A
    • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF7EFC61997
    • ?sputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAA_JPEB_W_J@Z.MSVCP140 ref: 00007FF7EFC619C1
    • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF7EFC619E6
    • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF7EFC61A2D
    • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF7EFC61A34
    • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF7EFC61A41
    Strings
    • 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 00007FF7EFC618B4
    Memory Dump Source
    • Source File: 00000000.00000002.4575545159.00007FF7EFC61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7EFC60000, based on PE: true
    • Associated: 00000000.00000002.4575527868.00007FF7EFC60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4575564369.00007FF7EFC63000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4575582242.00007FF7EFC66000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4575600495.00007FF7EFC67000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7efc60000_d3d11_hook.jbxd
    Similarity
    • API ID: U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@_$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@_?uncaught_exception@std@@Osfx@?$basic_ostream@_V12@
    • String ID: 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
    • API String ID: 1801066895-3592501980
    • Opcode ID: d71571c4ab8c6542fdcb2a024cbb0a073d49322db178fab5ac6fc3171b68a444
    • Instruction ID: 56ea19c01f4cfa8a8855afc0cb8de443e12235aadf7c51f7beb5ff4d0404a765
    • Opcode Fuzzy Hash: d71571c4ab8c6542fdcb2a024cbb0a073d49322db178fab5ac6fc3171b68a444
    • Instruction Fuzzy Hash: C651122274CA8182EB209F19E590379E7A0FB85F96B66C533CE4E43BB0CF39D4468351

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4575545159.00007FF7EFC61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7EFC60000, based on PE: true
    • Associated: 00000000.00000002.4575527868.00007FF7EFC60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4575564369.00007FF7EFC63000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4575582242.00007FF7EFC66000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4575600495.00007FF7EFC67000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7efc60000_d3d11_hook.jbxd
    Similarity
    • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
    • String ID:
    • API String ID: 1133592946-0
    • Opcode ID: e362a33378abd9c0d015d8bfcacea95e1256b078e08c84eb7883003044df4e9e
    • Instruction ID: b9279e6b66584f8cea96afe2f554f2ba239a9b77caeaf39bd09c9dc1bef6af66
    • Opcode Fuzzy Hash: e362a33378abd9c0d015d8bfcacea95e1256b078e08c84eb7883003044df4e9e
    • Instruction Fuzzy Hash: F7313E21A8D2C341EE14BB24B4513F99351AF85F84FE640B7D64E47AF3DE3DA8058263

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4575545159.00007FF7EFC61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7EFC60000, based on PE: true
    • Associated: 00000000.00000002.4575527868.00007FF7EFC60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4575564369.00007FF7EFC63000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4575582242.00007FF7EFC66000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4575600495.00007FF7EFC67000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7efc60000_d3d11_hook.jbxd
    Similarity
    • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
    • String ID:
    • API String ID: 313767242-0
    • Opcode ID: 92bdb05596ca56560113156515359938f04c82809e286cb23ec18e72fdeef511
    • Instruction ID: 9e07de07a19bd71cf140a9e2b08b1f57e3618a39118ac7975cb05e7894ff4093
    • Opcode Fuzzy Hash: 92bdb05596ca56560113156515359938f04c82809e286cb23ec18e72fdeef511
    • Instruction Fuzzy Hash: 19314972709AC18AEB60AF60F8403EDA360FB84B44F91403ADA4E47BA5DF38C549C721

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4575545159.00007FF7EFC61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7EFC60000, based on PE: true
    • Associated: 00000000.00000002.4575527868.00007FF7EFC60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4575564369.00007FF7EFC63000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4575582242.00007FF7EFC66000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4575600495.00007FF7EFC67000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7efc60000_d3d11_hook.jbxd
    Similarity
    • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
    • String ID:
    • API String ID: 2933794660-0
    • Opcode ID: 58fa07a43cbebff286adf7c1782afc97502b8c71e91422f4b0130224c4d27fda
    • Instruction ID: 843c31d7534a49b54d69b8adc86a5344036e475ea8e09ff2940411d3bd5bf930
    • Opcode Fuzzy Hash: 58fa07a43cbebff286adf7c1782afc97502b8c71e91422f4b0130224c4d27fda
    • Instruction Fuzzy Hash: C9114C22B58B418AEB00DB60F8443E873A4FB19B58F850A32DA2D46BA4DF38D1598391
    Memory Dump Source
    • Source File: 00000000.00000002.4575545159.00007FF7EFC61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7EFC60000, based on PE: true
    • Associated: 00000000.00000002.4575527868.00007FF7EFC60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4575564369.00007FF7EFC63000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4575582242.00007FF7EFC66000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4575600495.00007FF7EFC67000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7efc60000_d3d11_hook.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c212df9f7d96d27f38124359609e3d94df633cd6b7a4bdce6ddceb872332209f
    • Instruction ID: aeda0652e66d33f3b21b98f26e5eea2e5ee7e9f8486e6c77d7f48ae454e4c8ba
    • Opcode Fuzzy Hash: c212df9f7d96d27f38124359609e3d94df633cd6b7a4bdce6ddceb872332209f
    • Instruction Fuzzy Hash: ABA00122A8C882A1EA08AF00BD502A0A360AB94B00BA60176C40D819709E3CA5498262