Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
pwn.dll.dll

Overview

General Information

Sample name:pwn.dll.dll
(renamed file extension from exe to dll)
Original sample name:pwn.dll.exe
Analysis ID:1580305
MD5:2f8dd834b75bbf2ebf0be0b114c77521
SHA1:32e1a98a551916f1ace9e2ff3018fa065122ba71
SHA256:31a2bd9b628a18a8e38d0a125bd56d958c9cb097da214d67560f8caae1a84032
Tags:dllexeuser-NDA0E
Infos:

Detection

CobaltStrike
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected CobaltStrike
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Writes to foreign memory regions
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll64.exe (PID: 7872 cmdline: loaddll64.exe "C:\Users\user\Desktop\pwn.dll.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 7880 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7964 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\pwn.dll.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 7988 cmdline: rundll32.exe "C:\Users\user\Desktop\pwn.dll.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
        • wermgr.exe (PID: 8020 cmdline: wermgr.exe MD5: 74A0194782E039ACE1F7349544DC1CF4)
    • rundll32.exe (PID: 7972 cmdline: rundll32.exe C:\Users\user\Desktop\pwn.dll.dll,LRDCP MD5: EF3179D498793BF4234F708D3BE28633)
      • wermgr.exe (PID: 8012 cmdline: wermgr.exe MD5: 74A0194782E039ACE1F7349544DC1CF4)
    • rundll32.exe (PID: 8176 cmdline: rundll32.exe "C:\Users\user\Desktop\pwn.dll.dll",LRDCP MD5: EF3179D498793BF4234F708D3BE28633)
      • wermgr.exe (PID: 7172 cmdline: wermgr.exe MD5: 74A0194782E039ACE1F7349544DC1CF4)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Cobalt Strike, CobaltStrikeCobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable.
  • APT 29
  • APT32
  • APT41
  • AQUATIC PANDA
  • Anunak
  • Cobalt
  • Codoso
  • CopyKittens
  • DarkHydrus
  • Earth Baxia
  • FIN6
  • FIN7
  • Leviathan
  • Mustang Panda
  • Shell Crew
  • Stone Panda
  • TianWu
  • UNC1878
  • UNC2452
  • Winnti Umbrella
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike
{"BeaconType": ["HTTPS"], "Port": 443, "SleepTime": 15285, "MaxGetSize": 2101826, "Jitter": 39, "C2Server": "www.service-ad.pro,/sub/ccs/NDNZH1WD1", "HttpPostUri": "/Enable/docs41/VGZ8YK523L2G", "Malleable_C2_Instructions": ["Remove 2052 bytes from the end", "Remove 2614 bytes from the beginning", "NetBIOS decode 'a'", "XOR mask w/ random key"], "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\DevicePairingWizard.exe", "Spawnto_x64": "%windir%\\sysnative\\Locator.exe", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 666666666, "bStageCleanup": "True", "bCFGCaution": "False", "KillDate": 0, "bProcInject_StartRWX": "False", "bProcInject_UseRWX": "False", "bProcInject_MinAllocSize": 9409, "ProcInject_PrependAppend_x86": ["Dx+EAAAAAAAPH0AAUFgPH0AADx+EAAAAAAA=", "Dx+AAAAAAA8fAGaQUFgPH0QAAA8fAA8fRAAADx9AAGaQDx+AAAAAAA8fAA8fRAAADx8A"], "ProcInject_PrependAppend_x64": ["UFgPH0AAZg8fRAAAkGaQZg8fRAAAZpBmkA8fgAAAAAAPH0AADx9AAA8fQAAPHwBmDx+EAAAAAABmDx+EAAAAAAAPH4AAAAAADx9AAA8fgAAAAAA=", "ZpAPHwBmDx9EAABmDx9EAABmkA8fRAAADx+EAAAAAAAPH0QAAGYPH0QAAA8fhAAAAAAAkA=="], "ProcInject_Execute": ["ntdll:RtlUserThreadStart", "CreateThread", "NtQueueApcThread-s", "CreateRemoteThread", "RtlCreateUserThread"], "ProcInject_AllocationMethod": "VirtualAllocEx", "bUsesCookies": "True", "HostHeader": ""}
SourceRuleDescriptionAuthorStrings
0000000A.00000002.2589449610.000002963D080000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
    0000000A.00000002.2589449610.000002963D080000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_CobaltStrike_b54b94acRule for beacon sleep obfuscation routineunknown
    • 0x137:$a_x64: 4C 8B 53 08 45 8B 0A 45 8B 5A 04 4D 8D 52 08 45 85 C9 75 05 45 85 DB 74 33 45 3B CB 73 E6 49 8B F9 4C 8B 03
    00000006.00000002.2588676723.0000026E03400000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
      00000006.00000002.2588676723.0000026E03400000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_CobaltStrike_b54b94acRule for beacon sleep obfuscation routineunknown
      • 0x137:$a_x64: 4C 8B 53 08 45 8B 0A 45 8B 5A 04 4D 8D 52 08 45 85 C9 75 05 45 85 DB 74 33 45 3B CB 73 E6 49 8B F9 4C 8B 03
      00000007.00000002.2588686195.0000015A06FF0000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
        Click to see the 31 entries
        No Sigma rule has matched
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 00000006.00000003.1354728332.0000026E033C0000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: CobaltStrike {"BeaconType": ["HTTPS"], "Port": 443, "SleepTime": 15285, "MaxGetSize": 2101826, "Jitter": 39, "C2Server": "www.service-ad.pro,/sub/ccs/NDNZH1WD1", "HttpPostUri": "/Enable/docs41/VGZ8YK523L2G", "Malleable_C2_Instructions": ["Remove 2052 bytes from the end", "Remove 2614 bytes from the beginning", "NetBIOS decode 'a'", "XOR mask w/ random key"], "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\DevicePairingWizard.exe", "Spawnto_x64": "%windir%\\sysnative\\Locator.exe", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 666666666, "bStageCleanup": "True", "bCFGCaution": "False", "KillDate": 0, "bProcInject_StartRWX": "False", "bProcInject_UseRWX": "False", "bProcInject_MinAllocSize": 9409, "ProcInject_PrependAppend_x86": ["Dx+EAAAAAAAPH0AAUFgPH0AADx+EAAAAAAA=", "Dx+AAAAAAA8fAGaQUFgPH0QAAA8fAA8fRAAADx9AAGaQDx+AAAAAAA8fAA8fRAAADx8A"], "ProcInject_PrependAppend_x64": ["UFgPH0AAZg8fRAAAkGaQZg8fRAAAZpBmkA8fgAAAAAAPH0AADx9AAA8fQAAPHwBmDx+EAAAAAABmDx+EAAAAAAAPH4AAAAAADx9AAA8fgAAAAAA=", "ZpAPHwBmDx9EAABmDx9EAABmkA8fRAAADx+EAAAAAAAPH0QAAGYPH0QAAA8fhAAAAAAAkA=="], "ProcInject_Execute": ["ntdll:RtlUserThreadStart", "CreateThread", "NtQueueApcThread-s", "CreateRemoteThread", "RtlCreateUserThread"], "ProcInject_AllocationMethod": "VirtualAllocEx", "bUsesCookies": "True", "HostHeader": ""}
        Source: pwn.dll.dllVirustotal: Detection: 19%Perma Link
        Source: pwn.dll.dllReversingLabs: Detection: 47%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
        Source: pwn.dll.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT

        Networking

        barindex
        Source: Malware configuration extractorURLs: www.service-ad.pro
        Source: Joe Sandbox ViewASN Name: AMAZON-AESUS AMAZON-AESUS
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficDNS traffic detected: DNS query: www.service-ad.pro
        Source: wermgr.exe, 00000006.00000002.2588861671.0000026E0355F000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 00000006.00000002.2588861671.0000026E0350C000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 00000006.00000003.2255143942.0000026E0355F000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 00000006.00000003.1814770599.0000026E0355F000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 00000007.00000002.2588821962.0000015A07069000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 00000007.00000002.2588821962.0000015A070BD000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 00000007.00000003.1814771239.0000015A070C8000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 00000007.00000003.2255409316.0000015A070C8000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 0000000A.00000002.2588786427.000002963CE5D000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 0000000A.00000002.2588786427.000002963CE67000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 0000000A.00000003.2265711351.000002963CE5D000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 0000000A.00000003.1824931429.000002963CE5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.service-ad.pro/
        Source: wermgr.exe, 00000006.00000002.2588861671.0000026E0350C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.service-ad.pro/(
        Source: wermgr.exe, 0000000A.00000002.2588786427.000002963CE5D000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 0000000A.00000003.2265711351.000002963CE5D000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 0000000A.00000003.1824931429.000002963CE5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.service-ad.pro/:ji
        Source: wermgr.exe, 00000007.00000002.2588821962.0000015A07069000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.service-ad.pro/ControlSet
        Source: wermgr.exe, 00000006.00000002.2588861671.0000026E0350C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.service-ad.pro/T
        Source: wermgr.exe, 0000000A.00000002.2588786427.000002963CE67000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 0000000A.00000003.2265711351.000002963CE5D000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 0000000A.00000003.1824931429.000002963CE5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.service-ad.pro/pg
        Source: wermgr.exe, 00000006.00000002.2588861671.0000026E0350C000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 00000007.00000002.2588821962.0000015A07069000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.service-ad.pro/phy
        Source: wermgr.exe, 00000007.00000002.2588821962.0000015A070BD000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 00000007.00000002.2588821962.0000015A070AC000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 0000000A.00000002.2588786427.000002963CE67000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 0000000A.00000003.1824931429.000002963CE4D000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 0000000A.00000002.2588786427.000002963CE4D000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 0000000A.00000002.2588786427.000002963CE00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.service-ad.pro/sub/ccs/NDNZH1WD1
        Source: wermgr.exe, 0000000A.00000002.2588786427.000002963CE4D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.service-ad.pro/sub/ccs/NDNZH1WD1%G4
        Source: wermgr.exe, 0000000A.00000002.2588786427.000002963CE67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.service-ad.pro/sub/ccs/NDNZH1WD1(g5
        Source: wermgr.exe, 0000000A.00000002.2588786427.000002963CE67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.service-ad.pro/sub/ccs/NDNZH1WD1-53011b87bd06ndows
        Source: wermgr.exe, 00000006.00000002.2588861671.0000026E0355F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.service-ad.pro/sub/ccs/NDNZH1WD1/vJ
        Source: wermgr.exe, 0000000A.00000003.1824931429.000002963CE4D000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 0000000A.00000002.2588786427.000002963CE4D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.service-ad.pro/sub/ccs/NDNZH1WD10b1d
        Source: wermgr.exe, 00000006.00000002.2588861671.0000026E0350C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.service-ad.pro/sub/ccs/NDNZH1WD124612
        Source: wermgr.exe, 00000006.00000002.2588861671.0000026E0350C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.service-ad.pro/sub/ccs/NDNZH1WD15cc
        Source: wermgr.exe, 0000000A.00000002.2588786427.000002963CE4D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.service-ad.pro/sub/ccs/NDNZH1WD19X4
        Source: wermgr.exe, 00000007.00000002.2588821962.0000015A07069000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.service-ad.pro/sub/ccs/NDNZH1WD1J
        Source: wermgr.exe, 0000000A.00000002.2588786427.000002963CE67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.service-ad.pro/sub/ccs/NDNZH1WD1Lg
        Source: wermgr.exe, 0000000A.00000003.1824931429.000002963CE4D000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 0000000A.00000002.2588786427.000002963CE4D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.service-ad.pro/sub/ccs/NDNZH1WD1RG
        Source: wermgr.exe, 00000006.00000002.2588861671.0000026E0355F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.service-ad.pro/sub/ccs/NDNZH1WD1_v
        Source: wermgr.exe, 0000000A.00000002.2588786427.000002963CE00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.service-ad.pro/sub/ccs/NDNZH1WD1p
        Source: wermgr.exe, 00000006.00000002.2588861671.0000026E0354F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.service-ad.pro/sub/ccs/NDNZH1WD1sH
        Source: wermgr.exe, 00000006.00000002.2588861671.0000026E0355F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.service-ad.pro/sub/ccs/NDNZH1WD1tography
        Source: wermgr.exe, 00000007.00000002.2588821962.0000015A070BD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.service-ad.pro/sub/ccs/NDNZH1WD1ui
        Source: unknownNetwork traffic detected: HTTP traffic on port 49924 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49817 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49922 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49928 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49818
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49817
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
        Source: unknownNetwork traffic detected: HTTP traffic on port 49921 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49923 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49927 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49823 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49928
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49927
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49924
        Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49923
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49823
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49922
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49921

        System Summary

        barindex
        Source: 0000000A.00000002.2589449610.000002963D080000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
        Source: 00000006.00000002.2588676723.0000026E03400000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
        Source: 00000007.00000002.2588686195.0000015A06FF0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
        Source: 00000006.00000003.1354728332.0000026E033C0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
        Source: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
        Source: 00000004.00000002.1354786097.0000009707462000.00000004.00000010.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
        Source: 0000000A.00000003.1383681030.000002963CDA0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
        Source: 00000007.00000003.1354748088.0000015A06FB0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
        Source: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
        Source: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
        Source: 00000009.00000002.1383568977.00000013E3831000.00000004.00000010.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
        Source: 00000005.00000002.1354476157.0000008837DB2000.00000004.00000010.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
        Source: C:\Windows\System32\wermgr.exeCode function: 6_3_0000026E033C52AD6_3_0000026E033C52AD
        Source: C:\Windows\System32\wermgr.exeCode function: 6_3_0000026E033C64DF6_3_0000026E033C64DF
        Source: C:\Windows\System32\wermgr.exeCode function: 6_3_0000026E033C49746_3_0000026E033C4974
        Source: C:\Windows\System32\wermgr.exeCode function: 6_2_0000026E034000006_2_0000026E03400000
        Source: C:\Windows\System32\wermgr.exeCode function: 6_2_0000026E037A201C6_2_0000026E037A201C
        Source: C:\Windows\System32\wermgr.exeCode function: 6_2_0000026E037A0EE46_2_0000026E037A0EE4
        Source: C:\Windows\System32\wermgr.exeCode function: 6_2_0000026E037986B06_2_0000026E037986B0
        Source: C:\Windows\System32\wermgr.exeCode function: 6_2_0000026E037A15A86_2_0000026E037A15A8
        Source: C:\Windows\System32\wermgr.exeCode function: 6_2_0000026E03796BB86_2_0000026E03796BB8
        Source: C:\Windows\System32\wermgr.exeCode function: 6_2_0000026E037ACC706_2_0000026E037ACC70
        Source: C:\Windows\System32\wermgr.exeCode function: 6_2_0000026E037AC3006_2_0000026E037AC300
        Source: C:\Windows\System32\wermgr.exeCode function: 6_2_0000026E0379F2286_2_0000026E0379F228
        Source: C:\Windows\System32\wermgr.exeCode function: 6_2_0000026E037991EF6_2_0000026E037991EF
        Source: C:\Windows\System32\wermgr.exeCode function: 6_2_0000026E037992976_2_0000026E03799297
        Source: C:\Windows\System32\wermgr.exeCode function: 7_3_0000015A06FB64DF7_3_0000015A06FB64DF
        Source: C:\Windows\System32\wermgr.exeCode function: 7_3_0000015A06FB49747_3_0000015A06FB4974
        Source: C:\Windows\System32\wermgr.exeCode function: 7_3_0000015A06FB52AD7_3_0000015A06FB52AD
        Source: C:\Windows\System32\wermgr.exeCode function: 7_2_0000015A06FF00007_2_0000015A06FF0000
        Source: C:\Windows\System32\wermgr.exeCode function: 7_2_0000015A072F15A87_2_0000015A072F15A8
        Source: C:\Windows\System32\wermgr.exeCode function: 7_2_0000015A072FCC707_2_0000015A072FCC70
        Source: C:\Windows\System32\wermgr.exeCode function: 7_2_0000015A072E6BB87_2_0000015A072E6BB8
        Source: C:\Windows\System32\wermgr.exeCode function: 7_2_0000015A072EF2287_2_0000015A072EF228
        Source: C:\Windows\System32\wermgr.exeCode function: 7_2_0000015A072E92977_2_0000015A072E9297
        Source: C:\Windows\System32\wermgr.exeCode function: 7_2_0000015A072FC3007_2_0000015A072FC300
        Source: C:\Windows\System32\wermgr.exeCode function: 7_2_0000015A072E91EF7_2_0000015A072E91EF
        Source: C:\Windows\System32\wermgr.exeCode function: 7_2_0000015A072F201C7_2_0000015A072F201C
        Source: C:\Windows\System32\wermgr.exeCode function: 7_2_0000015A072E86B07_2_0000015A072E86B0
        Source: C:\Windows\System32\wermgr.exeCode function: 7_2_0000015A072F0EE47_2_0000015A072F0EE4
        Source: C:\Windows\System32\wermgr.exeCode function: 10_3_000002963CDA497410_3_000002963CDA4974
        Source: C:\Windows\System32\wermgr.exeCode function: 10_3_000002963CDA64DF10_3_000002963CDA64DF
        Source: C:\Windows\System32\wermgr.exeCode function: 10_3_000002963CDA52AD10_3_000002963CDA52AD
        Source: C:\Windows\System32\wermgr.exeCode function: 10_2_000002963D08000010_2_000002963D080000
        Source: C:\Windows\System32\wermgr.exeCode function: 10_2_000002963D2315A810_2_000002963D2315A8
        Source: C:\Windows\System32\wermgr.exeCode function: 10_2_000002963D23CC7010_2_000002963D23CC70
        Source: C:\Windows\System32\wermgr.exeCode function: 10_2_000002963D230EE410_2_000002963D230EE4
        Source: C:\Windows\System32\wermgr.exeCode function: 10_2_000002963D2286B010_2_000002963D2286B0
        Source: C:\Windows\System32\wermgr.exeCode function: 10_2_000002963D23201C10_2_000002963D23201C
        Source: C:\Windows\System32\wermgr.exeCode function: 10_2_000002963D23C30010_2_000002963D23C300
        Source: C:\Windows\System32\wermgr.exeCode function: 10_2_000002963D226BB810_2_000002963D226BB8
        Source: C:\Windows\System32\wermgr.exeCode function: 10_2_000002963D2291EF10_2_000002963D2291EF
        Source: C:\Windows\System32\wermgr.exeCode function: 10_2_000002963D22F22810_2_000002963D22F228
        Source: C:\Windows\System32\wermgr.exeCode function: 10_2_000002963D22929710_2_000002963D229297
        Source: pwn.dll.dllStatic PE information: Number of sections : 21 > 10
        Source: 0000000A.00000002.2589449610.000002963D080000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
        Source: 00000006.00000002.2588676723.0000026E03400000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
        Source: 00000007.00000002.2588686195.0000015A06FF0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
        Source: 00000006.00000003.1354728332.0000026E033C0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
        Source: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
        Source: 00000004.00000002.1354786097.0000009707462000.00000004.00000010.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
        Source: 0000000A.00000003.1383681030.000002963CDA0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
        Source: 00000007.00000003.1354748088.0000015A06FB0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
        Source: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
        Source: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
        Source: 00000009.00000002.1383568977.00000013E3831000.00000004.00000010.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
        Source: 00000005.00000002.1354476157.0000008837DB2000.00000004.00000010.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
        Source: classification engineClassification label: mal100.troj.evad.winDLL@16/0@1/1
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7880:120:WilError_03
        Source: pwn.dll.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\pwn.dll.dll,LRDCP
        Source: pwn.dll.dllVirustotal: Detection: 19%
        Source: pwn.dll.dllReversingLabs: Detection: 47%
        Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\pwn.dll.dll"
        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\pwn.dll.dll",#1
        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\pwn.dll.dll,LRDCP
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\pwn.dll.dll",#1
        Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\wermgr.exe wermgr.exe
        Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\wermgr.exe wermgr.exe
        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\pwn.dll.dll",LRDCP
        Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\wermgr.exe wermgr.exe
        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\pwn.dll.dll",#1Jump to behavior
        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\pwn.dll.dll,LRDCPJump to behavior
        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\pwn.dll.dll",LRDCPJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\pwn.dll.dll",#1Jump to behavior
        Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\wermgr.exe wermgr.exeJump to behavior
        Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\wermgr.exe wermgr.exeJump to behavior
        Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\wermgr.exe wermgr.exeJump to behavior
        Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Windows\System32\loaddll64.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: pwn.dll.dllStatic PE information: Image base 0x366e90000 > 0x60000000
        Source: pwn.dll.dllStatic file information: File size 2961425 > 1048576
        Source: pwn.dll.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
        Source: pwn.dll.dllStatic PE information: section name: /4
        Source: pwn.dll.dllStatic PE information: section name: .xdata
        Source: pwn.dll.dllStatic PE information: section name: /14
        Source: pwn.dll.dllStatic PE information: section name: /29
        Source: pwn.dll.dllStatic PE information: section name: /41
        Source: pwn.dll.dllStatic PE information: section name: /55
        Source: pwn.dll.dllStatic PE information: section name: /67
        Source: pwn.dll.dllStatic PE information: section name: /80
        Source: pwn.dll.dllStatic PE information: section name: /91
        Source: pwn.dll.dllStatic PE information: section name: /107
        Source: pwn.dll.dllStatic PE information: section name: /123
        Source: C:\Windows\System32\wermgr.exeCode function: 6_3_0000026E033C47D2 push ss; retf 6_3_0000026E033C47D3
        Source: C:\Windows\System32\wermgr.exeCode function: 6_3_0000026E033C1FC1 push esi; ret 6_3_0000026E033C1FDD
        Source: C:\Windows\System32\wermgr.exeCode function: 6_3_0000026E033C6017 pushad ; iretd 6_3_0000026E033C6016
        Source: C:\Windows\System32\wermgr.exeCode function: 6_3_0000026E033C5455 push FFFFFF81h; retf 6_3_0000026E033C5457
        Source: C:\Windows\System32\wermgr.exeCode function: 6_3_0000026E033C5F76 pushad ; iretd 6_3_0000026E033C6016
        Source: C:\Windows\System32\wermgr.exeCode function: 6_3_0000026E033C15D8 push ebx; ret 6_3_0000026E033C15E5
        Source: C:\Windows\System32\wermgr.exeCode function: 6_3_0000026E033C220F push edi; ret 6_3_0000026E033C2211
        Source: C:\Windows\System32\wermgr.exeCode function: 6_3_0000026E033C65FE push ss; retf 6_3_0000026E033C6602
        Source: C:\Windows\System32\wermgr.exeCode function: 6_3_0000026E033C5D71 push FFFFFF81h; retf 6_3_0000026E033C5D73
        Source: C:\Windows\System32\wermgr.exeCode function: 6_2_0000026E03799009 push FFFFFF88h; retf 6_2_0000026E03799043
        Source: C:\Windows\System32\wermgr.exeCode function: 6_2_0000026E0378979E push cs; retf 6_2_0000026E0378979F
        Source: C:\Windows\System32\wermgr.exeCode function: 6_2_0000026E03798619 push edx; iretd 6_2_0000026E03798646
        Source: C:\Windows\System32\wermgr.exeCode function: 6_2_0000026E037995E8 pushad ; ret 6_2_0000026E037995F2
        Source: C:\Windows\System32\wermgr.exeCode function: 6_2_0000026E0378ADD8 push ebp; iretd 6_2_0000026E0378ADD9
        Source: C:\Windows\System32\wermgr.exeCode function: 6_2_0000026E037893DD push edi; iretd 6_2_0000026E037893DE
        Source: C:\Windows\System32\wermgr.exeCode function: 6_2_0000026E037994A7 push 9D2172B5h; iretd 6_2_0000026E037994A6
        Source: C:\Windows\System32\wermgr.exeCode function: 6_2_0000026E0379945D push 9D2172B5h; iretd 6_2_0000026E037994A6
        Source: C:\Windows\System32\wermgr.exeCode function: 6_2_0000026E037AA918 push ebp; iretd 6_2_0000026E037AA919
        Source: C:\Windows\System32\wermgr.exeCode function: 6_2_0000026E037AA8EF push ebp; iretd 6_2_0000026E037AA8F0
        Source: C:\Windows\System32\wermgr.exeCode function: 6_2_0000026E037AA8CF push ebp; iretd 6_2_0000026E037AA8D0
        Source: C:\Windows\System32\wermgr.exeCode function: 6_2_0000026E0378B99C pushad ; retf 6_2_0000026E0378B99D
        Source: C:\Windows\System32\wermgr.exeCode function: 6_2_0000026E0378F981 push ebx; iretd 6_2_0000026E0378F982
        Source: C:\Windows\System32\wermgr.exeCode function: 7_3_0000015A06FB5455 push FFFFFF81h; retf 7_3_0000015A06FB5457
        Source: C:\Windows\System32\wermgr.exeCode function: 7_3_0000015A06FB220F push edi; ret 7_3_0000015A06FB2211
        Source: C:\Windows\System32\wermgr.exeCode function: 7_3_0000015A06FB65FE push ss; retf 7_3_0000015A06FB6602
        Source: C:\Windows\System32\wermgr.exeCode function: 7_3_0000015A06FB15D8 push ebx; ret 7_3_0000015A06FB15E5
        Source: C:\Windows\System32\wermgr.exeCode function: 7_3_0000015A06FB5D71 push FFFFFF81h; retf 7_3_0000015A06FB5D73
        Source: C:\Windows\System32\wermgr.exeCode function: 7_3_0000015A06FB6017 pushad ; iretd 7_3_0000015A06FB6016
        Source: C:\Windows\System32\wermgr.exeCode function: 7_3_0000015A06FB47D2 push ss; retf 7_3_0000015A06FB47D3
        Source: C:\Windows\System32\wermgr.exeCode function: 7_3_0000015A06FB1FC1 push esi; ret 7_3_0000015A06FB1FDD
        Source: C:\Windows\System32\wermgr.exeCode function: 7_3_0000015A06FB5F76 pushad ; iretd 7_3_0000015A06FB6016
        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\loaddll64.exe TID: 7876Thread sleep time: -120000s >= -30000sJump to behavior
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\wermgr.exeLast function: Thread delayed
        Source: C:\Windows\System32\wermgr.exeLast function: Thread delayed
        Source: C:\Windows\System32\wermgr.exeLast function: Thread delayed
        Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000Jump to behavior
        Source: wermgr.exe, 0000000A.00000002.2588786427.000002963CE00000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
        Source: wermgr.exe, 00000006.00000002.2588861671.0000026E0350C000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 00000006.00000002.2588861671.0000026E0357F000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 00000007.00000002.2588821962.0000015A07069000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 00000007.00000003.1814771239.0000015A070E2000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 00000007.00000002.2588821962.0000015A070DE000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 00000007.00000002.2588821962.0000015A070E2000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 0000000A.00000003.2265711351.000002963CE85000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: wermgr.exe, 0000000A.00000003.2265711351.000002963CE85000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWG

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Windows\System32\rundll32.exeMemory allocated: C:\Windows\System32\wermgr.exe base: 15A06FB0000 protect: page execute and read and writeJump to behavior
        Source: C:\Windows\System32\rundll32.exeMemory allocated: C:\Windows\System32\wermgr.exe base: 26E033C0000 protect: page execute and read and writeJump to behavior
        Source: C:\Windows\System32\rundll32.exeMemory allocated: C:\Windows\System32\wermgr.exe base: 2963CDA0000 protect: page execute and read and writeJump to behavior
        Source: C:\Windows\System32\rundll32.exeThread created: C:\Windows\System32\wermgr.exe EIP: 6FB0000Jump to behavior
        Source: C:\Windows\System32\rundll32.exeThread created: C:\Windows\System32\wermgr.exe EIP: 33C0000Jump to behavior
        Source: C:\Windows\System32\rundll32.exeThread created: C:\Windows\System32\wermgr.exe EIP: 3CDA0000Jump to behavior
        Source: C:\Windows\System32\rundll32.exeMemory written: C:\Windows\System32\wermgr.exe base: 15A06FB0000Jump to behavior
        Source: C:\Windows\System32\rundll32.exeMemory written: C:\Windows\System32\wermgr.exe base: 26E033C0000Jump to behavior
        Source: C:\Windows\System32\rundll32.exeMemory written: C:\Windows\System32\wermgr.exe base: 2963CDA0000Jump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\pwn.dll.dll",#1Jump to behavior
        Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\wermgr.exe wermgr.exeJump to behavior
        Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\wermgr.exe wermgr.exeJump to behavior
        Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\wermgr.exe wermgr.exeJump to behavior
        Source: C:\Windows\System32\wermgr.exeCode function: 6_2_0000026E03794EA8 GetUserNameA,strrchr,_snprintf,6_2_0000026E03794EA8

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000006.00000003.1354728332.0000026E033C0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.1354786097.0000009707462000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000003.1383681030.000002963CDA0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000003.1354748088.0000015A06FB0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.1383568977.00000013E3831000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.1354476157.0000008837DB2000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000002.2589449610.000002963D080000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.2588676723.0000026E03400000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2588686195.0000015A06FF0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7972, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7988, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: wermgr.exe PID: 8020, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: wermgr.exe PID: 8012, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 8176, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: wermgr.exe PID: 7172, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
        DLL Side-Loading
        311
        Process Injection
        11
        Virtualization/Sandbox Evasion
        OS Credential Dumping1
        Security Software Discovery
        Remote Services1
        Archive Collected Data
        12
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        DLL Side-Loading
        311
        Process Injection
        LSASS Memory11
        Virtualization/Sandbox Evasion
        Remote Desktop ProtocolData from Removable Media1
        Non-Application Layer Protocol
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
        Obfuscated Files or Information
        Security Account Manager1
        Account Discovery
        SMB/Windows Admin SharesData from Network Shared Drive12
        Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        Rundll32
        NTDS1
        System Owner/User Discovery
        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        DLL Side-Loading
        LSA Secrets1
        System Information Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1580305 Sample: pwn.dll.exe Startdate: 24/12/2024 Architecture: WINDOWS Score: 100 30 www.service-ad.pro 2->30 34 Found malware configuration 2->34 36 Malicious sample detected (through community Yara rule) 2->36 38 Multi AV Scanner detection for submitted file 2->38 40 3 other signatures 2->40 9 loaddll64.exe 1 2->9         started        signatures3 process4 process5 11 cmd.exe 1 9->11         started        13 rundll32.exe 9->13         started        16 rundll32.exe 9->16         started        18 conhost.exe 9->18         started        signatures6 20 rundll32.exe 11->20         started        48 Writes to foreign memory regions 13->48 50 Allocates memory in foreign processes 13->50 52 Creates a thread in another existing process (thread injection) 13->52 23 wermgr.exe 13->23         started        25 wermgr.exe 16->25         started        process7 signatures8 42 Writes to foreign memory regions 20->42 44 Allocates memory in foreign processes 20->44 46 Creates a thread in another existing process (thread injection) 20->46 27 wermgr.exe 20->27         started        process9 dnsIp10 32 www.service-ad.pro 54.173.64.206, 443, 49717, 49718 AMAZON-AESUS United States 27->32

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        pwn.dll.dll19%VirustotalBrowse
        pwn.dll.dll47%ReversingLabsWin64.Backdoor.Cobeacon
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        https://www.service-ad.pro/sub/ccs/NDNZH1WD1_v0%Avira URL Cloudsafe
        https://www.service-ad.pro/T0%Avira URL Cloudsafe
        https://www.service-ad.pro/sub/ccs/NDNZH1WD1tography0%Avira URL Cloudsafe
        https://www.service-ad.pro/sub/ccs/NDNZH1WD1-53011b87bd06ndows0%Avira URL Cloudsafe
        https://www.service-ad.pro/sub/ccs/NDNZH1WD1J0%Avira URL Cloudsafe
        https://www.service-ad.pro/sub/ccs/NDNZH1WD1sH0%Avira URL Cloudsafe
        https://www.service-ad.pro/sub/ccs/NDNZH1WD10%Avira URL Cloudsafe
        https://www.service-ad.pro/sub/ccs/NDNZH1WD1RG0%Avira URL Cloudsafe
        https://www.service-ad.pro/:ji0%Avira URL Cloudsafe
        https://www.service-ad.pro/pg0%Avira URL Cloudsafe
        https://www.service-ad.pro/phy0%Avira URL Cloudsafe
        https://www.service-ad.pro/sub/ccs/NDNZH1WD1246120%Avira URL Cloudsafe
        https://www.service-ad.pro/sub/ccs/NDNZH1WD1Lg0%Avira URL Cloudsafe
        https://www.service-ad.pro/sub/ccs/NDNZH1WD1%G40%Avira URL Cloudsafe
        https://www.service-ad.pro/0%Avira URL Cloudsafe
        https://www.service-ad.pro/(0%Avira URL Cloudsafe
        https://www.service-ad.pro/ControlSet0%Avira URL Cloudsafe
        www.service-ad.pro0%Avira URL Cloudsafe
        https://www.service-ad.pro/sub/ccs/NDNZH1WD10b1d0%Avira URL Cloudsafe
        https://www.service-ad.pro/sub/ccs/NDNZH1WD1ui0%Avira URL Cloudsafe
        https://www.service-ad.pro/sub/ccs/NDNZH1WD1/vJ0%Avira URL Cloudsafe
        https://www.service-ad.pro/sub/ccs/NDNZH1WD1p0%Avira URL Cloudsafe
        https://www.service-ad.pro/sub/ccs/NDNZH1WD15cc0%Avira URL Cloudsafe
        https://www.service-ad.pro/sub/ccs/NDNZH1WD19X40%Avira URL Cloudsafe
        https://www.service-ad.pro/sub/ccs/NDNZH1WD1(g50%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        s-part-0035.t-0009.t-msedge.net
        13.107.246.63
        truefalse
          high
          www.service-ad.pro
          54.173.64.206
          truetrue
            unknown
            NameMaliciousAntivirus DetectionReputation
            www.service-ad.protrue
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://www.service-ad.pro/Twermgr.exe, 00000006.00000002.2588861671.0000026E0350C000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.service-ad.pro/sub/ccs/NDNZH1WD1wermgr.exe, 00000007.00000002.2588821962.0000015A070BD000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 00000007.00000002.2588821962.0000015A070AC000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 0000000A.00000002.2588786427.000002963CE67000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 0000000A.00000003.1824931429.000002963CE4D000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 0000000A.00000002.2588786427.000002963CE4D000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 0000000A.00000002.2588786427.000002963CE00000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.service-ad.pro/sub/ccs/NDNZH1WD1tographywermgr.exe, 00000006.00000002.2588861671.0000026E0355F000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.service-ad.pro/sub/ccs/NDNZH1WD1RGwermgr.exe, 0000000A.00000003.1824931429.000002963CE4D000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 0000000A.00000002.2588786427.000002963CE4D000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.service-ad.pro/sub/ccs/NDNZH1WD1sHwermgr.exe, 00000006.00000002.2588861671.0000026E0354F000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.service-ad.pro/sub/ccs/NDNZH1WD1-53011b87bd06ndowswermgr.exe, 0000000A.00000002.2588786427.000002963CE67000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.service-ad.pro/sub/ccs/NDNZH1WD1_vwermgr.exe, 00000006.00000002.2588861671.0000026E0355F000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.service-ad.pro/:jiwermgr.exe, 0000000A.00000002.2588786427.000002963CE5D000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 0000000A.00000003.2265711351.000002963CE5D000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 0000000A.00000003.1824931429.000002963CE5D000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.service-ad.pro/pgwermgr.exe, 0000000A.00000002.2588786427.000002963CE67000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 0000000A.00000003.2265711351.000002963CE5D000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 0000000A.00000003.1824931429.000002963CE5D000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.service-ad.pro/sub/ccs/NDNZH1WD1Jwermgr.exe, 00000007.00000002.2588821962.0000015A07069000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.service-ad.pro/wermgr.exe, 00000006.00000002.2588861671.0000026E0355F000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 00000006.00000002.2588861671.0000026E0350C000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 00000006.00000003.2255143942.0000026E0355F000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 00000006.00000003.1814770599.0000026E0355F000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 00000007.00000002.2588821962.0000015A07069000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 00000007.00000002.2588821962.0000015A070BD000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 00000007.00000003.1814771239.0000015A070C8000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 00000007.00000003.2255409316.0000015A070C8000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 0000000A.00000002.2588786427.000002963CE5D000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 0000000A.00000002.2588786427.000002963CE67000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 0000000A.00000003.2265711351.000002963CE5D000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 0000000A.00000003.1824931429.000002963CE5D000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.service-ad.pro/phywermgr.exe, 00000006.00000002.2588861671.0000026E0350C000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 00000007.00000002.2588821962.0000015A07069000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.service-ad.pro/sub/ccs/NDNZH1WD1%G4wermgr.exe, 0000000A.00000002.2588786427.000002963CE4D000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.service-ad.pro/(wermgr.exe, 00000006.00000002.2588861671.0000026E0350C000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.service-ad.pro/sub/ccs/NDNZH1WD10b1dwermgr.exe, 0000000A.00000003.1824931429.000002963CE4D000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 0000000A.00000002.2588786427.000002963CE4D000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.service-ad.pro/sub/ccs/NDNZH1WD124612wermgr.exe, 00000006.00000002.2588861671.0000026E0350C000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.service-ad.pro/ControlSetwermgr.exe, 00000007.00000002.2588821962.0000015A07069000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.service-ad.pro/sub/ccs/NDNZH1WD1uiwermgr.exe, 00000007.00000002.2588821962.0000015A070BD000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.service-ad.pro/sub/ccs/NDNZH1WD1Lgwermgr.exe, 0000000A.00000002.2588786427.000002963CE67000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.service-ad.pro/sub/ccs/NDNZH1WD1/vJwermgr.exe, 00000006.00000002.2588861671.0000026E0355F000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.service-ad.pro/sub/ccs/NDNZH1WD1pwermgr.exe, 0000000A.00000002.2588786427.000002963CE00000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.service-ad.pro/sub/ccs/NDNZH1WD1(g5wermgr.exe, 0000000A.00000002.2588786427.000002963CE67000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.service-ad.pro/sub/ccs/NDNZH1WD15ccwermgr.exe, 00000006.00000002.2588861671.0000026E0350C000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.service-ad.pro/sub/ccs/NDNZH1WD19X4wermgr.exe, 0000000A.00000002.2588786427.000002963CE4D000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            54.173.64.206
            www.service-ad.proUnited States
            14618AMAZON-AESUStrue
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1580305
            Start date and time:2024-12-24 09:04:27 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 5m 6s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:15
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:pwn.dll.dll
            (renamed file extension from exe to dll)
            Original Sample Name:pwn.dll.exe
            Detection:MAL
            Classification:mal100.troj.evad.winDLL@16/0@1/1
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 83%
            • Number of executed functions: 15
            • Number of non-executed functions: 99
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
            • Excluded IPs from analysis (whitelisted): 13.107.246.63, 172.202.163.200
            • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            TimeTypeDescription
            03:05:22API Interceptor1x Sleep call for process: loaddll64.exe modified
            03:06:49API Interceptor3x Sleep call for process: wermgr.exe modified
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            s-part-0035.t-0009.t-msedge.net7kf4hLzMoS.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
            • 13.107.246.63
            2S5jaCcFo5.exeGet hashmaliciousUnknownBrowse
            • 13.107.246.63
            QDQXUZhiY3.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
            • 13.107.246.63
            https://en.newsnowbangla.com/archives/69912Get hashmaliciousHTMLPhisher, TechSupportScamBrowse
            • 13.107.246.63
            https://flowto.it/8tooc2sec?fc=0Get hashmaliciousUnknownBrowse
            • 13.107.246.63
            Onboard Training Checklist v1.1 - Wyatt Young (1).xlsxGet hashmaliciousUnknownBrowse
            • 13.107.246.63
            vFile__0054seconds__Airborn.htmlGet hashmaliciousHTMLPhisherBrowse
            • 13.107.246.63
            https://jkqbjwq.maxiite.comGet hashmaliciousHTMLPhisherBrowse
            • 13.107.246.63
            https://jkqbjwq.maxiite.comGet hashmaliciousHTMLPhisherBrowse
            • 13.107.246.63
            https://jkqbjwq.maxiite.comGet hashmaliciousHTMLPhisherBrowse
            • 13.107.246.63
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            AMAZON-AESUSGq48hjKhZf.exeGet hashmaliciousLodaRATBrowse
            • 3.5.8.193
            x6Rd1DzUJA.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
            • 34.226.108.155
            SzXZZDlkVE.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
            • 34.226.108.155
            ijn8pyFXSP.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
            • 34.226.108.155
            WzyLDvldFI.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
            • 34.226.108.155
            PhwUGyok2i.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
            • 34.226.108.155
            nRYpZg6i5E.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
            • 34.226.108.155
            RGU8qibimk.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
            • 34.226.108.155
            FMuiLqyqaT.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
            • 34.226.108.155
            iaLId0uLUw.exeGet hashmaliciousLummaCBrowse
            • 3.5.17.0
            No context
            No context
            No created / dropped files found
            File type:PE32+ executable (DLL) (console) x86-64, for MS Windows
            Entropy (8bit):6.249570982937299
            TrID:
            • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
            • Win64 Executable (generic) (12005/4) 10.17%
            • Generic Win/DOS Executable (2004/3) 1.70%
            • DOS Executable Generic (2002/1) 1.70%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
            File name:pwn.dll.dll
            File size:2'961'425 bytes
            MD5:2f8dd834b75bbf2ebf0be0b114c77521
            SHA1:32e1a98a551916f1ace9e2ff3018fa065122ba71
            SHA256:31a2bd9b628a18a8e38d0a125bd56d958c9cb097da214d67560f8caae1a84032
            SHA512:498bea3e769f021958f8ec3d397f354bc5374417491b5d5b538f80d2605c5a2676bb2ef4d5e0bcf026acc3ebff17e85f48b5e86ebecad87f536d81697e3bc2e0
            SSDEEP:49152:SiEC6uOSWZ/pFnvkp8rHNClssJn1Q8FXpoEzgf7fA:FbspFnvkp1s4XpoEzgf7fA
            TLSH:27D5094369DB0DA5DED677BCA2C35335A778FD35CA291F2BAA08C13129536C4AD1EB00
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....Acg.z........& ...*.......................f.............................`........-...`... ............................
            Icon Hash:7ae282899bbab082
            Entrypoint:0x366e91292
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x366e90000
            Subsystem:windows cui
            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LARGE_ADDRESS_AWARE, DLL
            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
            Time Stamp:0x676341AA [Wed Dec 18 21:42:02 2024 UTC]
            TLS Callbacks:0x66e9b560, 0x3, 0x66e9b620, 0x3, 0x66eaa3ee, 0x3
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:9c0bc9bd0a50ec0d7df40f8d51bcddec
            Instruction
            push ebp
            dec eax
            mov ebp, esp
            dec eax
            sub esp, 20h
            dec eax
            mov dword ptr [ebp+10h], ecx
            mov dword ptr [ebp+18h], edx
            dec esp
            mov dword ptr [ebp+20h], eax
            dec eax
            mov eax, dword ptr [00114014h]
            mov dword ptr [eax], 00000000h
            dec eax
            mov ecx, dword ptr [ebp+20h]
            mov edx, dword ptr [ebp+18h]
            dec eax
            mov eax, dword ptr [ebp+10h]
            dec ecx
            mov eax, ecx
            dec eax
            mov ecx, eax
            call 00007F6A4CD34A9Bh
            dec eax
            add esp, 20h
            pop ebp
            ret
            push ebp
            dec eax
            mov ebp, esp
            dec eax
            sub esp, 30h
            dec eax
            mov dword ptr [ebp+10h], ecx
            mov dword ptr [ebp+18h], edx
            dec esp
            mov dword ptr [ebp+20h], eax
            mov dword ptr [ebp-04h], 00000001h
            dec eax
            mov eax, dword ptr [00113FF1h]
            mov edx, dword ptr [ebp+18h]
            mov dword ptr [eax], edx
            cmp dword ptr [ebp+18h], 00000000h
            jne 00007F6A4CD34AA8h
            mov eax, dword ptr [0013FD00h]
            test eax, eax
            jne 00007F6A4CD34A9Eh
            mov dword ptr [ebp-04h], 00000000h
            jmp 00007F6A4CD34BD6h
            call 00007F6A4CD3F5E8h
            cmp dword ptr [ebp+18h], 01h
            je 00007F6A4CD34A98h
            cmp dword ptr [ebp+18h], 02h
            jne 00007F6A4CD34AFBh
            dec eax
            mov ecx, dword ptr [ebp+20h]
            mov edx, dword ptr [ebp+18h]
            dec eax
            mov eax, dword ptr [ebp+10h]
            dec ecx
            mov eax, ecx
            dec eax
            mov ecx, eax
            call 00007F6A4CD3477Bh
            mov dword ptr [ebp-04h], eax
            cmp dword ptr [ebp-04h], 00000000h
            je 00007F6A4CD34B9Ch
            dec eax
            mov ecx, dword ptr [ebp+20h]
            mov edx, dword ptr [ebp+18h]
            dec eax
            mov eax, dword ptr [ebp+10h]
            dec ecx
            mov eax, ecx
            dec eax
            mov ecx, eax
            call 00007F6A4CD4075Bh
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x1420000x40.edata
            IMAGE_DIRECTORY_ENTRY_IMPORT0x1430000x190c.idata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1230000xc12c.pdata
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1470000x1640.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x113cc00x28.rdata
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x1436480x530.idata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000xbea280xbec000a9355d24f0e54ef3995145ebeb79915False0.3478879116153342data6.139638316650916IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .data0xc00000x30800x3200d7d25c99683f900c18ca46358cdaf886False0.02796875dBase III DBT, version number 0, next free block index 1, 1st item "\320-\353f\003"0.3744154107590934IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .rdata0xc40000x5d4f00x5d600eab27f141125611bb26524ef6550575bFalse0.7583171226572959data7.643759419563151IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            /40x1220000x40x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .pdata0x1230000xc12c0xc200cd7b0492f8a8f1c8f2ebf7a96cc64817False0.5144772873711341data5.949220732775683IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .xdata0x1300000x10bf00x10c00add6697e8161d4ff7ad3fd3da3f32ae8False0.18661089085820895, SYS \003\001P4.886387418702516IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .bss0x1410000xd200x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .edata0x1420000x400x2004b01f7ea2691d093afa17124eeb17546False0.119140625data0.6720558129187144IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .idata0x1430000x190c0x1a00433be6924348010807170ccdcfb26697False0.3046875data4.3852150569721156IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .CRT0x1450000x600x20058d7a8c2e21102f787b5225a72e0a126False0.068359375data0.345979103835012IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .tls0x1460000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .reloc0x1470000x16400x1800a07e6e96b1231be730509c2d725e41ddFalse0.3894856770833333data5.325942218419584IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            /140x1490000xd00x200e69c9c5c78c1b91a826abcec04b38c2bFalse0.158203125data0.8801018156738997IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            /290x14a0000x46f90x4800d77bfc4f43021a61a2ec944cc68856c3False0.3791775173611111Matlab v4 mat-file (little endian) f\003, rows 134283269, columns 0, imaginary5.867887116880315IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            /410x14f0000x8a50xa008c412e1ec809bc2d22840ac0c0dd9436False0.326953125data4.517567710861818IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            /550x1500000x97f0xa00d285d6cd0db463fcb80331454a301ba0False0.541015625data4.818092440198135IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            /670x1510000x4980x60005aaae4054744240010da927faed8496False0.3470052083333333data3.2931908827991117IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            /800x1520000xce0x200292217cd9caa0647d900f44faf753dd5False0.34375data2.8722615854557496IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            /910x1530000x4610x60075a450f8317627827fe1cca60ebb0ae6False0.181640625data4.17072784657899IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            /1070x1540000x88b0xa00fb732459dfa7f47d77bcbc5dc4c8ca68False0.399609375data4.243449352096334IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            /1230x1550000x1080x200d2c23f33ed4b9902afd81a6cb72499dbFalse0.291015625data2.5304828581562533IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            DLLImport
            KERNEL32.dllAddVectoredExceptionHandler, CloseHandle, CreateEventA, CreateProcessA, CreateRemoteThread, CreateSemaphoreA, DeleteCriticalSection, DuplicateHandle, EnterCriticalSection, FormatMessageA, FreeLibrary, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetHandleInformation, GetLastError, GetModuleHandleA, GetProcAddress, GetProcessAffinityMask, GetSystemTimeAsFileTime, GetThreadContext, GetThreadPriority, GetTickCount64, InitializeCriticalSection, IsDebuggerPresent, LeaveCriticalSection, LoadLibraryA, LocalFree, MultiByteToWideChar, OpenProcess, OutputDebugStringA, RaiseException, ReleaseSemaphore, RemoveVectoredExceptionHandler, ResetEvent, ResumeThread, RtlCaptureContext, RtlLookupFunctionEntry, RtlUnwindEx, RtlVirtualUnwind, SetEvent, SetLastError, SetProcessAffinityMask, SetThreadContext, SetThreadPriority, Sleep, SuspendThread, TlsAlloc, TlsGetValue, TlsSetValue, TryEnterCriticalSection, VirtualAllocEx, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WideCharToMultiByte, WriteProcessMemory, __C_specific_handler
            api-ms-win-crt-convert-l1-1-0.dll_ultoa, mbrtowc, strtoul, wcrtomb
            api-ms-win-crt-environment-l1-1-0.dll__p__environ, __p__wenviron, getenv
            api-ms-win-crt-filesystem-l1-1-0.dll_fstat64
            api-ms-win-crt-heap-l1-1-0.dll_set_new_mode, calloc, free, malloc, realloc
            api-ms-win-crt-locale-l1-1-0.dll___lc_codepage_func, ___mb_cur_max_func, localeconv, setlocale
            api-ms-win-crt-math-l1-1-0.dll_fdopen
            api-ms-win-crt-private-l1-1-0.dll__intrinsic_setjmpex, longjmp, memchr, memcmp, memcpy, memmove, strchr
            api-ms-win-crt-runtime-l1-1-0.dll__p___argc, __p___argv, __p___wargv, _beginthreadex, _configure_narrow_argv, _configure_wide_argv, _crt_at_quick_exit, _crt_atexit, _endthreadex, _errno, _execute_onexit_table, _exit, _initialize_narrow_environment, _initialize_onexit_table, _initialize_wide_environment, _initterm, _register_onexit_function, abort, exit, signal, strerror
            api-ms-win-crt-stdio-l1-1-0.dll__acrt_iob_func, __stdio_common_vfprintf, __stdio_common_vfwprintf, __stdio_common_vsprintf, __stdio_common_vswprintf, _fileno, _fseeki64, _ftelli64, _lseeki64, _read, _wfopen, _write, fclose, fflush, fgetwc, fopen, fputc, fputs, fread, fwrite, getc, getwc, putc, putwc, setvbuf, ungetc, ungetwc
            api-ms-win-crt-string-l1-1-0.dll_strdup, iswctype, memset, strcmp, strcoll, strlen, strncmp, strxfrm, towlower, towupper, wcscoll, wcslen, wcsxfrm
            api-ms-win-crt-time-l1-1-0.dll__daylight, __timezone, __tzname, _tzset, strftime, wcsftime
            api-ms-win-crt-utility-l1-1-0.dllrand_s
            NameOrdinalAddress
            LRDCP10x366e915a0
            TimestampSource PortDest PortSource IPDest IP
            Dec 24, 2024 09:05:22.564690113 CET49717443192.168.2.954.173.64.206
            Dec 24, 2024 09:05:22.564724922 CET4434971754.173.64.206192.168.2.9
            Dec 24, 2024 09:05:22.564836025 CET49717443192.168.2.954.173.64.206
            Dec 24, 2024 09:05:22.565562010 CET49718443192.168.2.954.173.64.206
            Dec 24, 2024 09:05:22.565607071 CET4434971854.173.64.206192.168.2.9
            Dec 24, 2024 09:05:22.565671921 CET49718443192.168.2.954.173.64.206
            Dec 24, 2024 09:05:22.597518921 CET49717443192.168.2.954.173.64.206
            Dec 24, 2024 09:05:22.597536087 CET4434971754.173.64.206192.168.2.9
            Dec 24, 2024 09:05:22.597542048 CET49718443192.168.2.954.173.64.206
            Dec 24, 2024 09:05:22.597558975 CET4434971854.173.64.206192.168.2.9
            Dec 24, 2024 09:05:23.599489927 CET49719443192.168.2.954.173.64.206
            Dec 24, 2024 09:05:23.599529028 CET4434971954.173.64.206192.168.2.9
            Dec 24, 2024 09:05:23.599647045 CET49719443192.168.2.954.173.64.206
            Dec 24, 2024 09:05:23.610647917 CET49719443192.168.2.954.173.64.206
            Dec 24, 2024 09:05:23.610663891 CET4434971954.173.64.206192.168.2.9
            Dec 24, 2024 09:06:06.634749889 CET4434971854.173.64.206192.168.2.9
            Dec 24, 2024 09:06:06.634751081 CET4434971754.173.64.206192.168.2.9
            Dec 24, 2024 09:06:06.634865999 CET49717443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:06.635004997 CET49717443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:06.635010958 CET49718443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:06.635010958 CET49718443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:06.635021925 CET4434971754.173.64.206192.168.2.9
            Dec 24, 2024 09:06:06.644053936 CET49817443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:06.644088984 CET4434981754.173.64.206192.168.2.9
            Dec 24, 2024 09:06:06.644155025 CET49817443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:06.644490004 CET49817443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:06.644499063 CET4434981754.173.64.206192.168.2.9
            Dec 24, 2024 09:06:06.651016951 CET49818443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:06.651071072 CET4434981854.173.64.206192.168.2.9
            Dec 24, 2024 09:06:06.651158094 CET49818443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:06.651364088 CET49818443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:06.651385069 CET4434981854.173.64.206192.168.2.9
            Dec 24, 2024 09:06:06.940416098 CET49718443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:06.940460920 CET4434971854.173.64.206192.168.2.9
            Dec 24, 2024 09:06:07.648211002 CET4434971954.173.64.206192.168.2.9
            Dec 24, 2024 09:06:07.648300886 CET49719443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:07.648426056 CET49719443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:07.648446083 CET4434971954.173.64.206192.168.2.9
            Dec 24, 2024 09:06:07.667735100 CET49823443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:07.667781115 CET4434982354.173.64.206192.168.2.9
            Dec 24, 2024 09:06:07.667897940 CET49823443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:07.668205976 CET49823443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:07.668224096 CET4434982354.173.64.206192.168.2.9
            Dec 24, 2024 09:06:50.664397955 CET4434981854.173.64.206192.168.2.9
            Dec 24, 2024 09:06:50.667525053 CET49818443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:50.667622089 CET49818443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:50.667634964 CET4434981854.173.64.206192.168.2.9
            Dec 24, 2024 09:06:50.673118114 CET49921443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:50.673150063 CET4434992154.173.64.206192.168.2.9
            Dec 24, 2024 09:06:50.673216105 CET49921443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:50.673273087 CET49921443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:50.673299074 CET4434992154.173.64.206192.168.2.9
            Dec 24, 2024 09:06:50.673603058 CET49921443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:50.695779085 CET4434981754.173.64.206192.168.2.9
            Dec 24, 2024 09:06:50.695847034 CET49817443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:50.695924997 CET49817443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:50.695936918 CET4434981754.173.64.206192.168.2.9
            Dec 24, 2024 09:06:50.712044954 CET49922443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:50.712074041 CET4434992254.173.64.206192.168.2.9
            Dec 24, 2024 09:06:50.712142944 CET49922443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:50.712177992 CET49922443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:50.712229013 CET4434992254.173.64.206192.168.2.9
            Dec 24, 2024 09:06:50.712460995 CET49922443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:50.801861048 CET49923443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:50.801923037 CET4434992354.173.64.206192.168.2.9
            Dec 24, 2024 09:06:50.802051067 CET49923443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:50.802333117 CET49923443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:50.802347898 CET4434992354.173.64.206192.168.2.9
            Dec 24, 2024 09:06:50.833062887 CET49924443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:50.833122015 CET4434992454.173.64.206192.168.2.9
            Dec 24, 2024 09:06:50.833235979 CET49924443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:50.833554029 CET49924443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:50.833568096 CET4434992454.173.64.206192.168.2.9
            Dec 24, 2024 09:06:51.727015018 CET4434982354.173.64.206192.168.2.9
            Dec 24, 2024 09:06:51.727106094 CET49823443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:51.727207899 CET49823443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:51.727229118 CET4434982354.173.64.206192.168.2.9
            Dec 24, 2024 09:06:51.730047941 CET49927443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:51.730156898 CET4434992754.173.64.206192.168.2.9
            Dec 24, 2024 09:06:51.730249882 CET49927443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:51.730320930 CET49927443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:51.730391026 CET4434992754.173.64.206192.168.2.9
            Dec 24, 2024 09:06:51.730442047 CET49927443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:51.849788904 CET49928443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:51.849809885 CET4434992854.173.64.206192.168.2.9
            Dec 24, 2024 09:06:51.849865913 CET49928443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:51.850275040 CET49928443192.168.2.954.173.64.206
            Dec 24, 2024 09:06:51.850282907 CET4434992854.173.64.206192.168.2.9
            TimestampSource PortDest PortSource IPDest IP
            Dec 24, 2024 09:05:22.212398052 CET5817553192.168.2.91.1.1.1
            Dec 24, 2024 09:05:22.547111988 CET53581751.1.1.1192.168.2.9
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Dec 24, 2024 09:05:22.212398052 CET192.168.2.91.1.1.10xa9e6Standard query (0)www.service-ad.proA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Dec 24, 2024 09:05:16.384417057 CET1.1.1.1192.168.2.90xe39fNo error (0)shed.dual-low.s-part-0035.t-0009.t-msedge.nets-part-0035.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
            Dec 24, 2024 09:05:16.384417057 CET1.1.1.1192.168.2.90xe39fNo error (0)s-part-0035.t-0009.t-msedge.net13.107.246.63A (IP address)IN (0x0001)false
            Dec 24, 2024 09:05:22.547111988 CET1.1.1.1192.168.2.90xa9e6No error (0)www.service-ad.pro54.173.64.206A (IP address)IN (0x0001)false

            Click to jump to process

            Click to jump to process

            Click to jump to process

            Target ID:0
            Start time:03:05:18
            Start date:24/12/2024
            Path:C:\Windows\System32\loaddll64.exe
            Wow64 process (32bit):false
            Commandline:loaddll64.exe "C:\Users\user\Desktop\pwn.dll.dll"
            Imagebase:0x7ff607b70000
            File size:165'888 bytes
            MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:1
            Start time:03:05:19
            Start date:24/12/2024
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff70f010000
            File size:862'208 bytes
            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:3
            Start time:03:05:19
            Start date:24/12/2024
            Path:C:\Windows\System32\cmd.exe
            Wow64 process (32bit):false
            Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\pwn.dll.dll",#1
            Imagebase:0x7ff656220000
            File size:289'792 bytes
            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:4
            Start time:03:05:19
            Start date:24/12/2024
            Path:C:\Windows\System32\rundll32.exe
            Wow64 process (32bit):false
            Commandline:rundll32.exe C:\Users\user\Desktop\pwn.dll.dll,LRDCP
            Imagebase:0x7ff752900000
            File size:71'680 bytes
            MD5 hash:EF3179D498793BF4234F708D3BE28633
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_CobaltStrike_2, Description: Yara detected CobaltStrike, Source: 00000004.00000002.1354786097.0000009707462000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000004.00000002.1354786097.0000009707462000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000004.00000002.1354786097.0000009707462000.00000004.00000010.00020000.00000000.sdmp, Author: unknown
            Reputation:high
            Has exited:true

            Target ID:5
            Start time:03:05:19
            Start date:24/12/2024
            Path:C:\Windows\System32\rundll32.exe
            Wow64 process (32bit):false
            Commandline:rundll32.exe "C:\Users\user\Desktop\pwn.dll.dll",#1
            Imagebase:0x7ff752900000
            File size:71'680 bytes
            MD5 hash:EF3179D498793BF4234F708D3BE28633
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_CobaltStrike_2, Description: Yara detected CobaltStrike, Source: 00000005.00000002.1354476157.0000008837DB2000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000005.00000002.1354476157.0000008837DB2000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000005.00000002.1354476157.0000008837DB2000.00000004.00000010.00020000.00000000.sdmp, Author: unknown
            Reputation:high
            Has exited:true

            Target ID:6
            Start time:03:05:19
            Start date:24/12/2024
            Path:C:\Windows\System32\wermgr.exe
            Wow64 process (32bit):false
            Commandline:wermgr.exe
            Imagebase:0x7ff61efb0000
            File size:229'728 bytes
            MD5 hash:74A0194782E039ACE1F7349544DC1CF4
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000006.00000002.2588676723.0000026E03400000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000006.00000002.2588676723.0000026E03400000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_CobaltStrike_2, Description: Yara detected CobaltStrike, Source: 00000006.00000003.1354728332.0000026E033C0000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000006.00000003.1354728332.0000026E033C0000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000006.00000003.1354728332.0000026E033C0000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
            Reputation:moderate
            Has exited:false

            Target ID:7
            Start time:03:05:19
            Start date:24/12/2024
            Path:C:\Windows\System32\wermgr.exe
            Wow64 process (32bit):false
            Commandline:wermgr.exe
            Imagebase:0x7ff61efb0000
            File size:229'728 bytes
            MD5 hash:74A0194782E039ACE1F7349544DC1CF4
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000007.00000002.2588686195.0000015A06FF0000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000007.00000002.2588686195.0000015A06FF0000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_CobaltStrike_2, Description: Yara detected CobaltStrike, Source: 00000007.00000003.1354748088.0000015A06FB0000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000007.00000003.1354748088.0000015A06FB0000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000007.00000003.1354748088.0000015A06FB0000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
            Reputation:moderate
            Has exited:false

            Target ID:9
            Start time:03:05:22
            Start date:24/12/2024
            Path:C:\Windows\System32\rundll32.exe
            Wow64 process (32bit):false
            Commandline:rundll32.exe "C:\Users\user\Desktop\pwn.dll.dll",LRDCP
            Imagebase:0x7ff752900000
            File size:71'680 bytes
            MD5 hash:EF3179D498793BF4234F708D3BE28633
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_CobaltStrike_2, Description: Yara detected CobaltStrike, Source: 00000009.00000002.1383568977.00000013E3831000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000009.00000002.1383568977.00000013E3831000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000009.00000002.1383568977.00000013E3831000.00000004.00000010.00020000.00000000.sdmp, Author: unknown
            Reputation:high
            Has exited:true

            Target ID:10
            Start time:03:05:22
            Start date:24/12/2024
            Path:C:\Windows\System32\wermgr.exe
            Wow64 process (32bit):false
            Commandline:wermgr.exe
            Imagebase:0x7ff61efb0000
            File size:229'728 bytes
            MD5 hash:74A0194782E039ACE1F7349544DC1CF4
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 0000000A.00000002.2589449610.000002963D080000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 0000000A.00000002.2589449610.000002963D080000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_CobaltStrike_2, Description: Yara detected CobaltStrike, Source: 0000000A.00000003.1383681030.000002963CDA0000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 0000000A.00000003.1383681030.000002963CDA0000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 0000000A.00000003.1383681030.000002963CDA0000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
            Reputation:moderate
            Has exited:false

            Reset < >

              Execution Graph

              Execution Coverage:1.3%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:7.1%
              Total number of Nodes:563
              Total number of Limit Nodes:29
              execution_graph 16248 26e03400000 16251 26e03400021 16248->16251 16249 26e034000ce SleepEx 16250 26e034000de 16249->16250 16251->16249 16251->16251 15433 26e037a0bc8 15435 26e037a0be4 _DllMainCRTStartup 15433->15435 15439 26e037a0c74 15435->15439 15441 26e037a0c3e 15435->15441 15445 26e037a0a68 15435->15445 15437 26e037a0c92 15438 26e037a0cbb 15437->15438 15440 26e03798460 _DllMainCRTStartup 7 API calls 15437->15440 15438->15441 15442 26e037a0a68 _CRT_INIT RtlFreeHeap 15438->15442 15439->15441 15474 26e03798460 15439->15474 15443 26e037a0cae 15440->15443 15442->15441 15444 26e037a0a68 _CRT_INIT RtlFreeHeap 15443->15444 15444->15438 15446 26e037a0af7 15445->15446 15449 26e037a0a7a _heap_init 15445->15449 15447 26e037a0b4d 15446->15447 15450 26e037a0afb _CRT_INIT 15446->15450 15448 26e037a0bb0 15447->15448 15455 26e037a0b52 _CRT_INIT 15447->15455 15459 26e037a0a83 _CRT_INIT 15448->15459 15558 26e037a4888 15448->15558 15449->15459 15484 26e037a4a30 15449->15484 15450->15459 15524 26e0379efec 15450->15524 15455->15459 15546 26e037a37a8 15455->15546 15457 26e037a71ec _ioterm RtlFreeHeap 15457->15459 15458 26e037a0a8f _RTC_Initialize 15458->15459 15490 26e037a83fc 15458->15490 15459->15439 15460 26e037a0b6f _CRT_INIT 15460->15459 15462 26e037a0ba6 15460->15462 15463 26e037a0b90 15460->15463 15555 26e0379e2c4 15462->15555 15550 26e037a496c 15463->15550 15475 26e0379853b 15474->15475 15479 26e03798482 _DllMainCRTStartup 15474->15479 15476 26e03798487 _DllMainCRTStartup 15475->15476 15855 26e0379a4fc 15475->15855 15476->15437 15479->15476 15482 26e037984e5 _DllMainCRTStartup 15479->15482 15867 26e0379c36c 15479->15867 15803 26e0378baf4 15482->15803 15483 26e0379c36c _DllMainCRTStartup VirtualFree 15483->15482 15485 26e037a4a3b _mtinit _mtinitlocks 15484->15485 15486 26e037a37a8 _calloc_crt RtlFreeHeap 15485->15486 15489 26e037a4a8e 15485->15489 15487 26e037a4a6a _CRT_INIT 15486->15487 15488 26e037a496c _initptd RtlFreeHeap 15487->15488 15487->15489 15488->15489 15489->15458 15491 26e037a841b 15490->15491 15493 26e037a0ab1 15491->15493 15562 26e037a3828 15491->15562 15496 26e037a6ec0 15493->15496 15495 26e0379e2c4 free RtlFreeHeap 15495->15493 15639 26e037a2e0c 15496->15639 15525 26e0379f003 15524->15525 15526 26e0379f025 15525->15526 15528 26e0379e2c4 free RtlFreeHeap 15525->15528 15527 26e0379e2c4 free RtlFreeHeap 15526->15527 15529 26e0379f034 15527->15529 15528->15525 15530 26e0379f05b 15529->15530 15532 26e0379e2c4 free RtlFreeHeap 15529->15532 15531 26e0379e2c4 free RtlFreeHeap 15530->15531 15533 26e0379f06a 15531->15533 15532->15529 15534 26e0379e2c4 free RtlFreeHeap 15533->15534 15535 26e0379f07e 15534->15535 15536 26e0379e2c4 free RtlFreeHeap 15535->15536 15537 26e0379f08a 15536->15537 15538 26e0379f0b5 15537->15538 15539 26e0379e2c4 free RtlFreeHeap 15537->15539 15540 26e0379f0d6 15538->15540 15541 26e0379e2c4 free RtlFreeHeap 15538->15541 15539->15538 15542 26e0379f0ef 15540->15542 15544 26e0379e2c4 free RtlFreeHeap 15540->15544 15541->15540 15543 26e0379f120 15542->15543 15545 26e0379e2c4 free RtlFreeHeap 15542->15545 15543->15457 15543->15459 15544->15542 15545->15543 15549 26e037a37cd 15546->15549 15548 26e037a380a 15548->15460 15549->15548 15773 26e037a8d6c 15549->15773 15551 26e037a2e0c _lock RtlFreeHeap 15550->15551 15552 26e037a49d2 _freefls 15551->15552 15553 26e037a2e0c _lock RtlFreeHeap 15552->15553 15554 26e037a49f1 _freefls __addlocaleref 15553->15554 15554->15459 15556 26e0379e2c9 RtlFreeHeap 15555->15556 15557 26e0379e2e4 _errno free 15555->15557 15556->15557 15557->15459 15559 26e037a48be 15558->15559 15560 26e037a489c _CRT_INIT 15558->15560 15559->15459 15777 26e037a4754 15560->15777 15564 26e037a3850 15562->15564 15565 26e037a3885 15564->15565 15566 26e0379e304 15564->15566 15565->15493 15565->15495 15567 26e0379e398 _callnewh 15566->15567 15572 26e0379e31c _callnewh _mtinitlocknum 15566->15572 15568 26e037a0d98 _errno RtlFreeHeap 15567->15568 15576 26e0379e38d 15568->15576 15571 26e0379e37d 15602 26e037a0d98 15571->15602 15572->15571 15574 26e0379e382 15572->15574 15572->15576 15577 26e037a0e70 15572->15577 15586 26e037a0ee4 15572->15586 15575 26e037a0d98 _errno RtlFreeHeap 15574->15575 15575->15576 15576->15564 15605 26e037a8784 15577->15605 15579 26e037a0e7e 15580 26e037a0e8d 15579->15580 15581 26e037a8784 _set_error_mode RtlFreeHeap 15579->15581 15582 26e037a0ee4 _NMSG_WRITE RtlFreeHeap 15580->15582 15584 26e037a0eae 15580->15584 15581->15580 15583 26e037a0ea4 15582->15583 15585 26e037a0ee4 _NMSG_WRITE RtlFreeHeap 15583->15585 15584->15572 15585->15584 15587 26e037a0f18 _NMSG_WRITE 15586->15587 15588 26e037a8784 _set_error_mode RtlFreeHeap 15587->15588 15593 26e037a1035 setSBUpLow __crtMessageBoxW _invoke_watson 15587->15593 15589 26e037a0f2e 15588->15589 15590 26e037a8784 _set_error_mode RtlFreeHeap 15589->15590 15589->15593 15591 26e037a0f3f 15590->15591 15591->15593 15609 26e037a8630 15591->15609 15593->15572 15594 26e037a0f7b 15594->15593 15595 26e037a0fbb _putenv_helper 15594->15595 15596 26e037a8630 _NMSG_WRITE RtlFreeHeap 15594->15596 15595->15593 15597 26e037a1005 15595->15597 15616 26e037a86b8 15595->15616 15596->15595 15597->15593 15623 26e037a85a8 15597->15623 15599 26e037a101f 15599->15593 15601 26e037a85a8 _NMSG_WRITE RtlFreeHeap 15599->15601 15601->15593 15630 26e037a48e8 15602->15630 15606 26e037a878c 15605->15606 15607 26e037a0d98 _errno RtlFreeHeap 15606->15607 15608 26e037a8796 _invalid_parameter_noinfo 15606->15608 15607->15608 15608->15579 15610 26e037a8648 15609->15610 15611 26e037a863e 15609->15611 15612 26e037a0d98 _errno RtlFreeHeap 15610->15612 15611->15610 15614 26e037a8665 15611->15614 15613 26e037a8651 _invalid_parameter_noinfo 15612->15613 15613->15594 15614->15613 15615 26e037a0d98 _errno RtlFreeHeap 15614->15615 15615->15613 15620 26e037a86c5 15616->15620 15617 26e037a86ca 15618 26e037a0d98 _errno RtlFreeHeap 15617->15618 15619 26e037a86cf _invalid_parameter_noinfo 15617->15619 15618->15619 15619->15597 15620->15617 15620->15619 15621 26e037a8708 15620->15621 15621->15619 15622 26e037a0d98 _errno RtlFreeHeap 15621->15622 15622->15619 15624 26e037a85c3 15623->15624 15626 26e037a85b9 15623->15626 15625 26e037a0d98 _errno RtlFreeHeap 15624->15625 15627 26e037a85cc _invalid_parameter_noinfo 15625->15627 15626->15624 15628 26e037a85fa 15626->15628 15627->15599 15628->15627 15629 26e037a0d98 _errno RtlFreeHeap 15628->15629 15629->15627 15631 26e037a48f8 _CRT_INIT 15630->15631 15632 26e037a0da1 15631->15632 15633 26e037a37a8 _calloc_crt RtlFreeHeap 15631->15633 15632->15574 15634 26e037a491a _CRT_INIT 15633->15634 15634->15632 15635 26e037a4937 15634->15635 15636 26e037a494d 15634->15636 15637 26e037a496c _initptd RtlFreeHeap 15635->15637 15638 26e0379e2c4 free RtlFreeHeap 15636->15638 15637->15632 15638->15632 15640 26e037a2e2a 15639->15640 15641 26e037a2e2f 15639->15641 15643 26e037a2ed8 15640->15643 15644 26e037a2ef5 15643->15644 15646 26e037a2f04 _mtinitlocknum 15643->15646 15645 26e037a0e70 _FF_MSGBANNER RtlFreeHeap 15644->15645 15648 26e037a2efa 15645->15648 15647 26e037a3828 _malloc_crt RtlFreeHeap 15646->15647 15655 26e037a2f1f 15646->15655 15649 26e037a2f30 15647->15649 15650 26e037a0ee4 _NMSG_WRITE RtlFreeHeap 15648->15650 15651 26e037a2f38 15649->15651 15652 26e037a2f47 15649->15652 15650->15646 15653 26e037a0d98 _errno RtlFreeHeap 15651->15653 15654 26e037a2e0c _lock RtlFreeHeap 15652->15654 15653->15655 15656 26e037a2f51 15654->15656 15655->15641 15656->15655 15657 26e0379e2c4 free RtlFreeHeap 15656->15657 15657->15655 15774 26e037a8d81 15773->15774 15776 26e037a8d94 _callnewh 15773->15776 15775 26e037a0d98 _errno RtlFreeHeap 15774->15775 15774->15776 15775->15776 15776->15549 15778 26e037a487c 15777->15778 15779 26e037a475d 15777->15779 15778->15559 15780 26e037a4778 15779->15780 15781 26e0379e2c4 free RtlFreeHeap 15779->15781 15782 26e037a4786 15780->15782 15783 26e0379e2c4 free RtlFreeHeap 15780->15783 15781->15780 15784 26e037a4794 15782->15784 15785 26e0379e2c4 free RtlFreeHeap 15782->15785 15783->15782 15786 26e037a47a2 15784->15786 15788 26e0379e2c4 free RtlFreeHeap 15784->15788 15785->15784 15787 26e037a47b0 15786->15787 15789 26e0379e2c4 free RtlFreeHeap 15786->15789 15790 26e037a47be 15787->15790 15791 26e0379e2c4 free RtlFreeHeap 15787->15791 15788->15786 15789->15787 15792 26e037a47cf 15790->15792 15793 26e0379e2c4 free RtlFreeHeap 15790->15793 15791->15790 15794 26e037a47e7 15792->15794 15795 26e0379e2c4 free RtlFreeHeap 15792->15795 15793->15792 15796 26e037a2e0c _lock RtlFreeHeap 15794->15796 15795->15794 15798 26e037a47f3 15796->15798 15797 26e037a4820 _freefls 15800 26e037a2e0c _lock RtlFreeHeap 15797->15800 15798->15797 15799 26e0379e2c4 free RtlFreeHeap 15798->15799 15799->15797 15801 26e037a4832 _freefls 15800->15801 15802 26e0379e2c4 free RtlFreeHeap 15801->15802 15802->15778 15871 26e0379506c 15803->15871 15805 26e0378bb12 _DllMainCRTStartup 15806 26e0379e304 malloc RtlFreeHeap 15805->15806 15807 26e0378bbc0 15806->15807 15878 26e0379b2b0 15807->15878 15813 26e0378bc35 15814 26e0379db28 _DllMainCRTStartup RtlFreeHeap 15813->15814 15815 26e0378bc4f _DllMainCRTStartup 15814->15815 15817 26e0378bc5d _DllMainCRTStartup 15815->15817 15927 26e0379caf4 15815->15927 15818 26e0378bc79 15817->15818 15819 26e0379caf4 _DllMainCRTStartup 2 API calls 15817->15819 15901 26e0378e278 15818->15901 15819->15818 15822 26e0378bc8e 15907 26e0378e2f4 15822->15907 15823 26e0379caf4 _DllMainCRTStartup 2 API calls 15823->15822 15826 26e0379caf4 _DllMainCRTStartup 2 API calls 15827 26e0378bc9c 15826->15827 15828 26e0379e304 malloc RtlFreeHeap 15827->15828 15829 26e0378bccf 15828->15829 15830 26e0378bcdc 15829->15830 15831 26e0379caf4 _DllMainCRTStartup 2 API calls 15829->15831 15832 26e0379db28 _DllMainCRTStartup RtlFreeHeap 15830->15832 15831->15830 15833 26e0378bcf8 15832->15833 15917 26e03794ce0 15833->15917 15856 26e0379506c _DllMainCRTStartup RtlFreeHeap 15855->15856 15857 26e0379a520 memcpy_s _DllMainCRTStartup 15856->15857 15858 26e0379e304 malloc RtlFreeHeap 15857->15858 15859 26e0379a5ad memcpy_s 15858->15859 15860 26e0379db28 _DllMainCRTStartup RtlFreeHeap 15859->15860 15861 26e0379a5de _DllMainCRTStartup 15860->15861 15865 26e0379a5f5 memcpy_s _DllMainCRTStartup 15861->15865 16242 26e0378e094 15861->16242 15863 26e0379a882 memcpy_s _DllMainCRTStartup 15863->15476 15864 26e0379e304 malloc RtlFreeHeap 15864->15865 15865->15863 15865->15864 15866 26e0379db28 _DllMainCRTStartup RtlFreeHeap 15865->15866 15866->15865 15868 26e0379c419 VirtualFree 15867->15868 15870 26e0379c391 _DllMainCRTStartup 15867->15870 15869 26e03798507 15868->15869 15869->15482 15869->15483 15870->15868 15870->15869 15872 26e0379e304 malloc RtlFreeHeap 15871->15872 15873 26e0379508d 15872->15873 15874 26e0379e304 malloc RtlFreeHeap 15873->15874 15877 26e03795095 memcpy_s _DllMainCRTStartup 15873->15877 15875 26e037950a1 15874->15875 15876 26e0379e2c4 free RtlFreeHeap 15875->15876 15875->15877 15876->15877 15877->15805 15879 26e0379b2d9 _DllMainCRTStartup 15878->15879 15935 26e0379f4cc 15879->15935 15882 26e0379e304 malloc RtlFreeHeap 15884 26e0379b321 memcpy_s 15882->15884 15885 26e0379b38a 15884->15885 15938 26e037a089c 15884->15938 15886 26e037a089c _DllMainCRTStartup RtlFreeHeap 15885->15886 15887 26e0378bc07 15886->15887 15888 26e03792520 15887->15888 15889 26e03792533 _DllMainCRTStartup 15888->15889 15890 26e0379f4cc _DllMainCRTStartup RtlFreeHeap 15889->15890 15891 26e0379253b 15890->15891 15941 26e03791fdc 15891->15941 15894 26e0379db28 15895 26e0379db67 15894->15895 15900 26e0379db7d memcpy_s 15894->15900 15896 26e0379db7f 15895->15896 15897 26e0379db73 15895->15897 15898 26e037a0994 realloc RtlFreeHeap 15896->15898 15899 26e0379e304 malloc RtlFreeHeap 15897->15899 15898->15900 15899->15900 15900->15813 15902 26e0378e28e 15901->15902 15903 26e0378bc85 15902->15903 15946 26e0379995c 15902->15946 15903->15822 15903->15823 15905 26e0378e2c8 15950 26e03799994 15905->15950 15908 26e0378e319 15907->15908 15909 26e0378bc93 15908->15909 15910 26e0379e304 malloc RtlFreeHeap 15908->15910 15909->15826 15909->15827 15911 26e0378e395 memcpy_s _DllMainCRTStartup 15910->15911 15912 26e0378e3eb memcpy_s 15911->15912 15913 26e0379995c _DllMainCRTStartup RtlFreeHeap 15911->15913 15916 26e0379e2c4 free RtlFreeHeap 15912->15916 15914 26e0378e3cc 15913->15914 15915 26e03799994 _DllMainCRTStartup RtlFreeHeap 15914->15915 15915->15912 15916->15909 15918 26e03794cfe _DllMainCRTStartup 15917->15918 16114 26e0379a134 15918->16114 15920 26e03794d28 15921 26e0379f4cc _DllMainCRTStartup RtlFreeHeap 15920->15921 15922 26e03794d3f _DllMainCRTStartup 15921->15922 16118 26e03794ea8 15922->16118 15924 26e03794e14 memcpy_s _DllMainCRTStartup 16127 26e03799c4c 15924->16127 15926 26e03794e75 15928 26e0379cb08 15927->15928 16222 26e0378c2e8 15928->16222 15930 26e0379cb24 16229 26e03793ea4 15930->16229 15934 26e0379cb2e _DllMainCRTStartup 15936 26e037a48c4 _getptd RtlFreeHeap 15935->15936 15937 26e0379b2e1 15936->15937 15937->15882 15939 26e037a48c4 _getptd RtlFreeHeap 15938->15939 15940 26e037a08c0 setSBUpLow _DllMainCRTStartup 15939->15940 15940->15884 15942 26e03792007 _DllMainCRTStartup 15941->15942 15943 26e0378bc14 15941->15943 15942->15943 15944 26e0379e304 malloc RtlFreeHeap 15942->15944 15945 26e0379db28 _DllMainCRTStartup RtlFreeHeap 15942->15945 15943->15894 15944->15942 15945->15942 15947 26e03799977 15946->15947 15949 26e03799973 _DllMainCRTStartup 15946->15949 15956 26e03799bd4 15947->15956 15949->15905 15951 26e037999bc 15950->15951 15952 26e0379e6bc _snprintf RtlFreeHeap 15951->15952 15953 26e037999fc 15952->15953 15954 26e0379e6bc _snprintf RtlFreeHeap 15953->15954 15955 26e03799a12 _DllMainCRTStartup 15954->15955 15955->15903 15963 26e0379e6bc 15956->15963 15958 26e03799bf1 15958->15958 15959 26e0379e6bc _snprintf RtlFreeHeap 15958->15959 15960 26e03799c3c 15959->15960 15972 26e0379ee84 15960->15972 15964 26e0379e6ee memcpy_s 15963->15964 15965 26e0379e6f3 15964->15965 15967 26e0379e712 15964->15967 15966 26e037a0d98 _errno RtlFreeHeap 15965->15966 15970 26e0379e6f8 _invalid_parameter_noinfo 15966->15970 15976 26e037a15a8 15967->15976 15969 26e0379e742 15969->15970 15993 26e037a141c 15969->15993 15970->15958 15973 26e037a2d6c 15972->15973 16097 26e037a2b30 15973->16097 15975 26e03799c46 15975->15949 15977 26e037a0680 _tolower_l RtlFreeHeap 15976->15977 15978 26e037a160e 15977->15978 15979 26e037a0d98 _errno RtlFreeHeap 15978->15979 15980 26e037a1613 15979->15980 15981 26e037a1f73 15980->15981 15986 26e037a1640 _snprintf 15980->15986 16014 26e037a4ad4 15980->16014 15982 26e037a0d98 _errno RtlFreeHeap 15981->15982 15984 26e037a1f78 _invalid_parameter_noinfo setSBUpLow 15982->15984 15984->15969 15986->15981 15986->15984 15987 26e037a2a54 RtlFreeHeap write_char 15986->15987 15988 26e0379e2c4 free RtlFreeHeap 15986->15988 15989 26e037a8c94 RtlFreeHeap _snprintf 15986->15989 15990 26e037a3828 _malloc_crt RtlFreeHeap 15986->15990 15991 26e037a1fc8 RtlFreeHeap write_multi_char 15986->15991 15992 26e037a2a9c RtlFreeHeap write_string 15986->15992 16018 26e037a7774 15986->16018 15987->15986 15988->15986 15989->15986 15990->15986 15991->15986 15992->15986 15994 26e037a4ad4 _fileno RtlFreeHeap 15993->15994 15995 26e037a143e 15994->15995 15996 26e037a1449 15995->15996 15997 26e037a1460 15995->15997 16000 26e037a0d98 _errno RtlFreeHeap 15996->16000 15998 26e037a1465 15997->15998 15999 26e037a1472 _vsnprintf_helper 15997->15999 16001 26e037a0d98 _errno RtlFreeHeap 15998->16001 16002 26e037a144e 15999->16002 16003 26e037a14d7 15999->16003 16010 26e037a14cb 15999->16010 16021 26e037a8a3c 15999->16021 16000->16002 16001->16002 16002->15970 16004 26e037a156f 16003->16004 16005 26e037a14e4 16003->16005 16006 26e037a54b4 _flush RtlFreeHeap 16004->16006 16007 26e037a1500 16005->16007 16011 26e037a1519 16005->16011 16006->16002 16030 26e037a54b4 16007->16030 16010->16003 16027 26e037a8a9c 16010->16027 16011->16002 16047 26e037a6c88 16011->16047 16015 26e037a4add 16014->16015 16017 26e037a4ae2 _invalid_parameter_noinfo 16014->16017 16016 26e037a0d98 _errno RtlFreeHeap 16015->16016 16016->16017 16017->15986 16019 26e037a0680 _tolower_l RtlFreeHeap 16018->16019 16020 26e037a7786 16019->16020 16020->15986 16022 26e037a8a45 16021->16022 16023 26e037a8a52 16021->16023 16024 26e037a0d98 _errno RtlFreeHeap 16022->16024 16025 26e037a8a4a _invalid_parameter_noinfo 16023->16025 16026 26e037a0d98 _errno RtlFreeHeap 16023->16026 16024->16025 16025->16010 16026->16025 16028 26e037a3828 _malloc_crt RtlFreeHeap 16027->16028 16029 26e037a8ab5 16028->16029 16029->16003 16031 26e037a54d7 16030->16031 16032 26e037a54ef 16030->16032 16067 26e037a0d28 16031->16067 16033 26e037a5566 16032->16033 16038 26e037a5521 16032->16038 16035 26e037a0d28 __doserrno RtlFreeHeap 16033->16035 16037 26e037a556b 16035->16037 16040 26e037a0d98 _errno RtlFreeHeap 16037->16040 16070 26e037a9330 16038->16070 16039 26e037a0d98 _errno RtlFreeHeap 16045 26e037a54e4 _invalid_parameter_noinfo _unlock_fhandle 16039->16045 16040->16045 16042 26e037a5528 16043 26e037a0d98 _errno RtlFreeHeap 16042->16043 16042->16045 16044 26e037a554a 16043->16044 16046 26e037a0d28 __doserrno RtlFreeHeap 16044->16046 16045->16002 16046->16045 16048 26e037a6cab 16047->16048 16049 26e037a6cc3 16047->16049 16050 26e037a0d28 __doserrno RtlFreeHeap 16048->16050 16051 26e037a6d3d 16049->16051 16055 26e037a6cf5 16049->16055 16052 26e037a6cb0 16050->16052 16053 26e037a0d28 __doserrno RtlFreeHeap 16051->16053 16054 26e037a0d98 _errno RtlFreeHeap 16052->16054 16056 26e037a6d42 16053->16056 16066 26e037a6cb8 _invalid_parameter_noinfo _unlock_fhandle 16054->16066 16057 26e037a9330 __lock_fhandle RtlFreeHeap 16055->16057 16058 26e037a0d98 _errno RtlFreeHeap 16056->16058 16059 26e037a6cfc 16057->16059 16058->16066 16060 26e037a6d08 16059->16060 16061 26e037a6d1a 16059->16061 16074 26e037a6d6c 16060->16074 16063 26e037a0d98 _errno RtlFreeHeap 16061->16063 16064 26e037a6d1f 16063->16064 16065 26e037a0d28 __doserrno RtlFreeHeap 16064->16065 16065->16066 16066->16002 16068 26e037a48e8 _getptd_noexit RtlFreeHeap 16067->16068 16069 26e037a0d31 16068->16069 16069->16039 16071 26e037a9368 16070->16071 16073 26e037a9372 _freefls 16070->16073 16072 26e037a2e0c _lock RtlFreeHeap 16071->16072 16072->16073 16073->16042 16082 26e037a966c 16074->16082 16076 26e037a6d8b 16077 26e037a6d91 16076->16077 16079 26e037a6da2 16076->16079 16078 26e037a0d98 _errno RtlFreeHeap 16077->16078 16080 26e037a6d96 16078->16080 16079->16080 16092 26e037a0d48 16079->16092 16080->16066 16083 26e037a968a 16082->16083 16084 26e037a9675 16082->16084 16087 26e037a0d28 __doserrno RtlFreeHeap 16083->16087 16091 26e037a9682 _invalid_parameter_noinfo 16083->16091 16085 26e037a0d28 __doserrno RtlFreeHeap 16084->16085 16086 26e037a967a 16085->16086 16088 26e037a0d98 _errno RtlFreeHeap 16086->16088 16089 26e037a96c4 16087->16089 16088->16091 16090 26e037a0d98 _errno RtlFreeHeap 16089->16090 16090->16091 16091->16076 16093 26e037a48e8 _getptd_noexit RtlFreeHeap 16092->16093 16094 26e037a0d59 16093->16094 16095 26e037a48e8 _getptd_noexit RtlFreeHeap 16094->16095 16096 26e037a0d72 free 16095->16096 16096->16080 16098 26e037a0680 _tolower_l RtlFreeHeap 16097->16098 16101 26e037a2b5c 16098->16101 16099 26e037a2b77 16102 26e037a0d98 _errno RtlFreeHeap 16099->16102 16100 26e037a2b8c 16104 26e037a2bde 16100->16104 16107 26e037a7698 16100->16107 16101->16099 16101->16100 16106 26e037a2b7c _invalid_parameter_noinfo 16102->16106 16105 26e037a0d98 _errno RtlFreeHeap 16104->16105 16104->16106 16105->16106 16106->15975 16108 26e037a0680 _tolower_l RtlFreeHeap 16107->16108 16109 26e037a76ba 16108->16109 16110 26e037a7774 _isleadbyte_l RtlFreeHeap 16109->16110 16113 26e037a76c4 16109->16113 16111 26e037a76e7 16110->16111 16112 26e037a920c __crtGetStringTypeA RtlFreeHeap 16111->16112 16112->16113 16113->16100 16115 26e0379a151 _DllMainCRTStartup 16114->16115 16133 26e0378093c 16115->16133 16117 26e0379a182 _DllMainCRTStartup 16117->15920 16119 26e0379506c _DllMainCRTStartup RtlFreeHeap 16118->16119 16120 26e03794ed1 _DllMainCRTStartup 16119->16120 16121 26e03794f1f GetUserNameA 16120->16121 16122 26e03794f48 16121->16122 16139 26e0378e088 16122->16139 16124 26e03794f4d strrchr _DllMainCRTStartup 16125 26e0379e6bc _snprintf RtlFreeHeap 16124->16125 16126 26e03795020 _DllMainCRTStartup 16125->16126 16126->15924 16128 26e03799c7e memcpy_s _DllMainCRTStartup 16127->16128 16143 26e03780d44 16128->16143 16130 26e03799d3a 16132 26e03799d89 16130->16132 16163 26e03780be4 16130->16163 16132->15926 16135 26e0378096c _DllMainCRTStartup 16133->16135 16134 26e0378098d 16134->16117 16135->16134 16136 26e0379e304 malloc RtlFreeHeap 16135->16136 16138 26e037809a1 16136->16138 16137 26e0379e2c4 free RtlFreeHeap 16137->16134 16138->16134 16138->16137 16140 26e0378e094 _DllMainCRTStartup 16139->16140 16141 26e0378e0af WSASocketA 16140->16141 16142 26e0378e0d1 16141->16142 16142->16124 16144 26e03780dde _DllMainCRTStartup 16143->16144 16145 26e03780df7 setSBUpLow _DllMainCRTStartup 16144->16145 16167 26e037ade88 16144->16167 16145->16130 16147 26e03780def _DllMainCRTStartup 16147->16145 16148 26e03780f8c 16147->16148 16153 26e03780eed 16147->16153 16149 26e0379e2c4 free RtlFreeHeap 16148->16149 16150 26e03780f94 16149->16150 16152 26e03783ee4 _DllMainCRTStartup RtlFreeHeap 16150->16152 16155 26e03780fc0 16152->16155 16174 26e03783ee4 16153->16174 16155->16145 16161 26e03783ee4 _DllMainCRTStartup RtlFreeHeap 16155->16161 16162 26e037810dc 16155->16162 16156 26e03780f7d 16159 26e0379e2c4 free RtlFreeHeap 16156->16159 16157 26e03780f73 16158 26e0379e2c4 free RtlFreeHeap 16157->16158 16158->16145 16159->16145 16160 26e03783ee4 _DllMainCRTStartup RtlFreeHeap 16160->16145 16161->16162 16162->16145 16162->16160 16164 26e03780c25 _DllMainCRTStartup 16163->16164 16165 26e03780c1b _DllMainCRTStartup 16163->16165 16164->16165 16180 26e0378368c 16164->16180 16165->16132 16168 26e037a8d6c _calloc_impl RtlFreeHeap 16167->16168 16169 26e037ade9d 16168->16169 16170 26e037a0d98 _errno RtlFreeHeap 16169->16170 16173 26e037adeba 16169->16173 16171 26e037adeb0 16170->16171 16172 26e037a0d98 _errno RtlFreeHeap 16171->16172 16171->16173 16172->16173 16173->16147 16175 26e03783f10 16174->16175 16176 26e03780f6a 16175->16176 16177 26e037ade88 _DllMainCRTStartup RtlFreeHeap 16175->16177 16176->16156 16176->16157 16178 26e03783f4f _DllMainCRTStartup 16177->16178 16178->16176 16179 26e0379e2c4 free RtlFreeHeap 16178->16179 16179->16176 16181 26e037836bd _DllMainCRTStartup 16180->16181 16182 26e0379e304 malloc RtlFreeHeap 16181->16182 16192 26e03783913 16181->16192 16183 26e0378372e 16182->16183 16184 26e0379e304 malloc RtlFreeHeap 16183->16184 16185 26e03783738 16184->16185 16186 26e0379e304 malloc RtlFreeHeap 16185->16186 16187 26e03783743 16186->16187 16188 26e0378391f 16187->16188 16190 26e03783917 16187->16190 16193 26e03783761 16187->16193 16189 26e0378392c 16188->16189 16191 26e0379e2c4 free RtlFreeHeap 16188->16191 16189->16192 16195 26e0379e2c4 free RtlFreeHeap 16189->16195 16194 26e0379e2c4 free RtlFreeHeap 16190->16194 16191->16189 16192->16165 16196 26e0378093c _DllMainCRTStartup RtlFreeHeap 16193->16196 16194->16188 16195->16192 16202 26e037837a3 memcpy_s 16196->16202 16197 26e0379e2c4 free RtlFreeHeap 16198 26e03783903 16197->16198 16199 26e0379e2c4 free RtlFreeHeap 16198->16199 16200 26e0378390b 16199->16200 16201 26e0379e2c4 free RtlFreeHeap 16200->16201 16201->16192 16206 26e03783817 memcpy_s 16202->16206 16207 26e03784570 16202->16207 16204 26e0378383f 16204->16204 16205 26e03784570 _DllMainCRTStartup RtlFreeHeap 16204->16205 16204->16206 16205->16206 16206->16197 16208 26e0378459c _DllMainCRTStartup 16207->16208 16209 26e037846b9 16208->16209 16210 26e0379e304 malloc RtlFreeHeap 16208->16210 16209->16204 16211 26e037845bf 16210->16211 16212 26e0379e304 malloc RtlFreeHeap 16211->16212 16213 26e037845ca 16212->16213 16214 26e037846c5 16213->16214 16215 26e037846bd 16213->16215 16220 26e037845df 16213->16220 16214->16209 16217 26e0379e2c4 free RtlFreeHeap 16214->16217 16216 26e0379e2c4 free RtlFreeHeap 16215->16216 16216->16214 16217->16209 16218 26e0379e2c4 free RtlFreeHeap 16219 26e037846b1 16218->16219 16221 26e0379e2c4 free RtlFreeHeap 16219->16221 16220->16218 16221->16209 16223 26e0378c306 16222->16223 16224 26e0378c3ad 16223->16224 16225 26e0378c339 _DllMainCRTStartup 16223->16225 16226 26e0378c394 memcpy_s _DllMainCRTStartup 16223->16226 16224->16226 16227 26e0379c36c _DllMainCRTStartup VirtualFree 16224->16227 16225->16226 16228 26e0378c2e8 _DllMainCRTStartup VirtualFree 16225->16228 16226->15930 16227->16226 16228->16226 16230 26e03793eb3 16229->16230 16231 26e03793ec4 16230->16231 16232 26e0379e2c4 free RtlFreeHeap 16230->16232 16233 26e0379dc20 16231->16233 16232->16230 16234 26e0379dcaf 16233->16234 16239 26e0379dc3a memcpy_s 16233->16239 16235 26e0379dcc0 16234->16235 16236 26e0379e2c4 free RtlFreeHeap 16234->16236 16237 26e0379dcd1 16235->16237 16238 26e0379e2c4 free RtlFreeHeap 16235->16238 16236->16235 16237->15934 16238->16237 16239->16234 16240 26e0379e2c4 free RtlFreeHeap 16239->16240 16241 26e0379c36c _DllMainCRTStartup VirtualFree 16239->16241 16240->16239 16241->16239 16246 26e0378e198 16242->16246 16244 26e0378e0af WSASocketA 16245 26e0378e0d1 16244->16245 16245->15865 16247 26e0378e1ac 16246->16247 16247->16244

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: NameUser_snprintfmallocstrrchr
              • String ID:
              • API String ID: 1238167203-0
              • Opcode ID: d69273eeb4579e6a96eb8d0c87a60564a21875d7210b55cf29d23a145d20b21e
              • Instruction ID: 0c3f4e3026576e247c10b60a56c2a125f9020503dce490c3c19e83826369de21
              • Opcode Fuzzy Hash: d69273eeb4579e6a96eb8d0c87a60564a21875d7210b55cf29d23a145d20b21e
              • Instruction Fuzzy Hash: 7751843071CE098FEE58AB6CA44A7BA72D2E789310F19462EE08ED32D6D975D8028741

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 102 26e03400000-26e0340001f 103 26e03400021-26e0340002f 102->103 104 26e03400031-26e03400034 103->104 105 26e03400036-26e03400039 103->105 104->105 106 26e03400069-26e03400073 104->106 105->103 107 26e0340003b-26e0340003c 105->107 109 26e034000ce-26e034000dc SleepEx 106->109 110 26e03400075-26e03400076 106->110 108 26e0340003e-26e03400065 107->108 108->108 114 26e03400067 108->114 112 26e034000de-26e034000df 109->112 113 26e03400137-26e03400138 109->113 111 26e03400078-26e0340007f 110->111 115 26e03400081 111->115 116 26e034000b7-26e034000cc 111->116 117 26e034000e1-26e034000e8 112->117 118 26e0340013b-26e03400149 113->118 114->103 119 26e03400083-26e034000b5 115->119 116->109 116->111 120 26e03400120-26e03400135 117->120 121 26e034000ea 117->121 122 26e03400150-26e03400153 118->122 123 26e0340014b-26e0340014e 118->123 119->116 119->119 120->113 120->117 124 26e034000ec-26e0340011e 121->124 122->118 126 26e03400155-26e03400156 122->126 123->122 125 26e03400183-26e03400197 123->125 124->120 124->124 127 26e03400158-26e0340017f 126->127 127->127 128 26e03400181 127->128 128->118
              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2588676723.0000026E03400000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026E03400000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03400000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: Sleep
              • String ID:
              • API String ID: 3472027048-0
              • Opcode ID: 88e8bec169d31fc803aeef05fed04f98ffb8ac2501b92b4af572ff67ccb03544
              • Instruction ID: 69c343f566bd3c90451482b1cc186f3fdf793a230ab55e50ac7fdab7bfc11804
              • Opcode Fuzzy Hash: 88e8bec169d31fc803aeef05fed04f98ffb8ac2501b92b4af572ff67ccb03544
              • Instruction Fuzzy Hash: 49513138308A468FCB1CCE5C95C9B3173D5E785305B0692ACD59ADF2ABC972DC43C680

              Control-flow Graph

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: Socket
              • String ID: _Cy
              • API String ID: 38366605-1085951347
              • Opcode ID: 9f6035121241c12ff71e8e552415c275c25b201d0c9d2d3551ffb33b20d91594
              • Instruction ID: 656b93fc515bb6126788c192276bbae924bda3fba546a8ec6c4336f7b84ee898
              • Opcode Fuzzy Hash: 9f6035121241c12ff71e8e552415c275c25b201d0c9d2d3551ffb33b20d91594
              • Instruction Fuzzy Hash: AB31E83460CE498FDB94DF288888767B7E1FBA8315F15063EE44AD36E1DB75C5418741

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: Internet$ConnectOpen
              • String ID:
              • API String ID: 2790792615-0
              • Opcode ID: c02896be98f17698b461471e8597e5ae08ffedd86d74317b17a8770a829ca45e
              • Instruction ID: 57f449066618ba702d53fd49ebe4bddad870e6fde5b78a98d38f6ce6f4724c7e
              • Opcode Fuzzy Hash: c02896be98f17698b461471e8597e5ae08ffedd86d74317b17a8770a829ca45e
              • Instruction Fuzzy Hash: A551B73461C605CFEF59DB1CD49976977D2FB48300F16052E908BD36E2DABD9902CB82

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 129 26e0379c36c-26e0379c38b 130 26e0379c419-26e0379c422 VirtualFree 129->130 131 26e0379c391-26e0379c39a 129->131 134 26e0379c428-26e0379c437 130->134 132 26e0379c3a6-26e0379c3a9 131->132 133 26e0379c39c-26e0379c3a4 131->133 132->130 136 26e0379c3ab-26e0379c3b3 132->136 133->132 135 26e0379c3b5-26e0379c3dc 133->135 138 26e0379c3ec-26e0379c409 call 26e0379e186 135->138 139 26e0379c3de-26e0379c3ea 135->139 136->130 136->135 142 26e0379c40e-26e0379c410 138->142 139->142 142->130 143 26e0379c412-26e0379c417 142->143 143->134
              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: FreeVirtual
              • String ID:
              • API String ID: 1263568516-0
              • Opcode ID: 33013136f0bb95f1eb9f3645b418df4a5ff2efb559231014e174e8ee2656166c
              • Instruction ID: 36c6ba9cb44813718b1c7bed4cabb9dc19b0a3d33579223ec349bc8ccb122bd0
              • Opcode Fuzzy Hash: 33013136f0bb95f1eb9f3645b418df4a5ff2efb559231014e174e8ee2656166c
              • Instruction Fuzzy Hash: CF21623460CA0ACFEF95DB1CE44872A37E6F7AC345F150A3AD046D32A0C6B99940CB41
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errnowrite_multi_char$_invalid_parameter_noinfowrite_charwrite_string$__updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexit_isleadbyte_lfree
              • String ID: $@
              • API String ID: 3613058218-1077428164
              • Opcode ID: 0599035506f01076b605f9026c3628a483f4ccd483033c44f83e2593a1d2db07
              • Instruction ID: c36ca68274534f0178068defedc0eb017c8bd8f1212462d8f25f1a802308fba1
              • Opcode Fuzzy Hash: 0599035506f01076b605f9026c3628a483f4ccd483033c44f83e2593a1d2db07
              • Instruction Fuzzy Hash: BD62F83991CE4ACAFF6C8A18C45936B77D1FBD5300F2A491DF986E31D3D6B69C028641
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errnowrite_multi_char$_invalid_parameter_noinfowrite_charwrite_string$__updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexit_isleadbyte_lfree
              • String ID:
              • API String ID: 3613058218-3916222277
              • Opcode ID: 99560b4e6a3ba651302837abcdacc877c80be0c82fbf8e81c16206e006ab6ccb
              • Instruction ID: 0b39d5b8c333214bfa32b01287f3cae5c117bfc2f7c9eba0669a2f6651e54135
              • Opcode Fuzzy Hash: 99560b4e6a3ba651302837abcdacc877c80be0c82fbf8e81c16206e006ab6ccb
              • Instruction Fuzzy Hash: 5362E73891CE46CAFF6C9A1884493BB77D1FBD5311FAE061DF497E31C2D6B698028642

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1115 26e03796bb8-26e03796c2e call 26e0379e5b0 call 26e0379a4d4 call 26e03795184 1122 26e03796c31-26e03796c3f call 26e03795194 1115->1122 1125 26e03796fca-26e03796fcd 1122->1125 1126 26e03796c45 1122->1126 1129 26e03797298-26e037972d0 call 26e0379e5b0 call 26e03795304 1125->1129 1130 26e03796fd3-26e03796fd5 1125->1130 1127 26e03796fa9 1126->1127 1128 26e03796c4b-26e03796c4d 1126->1128 1131 26e03796fab-26e03796fbd call 26e0378fe60 1127->1131 1132 26e03796c53-26e03796c55 1128->1132 1133 26e03797375-26e03797378 1128->1133 1177 26e037972d2-26e037972e3 call 26e0379e6bc 1129->1177 1178 26e037972e5-26e037972f6 call 26e0379e6bc 1129->1178 1134 26e03796fdb-26e03796fdd 1130->1134 1135 26e037971e2-26e0379723b call 26e0379e5b0 call 26e03795304 call 26e0379e6bc 1130->1135 1147 26e03796fc2-26e03796fc5 1131->1147 1138 26e03796f56-26e03796f97 call 26e0379e5b0 call 26e03795304 call 26e0379e9a0 1132->1138 1139 26e03796c5b-26e03796c5d 1132->1139 1143 26e0379737e-26e03797381 1133->1143 1144 26e03797423-26e03797443 1133->1144 1140 26e037971db-26e037971dd 1134->1140 1141 26e03796fe3-26e03796fe5 1134->1141 1191 26e03797365-26e03797366 1135->1191 1215 26e03797241-26e03797245 1135->1215 1230 26e03796f99-26e03796fa0 1138->1230 1148 26e03796ecb-26e03796f0c call 26e0379e5b0 call 26e03795304 call 26e0379e9a0 1139->1148 1149 26e03796c63-26e03796c65 1139->1149 1140->1131 1151 26e0379714b-26e0379717e call 26e0379e6bc 1141->1151 1152 26e03796feb-26e03796fed 1141->1152 1143->1144 1154 26e03797387-26e0379738f 1143->1154 1156 26e03797134-26e03797146 call 26e0379e5b0 1147->1156 1246 26e03796f0e-26e03796f15 1148->1246 1159 26e03796c6b-26e03796c6d 1149->1159 1160 26e03796e8e-26e03796eab call 26e037802d8 1149->1160 1151->1191 1192 26e03797184-26e03797188 1151->1192 1162 26e0379710c-26e03797129 call 26e0378fd84 1152->1162 1163 26e03796ff3-26e03796ff6 1152->1163 1154->1154 1165 26e03797391-26e03797394 1154->1165 1172 26e03796e76-26e03796e89 call 26e0379e9a0 1159->1172 1173 26e03796c73-26e03796c75 1159->1173 1160->1144 1207 26e03796eb1-26e03796ec9 call 26e0379e5b0 1160->1207 1162->1144 1206 26e0379712f-26e03797130 1162->1206 1175 26e03796ffc-26e03796ffe 1163->1175 1176 26e037970f4-26e03797107 call 26e0378ff2c 1163->1176 1165->1144 1179 26e0379739a-26e037973c9 call 26e0379e6bc 1165->1179 1172->1122 1181 26e03796d97-26e03796dd3 call 26e0379e5b0 call 26e03795304 1173->1181 1182 26e03796c7b-26e03796c7d 1173->1182 1175->1122 1194 26e03797004-26e0379702c call 26e0379e5b0 call 26e03795304 1175->1194 1176->1147 1205 26e037972fb-26e0379730c 1177->1205 1178->1205 1212 26e0379741b-26e0379741e call 26e0379e9a0 1179->1212 1213 26e037973cb 1179->1213 1250 26e03796ded-26e03796e03 call 26e0379e6bc 1181->1250 1251 26e03796dd5-26e03796deb call 26e0379e6bc 1181->1251 1199 26e03796cd8-26e03796d3a call 26e0379e5b0 call 26e03795304 call 26e0379e6bc 1182->1199 1200 26e03796c7f-26e03796c81 1182->1200 1208 26e0379736b-26e03797370 call 26e0379e9a0 1191->1208 1209 26e0379718d-26e037971d4 1192->1209 1248 26e0379702e-26e0379702f 1194->1248 1249 26e03797065-26e03797082 call 26e0379e6bc 1194->1249 1199->1191 1276 26e03796d40-26e03796d44 1199->1276 1200->1122 1216 26e03796c83-26e03796c93 call 26e03795194 1200->1216 1205->1191 1218 26e0379730e-26e03797312 1205->1218 1206->1156 1244 26e03796f49-26e03796f51 1207->1244 1208->1122 1209->1209 1222 26e037971d6 1209->1222 1212->1144 1225 26e037973d0-26e03797417 1213->1225 1228 26e0379724a-26e03797291 1215->1228 1252 26e03796cad-26e03796cb0 1216->1252 1253 26e03796c95-26e03796cab call 26e0379e9a0 1216->1253 1231 26e03797317-26e0379735e 1218->1231 1222->1122 1225->1225 1238 26e03797419 1225->1238 1228->1228 1240 26e03797293 1228->1240 1230->1230 1242 26e03796fa2-26e03796fa4 1230->1242 1231->1231 1243 26e03797360 1231->1243 1238->1144 1240->1122 1242->1122 1243->1122 1244->1208 1246->1246 1247 26e03796f17-26e03796f2a call 26e0379e9a0 1246->1247 1271 26e03796f2c-26e03796f33 1247->1271 1256 26e03797031-26e03797039 1248->1256 1266 26e03797087-26e03797097 1249->1266 1267 26e03796e08-26e03796e19 1250->1267 1251->1267 1252->1122 1261 26e03796cb6-26e03796cd3 call 26e0379e9a0 1252->1261 1253->1122 1256->1256 1264 26e0379703b-26e0379703e 1256->1264 1261->1122 1264->1249 1272 26e03797040-26e03797063 call 26e0379e6bc 1264->1272 1266->1191 1273 26e0379709d-26e037970a1 1266->1273 1267->1191 1274 26e03796e1f-26e03796e23 1267->1274 1271->1271 1277 26e03796f35-26e03796f47 call 26e0379e5b0 1271->1277 1272->1266 1279 26e037970a6-26e037970ed 1273->1279 1280 26e03796e28-26e03796e6f 1274->1280 1281 26e03796d49-26e03796d90 1276->1281 1277->1244 1279->1279 1285 26e037970ef 1279->1285 1280->1280 1286 26e03796e71 1280->1286 1281->1281 1282 26e03796d92 1281->1282 1282->1122 1285->1122 1286->1122
              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _snprintf$_errno_invalid_parameter_noinfo
              • String ID:
              • API String ID: 3442832105-0
              • Opcode ID: 5c5fb6f4a09e06ccff5c46792293312cb34477fc99d63142bfc01bcec4b0117e
              • Instruction ID: b089f0ef8ac53714568473845b9db2f13cb25f69bbaaae5b211c61b30d4c82b3
              • Opcode Fuzzy Hash: 5c5fb6f4a09e06ccff5c46792293312cb34477fc99d63142bfc01bcec4b0117e
              • Instruction Fuzzy Hash: 8752023411CD8ACBEB5AEB2CD4067E2F3E1FFA8315F091309D88593592EB71E5828781
              Strings
              Memory Dump Source
              • Source File: 00000006.00000003.1354728332.0000026E033C0000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000026E033C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_3_26e033c0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID: 5F@4$W#?`
              • API String ID: 0-4215367577
              • Opcode ID: 7ef5a4437f3000b6a2226bfe11f24cc41c5e315243d0a398e55b1c31b366f874
              • Instruction ID: 90defa94bd4a8814c47c1f1a37d30a2c073edbf7263ff41187166635d64eb291
              • Opcode Fuzzy Hash: 7ef5a4437f3000b6a2226bfe11f24cc41c5e315243d0a398e55b1c31b366f874
              • Instruction Fuzzy Hash: 67419DA742D5C78FDB02CA35D4F93E9BBA1EB17720F2A52D8C0B04F242C96A5807C764
              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _initp_misc_winsig
              • String ID:
              • API String ID: 2710132595-0
              • Opcode ID: c8c90554330dcabd03fa81e8dd660722591610607187a6cda5de2b4df199049a
              • Instruction ID: 168d01585b2769e3a986565101d186f772155e879e86ab02445d94956870b501
              • Opcode Fuzzy Hash: c8c90554330dcabd03fa81e8dd660722591610607187a6cda5de2b4df199049a
              • Instruction Fuzzy Hash: EDA1EB71619A09CFFF94FF75E898AAA37B2F768301721893A900AD3174DABCD545CB40
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID: ?
              • API String ID: 0-1684325040
              • Opcode ID: daf65675f3bffc35005e75e7b4162ae52c388d63e550f19dd9eec779c8e99468
              • Instruction ID: 150938def8fcd2103730462edcf05a5b4552cbcc4994e085d8b32eb39ab3ccb0
              • Opcode Fuzzy Hash: daf65675f3bffc35005e75e7b4162ae52c388d63e550f19dd9eec779c8e99468
              • Instruction Fuzzy Hash: D931502240D7C58BEB525A38806C2D57FD09F5B204F5E07DCC6D24A7D3D6528407D392
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 598c92a77d3f8dda66df7f00e42631b8bb25fed254ebd76fcbad8f8343bff3d7
              • Instruction ID: 45ea27e68776238740392993e45f36c4cbfc9c2237472e23ddd366007c736312
              • Opcode Fuzzy Hash: 598c92a77d3f8dda66df7f00e42631b8bb25fed254ebd76fcbad8f8343bff3d7
              • Instruction Fuzzy Hash: 80620A31228A558FD31CCB1CC4B1B7AB7E1FB89340F44896DE287CB696C639DA45CB91
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b966ddc3a4a27f87df3b0e1d0093439f08c10720c9c40116a815356078c1d6ce
              • Instruction ID: d5dd5c55ac266d130c752bd8f06d9a988cdb58b094c95dc04fbb2d01a149c9e0
              • Opcode Fuzzy Hash: b966ddc3a4a27f87df3b0e1d0093439f08c10720c9c40116a815356078c1d6ce
              • Instruction Fuzzy Hash: EC52EE312286558FD31CCF1CC5A1E7AB7E1FB8D340F448A6DE28ACB692C639E545CB91
              Memory Dump Source
              • Source File: 00000006.00000003.1354728332.0000026E033C0000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000026E033C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_3_26e033c0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d366354534a9572f79d4aff29333c7cafe5288c4e4458810ea210a06cb1389b2
              • Instruction ID: f9b3405f86c7f3644abc175d4b216797663bd7756370e6a9ec47f06c14ecb03d
              • Opcode Fuzzy Hash: d366354534a9572f79d4aff29333c7cafe5288c4e4458810ea210a06cb1389b2
              • Instruction Fuzzy Hash: C4519CBA90C6C79FEB069A3494ED3D47F619F67214F2D06ECC0928B693D9068407C791
              Memory Dump Source
              • Source File: 00000006.00000003.1354728332.0000026E033C0000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000026E033C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_3_26e033c0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6f9e49f682d3545870b6b9835a02302a39fde6194118b9a0fe97a137350e698a
              • Instruction ID: 57554eaf9c13187ba0c20f8cbabd793c87853b05428766a1184bcc7f428f93a4
              • Opcode Fuzzy Hash: 6f9e49f682d3545870b6b9835a02302a39fde6194118b9a0fe97a137350e698a
              • Instruction Fuzzy Hash: 5B51A72B60C2C69EEB16DF34D8C87D43FA1AB0B254B6A12DDC4A14B5A3DB675443DB80
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4eb5025c488799d2f8a5c20adae6e44962d3733a5097a7cf8a007b1505b36c11
              • Instruction ID: 624ec4f89be9b2833750fe48e477a0fafa2b19c3e154e2e9d9c4e5825c9f140c
              • Opcode Fuzzy Hash: 4eb5025c488799d2f8a5c20adae6e44962d3733a5097a7cf8a007b1505b36c11
              • Instruction Fuzzy Hash: F841266640C9CAAAE7168F3484A83D57BA2AF57308F2D02CCC4D25B3E3D6A35402D351
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 41537edae7fd09a1d0932e558d8ac235093b37a8380a38275133ea2c9a3a4088
              • Instruction ID: df1826fd5880bafe404092f72e82e64b4b6a12587f9bfeb3b56e821290a5ec8e
              • Opcode Fuzzy Hash: 41537edae7fd09a1d0932e558d8ac235093b37a8380a38275133ea2c9a3a4088
              • Instruction Fuzzy Hash: 6A01753240D3D2EFDB16EA78D0956D27FA16B1731472E21DDC0A18F163D2565047FB62

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
              • String ID:
              • API String ID: 388111225-0
              • Opcode ID: 45b9cdfc7a25f1278b796800b15345f673bb2555b0332f4ab4807a0dfd005840
              • Instruction ID: 9fcaaf80579f50104dd6ca1ad1f20479657563c75b361a5fc0cc43e169d218cb
              • Opcode Fuzzy Hash: 45b9cdfc7a25f1278b796800b15345f673bb2555b0332f4ab4807a0dfd005840
              • Instruction Fuzzy Hash: 3C31C53510CF06CEEB546F68988A26E3790EB87330F5A0A58F456B72D3D6B2A8014351

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock_unlock_fhandle
              • String ID:
              • API String ID: 2644381645-0
              • Opcode ID: 4df773109a1628873075912f98a72f3a906b561885a4cc113f55c358271b2c3b
              • Instruction ID: d33f029e53677362413dadf019398569e543b8434566712c031c34215fecca1a
              • Opcode Fuzzy Hash: 4df773109a1628873075912f98a72f3a906b561885a4cc113f55c358271b2c3b
              • Instruction Fuzzy Hash: 1C21F33521CE068EFF596B68D84A3AA72D0EBC6360F5E0A49F015B71D3D6F258014662

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock_unlock_fhandle
              • String ID:
              • API String ID: 1078912150-0
              • Opcode ID: 689a55ff460a42ab0e8479ad490ad51203e5d8515b6f39f729bbcfe6708b8e94
              • Instruction ID: 7f2f7e7bd0739c4b477177ca2494ea4f3ac9c33ba7c6f75a86bf187727408c4a
              • Opcode Fuzzy Hash: 689a55ff460a42ab0e8479ad490ad51203e5d8515b6f39f729bbcfe6708b8e94
              • Instruction Fuzzy Hash: D621243560CA06CEFB196B28DC4A37E32C0EFC6320F2F0A58F016A71D3D6F658018662

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_unlock_fhandle
              • String ID:
              • API String ID: 2464146582-0
              • Opcode ID: 1700ff755fa86426cee97dc6493a8bbd2f86863ab499d60c3e97554295ddf05f
              • Instruction ID: 9b51cc0f64fba3658a3ba8928796d0a3cbddc45e42ca34748464cd5921e394bb
              • Opcode Fuzzy Hash: 1700ff755fa86426cee97dc6493a8bbd2f86863ab499d60c3e97554295ddf05f
              • Instruction Fuzzy Hash: 1321D63560CA058EFA556B68D84A3AA72D2DFC6331F1E0A4CF056A71D3D6F558018292

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno_unlock_fhandle
              • String ID:
              • API String ID: 2140805544-0
              • Opcode ID: 33c656564c66f9f9654a7b196b7fb26e9ac042736a70bebf64fd6ea01e35a20d
              • Instruction ID: 7ff67d08418986dd3d5ef9d86d0ad3d05735f6fad36e88ef47c8078aad5b35df
              • Opcode Fuzzy Hash: 33c656564c66f9f9654a7b196b7fb26e9ac042736a70bebf64fd6ea01e35a20d
              • Instruction Fuzzy Hash: C521F03A10DE06DEFB156B65C88936A7690EFC6321F1B095CF11AB72E3C6F798008761
              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: free$FreeHeap_errno
              • String ID:
              • API String ID: 2737118440-0
              • Opcode ID: f2c387d57ff385ba375dc00a6173171a26f2c39e06d74853e0125178de0f68c4
              • Instruction ID: a91a23b296843b6403c2c546cf8ba7f5b36f876059cd5a555ed4ca97b585ee3e
              • Opcode Fuzzy Hash: f2c387d57ff385ba375dc00a6173171a26f2c39e06d74853e0125178de0f68c4
              • Instruction Fuzzy Hash: B841B434268E0FCFFF94EB58D899BA673E2F758312F5A01AAD005D21D1CABD8885C711
              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: free$malloc$_errno$_callnewh
              • String ID:
              • API String ID: 4160633307-0
              • Opcode ID: 78c5723810e6e6d18fab4a62d391ea0db65c57382cb75ed74f6abc212771b6cb
              • Instruction ID: 3b005ae4020546d12180d2c9607eedbec703aba36a6900425c4ac50b8886b8fe
              • Opcode Fuzzy Hash: 78c5723810e6e6d18fab4a62d391ea0db65c57382cb75ed74f6abc212771b6cb
              • Instruction Fuzzy Hash: CA91EA3C31CB0A8BFB59AB6C944977B73D1EB85B00F59065ED48AD36C2DE61DC028782
              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: Packaged__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
              • String ID:
              • API String ID: 2917016420-0
              • Opcode ID: cfbfe809ff06962f400f8854e8dfaca57605153f463412cb5835124c7fa4a529
              • Instruction ID: a4ff7acebfca594d74769336c29c5cbf1717add79ff681c4bbbbf83c0943ebf1
              • Opcode Fuzzy Hash: cfbfe809ff06962f400f8854e8dfaca57605153f463412cb5835124c7fa4a529
              • Instruction Fuzzy Hash: B931BB34618E0ACFFF94EF69980936A72D2FB88351F19465EB449D32D1D7B5C8418741
              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errno$__doserrno__lock_fhandle_getptd_noexit_unlock_fhandle
              • String ID:
              • API String ID: 4120058822-0
              • Opcode ID: c8931cb6991e1dcdb4b4beaef908be2012675e49725fd5fc40ebfddcb96b8d14
              • Instruction ID: f5412671ed9dc517e58b999b684116ccac52a6e8d55f5c13b68035d167fbdda6
              • Opcode Fuzzy Hash: c8931cb6991e1dcdb4b4beaef908be2012675e49725fd5fc40ebfddcb96b8d14
              • Instruction Fuzzy Hash: C621D33960CE0ACEFA546F68989936E7690EFC6310F4E051CF21AA72D2D7F698508751
              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errno$_filbuf_fileno_getptd_noexit_invalid_parameter_noinfomemcpy_s
              • String ID:
              • API String ID: 2328795619-0
              • Opcode ID: 4bbdce99b29ecd3e24264ac9f3b66a56e11342a03ebc5466d7d382185dba5216
              • Instruction ID: d7b9b52e5b55fe01b9af6a9313f8bf69646d20010ddb7ea583b98588e965cab0
              • Opcode Fuzzy Hash: 4bbdce99b29ecd3e24264ac9f3b66a56e11342a03ebc5466d7d382185dba5216
              • Instruction Fuzzy Hash: 9961EA3821CF0B8AEB6C5A2C445D33772D2E795722F2E432FE455E32D1DAA2DC5246C1
              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: __updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
              • String ID:
              • API String ID: 2808835054-0
              • Opcode ID: 04a51c6534ba67d8c2ce71a0e6c0b8946822a3beaaa0ad6abf8e1e016199c0f5
              • Instruction ID: 6ff39678a9e75a6a8029ab0117f574fdd8dbc7224b209c7cce3ce8dcda78b93d
              • Opcode Fuzzy Hash: 04a51c6534ba67d8c2ce71a0e6c0b8946822a3beaaa0ad6abf8e1e016199c0f5
              • Instruction Fuzzy Hash: 16318F7420CE0A8FEBA49F18908876A76D0FB98310F5A06ADF449E76D2DAB1DC408785
              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
              • String ID:
              • API String ID: 1547050394-0
              • Opcode ID: aea42a6da675c9ef6e6bb8b8e91e805078560935a98c47ae5044fabd1e1da4ae
              • Instruction ID: c43d0c9dea45387da3b1ccafeed6fdef5c277f66cdd19796f842a89b5382fa68
              • Opcode Fuzzy Hash: aea42a6da675c9ef6e6bb8b8e91e805078560935a98c47ae5044fabd1e1da4ae
              • Instruction Fuzzy Hash: EE21A73461CB4BCFFB90AB28940936B77D1EB89351F1A0A5AE449E31E2DBB5CC404751
              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: freemallocstrchr$FreeHeap_errnorand
              • String ID:
              • API String ID: 3504763109-0
              • Opcode ID: f35e4bf4a30ec4413237561f10dac7197b8990473e0b46e11b580f4fb44e5963
              • Instruction ID: 4e78bee3d14f0c5a590023e99cd65ede3a5fe804aff3377ecdf6d5c83111740d
              • Opcode Fuzzy Hash: f35e4bf4a30ec4413237561f10dac7197b8990473e0b46e11b580f4fb44e5963
              • Instruction Fuzzy Hash: BB81F63421CE9ECBEB65EB2C98093F7B3D2FF99305F09066AD589D71D3DA6188468341
              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: free$_errno$_callnewhmalloc
              • String ID:
              • API String ID: 2761444284-0
              • Opcode ID: a46d6df1e63736bbf5e6f8efd513222b2720334364c4a35ae3722e37f335d37b
              • Instruction ID: 14632bf119ce00e58495b709a7f2612d855b42f4a80556ac31f4d01fa53243e2
              • Opcode Fuzzy Hash: a46d6df1e63736bbf5e6f8efd513222b2720334364c4a35ae3722e37f335d37b
              • Instruction Fuzzy Hash: 2D51B03C21CF0A9BEB59EB2C944967B73D1FB49700F49016DD84AD36C7EEA1E8428781
              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: malloc$_snprintf$_errno$_callnewhfreerealloc
              • String ID:
              • API String ID: 74200508-0
              • Opcode ID: fd4b1ce187cf5d2c7b3c7d1d5f2f485ec143d87fcb2d796d9dd721ce5a89571b
              • Instruction ID: adabce9f07014f44a30d40d7f6f7c64047bea970851eb2750d6a894427806dfb
              • Opcode Fuzzy Hash: fd4b1ce187cf5d2c7b3c7d1d5f2f485ec143d87fcb2d796d9dd721ce5a89571b
              • Instruction Fuzzy Hash: 8BD1AB3470CA06CBFF58B768845A3AF72D3EB84300F19062EA446E36D3DEB5D9058781
              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errno$_invalid_parameter_noinfo$fseekmalloc$_callnewh_fseek_nolock_ftelli64fclose
              • String ID:
              • API String ID: 2887643383-0
              • Opcode ID: f1c4e02295faa99f8843714657dd5281141177bf23df19fa39898597ddf49910
              • Instruction ID: 6d65d4f35e1996f3844783d479cbebb25b58f434bda4634eb9325218a088297b
              • Opcode Fuzzy Hash: f1c4e02295faa99f8843714657dd5281141177bf23df19fa39898597ddf49910
              • Instruction Fuzzy Hash: 3C51053472CA098FEB49EB2894597BA72D2FB88310F55036EE48BD32D7DD65990287C1
              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _lock$_calloc_crt_mtinitlocknum
              • String ID:
              • API String ID: 3962633935-0
              • Opcode ID: 37ad4fda8a075f5cd4d07cec490ae037cae96ac67048c51c0eece2b82dd4d161
              • Instruction ID: 9de2868dd1fa9bb5b17bc6e5f52efc1e3e19d943b9f6359c439f57ed6e8ff48b
              • Opcode Fuzzy Hash: 37ad4fda8a075f5cd4d07cec490ae037cae96ac67048c51c0eece2b82dd4d161
              • Instruction Fuzzy Hash: 3251047451CE0ACBEB189F18C889367B3D0FB99310F1A065DF94AD32E2D7B5D852C682
              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: free$_errno$_callnewhmalloc
              • String ID:
              • API String ID: 2761444284-0
              • Opcode ID: 9dd44889f23309e2c133c4e883ac3d7c03cf28f4ebc62bcd805b5d39935d1e2d
              • Instruction ID: 5447e98fe9f43af6245aa23b1907a4c3cbc0b4a7b48908448003c673df252776
              • Opcode Fuzzy Hash: 9dd44889f23309e2c133c4e883ac3d7c03cf28f4ebc62bcd805b5d39935d1e2d
              • Instruction Fuzzy Hash: BC41E23935CB0F8BEB289B29884937B77D5EB96310F19022ED886D36C3D9A1D8064381
              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errno$_fileno_getbuf_getptd_noexit_invalid_parameter_noinfo_isatty
              • String ID:
              • API String ID: 304646821-0
              • Opcode ID: c35e8c2de9f02937b40d8dcb44627bb11330896f7d068decc206105344bae12a
              • Instruction ID: 7b012e93cbabe72532fe7e7e271a7cc3f00ec7cf1fcf02d998137b9a09951a40
              • Opcode Fuzzy Hash: c35e8c2de9f02937b40d8dcb44627bb11330896f7d068decc206105344bae12a
              • Instruction Fuzzy Hash: 2651A134118E0A8FFF98EF18C49976677E1EB88310F5D0659F85ADB2D6D6B6C840C781
              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errno$_snprintffreemalloc$FreeHeap_callnewh_invalid_parameter_noinfo
              • String ID:
              • API String ID: 343393124-0
              • Opcode ID: faf2166294d0965833cb84c6e7fe882f3c5ed13ceeefabe40a4c11aee224dca5
              • Instruction ID: 89b33c898f4158340bf1cdd03c9e4a54a3e1dbc64a6aa189de17f188acf813b3
              • Opcode Fuzzy Hash: faf2166294d0965833cb84c6e7fe882f3c5ed13ceeefabe40a4c11aee224dca5
              • Instruction Fuzzy Hash: C541A33430CA494FEA98AB2C68197B977D3E79E310F49429ED08EC32D6DD659C428782
              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errno$free$FreeHeap_callnewhfclosefwritemalloc
              • String ID:
              • API String ID: 415550720-0
              • Opcode ID: c287650ca013cd6fba82a94b2bfab312077d62521af6d54d1c0599a360ecab3d
              • Instruction ID: 9414624a55aa0166900a14ccda33db1cb1f82bc2b87749d4ccc5c0aaefd9fbe7
              • Opcode Fuzzy Hash: c287650ca013cd6fba82a94b2bfab312077d62521af6d54d1c0599a360ecab3d
              • Instruction Fuzzy Hash: 1E21B83421CE0A8BEF45FB2880597AF72D2FB98314F49065EB04AE36C6DDA589054342
              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _getptd_noexit$__doserrno_errno
              • String ID:
              • API String ID: 2964073243-0
              • Opcode ID: 7de39b626677fa29025c8f4af27b0a540db68e2d6824cc23474586602198323a
              • Instruction ID: 126242b72f7bc010acd8ea4333d7444039d200a60370ab6938c60eb9619beb04
              • Opcode Fuzzy Hash: 7de39b626677fa29025c8f4af27b0a540db68e2d6824cc23474586602198323a
              • Instruction Fuzzy Hash: 5701213802DC0ECEFA95AB28C84839A3290FF8A321F9A4644B115F70E2D7BA14108712
              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _snprintf
              • String ID:
              • API String ID: 3512837008-0
              • Opcode ID: 72e4e973a1d0442b98f7febb78707b45b3081222fbe35b5ecbc6412512dc3076
              • Instruction ID: 1e4c424b26a3356ce5079d67c214a12b20f9d20db675e28479af7d2556dd8fe7
              • Opcode Fuzzy Hash: 72e4e973a1d0442b98f7febb78707b45b3081222fbe35b5ecbc6412512dc3076
              • Instruction Fuzzy Hash: 9291C43421CA09CFEF55EF18D889BAA73E6FB95300F05066AE44AD32D2DE75D905CB81
              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errnomalloc$_callnewh$_invalid_parameter_noinfo_snprintf
              • String ID:
              • API String ID: 2026495703-0
              • Opcode ID: b352101c7262c8bcb4a5e96376bd10b91777e0dce9561e268234f3b9efdf5141
              • Instruction ID: cba4ef76647bffdfc08239f50eff4d97521d402162f402dd821abeab8d0283ce
              • Opcode Fuzzy Hash: b352101c7262c8bcb4a5e96376bd10b91777e0dce9561e268234f3b9efdf5141
              • Instruction Fuzzy Hash: 4211513061CF094FEBA8EB6CA44936676E2EB8C310F15465FE09AC32D6DA749D4187C2
              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errno_fileno_flush_getptd_noexit_invalid_parameter_noinfo
              • String ID:
              • API String ID: 634798775-0
              • Opcode ID: 34e7f92ebff520e6a17a4e985317f9f17b8bd586bad3667c73d28a98cf0395a5
              • Instruction ID: ec858b6d05bcdc3c78ba6d9d707fd83acdb6894f2d175d1cebbdbc4ffbb5dba5
              • Opcode Fuzzy Hash: 34e7f92ebff520e6a17a4e985317f9f17b8bd586bad3667c73d28a98cf0395a5
              • Instruction Fuzzy Hash: 3F51F23421CF0B8BEF68696D584E33772C2E754711F6A036FD45AD31E6E5E2DC528181
              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: clock
              • String ID:
              • API String ID: 3195780754-0
              • Opcode ID: 88d80a52c757cc5c40c2c6d70a970e4954adb33c3b78b443ec03df4506b3ea8d
              • Instruction ID: 9d6bd945f1079e120cb38cf87aadd315d997174a97db52fb89791b9ff2ba48e1
              • Opcode Fuzzy Hash: 88d80a52c757cc5c40c2c6d70a970e4954adb33c3b78b443ec03df4506b3ea8d
              • Instruction Fuzzy Hash: 5F212E3584C70EDFEF74AE9C548633BB7D0D794360F1A022EE8C6A3593E5A19C4682D2
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
              • String ID: B
              • API String ID: 1812809483-1255198513
              • Opcode ID: c02d2d703cad3fde31994e70e132d1470a84cf0b2fdde3fa0011d2dc5e3ae6ea
              • Instruction ID: 7296438aa5192d8b143aff0a911a9e246734e37c30d14bcf93a462eaf5b13289
              • Opcode Fuzzy Hash: c02d2d703cad3fde31994e70e132d1470a84cf0b2fdde3fa0011d2dc5e3ae6ea
              • Instruction Fuzzy Hash: 9811BF30228F098FEB54EF58948976AB3D2FB98324F5547AEA059D32E1DB74C844C782
              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: free$_errno$_callnewhmalloc
              • String ID:
              • API String ID: 2761444284-0
              • Opcode ID: 220d10eecca3932b28677e19a5d899b4e1de467fae96e5e6bbac4d4284393be2
              • Instruction ID: ba9627371ca9059cc36e9e34edeef6ef714229c89d7d50fa905b5079ae4a1389
              • Opcode Fuzzy Hash: 220d10eecca3932b28677e19a5d899b4e1de467fae96e5e6bbac4d4284393be2
              • Instruction Fuzzy Hash: A861C83431C91ACBFE58EB18D4597AA73D3E789350F1A0A2EE546D31D3DFA698428381
              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.2589409754.0000026E03780000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000026E03780000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_26e03780000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: malloc
              • String ID:
              • API String ID: 2803490479-0
              • Opcode ID: eb22e79342f6c44f5990d3d93bc1acaf377093f70efb3d4e41a798bd81bbd69f
              • Instruction ID: 70a79e1486399c4c46e78f9e7629c768c4eaf2dfe1530103a1ed97c316a27580
              • Opcode Fuzzy Hash: eb22e79342f6c44f5990d3d93bc1acaf377093f70efb3d4e41a798bd81bbd69f
              • Instruction Fuzzy Hash: B851A43C21CA068BEF59DF2CD48967B73D1EB89710F19455DD88FD36C6EA61DC028681

              Execution Graph

              Execution Coverage:1.3%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:0%
              Total number of Nodes:562
              Total number of Limit Nodes:29
              execution_graph 16222 15a06ff0000 16224 15a06ff0021 SleepEx 16222->16224 16225 15a06ff00de 16224->16225 15407 15a072f0bc8 15409 15a072f0be4 _DllMainCRTStartup 15407->15409 15408 15a072f0c74 15416 15a072f0c3e 15408->15416 15448 15a072e8460 15408->15448 15409->15408 15409->15416 15419 15a072f0a68 15409->15419 15411 15a072f0c92 15412 15a072f0cbb 15411->15412 15415 15a072e8460 _DllMainCRTStartup 7 API calls 15411->15415 15414 15a072f0a68 _CRT_INIT RtlFreeHeap 15412->15414 15412->15416 15414->15416 15417 15a072f0cae 15415->15417 15418 15a072f0a68 _CRT_INIT RtlFreeHeap 15417->15418 15418->15412 15420 15a072f0af7 15419->15420 15423 15a072f0a7a _heap_init 15419->15423 15421 15a072f0b4d 15420->15421 15427 15a072f0afb _CRT_INIT 15420->15427 15422 15a072f0bb0 15421->15422 15429 15a072f0b52 _freeptd 15421->15429 15435 15a072f0a83 _CRT_INIT 15422->15435 15532 15a072f4888 15422->15532 15423->15435 15458 15a072f4a30 15423->15458 15427->15435 15498 15a072eefec 15427->15498 15429->15435 15520 15a072f37a8 15429->15520 15431 15a072f71ec _ioterm RtlFreeHeap 15431->15435 15432 15a072f0a8f _RTC_Initialize 15432->15435 15464 15a072f83fc 15432->15464 15433 15a072f0b6f _mtinit 15433->15435 15436 15a072f0ba6 15433->15436 15437 15a072f0b90 15433->15437 15435->15408 15529 15a072ee2c4 15436->15529 15524 15a072f496c 15437->15524 15449 15a072e853b 15448->15449 15454 15a072e8482 _DllMainCRTStartup 15448->15454 15450 15a072e8487 _DllMainCRTStartup 15449->15450 15829 15a072ea4fc 15449->15829 15450->15411 15452 15a072e84e5 _DllMainCRTStartup 15777 15a072dbaf4 15452->15777 15454->15450 15454->15452 15841 15a072ec36c 15454->15841 15457 15a072ec36c _DllMainCRTStartup VirtualFree 15457->15452 15460 15a072f4a3b _mtinit _mtinitlocks 15458->15460 15459 15a072f4a8e 15459->15432 15460->15459 15461 15a072f37a8 _calloc_crt RtlFreeHeap 15460->15461 15462 15a072f4a6a _mtinit 15461->15462 15462->15459 15463 15a072f496c _initptd RtlFreeHeap 15462->15463 15463->15459 15465 15a072f841b 15464->15465 15469 15a072f0ab1 15465->15469 15536 15a072f3828 15465->15536 15468 15a072ee2c4 free RtlFreeHeap 15468->15469 15470 15a072f6ec0 15469->15470 15613 15a072f2e0c 15470->15613 15499 15a072ef003 15498->15499 15500 15a072ef025 15499->15500 15502 15a072ee2c4 free RtlFreeHeap 15499->15502 15501 15a072ee2c4 free RtlFreeHeap 15500->15501 15503 15a072ef034 15501->15503 15502->15499 15504 15a072ef05b 15503->15504 15507 15a072ee2c4 free RtlFreeHeap 15503->15507 15505 15a072ee2c4 free RtlFreeHeap 15504->15505 15506 15a072ef06a 15505->15506 15508 15a072ee2c4 free RtlFreeHeap 15506->15508 15507->15503 15509 15a072ef07e 15508->15509 15510 15a072ee2c4 free RtlFreeHeap 15509->15510 15511 15a072ef08a 15510->15511 15512 15a072ef0b5 15511->15512 15513 15a072ee2c4 free RtlFreeHeap 15511->15513 15514 15a072ef0d6 15512->15514 15515 15a072ee2c4 free RtlFreeHeap 15512->15515 15513->15512 15516 15a072ef0ef 15514->15516 15517 15a072ee2c4 free RtlFreeHeap 15514->15517 15515->15514 15518 15a072ef120 15516->15518 15519 15a072ee2c4 free RtlFreeHeap 15516->15519 15517->15516 15518->15431 15518->15435 15519->15518 15522 15a072f37cd 15520->15522 15523 15a072f380a 15522->15523 15747 15a072f8d6c 15522->15747 15523->15433 15525 15a072f2e0c _lock RtlFreeHeap 15524->15525 15526 15a072f49d2 _locterm 15525->15526 15527 15a072f2e0c _lock RtlFreeHeap 15526->15527 15528 15a072f49f1 _locterm __addlocaleref 15527->15528 15528->15435 15530 15a072ee2c9 RtlFreeHeap 15529->15530 15531 15a072ee2e4 _errno realloc 15529->15531 15530->15531 15531->15435 15533 15a072f48be 15532->15533 15534 15a072f489c _freeptd _mtinit 15532->15534 15533->15435 15751 15a072f4754 15534->15751 15539 15a072f3850 15536->15539 15538 15a072f3885 15538->15468 15538->15469 15539->15538 15540 15a072ee304 15539->15540 15541 15a072ee398 _callnewh 15540->15541 15547 15a072ee31c _callnewh malloc 15540->15547 15543 15a072f0d98 _errno RtlFreeHeap 15541->15543 15550 15a072ee38d 15543->15550 15545 15a072ee37d 15576 15a072f0d98 15545->15576 15547->15545 15548 15a072ee382 15547->15548 15547->15550 15551 15a072f0e70 15547->15551 15560 15a072f0ee4 15547->15560 15549 15a072f0d98 _errno RtlFreeHeap 15548->15549 15549->15550 15550->15539 15579 15a072f8784 15551->15579 15553 15a072f0e7e 15554 15a072f0e8d 15553->15554 15555 15a072f8784 _set_error_mode RtlFreeHeap 15553->15555 15556 15a072f0ee4 _NMSG_WRITE RtlFreeHeap 15554->15556 15559 15a072f0eae 15554->15559 15555->15554 15557 15a072f0ea4 15556->15557 15558 15a072f0ee4 _NMSG_WRITE RtlFreeHeap 15557->15558 15558->15559 15559->15547 15561 15a072f0f18 _NMSG_WRITE 15560->15561 15562 15a072f8784 _set_error_mode RtlFreeHeap 15561->15562 15563 15a072f1035 setSBUpLow __crtMessageBoxW _invoke_watson 15561->15563 15564 15a072f0f2e 15562->15564 15563->15547 15564->15563 15565 15a072f8784 _set_error_mode RtlFreeHeap 15564->15565 15566 15a072f0f3f 15565->15566 15566->15563 15583 15a072f8630 15566->15583 15568 15a072f0f7b 15568->15563 15569 15a072f8630 _NMSG_WRITE RtlFreeHeap 15568->15569 15570 15a072f0fbb _NMSG_WRITE 15568->15570 15569->15570 15570->15563 15571 15a072f1005 15570->15571 15590 15a072f86b8 15570->15590 15571->15563 15597 15a072f85a8 15571->15597 15573 15a072f101f 15573->15563 15575 15a072f85a8 _NMSG_WRITE RtlFreeHeap 15573->15575 15575->15563 15604 15a072f48e8 15576->15604 15580 15a072f878c 15579->15580 15581 15a072f0d98 _errno RtlFreeHeap 15580->15581 15582 15a072f8796 _invalid_parameter_noinfo 15580->15582 15581->15582 15582->15553 15584 15a072f863e 15583->15584 15585 15a072f8648 15583->15585 15584->15585 15588 15a072f8665 15584->15588 15586 15a072f0d98 _errno RtlFreeHeap 15585->15586 15587 15a072f8651 _invalid_parameter_noinfo 15586->15587 15587->15568 15588->15587 15589 15a072f0d98 _errno RtlFreeHeap 15588->15589 15589->15587 15593 15a072f86c5 15590->15593 15591 15a072f86ca 15592 15a072f0d98 _errno RtlFreeHeap 15591->15592 15596 15a072f86cf _invalid_parameter_noinfo 15591->15596 15592->15596 15593->15591 15594 15a072f8708 15593->15594 15593->15596 15595 15a072f0d98 _errno RtlFreeHeap 15594->15595 15594->15596 15595->15596 15596->15571 15598 15a072f85b9 15597->15598 15600 15a072f85c3 15597->15600 15598->15600 15602 15a072f85fa 15598->15602 15599 15a072f0d98 _errno RtlFreeHeap 15601 15a072f85cc _invalid_parameter_noinfo 15599->15601 15600->15599 15601->15573 15602->15601 15603 15a072f0d98 _errno RtlFreeHeap 15602->15603 15603->15601 15605 15a072f48f8 _freeptd 15604->15605 15606 15a072f37a8 _calloc_crt RtlFreeHeap 15605->15606 15612 15a072f0da1 15605->15612 15607 15a072f491a _mtinit 15606->15607 15608 15a072f4937 15607->15608 15609 15a072f494d 15607->15609 15607->15612 15610 15a072f496c _initptd RtlFreeHeap 15608->15610 15611 15a072ee2c4 free RtlFreeHeap 15609->15611 15610->15612 15611->15612 15612->15548 15614 15a072f2e2f 15613->15614 15615 15a072f2e2a 15613->15615 15617 15a072f2ed8 15615->15617 15618 15a072f2ef5 15617->15618 15619 15a072f2f04 malloc 15617->15619 15620 15a072f0e70 _FF_MSGBANNER RtlFreeHeap 15618->15620 15622 15a072f3828 _malloc_crt RtlFreeHeap 15619->15622 15631 15a072f2f1f 15619->15631 15621 15a072f2efa 15620->15621 15623 15a072f0ee4 _NMSG_WRITE RtlFreeHeap 15621->15623 15624 15a072f2f30 15622->15624 15623->15619 15625 15a072f2f38 15624->15625 15626 15a072f2f47 15624->15626 15627 15a072f0d98 _errno RtlFreeHeap 15625->15627 15628 15a072f2e0c _lock RtlFreeHeap 15626->15628 15627->15631 15629 15a072f2f51 15628->15629 15630 15a072ee2c4 free RtlFreeHeap 15629->15630 15629->15631 15630->15631 15631->15614 15748 15a072f8d81 15747->15748 15750 15a072f8d94 _callnewh 15747->15750 15749 15a072f0d98 _errno RtlFreeHeap 15748->15749 15748->15750 15749->15750 15750->15522 15752 15a072f475d 15751->15752 15776 15a072f487c 15751->15776 15753 15a072f4778 15752->15753 15754 15a072ee2c4 free RtlFreeHeap 15752->15754 15755 15a072f4786 15753->15755 15756 15a072ee2c4 free RtlFreeHeap 15753->15756 15754->15753 15757 15a072f4794 15755->15757 15758 15a072ee2c4 free RtlFreeHeap 15755->15758 15756->15755 15759 15a072f47a2 15757->15759 15761 15a072ee2c4 free RtlFreeHeap 15757->15761 15758->15757 15760 15a072f47b0 15759->15760 15762 15a072ee2c4 free RtlFreeHeap 15759->15762 15763 15a072f47be 15760->15763 15764 15a072ee2c4 free RtlFreeHeap 15760->15764 15761->15759 15762->15760 15765 15a072f47cf 15763->15765 15766 15a072ee2c4 free RtlFreeHeap 15763->15766 15764->15763 15767 15a072f47e7 15765->15767 15768 15a072ee2c4 free RtlFreeHeap 15765->15768 15766->15765 15769 15a072f2e0c _lock RtlFreeHeap 15767->15769 15768->15767 15771 15a072f47f3 15769->15771 15770 15a072f4820 _locterm 15773 15a072f2e0c _lock RtlFreeHeap 15770->15773 15771->15770 15772 15a072ee2c4 free RtlFreeHeap 15771->15772 15772->15770 15774 15a072f4832 _locterm _freefls 15773->15774 15775 15a072ee2c4 free RtlFreeHeap 15774->15775 15775->15776 15776->15533 15845 15a072e506c 15777->15845 15779 15a072dbb12 _DllMainCRTStartup 15780 15a072ee304 malloc RtlFreeHeap 15779->15780 15781 15a072dbbc0 15780->15781 15852 15a072eb2b0 15781->15852 15787 15a072dbc35 15788 15a072edb28 _DllMainCRTStartup RtlFreeHeap 15787->15788 15789 15a072dbc4f _DllMainCRTStartup 15788->15789 15791 15a072dbc5d _DllMainCRTStartup 15789->15791 15901 15a072ecaf4 15789->15901 15792 15a072dbc79 15791->15792 15793 15a072ecaf4 _DllMainCRTStartup 2 API calls 15791->15793 15875 15a072de278 15792->15875 15793->15792 15796 15a072dbc8e 15881 15a072de2f4 15796->15881 15797 15a072ecaf4 _DllMainCRTStartup 2 API calls 15797->15796 15800 15a072ecaf4 _DllMainCRTStartup 2 API calls 15801 15a072dbc9c 15800->15801 15802 15a072ee304 malloc RtlFreeHeap 15801->15802 15803 15a072dbccf 15802->15803 15804 15a072dbcdc 15803->15804 15805 15a072ecaf4 _DllMainCRTStartup 2 API calls 15803->15805 15806 15a072edb28 _DllMainCRTStartup RtlFreeHeap 15804->15806 15805->15804 15807 15a072dbcf8 15806->15807 15891 15a072e4ce0 15807->15891 15830 15a072e506c _DllMainCRTStartup RtlFreeHeap 15829->15830 15831 15a072ea520 setSBCS _DllMainCRTStartup 15830->15831 15832 15a072ee304 malloc RtlFreeHeap 15831->15832 15833 15a072ea5ad setSBCS 15832->15833 15834 15a072edb28 _DllMainCRTStartup RtlFreeHeap 15833->15834 15835 15a072ea5de _DllMainCRTStartup 15834->15835 15838 15a072ea5f5 memcpy_s _DllMainCRTStartup 15835->15838 16216 15a072de094 15835->16216 15837 15a072ea882 setSBCS _DllMainCRTStartup 15837->15450 15838->15837 15839 15a072ee304 malloc RtlFreeHeap 15838->15839 15840 15a072edb28 _DllMainCRTStartup RtlFreeHeap 15838->15840 15839->15838 15840->15838 15842 15a072ec419 VirtualFree 15841->15842 15844 15a072ec391 _DllMainCRTStartup 15841->15844 15843 15a072e8507 15842->15843 15843->15452 15843->15457 15844->15842 15844->15843 15846 15a072ee304 malloc RtlFreeHeap 15845->15846 15847 15a072e508d 15846->15847 15848 15a072ee304 malloc RtlFreeHeap 15847->15848 15851 15a072e5095 setSBCS _DllMainCRTStartup 15847->15851 15849 15a072e50a1 15848->15849 15850 15a072ee2c4 free RtlFreeHeap 15849->15850 15849->15851 15850->15851 15851->15779 15853 15a072eb2d9 _DllMainCRTStartup 15852->15853 15909 15a072ef4cc 15853->15909 15856 15a072ee304 malloc RtlFreeHeap 15858 15a072eb321 setSBCS memcpy_s 15856->15858 15859 15a072eb38a 15858->15859 15912 15a072f089c 15858->15912 15860 15a072f089c _DllMainCRTStartup RtlFreeHeap 15859->15860 15861 15a072dbc07 15860->15861 15862 15a072e2520 15861->15862 15863 15a072e2533 _DllMainCRTStartup 15862->15863 15864 15a072ef4cc _DllMainCRTStartup RtlFreeHeap 15863->15864 15865 15a072e253b 15864->15865 15915 15a072e1fdc 15865->15915 15868 15a072edb28 15869 15a072edb67 15868->15869 15870 15a072edb7d setSBCS 15868->15870 15871 15a072edb73 15869->15871 15872 15a072edb7f 15869->15872 15870->15787 15873 15a072ee304 malloc RtlFreeHeap 15871->15873 15874 15a072f0994 realloc RtlFreeHeap 15872->15874 15873->15870 15874->15870 15877 15a072de28e 15875->15877 15876 15a072dbc85 15876->15796 15876->15797 15877->15876 15877->15877 15920 15a072e995c 15877->15920 15879 15a072de2c8 15924 15a072e9994 15879->15924 15883 15a072de319 15881->15883 15882 15a072dbc93 15882->15800 15882->15801 15883->15882 15884 15a072ee304 malloc RtlFreeHeap 15883->15884 15886 15a072de395 memcpy_s _DllMainCRTStartup 15884->15886 15885 15a072de3eb setSBCS 15889 15a072ee2c4 free RtlFreeHeap 15885->15889 15886->15885 15887 15a072e995c _DllMainCRTStartup RtlFreeHeap 15886->15887 15888 15a072de3cc 15887->15888 15890 15a072e9994 _DllMainCRTStartup RtlFreeHeap 15888->15890 15889->15882 15890->15885 15892 15a072e4cfe _DllMainCRTStartup 15891->15892 16088 15a072ea134 15892->16088 15894 15a072e4d28 15895 15a072ef4cc _DllMainCRTStartup RtlFreeHeap 15894->15895 15896 15a072e4d3f _DllMainCRTStartup 15895->15896 16092 15a072e4ea8 15896->16092 15898 15a072e4e14 setSBCS memcpy_s _DllMainCRTStartup 16101 15a072e9c4c 15898->16101 15900 15a072e4e75 15902 15a072ecb08 15901->15902 16196 15a072dc2e8 15902->16196 15904 15a072ecb24 16203 15a072e3ea4 15904->16203 15908 15a072ecb2e _DllMainCRTStartup 15910 15a072f48c4 _getptd RtlFreeHeap 15909->15910 15911 15a072eb2e1 15910->15911 15911->15856 15913 15a072f48c4 _getptd RtlFreeHeap 15912->15913 15914 15a072f08c0 setSBUpLow _DllMainCRTStartup 15913->15914 15914->15858 15916 15a072dbc14 15915->15916 15917 15a072e2007 _DllMainCRTStartup 15915->15917 15916->15868 15917->15916 15918 15a072ee304 malloc RtlFreeHeap 15917->15918 15919 15a072edb28 _DllMainCRTStartup RtlFreeHeap 15917->15919 15918->15917 15919->15917 15921 15a072e9977 15920->15921 15923 15a072e9973 _DllMainCRTStartup 15920->15923 15930 15a072e9bd4 15921->15930 15923->15879 15925 15a072e99bc 15924->15925 15926 15a072ee6bc _snprintf RtlFreeHeap 15925->15926 15927 15a072e99fc 15926->15927 15928 15a072ee6bc _snprintf RtlFreeHeap 15927->15928 15929 15a072e9a12 _DllMainCRTStartup 15928->15929 15929->15876 15937 15a072ee6bc 15930->15937 15932 15a072e9bf1 15933 15a072ee6bc _snprintf RtlFreeHeap 15932->15933 15934 15a072e9c3c 15933->15934 15946 15a072eee84 15934->15946 15941 15a072ee6ee setSBCS 15937->15941 15938 15a072ee6f3 15939 15a072f0d98 _errno RtlFreeHeap 15938->15939 15944 15a072ee6f8 _invalid_parameter_noinfo 15939->15944 15940 15a072ee712 15950 15a072f15a8 15940->15950 15941->15938 15941->15940 15943 15a072ee742 15943->15944 15967 15a072f141c 15943->15967 15944->15932 15947 15a072f2d6c 15946->15947 16071 15a072f2b30 15947->16071 15949 15a072e9c46 15949->15923 15951 15a072f0680 __crtLCMapStringA RtlFreeHeap 15950->15951 15952 15a072f160e 15951->15952 15953 15a072f0d98 _errno RtlFreeHeap 15952->15953 15954 15a072f1613 15953->15954 15955 15a072f1f73 15954->15955 15964 15a072f1640 _snprintf 15954->15964 15988 15a072f4ad4 15954->15988 15956 15a072f0d98 _errno RtlFreeHeap 15955->15956 15958 15a072f1f78 _invalid_parameter_noinfo setSBUpLow 15956->15958 15958->15943 15960 15a072f2a54 RtlFreeHeap write_char 15960->15964 15961 15a072ee2c4 free RtlFreeHeap 15961->15964 15962 15a072f3828 _malloc_crt RtlFreeHeap 15962->15964 15963 15a072f1fc8 RtlFreeHeap write_multi_char 15963->15964 15964->15955 15964->15958 15964->15960 15964->15961 15964->15962 15964->15963 15965 15a072f2a9c RtlFreeHeap write_string 15964->15965 15966 15a072f8c94 RtlFreeHeap _snprintf 15964->15966 15992 15a072f7774 15964->15992 15965->15964 15966->15964 15968 15a072f4ad4 _fileno RtlFreeHeap 15967->15968 15969 15a072f143e 15968->15969 15970 15a072f1449 15969->15970 15971 15a072f1460 15969->15971 15973 15a072f0d98 _errno RtlFreeHeap 15970->15973 15972 15a072f1465 15971->15972 15983 15a072f1472 _vsnprintf_helper 15971->15983 15974 15a072f0d98 _errno RtlFreeHeap 15972->15974 15975 15a072f144e 15973->15975 15974->15975 15975->15944 15976 15a072f14d7 15977 15a072f14e4 15976->15977 15978 15a072f156f 15976->15978 15980 15a072f1500 15977->15980 15985 15a072f1519 15977->15985 15979 15a072f54b4 _flush RtlFreeHeap 15978->15979 15979->15975 16004 15a072f54b4 15980->16004 15983->15975 15983->15976 15984 15a072f14cb 15983->15984 15995 15a072f8a3c 15983->15995 15984->15976 16001 15a072f8a9c 15984->16001 15985->15975 16021 15a072f6c88 15985->16021 15989 15a072f4ae2 _invalid_parameter_noinfo 15988->15989 15990 15a072f4add 15988->15990 15989->15964 15991 15a072f0d98 _errno RtlFreeHeap 15990->15991 15991->15989 15993 15a072f0680 __crtLCMapStringA RtlFreeHeap 15992->15993 15994 15a072f7786 15993->15994 15994->15964 15996 15a072f8a45 15995->15996 15997 15a072f8a52 15995->15997 15998 15a072f0d98 _errno RtlFreeHeap 15996->15998 15999 15a072f0d98 _errno RtlFreeHeap 15997->15999 16000 15a072f8a4a _invalid_parameter_noinfo 15997->16000 15998->16000 15999->16000 16000->15984 16002 15a072f3828 _malloc_crt RtlFreeHeap 16001->16002 16003 15a072f8ab5 16002->16003 16003->15976 16005 15a072f54d7 16004->16005 16006 15a072f54ef 16004->16006 16041 15a072f0d28 16005->16041 16007 15a072f5566 16006->16007 16013 15a072f5521 16006->16013 16009 15a072f0d28 __doserrno RtlFreeHeap 16007->16009 16012 15a072f556b 16009->16012 16011 15a072f0d98 _errno RtlFreeHeap 16016 15a072f54e4 _invalid_parameter_noinfo _unlock_fhandle 16011->16016 16014 15a072f0d98 _errno RtlFreeHeap 16012->16014 16044 15a072f9330 16013->16044 16014->16016 16016->15975 16017 15a072f5528 16017->16016 16018 15a072f0d98 _errno RtlFreeHeap 16017->16018 16019 15a072f554a 16018->16019 16020 15a072f0d28 __doserrno RtlFreeHeap 16019->16020 16020->16016 16022 15a072f6cc3 16021->16022 16023 15a072f6cab 16021->16023 16024 15a072f6d3d 16022->16024 16029 15a072f6cf5 16022->16029 16025 15a072f0d28 __doserrno RtlFreeHeap 16023->16025 16027 15a072f0d28 __doserrno RtlFreeHeap 16024->16027 16026 15a072f6cb0 16025->16026 16028 15a072f0d98 _errno RtlFreeHeap 16026->16028 16030 15a072f6d42 16027->16030 16034 15a072f6cb8 _invalid_parameter_noinfo _unlock_fhandle 16028->16034 16031 15a072f9330 __lock_fhandle RtlFreeHeap 16029->16031 16032 15a072f0d98 _errno RtlFreeHeap 16030->16032 16033 15a072f6cfc 16031->16033 16032->16034 16035 15a072f6d08 16033->16035 16036 15a072f6d1a 16033->16036 16034->15975 16048 15a072f6d6c 16035->16048 16038 15a072f0d98 _errno RtlFreeHeap 16036->16038 16039 15a072f6d1f 16038->16039 16040 15a072f0d28 __doserrno RtlFreeHeap 16039->16040 16040->16034 16042 15a072f48e8 _getptd_noexit RtlFreeHeap 16041->16042 16043 15a072f0d31 16042->16043 16043->16011 16045 15a072f9368 16044->16045 16047 15a072f9372 _locterm 16044->16047 16046 15a072f2e0c _lock RtlFreeHeap 16045->16046 16046->16047 16047->16017 16056 15a072f966c 16048->16056 16050 15a072f6d8b 16051 15a072f6d91 16050->16051 16054 15a072f6da2 16050->16054 16052 15a072f0d98 _errno RtlFreeHeap 16051->16052 16053 15a072f6d96 16052->16053 16053->16034 16054->16053 16066 15a072f0d48 16054->16066 16057 15a072f9675 16056->16057 16058 15a072f968a 16056->16058 16059 15a072f0d28 __doserrno RtlFreeHeap 16057->16059 16060 15a072f0d28 __doserrno RtlFreeHeap 16058->16060 16065 15a072f9682 _invalid_parameter_noinfo 16058->16065 16061 15a072f967a 16059->16061 16062 15a072f96c4 16060->16062 16063 15a072f0d98 _errno RtlFreeHeap 16061->16063 16064 15a072f0d98 _errno RtlFreeHeap 16062->16064 16063->16065 16064->16065 16065->16050 16067 15a072f48e8 _getptd_noexit RtlFreeHeap 16066->16067 16068 15a072f0d59 16067->16068 16069 15a072f48e8 _getptd_noexit RtlFreeHeap 16068->16069 16070 15a072f0d72 realloc 16069->16070 16070->16053 16072 15a072f0680 __crtLCMapStringA RtlFreeHeap 16071->16072 16074 15a072f2b5c 16072->16074 16073 15a072f2b77 16075 15a072f0d98 _errno RtlFreeHeap 16073->16075 16074->16073 16077 15a072f2b8c 16074->16077 16078 15a072f2b7c _invalid_parameter_noinfo 16075->16078 16079 15a072f2bde 16077->16079 16081 15a072f7698 16077->16081 16078->15949 16079->16078 16080 15a072f0d98 _errno RtlFreeHeap 16079->16080 16080->16078 16082 15a072f0680 __crtLCMapStringA RtlFreeHeap 16081->16082 16083 15a072f76ba 16082->16083 16084 15a072f7774 _isleadbyte_l RtlFreeHeap 16083->16084 16087 15a072f76c4 16083->16087 16085 15a072f76e7 16084->16085 16086 15a072f920c __crtGetStringTypeA RtlFreeHeap 16085->16086 16086->16087 16087->16077 16089 15a072ea151 _DllMainCRTStartup 16088->16089 16107 15a072d093c 16089->16107 16091 15a072ea182 _DllMainCRTStartup 16091->15894 16093 15a072e506c _DllMainCRTStartup RtlFreeHeap 16092->16093 16094 15a072e4ed1 _DllMainCRTStartup 16093->16094 16095 15a072e4f1f GetUserNameA 16094->16095 16096 15a072e4f48 16095->16096 16113 15a072de088 16096->16113 16098 15a072e4f4d strrchr _DllMainCRTStartup 16099 15a072ee6bc _snprintf RtlFreeHeap 16098->16099 16100 15a072e5020 _DllMainCRTStartup 16099->16100 16100->15898 16102 15a072e9c7e memcpy_s _DllMainCRTStartup 16101->16102 16117 15a072d0d44 16102->16117 16104 15a072e9d3a 16106 15a072e9d89 16104->16106 16137 15a072d0be4 16104->16137 16106->15900 16109 15a072d096c _DllMainCRTStartup 16107->16109 16108 15a072d098d 16108->16091 16109->16108 16110 15a072ee304 malloc RtlFreeHeap 16109->16110 16111 15a072d09a1 16110->16111 16111->16108 16112 15a072ee2c4 free RtlFreeHeap 16111->16112 16112->16108 16114 15a072de094 _DllMainCRTStartup 16113->16114 16115 15a072de0af WSASocketA 16114->16115 16116 15a072de0d1 16115->16116 16116->16098 16118 15a072d0dde _DllMainCRTStartup 16117->16118 16120 15a072d0df7 setSBUpLow _DllMainCRTStartup 16118->16120 16141 15a072fde88 16118->16141 16120->16104 16121 15a072d0def _DllMainCRTStartup 16121->16120 16122 15a072d0f8c 16121->16122 16127 15a072d0eed 16121->16127 16123 15a072ee2c4 free RtlFreeHeap 16122->16123 16124 15a072d0f94 16123->16124 16126 15a072d3ee4 _DllMainCRTStartup RtlFreeHeap 16124->16126 16133 15a072d0fc0 16126->16133 16148 15a072d3ee4 16127->16148 16129 15a072d0f73 16131 15a072ee2c4 free RtlFreeHeap 16129->16131 16130 15a072d0f7d 16132 15a072ee2c4 free RtlFreeHeap 16130->16132 16131->16120 16132->16120 16133->16120 16135 15a072d3ee4 _DllMainCRTStartup RtlFreeHeap 16133->16135 16136 15a072d10dc 16133->16136 16134 15a072d3ee4 _DllMainCRTStartup RtlFreeHeap 16134->16120 16135->16136 16136->16120 16136->16134 16138 15a072d0c25 _DllMainCRTStartup 16137->16138 16140 15a072d0c1b _DllMainCRTStartup 16137->16140 16138->16140 16154 15a072d368c 16138->16154 16140->16106 16142 15a072f8d6c _calloc_impl RtlFreeHeap 16141->16142 16143 15a072fde9d 16142->16143 16144 15a072f0d98 _errno RtlFreeHeap 16143->16144 16147 15a072fdeba 16143->16147 16145 15a072fdeb0 16144->16145 16146 15a072f0d98 _errno RtlFreeHeap 16145->16146 16145->16147 16146->16147 16147->16121 16149 15a072d3f10 16148->16149 16150 15a072d0f6a 16149->16150 16151 15a072fde88 _DllMainCRTStartup RtlFreeHeap 16149->16151 16150->16129 16150->16130 16152 15a072d3f4f _DllMainCRTStartup 16151->16152 16152->16150 16153 15a072ee2c4 free RtlFreeHeap 16152->16153 16153->16150 16155 15a072d36bd _DllMainCRTStartup 16154->16155 16156 15a072ee304 malloc RtlFreeHeap 16155->16156 16167 15a072d3913 16155->16167 16157 15a072d372e 16156->16157 16158 15a072ee304 malloc RtlFreeHeap 16157->16158 16159 15a072d3738 16158->16159 16160 15a072ee304 malloc RtlFreeHeap 16159->16160 16161 15a072d3743 16160->16161 16162 15a072d391f 16161->16162 16164 15a072d3917 16161->16164 16168 15a072d3761 16161->16168 16163 15a072d392c 16162->16163 16166 15a072ee2c4 free RtlFreeHeap 16162->16166 16163->16167 16169 15a072ee2c4 free RtlFreeHeap 16163->16169 16165 15a072ee2c4 free RtlFreeHeap 16164->16165 16165->16162 16166->16163 16167->16140 16170 15a072d093c _DllMainCRTStartup RtlFreeHeap 16168->16170 16169->16167 16176 15a072d37a3 setSBCS memcpy_s 16170->16176 16171 15a072ee2c4 free RtlFreeHeap 16172 15a072d3903 16171->16172 16173 15a072ee2c4 free RtlFreeHeap 16172->16173 16174 15a072d390b 16173->16174 16175 15a072ee2c4 free RtlFreeHeap 16174->16175 16175->16167 16180 15a072d3817 memcpy_s 16176->16180 16181 15a072d4570 16176->16181 16178 15a072d4570 _DllMainCRTStartup RtlFreeHeap 16178->16180 16179 15a072d383f 16179->16178 16179->16179 16179->16180 16180->16171 16182 15a072d459c _DllMainCRTStartup 16181->16182 16183 15a072d46b9 16182->16183 16184 15a072ee304 malloc RtlFreeHeap 16182->16184 16183->16179 16185 15a072d45bf 16184->16185 16186 15a072ee304 malloc RtlFreeHeap 16185->16186 16187 15a072d45ca 16186->16187 16188 15a072d46c5 16187->16188 16189 15a072d46bd 16187->16189 16193 15a072d45df 16187->16193 16188->16183 16191 15a072ee2c4 free RtlFreeHeap 16188->16191 16190 15a072ee2c4 free RtlFreeHeap 16189->16190 16190->16188 16191->16183 16192 15a072ee2c4 free RtlFreeHeap 16194 15a072d46b1 16192->16194 16193->16192 16195 15a072ee2c4 free RtlFreeHeap 16194->16195 16195->16183 16197 15a072dc306 16196->16197 16198 15a072dc3ad 16197->16198 16200 15a072dc339 _DllMainCRTStartup 16197->16200 16201 15a072dc394 setSBCS _DllMainCRTStartup 16197->16201 16199 15a072ec36c _DllMainCRTStartup VirtualFree 16198->16199 16198->16201 16199->16201 16200->16201 16202 15a072dc2e8 _DllMainCRTStartup VirtualFree 16200->16202 16201->15904 16202->16201 16204 15a072e3eb3 16203->16204 16205 15a072e3ec4 16204->16205 16206 15a072ee2c4 free RtlFreeHeap 16204->16206 16207 15a072edc20 16205->16207 16206->16204 16208 15a072edcaf 16207->16208 16213 15a072edc3a setSBCS 16207->16213 16209 15a072edcc0 16208->16209 16210 15a072ee2c4 free RtlFreeHeap 16208->16210 16211 15a072edcd1 16209->16211 16212 15a072ee2c4 free RtlFreeHeap 16209->16212 16210->16209 16211->15908 16212->16211 16213->16208 16214 15a072ee2c4 free RtlFreeHeap 16213->16214 16215 15a072ec36c _DllMainCRTStartup VirtualFree 16213->16215 16214->16213 16215->16213 16220 15a072de198 16216->16220 16218 15a072de0af WSASocketA 16219 15a072de0d1 16218->16219 16219->15838 16221 15a072de1ac 16220->16221 16221->16218

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 102 15a06ff0000-15a06ff001f 103 15a06ff0021-15a06ff002f 102->103 104 15a06ff0036-15a06ff0039 103->104 105 15a06ff0031-15a06ff0034 103->105 104->103 107 15a06ff003b-15a06ff003c 104->107 105->104 106 15a06ff0069-15a06ff0073 105->106 109 15a06ff0075-15a06ff0076 106->109 110 15a06ff00ce-15a06ff00dc SleepEx 106->110 108 15a06ff003e-15a06ff0065 107->108 108->108 111 15a06ff0067 108->111 112 15a06ff0078-15a06ff007f 109->112 113 15a06ff0137-15a06ff0138 110->113 114 15a06ff00de-15a06ff00df 110->114 111->103 116 15a06ff00b7-15a06ff00cc 112->116 117 15a06ff0081 112->117 115 15a06ff013b-15a06ff0149 113->115 118 15a06ff00e1-15a06ff00e8 114->118 119 15a06ff0150-15a06ff0153 115->119 120 15a06ff014b-15a06ff014e 115->120 116->110 116->112 121 15a06ff0083-15a06ff00b5 117->121 122 15a06ff0120-15a06ff0135 118->122 123 15a06ff00ea 118->123 119->115 125 15a06ff0155-15a06ff0156 119->125 120->119 124 15a06ff0183-15a06ff0197 120->124 121->116 121->121 122->113 122->118 126 15a06ff00ec-15a06ff011e 123->126 127 15a06ff0158-15a06ff017f 125->127 126->122 126->126 127->127 128 15a06ff0181 127->128 128->115
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2588686195.0000015A06FF0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000015A06FF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a06ff0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: Sleep
              • String ID:
              • API String ID: 3472027048-0
              • Opcode ID: 88e8bec169d31fc803aeef05fed04f98ffb8ac2501b92b4af572ff67ccb03544
              • Instruction ID: 7948a8f4da15f0a948c99df06e363dfccd3a899b2f058f592fcb8360a545f94e
              • Opcode Fuzzy Hash: 88e8bec169d31fc803aeef05fed04f98ffb8ac2501b92b4af572ff67ccb03544
              • Instruction Fuzzy Hash: 20510130264E458FC71CCF1C88D1A3577D5EF8930AB65A26DE59ACF2ABCD70D862C681

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: NameUser_snprintfmallocstrrchr
              • String ID:
              • API String ID: 1238167203-0
              • Opcode ID: d69273eeb4579e6a96eb8d0c87a60564a21875d7210b55cf29d23a145d20b21e
              • Instruction ID: 7faa14c0e9ec1281d3a468686df765589dab0ef31a81fab6fcb0369816928b7b
              • Opcode Fuzzy Hash: d69273eeb4579e6a96eb8d0c87a60564a21875d7210b55cf29d23a145d20b21e
              • Instruction Fuzzy Hash: C7517330768E084FEA58AB6DA8567B977D6EBCD311F94462DF08AC72D3D934DC028742

              Control-flow Graph

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: Socket
              • String ID: _Cy
              • API String ID: 38366605-1085951347
              • Opcode ID: 9f6035121241c12ff71e8e552415c275c25b201d0c9d2d3551ffb33b20d91594
              • Instruction ID: e1710c012568a5b23d1847c277132d4721335fc042a6c4d8173c3ed9da8ebbf1
              • Opcode Fuzzy Hash: 9f6035121241c12ff71e8e552415c275c25b201d0c9d2d3551ffb33b20d91594
              • Instruction Fuzzy Hash: 6B318730658F488BD754DF2898847A6BBE1EBE8316F51167EE44AC72D1DB34CD418742

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: Internet$ConnectOpen
              • String ID:
              • API String ID: 2790792615-0
              • Opcode ID: c02896be98f17698b461471e8597e5ae08ffedd86d74317b17a8770a829ca45e
              • Instruction ID: 5e849c8a901ee3466e7ca3b9f77c4373c1ba8a49690800b270bc62ca1bbf1762
              • Opcode Fuzzy Hash: c02896be98f17698b461471e8597e5ae08ffedd86d74317b17a8770a829ca45e
              • Instruction Fuzzy Hash: 0351D430768F048FEB59DB28D8957A877D5FB8C305F51552EA08BCB2D2CA3C99028743

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 129 15a072ec36c-15a072ec38b 130 15a072ec419-15a072ec422 VirtualFree 129->130 131 15a072ec391-15a072ec39a 129->131 132 15a072ec428-15a072ec437 130->132 133 15a072ec3a6-15a072ec3a9 131->133 134 15a072ec39c-15a072ec3a4 131->134 133->130 136 15a072ec3ab-15a072ec3b3 133->136 134->133 135 15a072ec3b5-15a072ec3dc 134->135 138 15a072ec3de-15a072ec3ea 135->138 139 15a072ec3ec-15a072ec409 call 15a072ee186 135->139 136->130 136->135 142 15a072ec40e-15a072ec410 138->142 139->142 142->130 143 15a072ec412-15a072ec417 142->143 143->132
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: FreeVirtual
              • String ID:
              • API String ID: 1263568516-0
              • Opcode ID: 33013136f0bb95f1eb9f3645b418df4a5ff2efb559231014e174e8ee2656166c
              • Instruction ID: eb08e8c4e51e17a8ade380384700d4eb671f3fb057a8a1634c498ca0039f7da8
              • Opcode Fuzzy Hash: 33013136f0bb95f1eb9f3645b418df4a5ff2efb559231014e174e8ee2656166c
              • Instruction Fuzzy Hash: 1A218730558E08CFEB94DF5CE8547693BE9F7DC356F900A3AE049C72A0C6789980CB52

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
              • String ID:
              • API String ID: 388111225-0
              • Opcode ID: f569b21a01fad2a92039226acf8a97d91cb16fac7f3924a9cc2c8e1a455bf938
              • Instruction ID: a1e18c907f6b2f98f87c9f97ad11501551c4f135ada62fab311a336908818059
              • Opcode Fuzzy Hash: f569b21a01fad2a92039226acf8a97d91cb16fac7f3924a9cc2c8e1a455bf938
              • Instruction Fuzzy Hash: 6731C430168F058EE3646F699C923E93BC0EF8A322F910769F4568F2D3D674A8214B53

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock_unlock_fhandle
              • String ID:
              • API String ID: 2644381645-0
              • Opcode ID: 1a0056bbafc3a7faafb75a0a5683c60387dc6450d26c6e1c9b28f7a797692c5c
              • Instruction ID: 6e1729650435362ee5541461f08f4f70e90c743e1aa0708a629fab7b85fd77a8
              • Opcode Fuzzy Hash: 1a0056bbafc3a7faafb75a0a5683c60387dc6450d26c6e1c9b28f7a797692c5c
              • Instruction Fuzzy Hash: AC21F630668E048EF3656B58DC423E97BD0EFCD322F95076AF0558B1D3D67068614E63

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock_unlock_fhandle
              • String ID:
              • API String ID: 1078912150-0
              • Opcode ID: af586274eb7c0247a5ed565ce490a43ddd2b1adc4c580e4a875ff27a69eb19f0
              • Instruction ID: 41517f3da120aea2747ab5e0150afff7a85ad8a240c11c13b58e82242d98b14a
              • Opcode Fuzzy Hash: af586274eb7c0247a5ed565ce490a43ddd2b1adc4c580e4a875ff27a69eb19f0
              • Instruction Fuzzy Hash: A421E5316A8A048EE3256B58DC523FD3BC0DFCA322F950769F4568F2D3D67468614A53

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_unlock_fhandle
              • String ID:
              • API String ID: 2464146582-0
              • Opcode ID: c89056d156aae0bb9c491ae48c02d203d405bbf82af9f534bcd04b22b5544d86
              • Instruction ID: 8022aa2a895725ecdaeb84831b408e836a73c3f3c2dda3b686dc1885ec34a606
              • Opcode Fuzzy Hash: c89056d156aae0bb9c491ae48c02d203d405bbf82af9f534bcd04b22b5544d86
              • Instruction Fuzzy Hash: 5821F630668A048EF3656B58DC523E83BC1DFC9322F950729F0168F1D3D674A8214E93

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno_unlock_fhandle
              • String ID:
              • API String ID: 2140805544-0
              • Opcode ID: d63a0d9a057a00514656f61d256491cfcc4309f98023220473e92bade8306c33
              • Instruction ID: c70035d8d496e164544748c7067cea28d02eb125b84b6dda475614cb06b0bde7
              • Opcode Fuzzy Hash: d63a0d9a057a00514656f61d256491cfcc4309f98023220473e92bade8306c33
              • Instruction Fuzzy Hash: 6621D4315A5E84CEE3656B64CC517E97F90EFC9322F91077AB0168F1D3C6B498508F52
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: free$FreeHeap_errno
              • String ID:
              • API String ID: 2737118440-0
              • Opcode ID: f2c387d57ff385ba375dc00a6173171a26f2c39e06d74853e0125178de0f68c4
              • Instruction ID: 241a5d806c154299e19ec06bdd8c3868eaf1a4ed05fb939576f23d8f26e0e5b3
              • Opcode Fuzzy Hash: f2c387d57ff385ba375dc00a6173171a26f2c39e06d74853e0125178de0f68c4
              • Instruction Fuzzy Hash: C3415C306A0E0ACFFB95EB58DCA4BE577E5EB98312FD0016DA009C61D1CA3C89458712
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: free$malloc$_errno$_callnewh
              • String ID:
              • API String ID: 4160633307-0
              • Opcode ID: 78c5723810e6e6d18fab4a62d391ea0db65c57382cb75ed74f6abc212771b6cb
              • Instruction ID: a67122ddaca9efe5435ab7f20c0a1f6b8ae440d12d6dff2d6016a8b302a29d3b
              • Opcode Fuzzy Hash: 78c5723810e6e6d18fab4a62d391ea0db65c57382cb75ed74f6abc212771b6cb
              • Instruction Fuzzy Hash: 2F91A130768F488BE759EA2898517F977D5EBC9711F80035EA48ACB2C3DE309D028687
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: Packaged__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
              • String ID:
              • API String ID: 2917016420-0
              • Opcode ID: cfbfe809ff06962f400f8854e8dfaca57605153f463412cb5835124c7fa4a529
              • Instruction ID: e1805d10b2485d84c56426d8f17c33baf92bcb4b4e1376fec3d2c2787d527143
              • Opcode Fuzzy Hash: cfbfe809ff06962f400f8854e8dfaca57605153f463412cb5835124c7fa4a529
              • Instruction Fuzzy Hash: 96319230A64E098FFB54AB699C153A97BD4FFCC322F95466DB44AC72E2D738C8408742
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errno$__doserrno__lock_fhandle_getptd_noexit_unlock_fhandle
              • String ID:
              • API String ID: 4120058822-0
              • Opcode ID: 9341880fa3ae8ea43da77f4714028596b22b009dd5c4526b8d460d71b2af8a07
              • Instruction ID: fadd7047ad3d1bb00822e684db3f2f79c8b4c7fdaafbce8ee07b15d5c66b6106
              • Opcode Fuzzy Hash: 9341880fa3ae8ea43da77f4714028596b22b009dd5c4526b8d460d71b2af8a07
              • Instruction Fuzzy Hash: 1B21B2706A4E04CEE6246B689C913E96F90EFC9312F84073DF156CF2D3D674A8904B53
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errno$_filbuf_fileno_getptd_noexit_invalid_parameter_noinfomemcpy_s
              • String ID:
              • API String ID: 2328795619-0
              • Opcode ID: 4bbdce99b29ecd3e24264ac9f3b66a56e11342a03ebc5466d7d382185dba5216
              • Instruction ID: 4468efc52605274b8ea82ab9f8582f21e1a951792c496d3a5ee85110245651e6
              • Opcode Fuzzy Hash: 4bbdce99b29ecd3e24264ac9f3b66a56e11342a03ebc5466d7d382185dba5216
              • Instruction Fuzzy Hash: 17610630278F098AE3A8962C4D653B57BC5EFDD722FE4072EF456C62D1EA70985246C3
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: __updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
              • String ID:
              • API String ID: 2808835054-0
              • Opcode ID: 04a51c6534ba67d8c2ce71a0e6c0b8946822a3beaaa0ad6abf8e1e016199c0f5
              • Instruction ID: 0658d90dc6a033120620924562baf9c29e07740e020c7b5c557f52a43467cd6b
              • Opcode Fuzzy Hash: 04a51c6534ba67d8c2ce71a0e6c0b8946822a3beaaa0ad6abf8e1e016199c0f5
              • Instruction Fuzzy Hash: 7C316030668E088FD7659F1894807A97BD0EF9C311F95037AB449CB2E2DA70D8508B86
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
              • String ID:
              • API String ID: 1547050394-0
              • Opcode ID: 25a8bf288fd42ce426ab2ae56b53d18e2e8359fd32586f4ae3706e9ff750b65b
              • Instruction ID: d5103d62e6f85452b11414fc19c9ffd7c82bc6013f45d7d1fd00ebfa865f0cac
              • Opcode Fuzzy Hash: 25a8bf288fd42ce426ab2ae56b53d18e2e8359fd32586f4ae3706e9ff750b65b
              • Instruction Fuzzy Hash: B8219130668E498FF790AB2848113AA6BD1EFDD302FD5066EB449CB1D2DB34C8504B52
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: freemallocstrchr$FreeHeap_errnorand
              • String ID:
              • API String ID: 3504763109-0
              • Opcode ID: f35e4bf4a30ec4413237561f10dac7197b8990473e0b46e11b580f4fb44e5963
              • Instruction ID: 95e8e3f54d591631d9b238393236ab1ef1488cd97c8eb6fabfcfca404b057795
              • Opcode Fuzzy Hash: f35e4bf4a30ec4413237561f10dac7197b8990473e0b46e11b580f4fb44e5963
              • Instruction Fuzzy Hash: 7881EA30668E58CBF765AB2C9C217F5B7D9FFDD306FC00269A58ACB1D2DA3485468342
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: free$_errno$_callnewhmalloc
              • String ID:
              • API String ID: 2761444284-0
              • Opcode ID: a46d6df1e63736bbf5e6f8efd513222b2720334364c4a35ae3722e37f335d37b
              • Instruction ID: bc60b755446fcd6f21f8c2fc3669456853051c5caf583bfdfec99efc60c580a1
              • Opcode Fuzzy Hash: a46d6df1e63736bbf5e6f8efd513222b2720334364c4a35ae3722e37f335d37b
              • Instruction Fuzzy Hash: 6851A330668F499BE799DA28D8552B977D4FB89301FC0422DE84AC62C7EE70DC0286C2
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: malloc$_snprintf$_errno$_callnewhfreerealloc
              • String ID:
              • API String ID: 74200508-0
              • Opcode ID: fd4b1ce187cf5d2c7b3c7d1d5f2f485ec143d87fcb2d796d9dd721ce5a89571b
              • Instruction ID: bb411cba331572dc832c12d37ad9e0f1191fd2d191189d07e3a80bc6ff844d4d
              • Opcode Fuzzy Hash: fd4b1ce187cf5d2c7b3c7d1d5f2f485ec143d87fcb2d796d9dd721ce5a89571b
              • Instruction Fuzzy Hash: 1DD14E70664E448AEB58AB648C667E977D6EFCC302FD0462DB446CB2D3DE389D058683
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errno$_invalid_parameter_noinfo$fseekmalloc$_callnewh_fseek_nolock_ftelli64fclose
              • String ID:
              • API String ID: 2887643383-0
              • Opcode ID: f1c4e02295faa99f8843714657dd5281141177bf23df19fa39898597ddf49910
              • Instruction ID: d49c57b6cfd325fd71a4eb21b17e9699eaf9cf1d6548044bc520f98c7730ac7b
              • Opcode Fuzzy Hash: f1c4e02295faa99f8843714657dd5281141177bf23df19fa39898597ddf49910
              • Instruction Fuzzy Hash: 26518D31668E088FE758EB2898657E977D5EFCC301F90436EB48BC72D7DD7499028682
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _lock$_calloc_crt_mtinitlocknum
              • String ID:
              • API String ID: 3962633935-0
              • Opcode ID: b1e94c722dda090378a8e761eed7513b06593d91ccd6790d0d4411b736f80c7c
              • Instruction ID: ab93a03f45b2d280bc8397489215d7ab2b58d9638cc81de63d741d673e23f2d4
              • Opcode Fuzzy Hash: b1e94c722dda090378a8e761eed7513b06593d91ccd6790d0d4411b736f80c7c
              • Instruction Fuzzy Hash: 4251C870568E04CFE754AF18DC453A5BBD0FF98311F91036DE88ACB1D2D674E8928A82
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: free$_errno$_callnewhmalloc
              • String ID:
              • API String ID: 2761444284-0
              • Opcode ID: 9dd44889f23309e2c133c4e883ac3d7c03cf28f4ebc62bcd805b5d39935d1e2d
              • Instruction ID: b5064eb5c33eac2e159e54149f56c28913b3254cddf79a98987f070d25d84916
              • Opcode Fuzzy Hash: 9dd44889f23309e2c133c4e883ac3d7c03cf28f4ebc62bcd805b5d39935d1e2d
              • Instruction Fuzzy Hash: BC41D270668F498BEB18EA684C452B67BD5EBDA312F90022DE887C72C3D930DC0646C2
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errno$_fileno_getbuf_getptd_noexit_invalid_parameter_noinfo_isatty
              • String ID:
              • API String ID: 304646821-0
              • Opcode ID: c35e8c2de9f02937b40d8dcb44627bb11330896f7d068decc206105344bae12a
              • Instruction ID: 55e14f33be7adea7a0922452b95aa8a551afe3dc3422a9e6d49fc1c34ad76ba2
              • Opcode Fuzzy Hash: c35e8c2de9f02937b40d8dcb44627bb11330896f7d068decc206105344bae12a
              • Instruction Fuzzy Hash: B6516130164E0CCFEB58AF1888917A57BE1EFD8311FD40769E456CF2D6E674C8618B82
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errno$_snprintffreemalloc$FreeHeap_callnewh_invalid_parameter_noinfo
              • String ID:
              • API String ID: 343393124-0
              • Opcode ID: faf2166294d0965833cb84c6e7fe882f3c5ed13ceeefabe40a4c11aee224dca5
              • Instruction ID: e3375b20979edfd715472d4fc508134433c45119133140e52e5949e9bcefa8a2
              • Opcode Fuzzy Hash: faf2166294d0965833cb84c6e7fe882f3c5ed13ceeefabe40a4c11aee224dca5
              • Instruction Fuzzy Hash: AD41A03065CE484FEA98AB2C68253F87BD6EBCD311B84529DE0CEC72D6D9349C024782
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errno$free$FreeHeap_callnewhfclosefwritemalloc
              • String ID:
              • API String ID: 415550720-0
              • Opcode ID: c287650ca013cd6fba82a94b2bfab312077d62521af6d54d1c0599a360ecab3d
              • Instruction ID: 46cef6411deb2c1aaa6d477597314087925e3addbed415cb8c197086ed338569
              • Opcode Fuzzy Hash: c287650ca013cd6fba82a94b2bfab312077d62521af6d54d1c0599a360ecab3d
              • Instruction Fuzzy Hash: 6E213030A78E088BE684EB2888653EA7BD5FFDC305FD4066D704ACB2C6DD348D014283
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _getptd_noexit$__doserrno_errno
              • String ID:
              • API String ID: 2964073243-0
              • Opcode ID: 7de39b626677fa29025c8f4af27b0a540db68e2d6824cc23474586602198323a
              • Instruction ID: 1d339c966242085c79826949a4ed98990b7ebd22ed81ffabe206f6d05a881c43
              • Opcode Fuzzy Hash: 7de39b626677fa29025c8f4af27b0a540db68e2d6824cc23474586602198323a
              • Instruction Fuzzy Hash: F3014B305B5D08CEE2A5AB68CC513D83B90EF99326FD54369B416CA1E6D67864A08E13
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _snprintf
              • String ID:
              • API String ID: 3512837008-0
              • Opcode ID: 72e4e973a1d0442b98f7febb78707b45b3081222fbe35b5ecbc6412512dc3076
              • Instruction ID: 7bc889ff86b3d3ac79096939ada7bc321f158be31cf3c96a2fcbcf9da021d85c
              • Opcode Fuzzy Hash: 72e4e973a1d0442b98f7febb78707b45b3081222fbe35b5ecbc6412512dc3076
              • Instruction Fuzzy Hash: ED91B130668E48CFEB55EB18DC95BEA77E5FF99301F80066AE446C71D2DA38D901CB42
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errnomalloc$_callnewh$_invalid_parameter_noinfo_snprintf
              • String ID:
              • API String ID: 2026495703-0
              • Opcode ID: b352101c7262c8bcb4a5e96376bd10b91777e0dce9561e268234f3b9efdf5141
              • Instruction ID: c487c1295622fa933c8bf2181720c967597e9c42a26fed5beaf657e487e960b6
              • Opcode Fuzzy Hash: b352101c7262c8bcb4a5e96376bd10b91777e0dce9561e268234f3b9efdf5141
              • Instruction Fuzzy Hash: 31114C30A2CF084FE7A8EB68A4553A57BD1EBCC711F91465EF09AC32D6DA349D4187C2
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errno_fileno_flush_getptd_noexit_invalid_parameter_noinfo
              • String ID:
              • API String ID: 634798775-0
              • Opcode ID: 34e7f92ebff520e6a17a4e985317f9f17b8bd586bad3667c73d28a98cf0395a5
              • Instruction ID: 9dff9510c80799304cb1207f5fa0e78890414f663c75da1414e3f2ea7ceba51c
              • Opcode Fuzzy Hash: 34e7f92ebff520e6a17a4e985317f9f17b8bd586bad3667c73d28a98cf0395a5
              • Instruction Fuzzy Hash: 8851E830268E098BE6A869695D653A57BC4EFDC312FE1033EF45AC71D6EA70DC528183
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: clock
              • String ID:
              • API String ID: 3195780754-0
              • Opcode ID: 88d80a52c757cc5c40c2c6d70a970e4954adb33c3b78b443ec03df4506b3ea8d
              • Instruction ID: 0f57356304c79f982ccf113865bf6f5d0d90c502a2ae3ba4cf9b4ae4f3174c4c
              • Opcode Fuzzy Hash: 88d80a52c757cc5c40c2c6d70a970e4954adb33c3b78b443ec03df4506b3ea8d
              • Instruction Fuzzy Hash: 6C21293245CB088AE774E99C68423AABBD0DFC8351F51132EF896872A3F570DC4286D3
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
              • String ID: B
              • API String ID: 1812809483-1255198513
              • Opcode ID: c02d2d703cad3fde31994e70e132d1470a84cf0b2fdde3fa0011d2dc5e3ae6ea
              • Instruction ID: 408326a91d4eb11d82aa56e0772a8410c71f2229bfdc494dee57c83327968e11
              • Opcode Fuzzy Hash: c02d2d703cad3fde31994e70e132d1470a84cf0b2fdde3fa0011d2dc5e3ae6ea
              • Instruction Fuzzy Hash: 7D11B230628F0C8FE754EF1898857A9B7D1FB98325F9047AEA019C72E5CB74C944CB82
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: free$_errno$_callnewhmalloc
              • String ID:
              • API String ID: 2761444284-0
              • Opcode ID: 220d10eecca3932b28677e19a5d899b4e1de467fae96e5e6bbac4d4284393be2
              • Instruction ID: 2c0e307e7941ea4081656bbfe8ec329454eab74bad1e09c29c324a4e8e72bacb
              • Opcode Fuzzy Hash: 220d10eecca3932b28677e19a5d899b4e1de467fae96e5e6bbac4d4284393be2
              • Instruction Fuzzy Hash: D261A530268E098BEA58EB188C617E977D5EFCC341FD04B2DB546CB1D6DA3499418683
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.2589411150.0000015A072D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000015A072D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_15a072d0000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: malloc
              • String ID:
              • API String ID: 2803490479-0
              • Opcode ID: eb22e79342f6c44f5990d3d93bc1acaf377093f70efb3d4e41a798bd81bbd69f
              • Instruction ID: d52283d05780fb55e1e2b681d159821cffe8c6714df81305cd38376497685e90
              • Opcode Fuzzy Hash: eb22e79342f6c44f5990d3d93bc1acaf377093f70efb3d4e41a798bd81bbd69f
              • Instruction Fuzzy Hash: DB518130668F05CBEB59DE28DC556AA77D1EFC9311F80465DE84BC72C7EA34DC028682

              Execution Graph

              Execution Coverage:1.3%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:0%
              Total number of Nodes:563
              Total number of Limit Nodes:29
              execution_graph 16262 2963d080000 16265 2963d080021 16262->16265 16263 2963d0800ce SleepEx 16264 2963d0800de 16263->16264 16265->16263 16265->16265 15447 2963d230bc8 15450 2963d230be4 _DllMainCRTStartup 15447->15450 15449 2963d230cbb 15454 2963d230a68 _CRT_INIT RtlFreeHeap 15449->15454 15456 2963d230c3e 15449->15456 15452 2963d230c74 15450->15452 15450->15456 15459 2963d230a68 15450->15459 15452->15456 15488 2963d228460 15452->15488 15453 2963d230c92 15453->15449 15455 2963d228460 _DllMainCRTStartup 7 API calls 15453->15455 15454->15456 15457 2963d230cae 15455->15457 15458 2963d230a68 _CRT_INIT RtlFreeHeap 15457->15458 15458->15449 15460 2963d230af7 15459->15460 15463 2963d230a7a _heap_init 15459->15463 15461 2963d230b4d 15460->15461 15465 2963d230afb _CRT_INIT 15460->15465 15462 2963d230bb0 15461->15462 15469 2963d230b52 _getptd_noexit 15461->15469 15475 2963d230a83 _CRT_INIT 15462->15475 15572 2963d234888 15462->15572 15463->15475 15498 2963d234a30 15463->15498 15465->15475 15538 2963d22efec 15465->15538 15469->15475 15560 2963d2337a8 15469->15560 15471 2963d2371ec _ioterm RtlFreeHeap 15471->15475 15472 2963d230a8f _RTC_Initialize 15472->15475 15504 2963d2383fc 15472->15504 15473 2963d230b6f _getptd_noexit 15473->15475 15476 2963d230ba6 15473->15476 15477 2963d230b90 15473->15477 15475->15452 15569 2963d22e2c4 15476->15569 15564 2963d23496c 15477->15564 15489 2963d22853b 15488->15489 15493 2963d228482 _DllMainCRTStartup 15488->15493 15490 2963d228487 _DllMainCRTStartup 15489->15490 15869 2963d22a4fc 15489->15869 15490->15453 15493->15490 15495 2963d2284e5 _DllMainCRTStartup 15493->15495 15881 2963d22c36c 15493->15881 15817 2963d21baf4 15495->15817 15497 2963d22c36c _DllMainCRTStartup VirtualFree 15497->15495 15500 2963d234a3b _mtinit _mtinitlocks 15498->15500 15499 2963d234a8e 15499->15472 15500->15499 15501 2963d2337a8 _calloc_crt RtlFreeHeap 15500->15501 15502 2963d234a6a _getptd_noexit 15501->15502 15502->15499 15503 2963d23496c _initptd RtlFreeHeap 15502->15503 15503->15499 15505 2963d23841b 15504->15505 15507 2963d230ab1 15505->15507 15576 2963d233828 15505->15576 15510 2963d236ec0 15507->15510 15509 2963d22e2c4 free RtlFreeHeap 15509->15507 15653 2963d232e0c 15510->15653 15539 2963d22f003 15538->15539 15540 2963d22f025 15539->15540 15542 2963d22e2c4 free RtlFreeHeap 15539->15542 15541 2963d22e2c4 free RtlFreeHeap 15540->15541 15543 2963d22f034 15541->15543 15542->15539 15544 2963d22f05b 15543->15544 15546 2963d22e2c4 free RtlFreeHeap 15543->15546 15545 2963d22e2c4 free RtlFreeHeap 15544->15545 15547 2963d22f06a 15545->15547 15546->15543 15548 2963d22e2c4 free RtlFreeHeap 15547->15548 15549 2963d22f07e 15548->15549 15550 2963d22e2c4 free RtlFreeHeap 15549->15550 15551 2963d22f08a 15550->15551 15552 2963d22f0b5 15551->15552 15553 2963d22e2c4 free RtlFreeHeap 15551->15553 15554 2963d22f0d6 15552->15554 15555 2963d22e2c4 free RtlFreeHeap 15552->15555 15553->15552 15556 2963d22f0ef 15554->15556 15558 2963d22e2c4 free RtlFreeHeap 15554->15558 15555->15554 15557 2963d22f120 15556->15557 15559 2963d22e2c4 free RtlFreeHeap 15556->15559 15557->15471 15557->15475 15558->15556 15559->15557 15563 2963d2337cd 15560->15563 15562 2963d23380a 15562->15473 15563->15562 15787 2963d238d6c 15563->15787 15565 2963d232e0c _lock RtlFreeHeap 15564->15565 15566 2963d2349d2 _freefls 15565->15566 15567 2963d232e0c _lock RtlFreeHeap 15566->15567 15568 2963d2349f1 _freefls __addlocaleref 15567->15568 15568->15475 15570 2963d22e2c9 RtlFreeHeap 15569->15570 15571 2963d22e2e4 _errno realloc 15569->15571 15570->15571 15571->15475 15573 2963d2348be 15572->15573 15574 2963d23489c _getptd_noexit 15572->15574 15573->15475 15791 2963d234754 15574->15791 15578 2963d233850 15576->15578 15579 2963d233885 15578->15579 15580 2963d22e304 15578->15580 15579->15507 15579->15509 15581 2963d22e398 _callnewh 15580->15581 15587 2963d22e31c _callnewh _mtinitlocknum 15580->15587 15582 2963d230d98 _errno RtlFreeHeap 15581->15582 15590 2963d22e38d 15582->15590 15585 2963d22e37d 15616 2963d230d98 15585->15616 15587->15585 15588 2963d22e382 15587->15588 15587->15590 15591 2963d230e70 15587->15591 15600 2963d230ee4 15587->15600 15589 2963d230d98 _errno RtlFreeHeap 15588->15589 15589->15590 15590->15578 15619 2963d238784 15591->15619 15593 2963d230e7e 15594 2963d238784 _set_error_mode RtlFreeHeap 15593->15594 15597 2963d230e8d 15593->15597 15594->15597 15595 2963d230ee4 _NMSG_WRITE RtlFreeHeap 15596 2963d230ea4 15595->15596 15598 2963d230ee4 _NMSG_WRITE RtlFreeHeap 15596->15598 15597->15595 15599 2963d230eae 15597->15599 15598->15599 15599->15587 15601 2963d230f18 _NMSG_WRITE 15600->15601 15602 2963d238784 _set_error_mode RtlFreeHeap 15601->15602 15615 2963d231035 _setmbcp_nolock __crtMessageBoxW _invoke_watson 15601->15615 15603 2963d230f2e 15602->15603 15604 2963d238784 _set_error_mode RtlFreeHeap 15603->15604 15603->15615 15605 2963d230f3f 15604->15605 15605->15615 15623 2963d238630 15605->15623 15607 2963d230f7b 15608 2963d238630 _NMSG_WRITE RtlFreeHeap 15607->15608 15610 2963d230fbb _putenv_helper 15607->15610 15607->15615 15608->15610 15609 2963d231005 15609->15615 15637 2963d2385a8 15609->15637 15610->15609 15610->15615 15630 2963d2386b8 15610->15630 15612 2963d23101f 15614 2963d2385a8 _NMSG_WRITE RtlFreeHeap 15612->15614 15612->15615 15614->15615 15615->15587 15644 2963d2348e8 15616->15644 15620 2963d23878c 15619->15620 15621 2963d230d98 _errno RtlFreeHeap 15620->15621 15622 2963d238796 _invalid_parameter_noinfo 15620->15622 15621->15622 15622->15593 15624 2963d238648 15623->15624 15625 2963d23863e 15623->15625 15626 2963d230d98 _errno RtlFreeHeap 15624->15626 15625->15624 15628 2963d238665 15625->15628 15627 2963d238651 _invalid_parameter_noinfo 15626->15627 15627->15607 15628->15627 15629 2963d230d98 _errno RtlFreeHeap 15628->15629 15629->15627 15633 2963d2386c5 15630->15633 15631 2963d2386ca 15632 2963d230d98 _errno RtlFreeHeap 15631->15632 15634 2963d2386cf _invalid_parameter_noinfo 15631->15634 15632->15634 15633->15631 15633->15634 15635 2963d238708 15633->15635 15634->15609 15635->15634 15636 2963d230d98 _errno RtlFreeHeap 15635->15636 15636->15634 15638 2963d2385c3 15637->15638 15640 2963d2385b9 15637->15640 15639 2963d230d98 _errno RtlFreeHeap 15638->15639 15641 2963d2385cc _invalid_parameter_noinfo 15639->15641 15640->15638 15642 2963d2385fa 15640->15642 15641->15612 15642->15641 15643 2963d230d98 _errno RtlFreeHeap 15642->15643 15643->15641 15645 2963d2348f8 _getptd_noexit 15644->15645 15646 2963d2337a8 _calloc_crt RtlFreeHeap 15645->15646 15652 2963d230da1 15645->15652 15647 2963d23491a _getptd_noexit 15646->15647 15648 2963d234937 15647->15648 15649 2963d23494d 15647->15649 15647->15652 15650 2963d23496c _initptd RtlFreeHeap 15648->15650 15651 2963d22e2c4 free RtlFreeHeap 15649->15651 15650->15652 15651->15652 15652->15588 15654 2963d232e2a 15653->15654 15656 2963d232e2f 15653->15656 15657 2963d232ed8 15654->15657 15658 2963d232ef5 15657->15658 15668 2963d232f04 _mtinitlocknum 15657->15668 15659 2963d230e70 _FF_MSGBANNER RtlFreeHeap 15658->15659 15661 2963d232efa 15659->15661 15660 2963d233828 _malloc_crt RtlFreeHeap 15662 2963d232f30 15660->15662 15663 2963d230ee4 _NMSG_WRITE RtlFreeHeap 15661->15663 15664 2963d232f38 15662->15664 15665 2963d232f47 15662->15665 15663->15668 15666 2963d230d98 _errno RtlFreeHeap 15664->15666 15667 2963d232e0c _lock RtlFreeHeap 15665->15667 15669 2963d232f1f 15666->15669 15670 2963d232f51 15667->15670 15668->15660 15668->15669 15669->15656 15670->15669 15671 2963d22e2c4 free RtlFreeHeap 15670->15671 15671->15669 15788 2963d238d81 15787->15788 15790 2963d238d94 _callnewh 15787->15790 15789 2963d230d98 _errno RtlFreeHeap 15788->15789 15788->15790 15789->15790 15790->15563 15792 2963d23475d 15791->15792 15816 2963d23487c 15791->15816 15793 2963d234778 15792->15793 15794 2963d22e2c4 free RtlFreeHeap 15792->15794 15795 2963d234786 15793->15795 15797 2963d22e2c4 free RtlFreeHeap 15793->15797 15794->15793 15796 2963d234794 15795->15796 15798 2963d22e2c4 free RtlFreeHeap 15795->15798 15799 2963d22e2c4 free RtlFreeHeap 15796->15799 15800 2963d2347a2 15796->15800 15797->15795 15798->15796 15799->15800 15801 2963d2347b0 15800->15801 15802 2963d22e2c4 free RtlFreeHeap 15800->15802 15803 2963d2347be 15801->15803 15804 2963d22e2c4 free RtlFreeHeap 15801->15804 15802->15801 15805 2963d2347cf 15803->15805 15807 2963d22e2c4 free RtlFreeHeap 15803->15807 15804->15803 15806 2963d2347e7 15805->15806 15808 2963d22e2c4 free RtlFreeHeap 15805->15808 15809 2963d232e0c _lock RtlFreeHeap 15806->15809 15807->15805 15808->15806 15811 2963d2347f3 15809->15811 15810 2963d234820 _freefls 15813 2963d232e0c _lock RtlFreeHeap 15810->15813 15811->15810 15812 2963d22e2c4 free RtlFreeHeap 15811->15812 15812->15810 15814 2963d234832 _freefls 15813->15814 15815 2963d22e2c4 free RtlFreeHeap 15814->15815 15815->15816 15816->15573 15885 2963d22506c 15817->15885 15819 2963d21bb12 _DllMainCRTStartup 15820 2963d22e304 malloc RtlFreeHeap 15819->15820 15821 2963d21bbc0 15820->15821 15892 2963d22b2b0 15821->15892 15827 2963d21bc35 15828 2963d22db28 _DllMainCRTStartup RtlFreeHeap 15827->15828 15829 2963d21bc4f _DllMainCRTStartup 15828->15829 15831 2963d21bc5d _DllMainCRTStartup 15829->15831 15941 2963d22caf4 15829->15941 15832 2963d21bc79 15831->15832 15833 2963d22caf4 _DllMainCRTStartup 2 API calls 15831->15833 15915 2963d21e278 15832->15915 15833->15832 15836 2963d21bc8e 15921 2963d21e2f4 15836->15921 15837 2963d22caf4 _DllMainCRTStartup 2 API calls 15837->15836 15840 2963d22caf4 _DllMainCRTStartup 2 API calls 15841 2963d21bc9c 15840->15841 15842 2963d22e304 malloc RtlFreeHeap 15841->15842 15843 2963d21bccf 15842->15843 15844 2963d21bcdc 15843->15844 15845 2963d22caf4 _DllMainCRTStartup 2 API calls 15843->15845 15846 2963d22db28 _DllMainCRTStartup RtlFreeHeap 15844->15846 15845->15844 15847 2963d21bcf8 15846->15847 15931 2963d224ce0 15847->15931 15870 2963d22506c _DllMainCRTStartup RtlFreeHeap 15869->15870 15871 2963d22a520 _setmbcp_nolock _DllMainCRTStartup 15870->15871 15872 2963d22e304 malloc RtlFreeHeap 15871->15872 15873 2963d22a5ad _setmbcp_nolock 15872->15873 15874 2963d22db28 _DllMainCRTStartup RtlFreeHeap 15873->15874 15875 2963d22a5de _DllMainCRTStartup 15874->15875 15879 2963d22a5f5 _setmbcp _DllMainCRTStartup 15875->15879 16256 2963d21e094 15875->16256 15877 2963d22a882 _setmbcp_nolock _DllMainCRTStartup 15877->15490 15878 2963d22e304 malloc RtlFreeHeap 15878->15879 15879->15877 15879->15878 15880 2963d22db28 _DllMainCRTStartup RtlFreeHeap 15879->15880 15880->15879 15882 2963d22c419 VirtualFree 15881->15882 15884 2963d22c391 _DllMainCRTStartup 15881->15884 15883 2963d228507 15882->15883 15883->15495 15883->15497 15884->15882 15884->15883 15886 2963d22e304 malloc RtlFreeHeap 15885->15886 15887 2963d22508d 15886->15887 15888 2963d22e304 malloc RtlFreeHeap 15887->15888 15891 2963d225095 _setmbcp_nolock _DllMainCRTStartup 15887->15891 15889 2963d2250a1 15888->15889 15890 2963d22e2c4 free RtlFreeHeap 15889->15890 15889->15891 15890->15891 15891->15819 15893 2963d22b2d9 _DllMainCRTStartup 15892->15893 15949 2963d22f4cc 15893->15949 15896 2963d22e304 malloc RtlFreeHeap 15897 2963d22b321 _setmbcp _setmbcp_nolock 15896->15897 15899 2963d22b38a 15897->15899 15952 2963d23089c 15897->15952 15900 2963d23089c _DllMainCRTStartup RtlFreeHeap 15899->15900 15901 2963d21bc07 15900->15901 15902 2963d222520 15901->15902 15903 2963d222533 _DllMainCRTStartup 15902->15903 15904 2963d22f4cc _DllMainCRTStartup RtlFreeHeap 15903->15904 15905 2963d22253b 15904->15905 15955 2963d221fdc 15905->15955 15908 2963d22db28 15909 2963d22db67 15908->15909 15910 2963d22db7d _setmbcp_nolock 15908->15910 15911 2963d22db7f 15909->15911 15912 2963d22db73 15909->15912 15910->15827 15914 2963d230994 realloc RtlFreeHeap 15911->15914 15913 2963d22e304 malloc RtlFreeHeap 15912->15913 15913->15910 15914->15910 15917 2963d21e28e 15915->15917 15916 2963d21bc85 15916->15836 15916->15837 15917->15916 15960 2963d22995c 15917->15960 15919 2963d21e2c8 15964 2963d229994 15919->15964 15923 2963d21e319 15921->15923 15922 2963d21bc93 15922->15840 15922->15841 15923->15922 15924 2963d22e304 malloc RtlFreeHeap 15923->15924 15925 2963d21e395 _setmbcp _DllMainCRTStartup 15924->15925 15926 2963d21e3eb _setmbcp_nolock 15925->15926 15927 2963d22995c _DllMainCRTStartup RtlFreeHeap 15925->15927 15930 2963d22e2c4 free RtlFreeHeap 15926->15930 15928 2963d21e3cc 15927->15928 15929 2963d229994 _DllMainCRTStartup RtlFreeHeap 15928->15929 15929->15926 15930->15922 15932 2963d224cfe _DllMainCRTStartup 15931->15932 16128 2963d22a134 15932->16128 15934 2963d224d28 15935 2963d22f4cc _DllMainCRTStartup RtlFreeHeap 15934->15935 15936 2963d224d3f _DllMainCRTStartup 15935->15936 16132 2963d224ea8 15936->16132 15938 2963d224e14 _setmbcp _setmbcp_nolock _DllMainCRTStartup 16141 2963d229c4c 15938->16141 15940 2963d224e75 15942 2963d22cb08 15941->15942 16236 2963d21c2e8 15942->16236 15944 2963d22cb24 16243 2963d223ea4 15944->16243 15948 2963d22cb2e _DllMainCRTStartup 15950 2963d2348c4 _getptd RtlFreeHeap 15949->15950 15951 2963d22b2e1 15950->15951 15951->15896 15953 2963d2348c4 _getptd RtlFreeHeap 15952->15953 15954 2963d2308c0 _setmbcp_nolock _DllMainCRTStartup 15953->15954 15954->15897 15956 2963d21bc14 15955->15956 15957 2963d222007 _DllMainCRTStartup 15955->15957 15956->15908 15957->15956 15958 2963d22e304 malloc RtlFreeHeap 15957->15958 15959 2963d22db28 _DllMainCRTStartup RtlFreeHeap 15957->15959 15958->15957 15959->15957 15961 2963d229977 15960->15961 15963 2963d229973 _DllMainCRTStartup 15960->15963 15970 2963d229bd4 15961->15970 15963->15919 15965 2963d2299bc 15964->15965 15966 2963d22e6bc _snprintf RtlFreeHeap 15965->15966 15967 2963d2299fc 15966->15967 15968 2963d22e6bc _snprintf RtlFreeHeap 15967->15968 15969 2963d229a12 _DllMainCRTStartup 15968->15969 15969->15916 15977 2963d22e6bc 15970->15977 15972 2963d229bf1 15973 2963d22e6bc _snprintf RtlFreeHeap 15972->15973 15974 2963d229c3c 15973->15974 15986 2963d22ee84 15974->15986 15978 2963d22e6ee _setmbcp_nolock 15977->15978 15979 2963d22e6f3 15978->15979 15980 2963d22e712 15978->15980 15981 2963d230d98 _errno RtlFreeHeap 15979->15981 15990 2963d2315a8 15980->15990 15984 2963d22e6f8 _invalid_parameter_noinfo 15981->15984 15983 2963d22e742 15983->15984 16007 2963d23141c 15983->16007 15984->15972 15987 2963d232d6c 15986->15987 16111 2963d232b30 15987->16111 15989 2963d229c46 15989->15963 15991 2963d230680 _strnicoll_l RtlFreeHeap 15990->15991 15992 2963d23160e 15991->15992 15993 2963d230d98 _errno RtlFreeHeap 15992->15993 15994 2963d231613 15993->15994 15995 2963d231f73 15994->15995 16000 2963d231640 _snprintf 15994->16000 16028 2963d234ad4 15994->16028 15996 2963d230d98 _errno RtlFreeHeap 15995->15996 15998 2963d231f78 _invalid_parameter_noinfo _setmbcp_nolock 15996->15998 15998->15983 16000->15995 16000->15998 16001 2963d232a54 RtlFreeHeap write_char 16000->16001 16002 2963d22e2c4 free RtlFreeHeap 16000->16002 16003 2963d238c94 RtlFreeHeap _snprintf 16000->16003 16004 2963d233828 _malloc_crt RtlFreeHeap 16000->16004 16005 2963d231fc8 RtlFreeHeap write_multi_char 16000->16005 16006 2963d232a9c RtlFreeHeap write_string 16000->16006 16032 2963d237774 16000->16032 16001->16000 16002->16000 16003->16000 16004->16000 16005->16000 16006->16000 16008 2963d234ad4 _fileno RtlFreeHeap 16007->16008 16009 2963d23143e 16008->16009 16010 2963d231449 16009->16010 16011 2963d231460 16009->16011 16012 2963d230d98 _errno RtlFreeHeap 16010->16012 16013 2963d231465 16011->16013 16022 2963d231472 _vsnprintf_helper 16011->16022 16021 2963d23144e 16012->16021 16014 2963d230d98 _errno RtlFreeHeap 16013->16014 16014->16021 16015 2963d2314d7 16016 2963d23156f 16015->16016 16017 2963d2314e4 16015->16017 16018 2963d2354b4 _flush RtlFreeHeap 16016->16018 16019 2963d231500 16017->16019 16024 2963d231519 16017->16024 16018->16021 16044 2963d2354b4 16019->16044 16021->15984 16022->16015 16022->16021 16025 2963d2314cb 16022->16025 16035 2963d238a3c 16022->16035 16024->16021 16061 2963d236c88 16024->16061 16025->16015 16041 2963d238a9c 16025->16041 16029 2963d234add 16028->16029 16031 2963d234ae2 _invalid_parameter_noinfo 16028->16031 16030 2963d230d98 _errno RtlFreeHeap 16029->16030 16030->16031 16031->16000 16033 2963d230680 _strnicoll_l RtlFreeHeap 16032->16033 16034 2963d237786 16033->16034 16034->16000 16036 2963d238a45 16035->16036 16037 2963d238a52 16035->16037 16038 2963d230d98 _errno RtlFreeHeap 16036->16038 16039 2963d230d98 _errno RtlFreeHeap 16037->16039 16040 2963d238a4a _invalid_parameter_noinfo 16037->16040 16038->16040 16039->16040 16040->16025 16042 2963d233828 _malloc_crt RtlFreeHeap 16041->16042 16043 2963d238ab5 16042->16043 16043->16015 16045 2963d2354d7 16044->16045 16048 2963d2354ef 16044->16048 16081 2963d230d28 16045->16081 16047 2963d235566 16050 2963d230d28 __doserrno RtlFreeHeap 16047->16050 16048->16047 16053 2963d235521 16048->16053 16052 2963d23556b 16050->16052 16051 2963d230d98 _errno RtlFreeHeap 16060 2963d2354e4 _invalid_parameter_noinfo _unlock_fhandle 16051->16060 16054 2963d230d98 _errno RtlFreeHeap 16052->16054 16084 2963d239330 16053->16084 16054->16060 16056 2963d235528 16057 2963d230d98 _errno RtlFreeHeap 16056->16057 16056->16060 16058 2963d23554a 16057->16058 16059 2963d230d28 __doserrno RtlFreeHeap 16058->16059 16059->16060 16060->16021 16062 2963d236cab 16061->16062 16065 2963d236cc3 16061->16065 16064 2963d230d28 __doserrno RtlFreeHeap 16062->16064 16063 2963d236d3d 16066 2963d230d28 __doserrno RtlFreeHeap 16063->16066 16067 2963d236cb0 16064->16067 16065->16063 16068 2963d236cf5 16065->16068 16069 2963d236d42 16066->16069 16070 2963d230d98 _errno RtlFreeHeap 16067->16070 16071 2963d239330 __lock_fhandle RtlFreeHeap 16068->16071 16072 2963d230d98 _errno RtlFreeHeap 16069->16072 16078 2963d236cb8 _invalid_parameter_noinfo _unlock_fhandle 16070->16078 16073 2963d236cfc 16071->16073 16072->16078 16074 2963d236d08 16073->16074 16075 2963d236d1a 16073->16075 16088 2963d236d6c 16074->16088 16077 2963d230d98 _errno RtlFreeHeap 16075->16077 16079 2963d236d1f 16077->16079 16078->16021 16080 2963d230d28 __doserrno RtlFreeHeap 16079->16080 16080->16078 16082 2963d2348e8 _getptd_noexit RtlFreeHeap 16081->16082 16083 2963d230d31 16082->16083 16083->16051 16085 2963d239368 16084->16085 16087 2963d239372 _freefls 16084->16087 16086 2963d232e0c _lock RtlFreeHeap 16085->16086 16086->16087 16087->16056 16096 2963d23966c 16088->16096 16090 2963d236d8b 16091 2963d236d91 16090->16091 16092 2963d236da2 16090->16092 16093 2963d230d98 _errno RtlFreeHeap 16091->16093 16094 2963d236d96 16092->16094 16106 2963d230d48 16092->16106 16093->16094 16094->16078 16097 2963d23968a 16096->16097 16098 2963d239675 16096->16098 16100 2963d230d28 __doserrno RtlFreeHeap 16097->16100 16105 2963d239682 _invalid_parameter_noinfo 16097->16105 16099 2963d230d28 __doserrno RtlFreeHeap 16098->16099 16101 2963d23967a 16099->16101 16102 2963d2396c4 16100->16102 16103 2963d230d98 _errno RtlFreeHeap 16101->16103 16104 2963d230d98 _errno RtlFreeHeap 16102->16104 16103->16105 16104->16105 16105->16090 16107 2963d2348e8 _getptd_noexit RtlFreeHeap 16106->16107 16108 2963d230d59 16107->16108 16109 2963d2348e8 _getptd_noexit RtlFreeHeap 16108->16109 16110 2963d230d72 realloc 16109->16110 16110->16094 16112 2963d230680 _strnicoll_l RtlFreeHeap 16111->16112 16114 2963d232b5c 16112->16114 16113 2963d232b77 16115 2963d230d98 _errno RtlFreeHeap 16113->16115 16114->16113 16117 2963d232b8c 16114->16117 16118 2963d232b7c _invalid_parameter_noinfo 16115->16118 16119 2963d232bde 16117->16119 16121 2963d237698 16117->16121 16118->15989 16119->16118 16120 2963d230d98 _errno RtlFreeHeap 16119->16120 16120->16118 16122 2963d230680 _strnicoll_l RtlFreeHeap 16121->16122 16123 2963d2376ba 16122->16123 16124 2963d237774 _isleadbyte_l RtlFreeHeap 16123->16124 16127 2963d2376c4 16123->16127 16125 2963d2376e7 16124->16125 16126 2963d23920c __crtGetStringTypeA RtlFreeHeap 16125->16126 16126->16127 16127->16117 16129 2963d22a151 _DllMainCRTStartup 16128->16129 16147 2963d21093c 16129->16147 16131 2963d22a182 _DllMainCRTStartup 16131->15934 16133 2963d22506c _DllMainCRTStartup RtlFreeHeap 16132->16133 16134 2963d224ed1 _DllMainCRTStartup 16133->16134 16135 2963d224f1f GetUserNameA 16134->16135 16136 2963d224f48 16135->16136 16153 2963d21e088 16136->16153 16138 2963d224f4d strrchr _DllMainCRTStartup 16139 2963d22e6bc _snprintf RtlFreeHeap 16138->16139 16140 2963d225020 _DllMainCRTStartup 16139->16140 16140->15938 16142 2963d229c7e _setmbcp _DllMainCRTStartup 16141->16142 16157 2963d210d44 16142->16157 16144 2963d229d3a 16146 2963d229d89 16144->16146 16177 2963d210be4 16144->16177 16146->15940 16149 2963d21096c _DllMainCRTStartup 16147->16149 16148 2963d21098d 16148->16131 16149->16148 16150 2963d22e304 malloc RtlFreeHeap 16149->16150 16152 2963d2109a1 16150->16152 16151 2963d22e2c4 free RtlFreeHeap 16151->16148 16152->16148 16152->16151 16154 2963d21e094 _DllMainCRTStartup 16153->16154 16155 2963d21e0af WSASocketA 16154->16155 16156 2963d21e0d1 16155->16156 16156->16138 16158 2963d210dde _DllMainCRTStartup 16157->16158 16172 2963d210df7 _setmbcp_nolock _DllMainCRTStartup 16158->16172 16181 2963d23de88 16158->16181 16160 2963d210def _DllMainCRTStartup 16161 2963d210f8c 16160->16161 16167 2963d210eed 16160->16167 16160->16172 16162 2963d22e2c4 free RtlFreeHeap 16161->16162 16164 2963d210f94 16162->16164 16166 2963d213ee4 _DllMainCRTStartup RtlFreeHeap 16164->16166 16173 2963d210fc0 16166->16173 16188 2963d213ee4 16167->16188 16168 2963d210f7d 16171 2963d22e2c4 free RtlFreeHeap 16168->16171 16169 2963d210f73 16170 2963d22e2c4 free RtlFreeHeap 16169->16170 16170->16172 16171->16172 16172->16144 16173->16172 16175 2963d213ee4 _DllMainCRTStartup RtlFreeHeap 16173->16175 16176 2963d2110dc 16173->16176 16174 2963d213ee4 _DllMainCRTStartup RtlFreeHeap 16174->16172 16175->16176 16176->16172 16176->16174 16178 2963d210c25 _DllMainCRTStartup 16177->16178 16179 2963d210c1b _DllMainCRTStartup 16177->16179 16178->16179 16194 2963d21368c 16178->16194 16179->16146 16182 2963d238d6c _calloc_impl RtlFreeHeap 16181->16182 16183 2963d23de9d 16182->16183 16184 2963d230d98 _errno RtlFreeHeap 16183->16184 16187 2963d23deba 16183->16187 16185 2963d23deb0 16184->16185 16186 2963d230d98 _errno RtlFreeHeap 16185->16186 16185->16187 16186->16187 16187->16160 16190 2963d213f10 16188->16190 16189 2963d210f6a 16189->16168 16189->16169 16190->16189 16191 2963d23de88 _DllMainCRTStartup RtlFreeHeap 16190->16191 16193 2963d213f4f _DllMainCRTStartup 16191->16193 16192 2963d22e2c4 free RtlFreeHeap 16192->16189 16193->16189 16193->16192 16196 2963d2136bd _DllMainCRTStartup 16194->16196 16195 2963d213913 16195->16179 16196->16195 16197 2963d22e304 malloc RtlFreeHeap 16196->16197 16198 2963d21372e 16197->16198 16199 2963d22e304 malloc RtlFreeHeap 16198->16199 16200 2963d213738 16199->16200 16201 2963d22e304 malloc RtlFreeHeap 16200->16201 16202 2963d213743 16201->16202 16203 2963d21391f 16202->16203 16205 2963d213917 16202->16205 16208 2963d213761 16202->16208 16204 2963d21392c 16203->16204 16207 2963d22e2c4 free RtlFreeHeap 16203->16207 16204->16195 16209 2963d22e2c4 free RtlFreeHeap 16204->16209 16206 2963d22e2c4 free RtlFreeHeap 16205->16206 16206->16203 16207->16204 16210 2963d21093c _DllMainCRTStartup RtlFreeHeap 16208->16210 16209->16195 16216 2963d2137a3 _setmbcp _setmbcp_nolock 16210->16216 16211 2963d22e2c4 free RtlFreeHeap 16212 2963d213903 16211->16212 16213 2963d22e2c4 free RtlFreeHeap 16212->16213 16214 2963d21390b 16213->16214 16215 2963d22e2c4 free RtlFreeHeap 16214->16215 16215->16195 16220 2963d213817 _setmbcp 16216->16220 16221 2963d214570 16216->16221 16218 2963d21383f 16218->16218 16219 2963d214570 _DllMainCRTStartup RtlFreeHeap 16218->16219 16218->16220 16219->16220 16220->16211 16222 2963d21459c _DllMainCRTStartup 16221->16222 16223 2963d2146b9 16222->16223 16224 2963d22e304 malloc RtlFreeHeap 16222->16224 16223->16218 16225 2963d2145bf 16224->16225 16226 2963d22e304 malloc RtlFreeHeap 16225->16226 16227 2963d2145ca 16226->16227 16228 2963d2146c5 16227->16228 16229 2963d2146bd 16227->16229 16235 2963d2145df 16227->16235 16228->16223 16231 2963d22e2c4 free RtlFreeHeap 16228->16231 16230 2963d22e2c4 free RtlFreeHeap 16229->16230 16230->16228 16231->16223 16232 2963d22e2c4 free RtlFreeHeap 16233 2963d2146b1 16232->16233 16234 2963d22e2c4 free RtlFreeHeap 16233->16234 16234->16223 16235->16232 16237 2963d21c306 16236->16237 16238 2963d21c3ad 16237->16238 16240 2963d21c339 _DllMainCRTStartup 16237->16240 16242 2963d21c394 _setmbcp_nolock _DllMainCRTStartup 16237->16242 16239 2963d22c36c _DllMainCRTStartup VirtualFree 16238->16239 16238->16242 16239->16242 16241 2963d21c2e8 _DllMainCRTStartup VirtualFree 16240->16241 16240->16242 16241->16242 16242->15944 16244 2963d223eb3 16243->16244 16245 2963d223ec4 16244->16245 16246 2963d22e2c4 free RtlFreeHeap 16244->16246 16247 2963d22dc20 16245->16247 16246->16244 16248 2963d22dcaf 16247->16248 16253 2963d22dc3a _setmbcp_nolock 16247->16253 16249 2963d22dcc0 16248->16249 16250 2963d22e2c4 free RtlFreeHeap 16248->16250 16251 2963d22dcd1 16249->16251 16252 2963d22e2c4 free RtlFreeHeap 16249->16252 16250->16249 16251->15948 16252->16251 16253->16248 16254 2963d22e2c4 free RtlFreeHeap 16253->16254 16255 2963d22c36c _DllMainCRTStartup VirtualFree 16253->16255 16254->16253 16255->16253 16260 2963d21e198 16256->16260 16258 2963d21e0af WSASocketA 16259 2963d21e0d1 16258->16259 16259->15879 16261 2963d21e1ac 16260->16261 16261->16258

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 102 2963d080000-2963d08001f 103 2963d080021-2963d08002f 102->103 104 2963d080031-2963d080034 103->104 105 2963d080036-2963d080039 103->105 104->105 106 2963d080069-2963d080073 104->106 105->103 107 2963d08003b-2963d08003c 105->107 109 2963d0800ce-2963d0800dc SleepEx 106->109 110 2963d080075-2963d080076 106->110 108 2963d08003e-2963d080065 107->108 108->108 111 2963d080067 108->111 113 2963d0800de-2963d0800df 109->113 114 2963d080137-2963d080138 109->114 112 2963d080078-2963d08007f 110->112 111->103 116 2963d080081 112->116 117 2963d0800b7-2963d0800cc 112->117 118 2963d0800e1-2963d0800e8 113->118 115 2963d08013b-2963d080149 114->115 119 2963d080150-2963d080153 115->119 120 2963d08014b-2963d08014e 115->120 121 2963d080083-2963d0800b5 116->121 117->109 117->112 122 2963d080120-2963d080135 118->122 123 2963d0800ea 118->123 119->115 126 2963d080155-2963d080156 119->126 120->119 125 2963d080183-2963d080197 120->125 121->117 121->121 122->114 122->118 124 2963d0800ec-2963d08011e 123->124 124->122 124->124 127 2963d080158-2963d08017f 126->127 127->127 128 2963d080181 127->128 128->115
              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589449610.000002963D080000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002963D080000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d080000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: Sleep
              • String ID:
              • API String ID: 3472027048-0
              • Opcode ID: 88e8bec169d31fc803aeef05fed04f98ffb8ac2501b92b4af572ff67ccb03544
              • Instruction ID: 203fd0e71b8c5c23d959a2efaec593ad49aecaa19972f1693b9016a9c2a1c2f5
              • Opcode Fuzzy Hash: 88e8bec169d31fc803aeef05fed04f98ffb8ac2501b92b4af572ff67ccb03544
              • Instruction Fuzzy Hash: 4C515630204B858FCB1DCE1C86E9A3573D1FB85705F0592ACE59BCB26BCA30DC62CA84

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: NameUser_snprintfmallocstrrchr
              • String ID:
              • API String ID: 1238167203-0
              • Opcode ID: d69273eeb4579e6a96eb8d0c87a60564a21875d7210b55cf29d23a145d20b21e
              • Instruction ID: 8bb87ac86b4089532780ea885f17821a7a7fde3fec89ed73d75ddc7b81460bcd
              • Opcode Fuzzy Hash: d69273eeb4579e6a96eb8d0c87a60564a21875d7210b55cf29d23a145d20b21e
              • Instruction Fuzzy Hash: E751853071CA084FEB48AB69A45E7B972D2EBC8710F14856DF19EC32D7DA38DC029745

              Control-flow Graph

              APIs
              Strings
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: Socket
              • String ID: _Cy
              • API String ID: 38366605-1085951347
              • Opcode ID: 9f6035121241c12ff71e8e552415c275c25b201d0c9d2d3551ffb33b20d91594
              • Instruction ID: 27adf02e566ad2d33d11eba32164dfb0aa46f5c3c23465e91cc3ef39343ab086
              • Opcode Fuzzy Hash: 9f6035121241c12ff71e8e552415c275c25b201d0c9d2d3551ffb33b20d91594
              • Instruction Fuzzy Hash: 9A31D430608E484BDBA4DF29988C76AB7E1FBE8315F104A7EE58AC3291DB35C9428745

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: Internet$ConnectOpen
              • String ID:
              • API String ID: 2790792615-0
              • Opcode ID: c02896be98f17698b461471e8597e5ae08ffedd86d74317b17a8770a829ca45e
              • Instruction ID: 0de48a7c749c718627e545f3c4d5d0493388088e1033bbacb8d25b90c9353472
              • Opcode Fuzzy Hash: c02896be98f17698b461471e8597e5ae08ffedd86d74317b17a8770a829ca45e
              • Instruction Fuzzy Hash: 3F51B530618A048FEB59DF29D4AE76973D1FF88704F11446DB18BC3692DA3CD902D786

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 129 2963d22c36c-2963d22c38b 130 2963d22c419-2963d22c422 VirtualFree 129->130 131 2963d22c391-2963d22c39a 129->131 132 2963d22c428-2963d22c437 130->132 133 2963d22c3a6-2963d22c3a9 131->133 134 2963d22c39c-2963d22c3a4 131->134 133->130 136 2963d22c3ab-2963d22c3b3 133->136 134->133 135 2963d22c3b5-2963d22c3dc 134->135 138 2963d22c3ec-2963d22c409 call 2963d22e186 135->138 139 2963d22c3de-2963d22c3ea 135->139 136->130 136->135 142 2963d22c40e-2963d22c410 138->142 139->142 142->130 143 2963d22c412-2963d22c417 142->143 143->132
              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: FreeVirtual
              • String ID:
              • API String ID: 1263568516-0
              • Opcode ID: 33013136f0bb95f1eb9f3645b418df4a5ff2efb559231014e174e8ee2656166c
              • Instruction ID: 5e745c1a148c9123b8911de5b916103889e07953894a94e481abad76af1125aa
              • Opcode Fuzzy Hash: 33013136f0bb95f1eb9f3645b418df4a5ff2efb559231014e174e8ee2656166c
              • Instruction Fuzzy Hash: 91218130628A488FEBD5DF1DE45C72A37E5FBAC719F00097AF189C32A0C6799940EB45

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
              • String ID:
              • API String ID: 388111225-0
              • Opcode ID: f569b21a01fad2a92039226acf8a97d91cb16fac7f3924a9cc2c8e1a455bf938
              • Instruction ID: f91deddb079e299563dd2fbfc5cd22de2d31181a1b7d90d8dd765610c665285e
              • Opcode Fuzzy Hash: f569b21a01fad2a92039226acf8a97d91cb16fac7f3924a9cc2c8e1a455bf938
              • Instruction Fuzzy Hash: FB312970118B084FF3556F6A9CAE37C37D0EF47B20F510698F656872D3D634A8015355

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock_unlock_fhandle
              • String ID:
              • API String ID: 2644381645-0
              • Opcode ID: 1a0056bbafc3a7faafb75a0a5683c60387dc6450d26c6e1c9b28f7a797692c5c
              • Instruction ID: 78a40841da3c3c34af022294edc563f1b94ac3855abf76a59947aa83af363634
              • Opcode Fuzzy Hash: 1a0056bbafc3a7faafb75a0a5683c60387dc6450d26c6e1c9b28f7a797692c5c
              • Instruction Fuzzy Hash: A7216830618A080FF3996F1EDC6E3BC72D4EF86B21F5506CCF256C71D7C66158015269

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock_unlock_fhandle
              • String ID:
              • API String ID: 1078912150-0
              • Opcode ID: af586274eb7c0247a5ed565ce490a43ddd2b1adc4c580e4a875ff27a69eb19f0
              • Instruction ID: b676e980c0282a221d516dc6dd0a280ce3415ff8180e3efbc91f534ed3ba1262
              • Opcode Fuzzy Hash: af586274eb7c0247a5ed565ce490a43ddd2b1adc4c580e4a875ff27a69eb19f0
              • Instruction Fuzzy Hash: 272168306082040FF3596F1ACC6E3BC33D9DF82B21F0506D8F296871E3C6605801566A

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_unlock_fhandle
              • String ID:
              • API String ID: 2464146582-0
              • Opcode ID: c89056d156aae0bb9c491ae48c02d203d405bbf82af9f534bcd04b22b5544d86
              • Instruction ID: 84ddb89d9b7093decfc1c5aeb947b034e6557df2bc37af1e1d4f91dab3512ee0
              • Opcode Fuzzy Hash: c89056d156aae0bb9c491ae48c02d203d405bbf82af9f534bcd04b22b5544d86
              • Instruction Fuzzy Hash: E12124706197044FF35A6F6ADCAE3BC32D1EF86B30F15068CF25A872D3D664AC0152A9

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno_unlock_fhandle
              • String ID:
              • API String ID: 2140805544-0
              • Opcode ID: d63a0d9a057a00514656f61d256491cfcc4309f98023220473e92bade8306c33
              • Instruction ID: cf2dfd6fa8247ee760f69dd4ea19e2c55a6e92bb9398d70d03993e05d129f444
              • Opcode Fuzzy Hash: d63a0d9a057a00514656f61d256491cfcc4309f98023220473e92bade8306c33
              • Instruction Fuzzy Hash: E1212431515A084FF3156F76CCAD3A87AE0EF46B20F1109DCF25A872E3C676D8019768
              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: free$FreeHeap_errno
              • String ID:
              • API String ID: 2737118440-0
              • Opcode ID: f2c387d57ff385ba375dc00a6173171a26f2c39e06d74853e0125178de0f68c4
              • Instruction ID: 90bf34d28893db083770ca3ff163240ae02216b1130ec6451bbaad24404f3aa1
              • Opcode Fuzzy Hash: f2c387d57ff385ba375dc00a6173171a26f2c39e06d74853e0125178de0f68c4
              • Instruction Fuzzy Hash: DE41A530270A0A8FFBD4EB5AD8ADB6572F1FF58719F5000A9B206C22D1CA2C8945E719
              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: free$malloc$_errno$_callnewh
              • String ID:
              • API String ID: 4160633307-0
              • Opcode ID: 78c5723810e6e6d18fab4a62d391ea0db65c57382cb75ed74f6abc212771b6cb
              • Instruction ID: f2779e4aea8c63bad784f158d92e6b81fae6e61256d9dab0c3bd832b4f8fcebd
              • Opcode Fuzzy Hash: 78c5723810e6e6d18fab4a62d391ea0db65c57382cb75ed74f6abc212771b6cb
              • Instruction Fuzzy Hash: BD910C30718B484BD759AB6D946D77A73D2EF89B10F40429EF58AC32C3DE21DC02968A
              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: Packaged__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
              • String ID:
              • API String ID: 2917016420-0
              • Opcode ID: cfbfe809ff06962f400f8854e8dfaca57605153f463412cb5835124c7fa4a529
              • Instruction ID: d415dcca59d071fa4950b32a3f49c6435258806dd40ea330b84812700e04228d
              • Opcode Fuzzy Hash: cfbfe809ff06962f400f8854e8dfaca57605153f463412cb5835124c7fa4a529
              • Instruction Fuzzy Hash: 7631F730624A094FFB88AF7E986D36972D0FF8C725F14459DB54AC32E2DB78C840A746
              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errno$__doserrno__lock_fhandle_getptd_noexit_unlock_fhandle
              • String ID:
              • API String ID: 4120058822-0
              • Opcode ID: 9341880fa3ae8ea43da77f4714028596b22b009dd5c4526b8d460d71b2af8a07
              • Instruction ID: 2cbe8f83252e6caa6c0441c0e26378e53698c27e2d3643fd69e21a2a8ded1cff
              • Opcode Fuzzy Hash: 9341880fa3ae8ea43da77f4714028596b22b009dd5c4526b8d460d71b2af8a07
              • Instruction Fuzzy Hash: F721F2A0A08A044FF7146F6B9CBD36D76D0EF87B10F44059CF25A872D3D6689800A369
              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errno$_filbuf_fileno_getptd_noexit_invalid_parameter_noinfomemcpy_s
              • String ID:
              • API String ID: 2328795619-0
              • Opcode ID: 4bbdce99b29ecd3e24264ac9f3b66a56e11342a03ebc5466d7d382185dba5216
              • Instruction ID: 8989224457fe31f1b4e5a8992061903656f803f1fa8a0e6e5f09188f9ef62847
              • Opcode Fuzzy Hash: 4bbdce99b29ecd3e24264ac9f3b66a56e11342a03ebc5466d7d382185dba5216
              • Instruction Fuzzy Hash: F7610830238F090AE7AC962F486D33972C1EF94B25F2403AEF656C36D5EE21DC5252C9
              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: __updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
              • String ID:
              • API String ID: 2808835054-0
              • Opcode ID: 04a51c6534ba67d8c2ce71a0e6c0b8946822a3beaaa0ad6abf8e1e016199c0f5
              • Instruction ID: 4a965b2513fdbb3337f7dd26c6a6b5f36e9089aaf7a95bc8e0e696c6ea27cc97
              • Opcode Fuzzy Hash: 04a51c6534ba67d8c2ce71a0e6c0b8946822a3beaaa0ad6abf8e1e016199c0f5
              • Instruction Fuzzy Hash: B4319A30618A0C8FE7A89F19989C76A72E0FF58B10F1107E9B549C72D2DA30DC449799
              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
              • String ID:
              • API String ID: 1547050394-0
              • Opcode ID: 25a8bf288fd42ce426ab2ae56b53d18e2e8359fd32586f4ae3706e9ff750b65b
              • Instruction ID: 77f6158c377f1df349f32ae470f3df67412fcd9455c238c1f53723eeb61ede74
              • Opcode Fuzzy Hash: 25a8bf288fd42ce426ab2ae56b53d18e2e8359fd32586f4ae3706e9ff750b65b
              • Instruction Fuzzy Hash: 6421D630618A0D4FF7D1AB3A882D36A76D1FF89B04F0509DAB549C31A2DF24CC406799
              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: freemallocstrchr$FreeHeap_errnorand
              • String ID:
              • API String ID: 3504763109-0
              • Opcode ID: f35e4bf4a30ec4413237561f10dac7197b8990473e0b46e11b580f4fb44e5963
              • Instruction ID: a03d93ad50780eadd706967ffb410500d4d28a4612cd4102cd8ce61b33191019
              • Opcode Fuzzy Hash: f35e4bf4a30ec4413237561f10dac7197b8990473e0b46e11b580f4fb44e5963
              • Instruction Fuzzy Hash: 2B812B2022CE9C4BE7E5AB2D842D3F6B3D1FF9D709F4001ADF689C7192DA258646E345
              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: free$_errno$_callnewhmalloc
              • String ID:
              • API String ID: 2761444284-0
              • Opcode ID: a46d6df1e63736bbf5e6f8efd513222b2720334364c4a35ae3722e37f335d37b
              • Instruction ID: f7783d9fb172960adc9b835608025c13d00868723a7ca2515342ac7faf369fb5
              • Opcode Fuzzy Hash: a46d6df1e63736bbf5e6f8efd513222b2720334364c4a35ae3722e37f335d37b
              • Instruction Fuzzy Hash: AA51E330618F495BE799EB29986D67A73D1FF49704F4041ADF94BC3293EE20DC0296C9
              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: malloc$_snprintf$_errno$_callnewhfreerealloc
              • String ID:
              • API String ID: 74200508-0
              • Opcode ID: fd4b1ce187cf5d2c7b3c7d1d5f2f485ec143d87fcb2d796d9dd721ce5a89571b
              • Instruction ID: 338f815dc093de29a199876208d339a101d64415022348bd9337a92e1be2d16c
              • Opcode Fuzzy Hash: fd4b1ce187cf5d2c7b3c7d1d5f2f485ec143d87fcb2d796d9dd721ce5a89571b
              • Instruction Fuzzy Hash: 0DD1EA30714A044BFB99BB36887E3A972D2FF85B04F5045ADB646C32C3DE39D905A74A
              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errno$_invalid_parameter_noinfo$fseekmalloc$_callnewh_fseek_nolock_ftelli64fclose
              • String ID:
              • API String ID: 2887643383-0
              • Opcode ID: f1c4e02295faa99f8843714657dd5281141177bf23df19fa39898597ddf49910
              • Instruction ID: 19f697fb5abb9825c3f921d80b8c689830cda33bbbd56d40b3573a7fb54c881e
              • Opcode Fuzzy Hash: f1c4e02295faa99f8843714657dd5281141177bf23df19fa39898597ddf49910
              • Instruction Fuzzy Hash: 9151E831628A084FE788EB29946E7BA72D1FF88714F5042ADF54BC32D7DD24990296C5
              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _lock$_calloc_crt_mtinitlocknum
              • String ID:
              • API String ID: 3962633935-0
              • Opcode ID: b1e94c722dda090378a8e761eed7513b06593d91ccd6790d0d4411b736f80c7c
              • Instruction ID: 64551ebf0a4ffc6a5ee7488314677e2cbd9cd5bff3e0a02bc0140168b06da85d
              • Opcode Fuzzy Hash: b1e94c722dda090378a8e761eed7513b06593d91ccd6790d0d4411b736f80c7c
              • Instruction Fuzzy Hash: D65125B0518B088FE7689F1ACC9D366B7D0FF59710F10029DFA4AC32A2D674D842DB86
              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: free$_errno$_callnewhmalloc
              • String ID:
              • API String ID: 2761444284-0
              • Opcode ID: 9dd44889f23309e2c133c4e883ac3d7c03cf28f4ebc62bcd805b5d39935d1e2d
              • Instruction ID: 699de7269abf41a41006ac51d74a60b8dbd8d873894b191cad1f0b55e717265b
              • Opcode Fuzzy Hash: 9dd44889f23309e2c133c4e883ac3d7c03cf28f4ebc62bcd805b5d39935d1e2d
              • Instruction Fuzzy Hash: 45413A30318B4D4BE7689A3A885D27673D5EF96714F1081AEF98BC3283DD21D8075789
              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errno$_fileno_getbuf_getptd_noexit_invalid_parameter_noinfo_isatty
              • String ID:
              • API String ID: 304646821-0
              • Opcode ID: c35e8c2de9f02937b40d8dcb44627bb11330896f7d068decc206105344bae12a
              • Instruction ID: 7cbfd3024fbcaa6aec853bdf8db335216e5c43e40fb7341245e40856ef2bb404
              • Opcode Fuzzy Hash: c35e8c2de9f02937b40d8dcb44627bb11330896f7d068decc206105344bae12a
              • Instruction Fuzzy Hash: 59519030114A084FEB9AEF2AC8AD76577E1FF48B10F1406D9EA5ACB2DBD734C8459784
              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errno$_snprintffreemalloc$FreeHeap_callnewh_invalid_parameter_noinfo
              • String ID:
              • API String ID: 343393124-0
              • Opcode ID: faf2166294d0965833cb84c6e7fe882f3c5ed13ceeefabe40a4c11aee224dca5
              • Instruction ID: 9de6c318437518a3835d5be521b96ba783a09caa3d2ebf351de0c7a1dc5690f5
              • Opcode Fuzzy Hash: faf2166294d0965833cb84c6e7fe882f3c5ed13ceeefabe40a4c11aee224dca5
              • Instruction Fuzzy Hash: 2C41C22071CA480FE698AB2D682D3B8B7D2EB89714F4442DDF58EC3396DD24DD029789
              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errno$free$FreeHeap_callnewhfclosefwritemalloc
              • String ID:
              • API String ID: 415550720-0
              • Opcode ID: c287650ca013cd6fba82a94b2bfab312077d62521af6d54d1c0599a360ecab3d
              • Instruction ID: e2f827608893ca5212cffe58b05a408ab6703c178544fbe44c6b8d21631411c2
              • Opcode Fuzzy Hash: c287650ca013cd6fba82a94b2bfab312077d62521af6d54d1c0599a360ecab3d
              • Instruction Fuzzy Hash: D6216B20738A084FE784F72A846D7AEB2D1FF9CB14F54459D764AC32D6DD258901534A
              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _getptd_noexit$__doserrno_errno
              • String ID:
              • API String ID: 2964073243-0
              • Opcode ID: 7de39b626677fa29025c8f4af27b0a540db68e2d6824cc23474586602198323a
              • Instruction ID: 5e36c00b9d6aa337774d678eae0dc06b705208c4485f4db1757f36d0a6d5cc9c
              • Opcode Fuzzy Hash: 7de39b626677fa29025c8f4af27b0a540db68e2d6824cc23474586602198323a
              • Instruction Fuzzy Hash: DD01F47012680C4FF399AB6BCD6D39832E0FF06B21F9042D4F615870E6D7391460AB2A
              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _snprintf
              • String ID:
              • API String ID: 3512837008-0
              • Opcode ID: 72e4e973a1d0442b98f7febb78707b45b3081222fbe35b5ecbc6412512dc3076
              • Instruction ID: a789523f4e68bd86b19ac7c54523a2c285aea40a984387c74bf5a70c849d2113
              • Opcode Fuzzy Hash: 72e4e973a1d0442b98f7febb78707b45b3081222fbe35b5ecbc6412512dc3076
              • Instruction Fuzzy Hash: 8B91D430228A088FEB95EF19D89DBAA73E5FF98704F0045A9F546C31D2DE38D905DB85
              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errnomalloc$_callnewh$_invalid_parameter_noinfo_snprintf
              • String ID:
              • API String ID: 2026495703-0
              • Opcode ID: b352101c7262c8bcb4a5e96376bd10b91777e0dce9561e268234f3b9efdf5141
              • Instruction ID: 66d995854a731ba09c64a797ee8a497bd77e2610aaed528182aaa8574c0fb2a8
              • Opcode Fuzzy Hash: b352101c7262c8bcb4a5e96376bd10b91777e0dce9561e268234f3b9efdf5141
              • Instruction Fuzzy Hash: 50118B30A2CF080FE7A8EB2DA05936576D1EB8C720F10459EF18AC3396DA349E4197C6
              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errno_fileno_flush_getptd_noexit_invalid_parameter_noinfo
              • String ID:
              • API String ID: 634798775-0
              • Opcode ID: 34e7f92ebff520e6a17a4e985317f9f17b8bd586bad3667c73d28a98cf0395a5
              • Instruction ID: 4f7348e334fdc942116f3c3f808a77c077dcbe0ad36d32b740de3d6ff5c97675
              • Opcode Fuzzy Hash: 34e7f92ebff520e6a17a4e985317f9f17b8bd586bad3667c73d28a98cf0395a5
              • Instruction Fuzzy Hash: 1851FF30228F094FE7E8596F546D33672C0EF58B14F2502AEF55AC31E6EA50DC52528A
              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: clock
              • String ID:
              • API String ID: 3195780754-0
              • Opcode ID: 88d80a52c757cc5c40c2c6d70a970e4954adb33c3b78b443ec03df4506b3ea8d
              • Instruction ID: 25fc6fb4e31ec2280cb57c9a5f2c0d17dd36149c7f0199cd4467cfa686bbf7ca
              • Opcode Fuzzy Hash: 88d80a52c757cc5c40c2c6d70a970e4954adb33c3b78b443ec03df4506b3ea8d
              • Instruction Fuzzy Hash: C521383240C70C4FE768AD9F948E336B3D0EFC4750F11426DFACA83157E956985692DA
              APIs
              Strings
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
              • String ID: B
              • API String ID: 1812809483-1255198513
              • Opcode ID: c02d2d703cad3fde31994e70e132d1470a84cf0b2fdde3fa0011d2dc5e3ae6ea
              • Instruction ID: 6461d973329f1f8b36340a729bd8c681af0873830b5ccd5dbd4b7a88bcc19952
              • Opcode Fuzzy Hash: c02d2d703cad3fde31994e70e132d1470a84cf0b2fdde3fa0011d2dc5e3ae6ea
              • Instruction Fuzzy Hash: 1011B270228B084FD794EF1994897A9B3D1FB98724F5047AEB159C32A5CB34C844D786
              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: free$_errno$_callnewhmalloc
              • String ID:
              • API String ID: 2761444284-0
              • Opcode ID: 220d10eecca3932b28677e19a5d899b4e1de467fae96e5e6bbac4d4284393be2
              • Instruction ID: 8306dbf88aae6703295ea2ea9f2bb294024821981c08df5ad95d5ac77066a471
              • Opcode Fuzzy Hash: 220d10eecca3932b28677e19a5d899b4e1de467fae96e5e6bbac4d4284393be2
              • Instruction Fuzzy Hash: 5461E8303285084BEBD8EB1AC4AD7AD72D1FF88B14F1049ADF646C31D7DE6499029689
              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.2589648151.000002963D210000.00000040.00000020.00020000.00000000.sdmp, Offset: 000002963D210000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_2963d210000_wermgr.jbxd
              Yara matches
              Similarity
              • API ID: malloc
              • String ID:
              • API String ID: 2803490479-0
              • Opcode ID: eb22e79342f6c44f5990d3d93bc1acaf377093f70efb3d4e41a798bd81bbd69f
              • Instruction ID: 788d7bdecc3db4a01e7b1eb6825777e2565eaf35e378e4250fd43841a577b3c7
              • Opcode Fuzzy Hash: eb22e79342f6c44f5990d3d93bc1acaf377093f70efb3d4e41a798bd81bbd69f
              • Instruction Fuzzy Hash: D151C830618A054BDB59DF2DD46D67A73D2FF89710F1045ADF98BC3286EE31DC029689