Create Interactive Tour

Windows Analysis Report w3wp.exe

Overview

General Information

Sample Name:w3wp.exe
Analysis ID:547959
MD5:8337336dbf7ce28f4c29e907ae97ad4f
SHA1:2ebbb1ad7b63c506c2bcace2f1d91051803fe2b3
SHA256:8d5ffa6baee2638a084fabe8d4f00302df6c8e97429e24cacac895f3bf8b3da7
Infos:

Most interesting Screenshot:

Detection

Score:3
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Contains functionality to call native functions
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Program does not show much activity (idle)
Binary contains a suspicious time stamp
Detected potential crypto function

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • w3wp.exe (PID: 6744 cmdline: "C:\Users\user\Desktop\w3wp.exe" MD5: 8337336DBF7CE28F4C29E907AE97AD4F)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: w3wp.exeStatic PE information: GUARD_CF, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
Source: Binary string: w3wp.pdb source: w3wp.exe
Source: Binary string: w3wp.pdbGCTL source: w3wp.exe
Source: C:\Users\user\Desktop\w3wp.exeCode function: 1_2_00007FF7A670115C PuLoadDebugFlagsFromRegStr,SetErrorMode,SetUnhandledExceptionFilter,GetCurrentProcess,GetProcessAffinityMask,PuDbgPrint,CoInitializeEx,PuDbgPrint,IsDebuggerPresent,??0STRU@@QEAA@XZ,GetCurrentProcessId,PuDbgPrint,??1STRU@@QEAA@XZ,?Append@STRU@@QEAAJPEBG@Z,?Append@STRU@@QEAAJPEBG@Z,NtQuerySystemTime,RtlSystemTimeToLocalTime,RtlTimeToTimeFields,?Append@STRU@@QEAAJPEBG@Z,SetConsoleTitleW,??1STRU@@QEAA@XZ,PuDbgPrintError,LoadLibraryExW,GetLastError,PuDbgPrint,GetProcAddress,GetLastError,IsDebuggerPresent,PerfStopProvider,PerfStopProvider,CoUninitialize,1_2_00007FF7A670115C
Source: w3wp.exeBinary or memory string: OriginalFilename vs w3wp.exe
Source: C:\Users\user\Desktop\w3wp.exeCode function: 1_2_00007FF7A67024901_2_00007FF7A6702490
Source: C:\Users\user\Desktop\w3wp.exeCode function: 1_2_00007FF7A6701DC81_2_00007FF7A6701DC8
Source: C:\Users\user\Desktop\w3wp.exeCode function: 1_2_00007FF7A6701BF01_2_00007FF7A6701BF0
Source: w3wp.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: classification engineClassification label: clean3.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\w3wp.exeCode function: 1_2_00007FF7A67015F8 RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,InitializeSdFromProcessToken,CoInitializeSecurity,CoCreateInstance,LocalFree,LocalFree,1_2_00007FF7A67015F8
Source: w3wp.exeStatic PE information: Image base 0x7ff7a6700000 > 0x60000000
Source: w3wp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: w3wp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: w3wp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: w3wp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: w3wp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: w3wp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: w3wp.exeStatic PE information: GUARD_CF, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
Source: w3wp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: w3wp.pdb source: w3wp.exe
Source: Binary string: w3wp.pdbGCTL source: w3wp.exe
Source: w3wp.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: w3wp.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: w3wp.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: w3wp.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: w3wp.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: w3wp.exeStatic PE information: real checksum: 0x108b8 should be: 0x6e61
Source: w3wp.exeStatic PE information: 0xCFDB13D8 [Wed Jul 3 14:06:16 2080 UTC]
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\w3wp.exeCode function: 1_2_00007FF7A670115C PuLoadDebugFlagsFromRegStr,SetErrorMode,SetUnhandledExceptionFilter,GetCurrentProcess,GetProcessAffinityMask,PuDbgPrint,CoInitializeEx,PuDbgPrint,IsDebuggerPresent,??0STRU@@QEAA@XZ,GetCurrentProcessId,PuDbgPrint,??1STRU@@QEAA@XZ,?Append@STRU@@QEAAJPEBG@Z,?Append@STRU@@QEAAJPEBG@Z,NtQuerySystemTime,RtlSystemTimeToLocalTime,RtlTimeToTimeFields,?Append@STRU@@QEAAJPEBG@Z,SetConsoleTitleW,??1STRU@@QEAA@XZ,PuDbgPrintError,LoadLibraryExW,GetLastError,PuDbgPrint,GetProcAddress,GetLastError,IsDebuggerPresent,PerfStopProvider,PerfStopProvider,CoUninitialize,1_2_00007FF7A670115C
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\w3wp.exeCode function: 1_2_00007FF7A67032D4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00007FF7A67032D4
Source: C:\Users\user\Desktop\w3wp.exeCode function: 1_2_00007FF7A67034D0 SetUnhandledExceptionFilter,1_2_00007FF7A67034D0
Source: C:\Users\user\Desktop\w3wp.exeCode function: 1_2_00007FF7A6701830 GetCurrentThread,OpenThreadToken,RevertToSelf,SetUnhandledExceptionFilter,UnhandledExceptionFilter,SetUnhandledExceptionFilter,SetThreadToken,CloseHandle,1_2_00007FF7A6701830
Source: C:\Users\user\Desktop\w3wp.exeCode function: 1_2_00007FF7A670115C PuLoadDebugFlagsFromRegStr,SetErrorMode,SetUnhandledExceptionFilter,GetCurrentProcess,GetProcessAffinityMask,PuDbgPrint,CoInitializeEx,PuDbgPrint,IsDebuggerPresent,??0STRU@@QEAA@XZ,GetCurrentProcessId,PuDbgPrint,??1STRU@@QEAA@XZ,?Append@STRU@@QEAAJPEBG@Z,?Append@STRU@@QEAAJPEBG@Z,NtQuerySystemTime,RtlSystemTimeToLocalTime,RtlTimeToTimeFields,?Append@STRU@@QEAAJPEBG@Z,SetConsoleTitleW,??1STRU@@QEAA@XZ,PuDbgPrintError,LoadLibraryExW,GetLastError,PuDbgPrint,GetProcAddress,GetLastError,IsDebuggerPresent,PerfStopProvider,PerfStopProvider,CoUninitialize,1_2_00007FF7A670115C
Source: C:\Users\user\Desktop\w3wp.exeCode function: 1_2_00007FF7A67036A4 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,GetTickCount,QueryPerformanceCounter,1_2_00007FF7A67036A4

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionTimestomp1OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemorySecurity Software Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerSystem Information Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 547959 Sample: w3wp.exe Startdate: 04/01/2022 Architecture: WINDOWS Score: 3 4 w3wp.exe 2->4         started       

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
SourceDetectionScannerLabelLink
w3wp.exe1%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos

General Information

Joe Sandbox Version:34.0.0 Boulder Opal
Analysis ID:547959
Start date:04.01.2022
Start time:21:39:21
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 4m 23s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:w3wp.exe
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:21
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:CLEAN
Classification:clean3.winEXE@1/0@0/0
EGA Information:Failed
HDC Information:
  • Successful, ratio: 100% (good quality ratio 29.7%)
  • Quality average: 26.5%
  • Quality standard deviation: 41.7%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 16
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .exe
Warnings:
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
  • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
  • Execution Graph export aborted for target w3wp.exe, PID 6744 because there are no executed function
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
No context
No created / dropped files found

Static File Info

General

File type:PE32+ executable (console) x86-64, for MS Windows
Entropy (8bit):5.1994218303934945
TrID:
  • Win64 Executable Console (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:w3wp.exe
File size:26624
MD5:8337336dbf7ce28f4c29e907ae97ad4f
SHA1:2ebbb1ad7b63c506c2bcace2f1d91051803fe2b3
SHA256:8d5ffa6baee2638a084fabe8d4f00302df6c8e97429e24cacac895f3bf8b3da7
SHA512:35ea14d7fef43cf63393ea13f49021abf99b519da1b499ac87393518345081ecda2b800d868f64f4a9e22566061e7d7e9c48f64be9b8810bc9d7312e49eee8f5
SSDEEP:384:od71aN4xcQVNTYSFS26+fdJUjGL/N+NAZfHxWS9UsdX6EaGUtWSu8:od71aNmVVYSgN+PtZ+iZfHQnsdX9ex
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................`.....................................................................Rich............................PE..d..

File Icon

Icon Hash:00828e8e8686b000

General

Entrypoint:0x7ff7a6703280
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x7ff7a6700000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:GUARD_CF, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
Time Stamp:0xCFDB13D8 [Wed Jul 3 14:06:16 2080 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:10
OS Version Minor:0
File Version Major:10
File Version Minor:0
Subsystem Version Major:10
Subsystem Version Minor:0
Import Hash:6e62e5f087316547aab36ed54a5e50b9
Instruction
dec eax
sub esp, 28h
call 00007F2974684CE0h
dec eax
add esp, 28h
jmp 00007F29746846E3h
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
nop word ptr [eax+eax+00000000h]
dec eax
cmp ecx, dword ptr [00003D51h]
jne 00007F29746848D2h
dec eax
rol ecx, 10h
test cx, FFFFh
jne 00007F29746848C3h
ret
dec eax
ror ecx, 10h
jmp 00007F2974684907h
int3
int3
int3
int3
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, ecx
xor ecx, ecx
call dword ptr [00000E9Bh]
dec eax
mov ecx, ebx
call dword ptr [00000E8Ah]
call dword ptr [00000F6Ch]
dec eax
mov ecx, eax
mov edx, C0000409h
dec eax
add esp, 20h
pop ebx
dec eax
jmp dword ptr [00000F40h]
int3
int3
int3
int3
int3
int3
int3
int3
dec eax
mov dword ptr [esp+08h], ecx
dec eax
sub esp, 00000088h
dec eax
lea ecx, dword ptr [000045CDh]
call dword ptr [00000F97h]
dec eax
mov eax, dword ptr [000046B8h]
dec eax
mov dword ptr [esp+48h], eax
inc ebp
xor eax, eax
dec eax
lea edx, dword ptr [esp+50h]
dec eax
mov ecx, dword ptr [esp+48h]
call dword ptr [00000F88h]
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x54dc0x1f4.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x90000x448.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x80000x180.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0xa0000x20.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x50b00x54.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x40100x108.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x41180x378.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x28c00x2a00False0.56287202381data5.97461374705IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.rdata0x40000x240a0x2600False0.399568256579data4.78791035663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x70000xe800xa00False0.184375data1.96000358061IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.pdata0x80000x1800x200False0.490234375data3.08930045264IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x90000x4480x600False0.313802083333data2.4204633685IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0xa0000x200x200False0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountry
RT_STRING0x94200x26dataEnglishUnited States
RT_VERSION0x90a00x37cdataEnglishUnited States
DLLImport
msvcrt.dll_amsg_exit, _XcptFilter, __set_app_type, _wcsicmp, wcstoul, swprintf_s, _wsetlocale, printf, _ultow, towupper, _getwch, wprintf, exit, _exit, _cexit, __setusermatherr, _initterm, __C_specific_handler, _fmode, _commode, ?terminate@@YAXXZ, __wgetmainargs, _vsnwprintf, memset
api-ms-win-core-errorhandling-l1-1-0.dllUnhandledExceptionFilter, SetUnhandledExceptionFilter, GetLastError, SetErrorMode
api-ms-win-core-processthreads-l1-1-0.dllGetCurrentThread, GetCurrentThreadId, TerminateProcess, GetCurrentProcessId, ExitProcess, GetCurrentProcess, OpenThreadToken, SetThreadToken
api-ms-win-core-com-l1-1-0.dllCoInitializeSecurity, CoCreateInstance, CoInitializeEx, CoUninitialize
api-ms-win-core-debug-l1-1-0.dllIsDebuggerPresent
api-ms-win-core-console-l2-2-0.dllSetConsoleTitleW
api-ms-win-core-libraryloader-l1-2-0.dllLoadLibraryExW, LoadStringW, GetProcAddress, GetModuleHandleW
api-ms-win-core-registry-l1-1-0.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey
api-ms-win-core-heap-l2-1-0.dllLocalFree
api-ms-win-security-base-l1-1-0.dllRevertToSelf
api-ms-win-core-handle-l1-1-0.dllCloseHandle
api-ms-win-core-threadpool-l1-2-0.dllCreateThreadpoolTimer, WaitForThreadpoolTimerCallbacks, CloseThreadpoolTimer, SetThreadpoolTimer
api-ms-win-core-processenvironment-l1-1-0.dllExpandEnvironmentStringsW
api-ms-win-core-file-l1-1-0.dllGetFullPathNameW
api-ms-win-core-console-l1-1-0.dllSetConsoleCtrlHandler, GetConsoleOutputCP
api-ms-win-core-localization-l1-2-0.dllSetThreadPreferredUILanguages
api-ms-win-core-synch-l1-2-0.dllSleep
api-ms-win-core-rtlsupport-l1-1-0.dllRtlCaptureContext, RtlVirtualUnwind, RtlLookupFunctionEntry
api-ms-win-core-profile-l1-1-0.dllQueryPerformanceCounter
api-ms-win-core-sysinfo-l1-1-0.dllGetTickCount, GetSystemTimeAsFileTime
api-ms-win-core-perfcounters-l1-1-0.dllPerfStopProvider, PerfStartProvider, PerfSetCounterSetInfo
api-ms-win-core-processtopology-obsolete-l1-1-0.dllGetProcessAffinityMask
ntdll.dllNtQuerySystemTime, RtlSystemTimeToLocalTime, RtlTimeToTimeFields
iisutil.dllInitializeSdFromProcessToken, ?Append@STRU@@QEAAJPEBG@Z, ??0STRU@@QEAA@XZ, PuDbgPrintError, PuLoadDebugFlagsFromRegStr, ?Copy@STRU@@QEAAJPEBGK@Z, ?Copy@STRU@@QEAAJPEBG@Z, MakePathCanonicalizationProof, ??1STRU@@QEAA@XZ, ?Resize@STRU@@QEAAJK@Z, PuDbgPrint, ??0STRU@@QEAA@PEAGK@Z
DescriptionData
LegalCopyright Microsoft Corporation. All rights reserved.
InternalNamew3wp.exe
FileVersion10.0.17763.1 (WinBuild.160101.0800)
CompanyNameMicrosoft Corporation
ProductNameInternet Information Services
ProductVersion10.0.17763.1
FileDescriptionIIS Worker Process
OriginalFilenamew3wp.exe
Translation0x0000 0x04b0
Language of compilation systemCountry where language is spokenMap
EnglishUnited States

Network Behavior

No network behavior found

Code Manipulations

Statistics

CPU Usage

050100s020406080100

Click to jump to process

Memory Usage

050100s0.000.200.400.600.80MB

Click to jump to process

System Behavior

Start time:21:40:20
Start date:04/01/2022
Path:C:\Users\user\Desktop\w3wp.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\w3wp.exe"
Imagebase:0x7ff7a6700000
File size:26624 bytes
MD5 hash:8337336DBF7CE28F4C29E907AE97AD4F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

Disassembly

Code Analysis

Executed Functions

Non-executed Functions

APIs
Strings
Memory Dump Source
  • Source File: 00000001.00000002.562188500.00007FF7A6701000.00000020.00020000.sdmp, Offset: 00007FF7A6700000, based on PE: true
  • Associated: 00000001.00000002.562175111.00007FF7A6700000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562198637.00007FF7A6704000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562210710.00007FF7A6707000.00000008.00020000.sdmp Download File
  • Associated: 00000001.00000002.562218066.00007FF7A6708000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_1_2_7ff7a6700000_w3wp.jbxd
Similarity
  • API ID: Print$wcstoul
  • String ID: App host file cannot be provided when using -debug or -u switch$App pool was passed and in user console mode$Application Host File, %S$ClrConfigFile, %S$ClrLoader, %S$ClrVersion, %S$Idle time can not be passed when in user console mode$Invalid idle time %ws$Invalid idle timeout action %ws$Invalid maximum requests %ws$Invalid number of parameters (%d)$Invalid shutdown timeout value %ws$Invalid site id %ws$Managed pipeline mode can not be passed when in user console mode$Maximum requests is %lu$Missing app host file when in user console mode$NamedPipe Id, %S$No app pool was passed and not in user console mode$ParseCommandLine$Pipeline id cannot be passed when not in user console mode$Restart count can not be passed when in user console mode$Root Web Config File, %S$Site Id is %lu$Site id cannot be passed when not in user console mode$The idle time value is %lu$The idle timeout action is %lu$The shutdown timeout value is %lu$debug$disable$enable$false$invalid argument %S$invalid parameter passed in '%S' $servercommon\inetsrv\iis\iisrearc\iisplus\w3wp\parsecommandline.cxx$true$wmain
  • API String ID: 1376526027-1636702181
  • Opcode ID: 79ec0dbdfe0b09d6c5b53198d614af7f7c6bc1f8da55cc2dcca95924322dc5e2
  • Instruction ID: 9c1cc4cf481d717d02e988d52e8995cec5ccfe2b42b0a16392a5f9a5450645ec
  • Opcode Fuzzy Hash: 79ec0dbdfe0b09d6c5b53198d614af7f7c6bc1f8da55cc2dcca95924322dc5e2
  • Instruction Fuzzy Hash: CC529B32A3A64681E662BB10EC7467BE794BF4CF85F974135C95D42AB4DF2CE9408370
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000001.00000002.562188500.00007FF7A6701000.00000020.00020000.sdmp, Offset: 00007FF7A6700000, based on PE: true
  • Associated: 00000001.00000002.562175111.00007FF7A6700000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562198637.00007FF7A6704000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562210710.00007FF7A6707000.00000008.00020000.sdmp Download File
  • Associated: 00000001.00000002.562218066.00007FF7A6708000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_1_2_7ff7a6700000_w3wp.jbxd
Similarity
  • API ID: memset$EnvironmentErrorExpandLastStrings$FullNamePathResize@
  • String ID: %windir%\system32\inetsrv\config\applicationhost.config$Could not find entry point '%s'. Error = %d$Could set console Ctrl handle. Error = %d$Error loading hwebcore dll '%ws'. Error = %d$StartHWCMode$WebCoreActivate$WebCoreShutdown$hwebcore.dll$servercommon\inetsrv\iis\iisrearc\iisplus\w3wp\w3wp.cxx$wmain
  • API String ID: 251861057-2834812047
  • Opcode ID: ff6217d970aaedacbffb1688cf148d02c08d4bb83e89d18e47283adb30523bf0
  • Instruction ID: 74ae527894f287a081c5e3e34ffc613e273cc214d4b44b2fc5e8404d588ecc3e
  • Opcode Fuzzy Hash: ff6217d970aaedacbffb1688cf148d02c08d4bb83e89d18e47283adb30523bf0
  • Instruction Fuzzy Hash: 68D14125A2AA52D1E710BB65EC642BAA3A4FB4CF44FC30035DA0D426B8DF3DE945C730
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000001.00000002.562188500.00007FF7A6701000.00000020.00020000.sdmp, Offset: 00007FF7A6700000, based on PE: true
  • Associated: 00000001.00000002.562175111.00007FF7A6700000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562198637.00007FF7A6704000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562210710.00007FF7A6707000.00000008.00020000.sdmp Download File
  • Associated: 00000001.00000002.562218066.00007FF7A6708000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_1_2_7ff7a6700000_w3wp.jbxd
Similarity
  • API ID: PrintTime_wsetlocale$Error$Append@Process$ConsoleCurrentDebuggerLastLoadPerfPresentProviderStopSystem$AddressAffinityDebugExceptionFieldsFilterFlagsFromInitializeLanguagesLibraryLocalMaskModeOutputPreferredProcQueryThreadTitleUnhandledUninitializeswprintf_s
  • String ID: - %02u/%02u %02u:%02u:%02u$AppHostInitialize$Could not find entry point '%s'. Error = %d$Error in CoInitializeEx(). hr = %x$Error in InitializeComSecurity(). hr = %x$Error loading process model hosting dll '%ws'. Error = %d$Failed to initialize Instance counter.$HWC Console Mode$Process affinity mask: %p$String format operation failed.$System\CurrentControlSet\Services\iisw3adm\Parameters\WP$servercommon\inetsrv\iis\iisrearc\iisplus\w3wp\w3wp.cxx$w3wp[%lu] - $w3wphost.dll$wmain
  • API String ID: 279174646-1557335494
  • Opcode ID: 061a0e7139716de6fe77502d3cfa7fa8a0e6932147d6d2cf09372d674776db4d
  • Instruction ID: 932af03786e6eca1c7175d0df7d496cf51df1b19ecbd61ec1e625678f7cf812c
  • Opcode Fuzzy Hash: 061a0e7139716de6fe77502d3cfa7fa8a0e6932147d6d2cf09372d674776db4d
  • Instruction Fuzzy Hash: EBD12C35A2AA52C5E711FB60EC602ABA7A0BB4CF45F830135D94D82AB8DF3CE545C770
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000001.00000002.562188500.00007FF7A6701000.00000020.00020000.sdmp, Offset: 00007FF7A6700000, based on PE: true
  • Associated: 00000001.00000002.562175111.00007FF7A6700000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562198637.00007FF7A6704000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562210710.00007FF7A6707000.00000008.00020000.sdmp Download File
  • Associated: 00000001.00000002.562218066.00007FF7A6708000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_1_2_7ff7a6700000_w3wp.jbxd
Similarity
  • API ID: ErrorLastThreadpoolTimer$AddressCallbacksCloseCreateExitLibraryLoadPrintProcProcessWait
  • String ID: Could not find entry point '%s'. Error = %d$Error loading hwebcore dll '%ws'. Error = %d$CtrlHandle$WebCoreShutdown$hwebcore.dll$servercommon\inetsrv\iis\iisrearc\iisplus\w3wp\w3wp.cxx
  • API String ID: 424399764-148071961
  • Opcode ID: 7c64127a9d414894d2305aa97b1092e6ac11ceb9bb28f3357088fc14168ecfb7
  • Instruction ID: 235888e62d5f5c50a39e063bbfa0db497250cf898335908d39c819278ca39034
  • Opcode Fuzzy Hash: 7c64127a9d414894d2305aa97b1092e6ac11ceb9bb28f3357088fc14168ecfb7
  • Instruction Fuzzy Hash: 7B516D25A2A712C2F711BB61AC6463BA3A0AF8CF41FD74039D90D427B9DF3CA4458670
Uniqueness

Uniqueness Score: -1.00%

APIs
  • RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,?,?,?,?,00000000), ref: 00007FF7A670163E
  • RegQueryValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,?,?,?,?,00000000), ref: 00007FF7A6701676
  • RegQueryValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,?,?,?,?,00000000), ref: 00007FF7A67016BD
  • RegQueryValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,?,?,?,?,00000000), ref: 00007FF7A67016F5
  • RegQueryValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,?,?,?,?,00000000), ref: 00007FF7A670172D
  • RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,?,?,?,?,00000000), ref: 00007FF7A6701743
  • InitializeSdFromProcessToken.IISUTIL(?,?,?,?,?,?,?,?,00000000), ref: 00007FF7A6701751
  • CoInitializeSecurity.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF7A6701783
  • CoCreateInstance.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF7A67017B0
  • LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0(?,?,?,?,?,?,?,?,00000000), ref: 00007FF7A67017F8
  • LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0(?,?,?,?,?,?,?,?,00000000), ref: 00007FF7A670180C
Strings
Memory Dump Source
  • Source File: 00000001.00000002.562188500.00007FF7A6701000.00000020.00020000.sdmp, Offset: 00007FF7A6700000, based on PE: true
  • Associated: 00000001.00000002.562175111.00007FF7A6700000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562198637.00007FF7A6704000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562210710.00007FF7A6707000.00000008.00020000.sdmp Download File
  • Associated: 00000001.00000002.562218066.00007FF7A6708000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_1_2_7ff7a6700000_w3wp.jbxd
Similarity
  • API ID: QueryValue$FreeInitializeLocal$CloseCreateFromInstanceOpenProcessSecurityToken
  • String ID: AuthenticationCapabilities$AuthenticationLevel$CoInitializeSecurityParam$ImpersonationLevel$System\CurrentControlSet\Services\w3svc\Parameters
  • API String ID: 2094206347-9183430
  • Opcode ID: cb3a23642fef57128fac9b04bdbe6ab5c714e735f99753a0d04313fc1df2b4cc
  • Instruction ID: cb92220d48b75590daa64782c8f6543d474aaa7681d58647359475391d9356b6
  • Opcode Fuzzy Hash: cb3a23642fef57128fac9b04bdbe6ab5c714e735f99753a0d04313fc1df2b4cc
  • Instruction Fuzzy Hash: 69618432B25A55CAEB10EF65DC907AA77B4FB48B48F821136EA0D43A78DF38D544C760
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000001.00000002.562188500.00007FF7A6701000.00000020.00020000.sdmp, Offset: 00007FF7A6700000, based on PE: true
  • Associated: 00000001.00000002.562175111.00007FF7A6700000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562198637.00007FF7A6704000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562210710.00007FF7A6707000.00000008.00020000.sdmp Download File
  • Associated: 00000001.00000002.562218066.00007FF7A6708000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_1_2_7ff7a6700000_w3wp.jbxd
Similarity
  • API ID: ExceptionFilterThreadUnhandled$Token$CloseCurrentHandleOpenRevertSelf
  • String ID:
  • API String ID: 2699639960-0
  • Opcode ID: a4e4461494ab88de9d1968e281edbd3cec0f739a80ab7876bf30e2574ecbd6fa
  • Instruction ID: b5229d49ce5b5ce269d5f593e95e1b8a41f5e5a6845360e25d9632a2221f2459
  • Opcode Fuzzy Hash: a4e4461494ab88de9d1968e281edbd3cec0f739a80ab7876bf30e2574ecbd6fa
  • Instruction Fuzzy Hash: B501F825B2A652D2E714BB61FC6402BA360BF8CF51F971135D90B466B8DF3CD558C630
Uniqueness

Uniqueness Score: -1.00%

APIs
  • GetSystemTimeAsFileTime.API-MS-WIN-CORE-SYSINFO-L1-1-0(?,?,?,00007FF7A6703289), ref: 00007FF7A67036D5
  • GetCurrentProcessId.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,?,?,00007FF7A6703289), ref: 00007FF7A67036E3
  • GetCurrentThreadId.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,?,?,00007FF7A6703289), ref: 00007FF7A67036EF
  • GetTickCount.API-MS-WIN-CORE-SYSINFO-L1-1-0(?,?,?,00007FF7A6703289), ref: 00007FF7A67036FB
  • GetTickCount.API-MS-WIN-CORE-SYSINFO-L1-1-0(?,?,?,00007FF7A6703289), ref: 00007FF7A670370B
  • QueryPerformanceCounter.API-MS-WIN-CORE-PROFILE-L1-1-0(?,?,?,00007FF7A6703289), ref: 00007FF7A6703726
Memory Dump Source
  • Source File: 00000001.00000002.562188500.00007FF7A6701000.00000020.00020000.sdmp, Offset: 00007FF7A6700000, based on PE: true
  • Associated: 00000001.00000002.562175111.00007FF7A6700000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562198637.00007FF7A6704000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562210710.00007FF7A6707000.00000008.00020000.sdmp Download File
  • Associated: 00000001.00000002.562218066.00007FF7A6708000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_1_2_7ff7a6700000_w3wp.jbxd
Similarity
  • API ID: CountCurrentTickTime$CounterFilePerformanceProcessQuerySystemThread
  • String ID:
  • API String ID: 4104442557-0
  • Opcode ID: 3e24d1e02675214bcc0f52bef35fc190bb6710cc75c52141ff99f59ba6cefb69
  • Instruction ID: f554ebf58a5fa0bfa7dfc0f177d3ea98ad1796924119749893d70ce3c8fc5f70
  • Opcode Fuzzy Hash: 3e24d1e02675214bcc0f52bef35fc190bb6710cc75c52141ff99f59ba6cefb69
  • Instruction Fuzzy Hash: AD114F21715B42CADB00FF70EC5406973A4FB4CB58B821A31EA6D837A4EF7CD5648360
Uniqueness

Uniqueness Score: -1.00%

APIs
  • SetUnhandledExceptionFilter.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7A67034DB
Memory Dump Source
  • Source File: 00000001.00000002.562188500.00007FF7A6701000.00000020.00020000.sdmp, Offset: 00007FF7A6700000, based on PE: true
  • Associated: 00000001.00000002.562175111.00007FF7A6700000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562198637.00007FF7A6704000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562210710.00007FF7A6707000.00000008.00020000.sdmp Download File
  • Associated: 00000001.00000002.562218066.00007FF7A6708000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_1_2_7ff7a6700000_w3wp.jbxd
Similarity
  • API ID: ExceptionFilterUnhandled
  • String ID:
  • API String ID: 3192549508-0
  • Opcode ID: 099205bb6c7178dd8796c00f571d1855ab0a4b405dad5b7c782d4e954bbb2a95
  • Instruction ID: bba1805f9637345ee2cf4cc683efb4e00a870d1301a4fc2ad8512bb455843ffb
  • Opcode Fuzzy Hash: 099205bb6c7178dd8796c00f571d1855ab0a4b405dad5b7c782d4e954bbb2a95
  • Instruction Fuzzy Hash: B4B01210F37403E1D604BB21ECA907252A07F6CB14FC30431C00D84170DE1C92AF8730
Uniqueness

Uniqueness Score: -1.00%

APIs
  • LoadLibraryExW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,?,?,?,?,00000003,00007FF7A670244A), ref: 00007FF7A67018E6
  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,00000003,00007FF7A670244A), ref: 00007FF7A67018F8
  • PuDbgPrint.IISUTIL(?,?,?,?,?,?,00000003,00007FF7A670244A), ref: 00007FF7A6701944
  • LoadStringW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,?,?,?,?,00000003,00007FF7A670244A), ref: 00007FF7A670195F
  • ?Resize@STRU@@QEAAJK@Z.IISUTIL(?,?,?,?,?,?,00000003,00007FF7A670244A), ref: 00007FF7A6701977
  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,00000003,00007FF7A670244A), ref: 00007FF7A6701995
  • PuDbgPrint.IISUTIL(?,?,?,?,?,?,00000003,00007FF7A670244A), ref: 00007FF7A67019CA
Strings
Memory Dump Source
  • Source File: 00000001.00000002.562188500.00007FF7A6701000.00000020.00020000.sdmp, Offset: 00007FF7A6700000, based on PE: true
  • Associated: 00000001.00000002.562175111.00007FF7A6700000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562198637.00007FF7A6704000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562210710.00007FF7A6707000.00000008.00020000.sdmp Download File
  • Associated: 00000001.00000002.562218066.00007FF7A6708000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_1_2_7ff7a6700000_w3wp.jbxd
Similarity
  • API ID: ErrorLastLoadPrint$LibraryResize@String
  • String ID: Error Loading required resource DLL. hr = %x$Error retrieving resource id '%d'. GetLastError = %d$GetResourceString$iisres.dll$servercommon\inetsrv\iis\iisrearc\iisplus\w3wp\w3wp.cxx
  • API String ID: 2095738677-870567931
  • Opcode ID: aaa68d34fa69a90e0f8fef84dbb87f31c549609602586f53e5cf556c640eae90
  • Instruction ID: cddf5d1c1b39e6adbebae060b1af8bfa95d85b18630132d89d893585543cf644
  • Opcode Fuzzy Hash: aaa68d34fa69a90e0f8fef84dbb87f31c549609602586f53e5cf556c640eae90
  • Instruction Fuzzy Hash: 4C318A21A2AB5382E711BB55AC64167A3A0BF4CF90F870136D94D427B8EF7CE5408770
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000001.00000002.562188500.00007FF7A6701000.00000020.00020000.sdmp, Offset: 00007FF7A6700000, based on PE: true
  • Associated: 00000001.00000002.562175111.00007FF7A6700000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562198637.00007FF7A6704000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562210710.00007FF7A6707000.00000008.00020000.sdmp Download File
  • Associated: 00000001.00000002.562218066.00007FF7A6708000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_1_2_7ff7a6700000_w3wp.jbxd
Similarity
  • API ID: Perf$Provider$CounterInfoStartStop$ErrorPrint
  • String ID: InitializeWPInstanceCounters$PerfAutoInitialize failed.$servercommon\inetsrv\iis\iisrearc\iisplus\w3wp\w3wp.cxx
  • API String ID: 1307942641-1148039921
  • Opcode ID: 5a48a7054c08acc1b0a5badecee51bd6607c67ccc8c9caa501ef1d66c35d3d9b
  • Instruction ID: 4248ca924bc1af6ede75e35aa4441a35b4dad59d22a3f09c30c484e822b37037
  • Opcode Fuzzy Hash: 5a48a7054c08acc1b0a5badecee51bd6607c67ccc8c9caa501ef1d66c35d3d9b
  • Instruction Fuzzy Hash: AA31CC65A2EA4381E702BB55ECA01B2A3A1BF8CF85FD70136C84D82674EF7DE5558370
Uniqueness

Uniqueness Score: -1.00%

APIs
  • _wsetlocale.MSVCRT(?,?,?,?,?,?,?,?,00007FF7A670243B), ref: 00007FF7A67022D0
  • _wsetlocale.MSVCRT(?,?,?,?,?,?,?,?,00007FF7A670243B), ref: 00007FF7A67022E2
  • _wsetlocale.MSVCRT(?,?,?,?,?,?,?,?,00007FF7A670243B), ref: 00007FF7A67022F4
  • _wsetlocale.MSVCRT(?,?,?,?,?,?,?,?,00007FF7A670243B), ref: 00007FF7A6702306
  • GetConsoleOutputCP.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,?,?,00007FF7A670243B), ref: 00007FF7A670230C
  • swprintf_s.MSVCRT(?,?,?,?,?,?,?,?,00007FF7A670243B), ref: 00007FF7A6702326
  • _wsetlocale.MSVCRT(?,?,?,?,?,?,?,?,00007FF7A670243B), ref: 00007FF7A6702336
  • SetThreadPreferredUILanguages.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(?,?,?,?,?,?,?,?,00007FF7A670243B), ref: 00007FF7A6702346
Strings
Memory Dump Source
  • Source File: 00000001.00000002.562188500.00007FF7A6701000.00000020.00020000.sdmp, Offset: 00007FF7A6700000, based on PE: true
  • Associated: 00000001.00000002.562175111.00007FF7A6700000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562198637.00007FF7A6704000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562210710.00007FF7A6707000.00000008.00020000.sdmp Download File
  • Associated: 00000001.00000002.562218066.00007FF7A6708000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_1_2_7ff7a6700000_w3wp.jbxd
Similarity
  • API ID: _wsetlocale$ConsoleLanguagesOutputPreferredThreadswprintf_s
  • String ID: .%d$.OCP
  • API String ID: 764669596-946545276
  • Opcode ID: a36a16c5395f60253a60df3733d6ada80152bd60c2376ddacbe6dccdc93da7cd
  • Instruction ID: 13e9de78fd26c338abeb359640b2c0dabb482a0fac32c4fad1a1b09f64430521
  • Opcode Fuzzy Hash: a36a16c5395f60253a60df3733d6ada80152bd60c2376ddacbe6dccdc93da7cd
  • Instruction Fuzzy Hash: 0D11B964A29A16C2FB05BB20FC74366E361EB8CF85FC36035C51E162B8DE6CA5598730
Uniqueness

Uniqueness Score: -1.00%

APIs
  • ?Copy@STRU@@QEAAJPEBGK@Z.IISUTIL(?,?,?,?,?,?,00000000,00007FF7A6702157), ref: 00007FF7A6701B14
  • ?Copy@STRU@@QEAAJPEBG@Z.IISUTIL(?,?,?,?,?,?,00000000,00007FF7A6702157), ref: 00007FF7A6701B1C
  • ?Append@STRU@@QEAAJPEBG@Z.IISUTIL(?,?,?,?,?,?,00000000,00007FF7A6702157), ref: 00007FF7A6701B2B
  • GetCurrentProcessId.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,?,?,?,?,?,00000000,00007FF7A6702157), ref: 00007FF7A6701B45
  • _ultow.MSVCRT(?,?,?,?,?,?,00000000,00007FF7A6702157), ref: 00007FF7A6701B58
  • ?Append@STRU@@QEAAJPEBG@Z.IISUTIL(?,?,?,?,?,?,00000000,00007FF7A6702157), ref: 00007FF7A6701B6B
Strings
Memory Dump Source
  • Source File: 00000001.00000002.562188500.00007FF7A6701000.00000020.00020000.sdmp, Offset: 00007FF7A6700000, based on PE: true
  • Associated: 00000001.00000002.562175111.00007FF7A6700000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562198637.00007FF7A6704000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562210710.00007FF7A6707000.00000008.00020000.sdmp Download File
  • Associated: 00000001.00000002.562218066.00007FF7A6708000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_1_2_7ff7a6700000_w3wp.jbxd
Similarity
  • API ID: Append@Copy@$CurrentProcess_ultow
  • String ID: HWC-
  • API String ID: 2066212200-2291980104
  • Opcode ID: 5f24ed09ceb635d25e7d6e023f24946035a165c50b3b939065965893c6aff3ce
  • Instruction ID: 017a84d64ff254a7064531f0f04d983a3f0463aef5cf8dc5f6e244ab985cc3e7
  • Opcode Fuzzy Hash: 5f24ed09ceb635d25e7d6e023f24946035a165c50b3b939065965893c6aff3ce
  • Instruction Fuzzy Hash: 42114265A2A642C1EA54BB65EC6012BE260AF9CF90F935231D56E427F4DF2CE5448730
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000001.00000002.562188500.00007FF7A6701000.00000020.00020000.sdmp, Offset: 00007FF7A6700000, based on PE: true
  • Associated: 00000001.00000002.562175111.00007FF7A6700000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562198637.00007FF7A6704000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562210710.00007FF7A6707000.00000008.00020000.sdmp Download File
  • Associated: 00000001.00000002.562218066.00007FF7A6708000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_1_2_7ff7a6700000_w3wp.jbxd
Similarity
  • API ID: CurrentImageNonwritableSleep_amsg_exit_cexit_inittermexit
  • String ID:
  • API String ID: 4291973834-0
  • Opcode ID: c37d83c2c1d8f91eda864916aaff83b3d3b1f2e02c0300972c689cd9b6bce79c
  • Instruction ID: 795aa9fc8e210e2bae13c7ef6d7b1cbfb34deca9faaf2988fdf09445f849aa43
  • Opcode Fuzzy Hash: c37d83c2c1d8f91eda864916aaff83b3d3b1f2e02c0300972c689cd9b6bce79c
  • Instruction Fuzzy Hash: F0410621A2BA4386F711FB14EC60277A3A1AF4CB95F870035D90D876B4DF6DEA41C670
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000001.00000002.562188500.00007FF7A6701000.00000020.00020000.sdmp, Offset: 00007FF7A6700000, based on PE: true
  • Associated: 00000001.00000002.562175111.00007FF7A6700000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562198637.00007FF7A6704000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562210710.00007FF7A6707000.00000008.00020000.sdmp Download File
  • Associated: 00000001.00000002.562218066.00007FF7A6708000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_1_2_7ff7a6700000_w3wp.jbxd
Similarity
  • API ID: wprintf$ErrorLastLibraryLoadPrintmemset
  • String ID:
  • API String ID: 3083366354-0
  • Opcode ID: 1cc761ad12bf14b917338c9e83cdea0561dc8e0f40d2607cbcdfeee7bd488303
  • Instruction ID: 1e176d0c2bc2108e36ce4e6a6d0798e8cff3e6fe029d83a3b9cd03f22f8867a1
  • Opcode Fuzzy Hash: 1cc761ad12bf14b917338c9e83cdea0561dc8e0f40d2607cbcdfeee7bd488303
  • Instruction Fuzzy Hash: F4011E21A3D64692EB10BB21FCA436BA320FB8CB45F820035D54D426B9DE2CD5098730
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
  • Process is terminated due to shutdown timout (%d seconds) , xrefs: 00007FF7A6701BAD
Memory Dump Source
  • Source File: 00000001.00000002.562188500.00007FF7A6701000.00000020.00020000.sdmp, Offset: 00007FF7A6700000, based on PE: true
  • Associated: 00000001.00000002.562175111.00007FF7A6700000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562198637.00007FF7A6704000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562210710.00007FF7A6707000.00000008.00020000.sdmp Download File
  • Associated: 00000001.00000002.562218066.00007FF7A6708000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_1_2_7ff7a6700000_w3wp.jbxd
Similarity
  • API ID: CloseExitProcessThreadpoolTimerprintf
  • String ID: Process is terminated due to shutdown timout (%d seconds)
  • API String ID: 1291760926-3626753286
  • Opcode ID: 46ea469599ca5cab0e90e6a809b4e6df6f4ee683f520fb3d2fa3408d2f500c88
  • Instruction ID: 202317ff1f0b8b253eb210eb6504bb7e575c1d3875b8825c029e0b3683446593
  • Opcode Fuzzy Hash: 46ea469599ca5cab0e90e6a809b4e6df6f4ee683f520fb3d2fa3408d2f500c88
  • Instruction Fuzzy Hash: 65F0A524A3B513C6EA0AFB61AC74337A260AF4CF06FD34539C00E462B4EE6C649587B4
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000001.00000002.562188500.00007FF7A6701000.00000020.00020000.sdmp, Offset: 00007FF7A6700000, based on PE: true
  • Associated: 00000001.00000002.562175111.00007FF7A6700000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562198637.00007FF7A6704000.00000002.00020000.sdmp Download File
  • Associated: 00000001.00000002.562210710.00007FF7A6707000.00000008.00020000.sdmp Download File
  • Associated: 00000001.00000002.562218066.00007FF7A6708000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_1_2_7ff7a6700000_w3wp.jbxd
Similarity
  • API ID: CaptureContextEntryFunctionLookupUnwindVirtual__raise_securityfailure
  • String ID:
  • API String ID: 140117192-0
  • Opcode ID: a523fbfb6b5614d965d686ac78b4545e317867291d7ab5ff6c6011fed975c368
  • Instruction ID: d14ca42664296b8eb95a4bff39217df7956cf4982451fdfbaa7eadf748c7bc21
  • Opcode Fuzzy Hash: a523fbfb6b5614d965d686ac78b4545e317867291d7ab5ff6c6011fed975c368
  • Instruction Fuzzy Hash: E641B73562AB0281EA11BB14FC6036AB3A4FB88B55FD24136D98D827B4DF3DE544C770
Uniqueness

Uniqueness Score: -1.00%