Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exe
Analysis ID:1522428
MD5:69cf2ff495c90c2bdd9182e9d1d83467
SHA1:32111f59feb39824f1f8b7d1d541f483c120fc69
SHA256:915bec2968a2cda0014b6fbe20c14f2588059a1d730e8ec44e07c44e19ffe7bc
Tags:exe
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Contains functionality to inject code into remote processes
Machine Learning detection for sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Program does not show much activity (idle)

Classification

  • System is w10x64
  • SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exe (PID: 1812 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exe" MD5: 69CF2FF495C90C2BDD9182E9D1D83467)
    • conhost.exe (PID: 3208 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeAvira: detected
Source: SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeReversingLabs: Detection: 47%
Source: SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeVirustotal: Detection: 63%Perma Link
Source: SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\erays\Desktop\Process-Hollowing-main\Source\x64\Release\runpe.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exe
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeCode function: 0_2_00007FF7DC6D1F500_2_00007FF7DC6D1F50
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeCode function: String function: 00007FF7DC6D1010 appears 57 times
Source: classification engineClassification label: mal64.evad.winEXE@2/1@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3208:120:WilError_03
Source: SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeReversingLabs: Detection: 47%
Source: SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeVirustotal: Detection: 63%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeSection loaded: kernel.appcore.dllJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\erays\Desktop\Process-Hollowing-main\Source\x64\Release\runpe.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeAPI coverage: 4.8 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeCode function: 0_2_00007FF7DC6D2CC0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7DC6D2CC0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeCode function: 0_2_00007FF7DC6D1F50 printf,CreateFileA,printf,CloseHandle,GetFileSize,printf,CloseHandle,GetProcessHeap,HeapAlloc,printf,CloseHandle,CloseHandle,ReadFile,printf,CloseHandle,CloseHandle,CloseHandle,printf,printf,CreateProcessA,IsWow64Process,memset,Wow64GetThreadContext,ReadProcessMemory,memset,GetThreadContext,ReadProcessMemory,printf,printf,printf,printf,printf,printf,printf,printf,printf,printf,printf,GetProcessHeap,printf,GetProcessHeap,HeapFree,CloseHandle,CloseHandle,printf,GetProcessHeap,HeapFree,CloseHandle,TerminateProcess,CloseHandle,printf,GetProcessHeap,HeapFree,printf,0_2_00007FF7DC6D1F50
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeCode function: 0_2_00007FF7DC6D27E4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF7DC6D27E4
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeCode function: 0_2_00007FF7DC6D2E64 SetUnhandledExceptionFilter,0_2_00007FF7DC6D2E64
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeCode function: 0_2_00007FF7DC6D2CC0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7DC6D2CC0

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeCode function: 0_2_00007FF7DC6D1580 VirtualAllocEx,printf,printf,WriteProcessMemory,printf,printf,WriteProcessMemory,printf,memset,GetThreadContext,printf,printf,WriteProcessMemory,printf,SetThreadContext,printf,ResumeThread,0_2_00007FF7DC6D1580
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exeCode function: 0_2_00007FF7DC6D2BA0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF7DC6D2BA0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
11
Process Injection
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory2
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager2
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exe47%ReversingLabsWin64.Trojan.Generic
SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exe63%VirustotalBrowse
SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exe100%AviraTR/AVI.Inj.aastj
SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1522428
Start date and time:2024-09-30 03:23:06 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 1m 55s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:3
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exe
Detection:MAL
Classification:mal64.evad.winEXE@2/1@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 2
  • Number of non-executed functions: 9
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): dllhost.exe
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):45
Entropy (8bit):4.515938719420928
Encrypted:false
SSDEEP:3:lQb0CjBQsy6bA9ov:y11q6k9ov
MD5:A01ABA58BF6760B21B846A13F06B2C31
SHA1:907994E94642E37D286906A2D3290AFDD8426232
SHA-256:A432556A30B028C712624EB7A7B3A5097A47398B1746E0DB05370CC002ABEB70
SHA-512:1D4E0806E56011522C157D299CEA783A8717C4CE595D777B6FD1DF760B3AEE78D28E59B3DB52AD24ED3A4AE642D197AB83B52B5101FDEDE9DC52BE8062EA030C
Malicious:false
Reputation:low
Preview:[HELP] runpe.exe <pe_file> <target_process>..
File type:PE32+ executable (console) x86-64, for MS Windows
Entropy (8bit):5.450786770849834
TrID:
  • Win64 Executable Console (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exe
File size:20'480 bytes
MD5:69cf2ff495c90c2bdd9182e9d1d83467
SHA1:32111f59feb39824f1f8b7d1d541f483c120fc69
SHA256:915bec2968a2cda0014b6fbe20c14f2588059a1d730e8ec44e07c44e19ffe7bc
SHA512:3400facf84a0d68cf83a8ef94859bb032a00dc709987c7741767d0674f0d7069c7cf7cdb2469d18fd3e56f9ab9df391d208fb5071e6bc8d938873e013aee443f
SSDEEP:384:hdTUxXB4Mo3FvFCqUDqye8QAlHlMK35y:hZuXa51c2r8QAlyK3s
TLSH:9A923C067B5936F6D922D4F48877602AD6B2F81A0B32879F06F445332FB0AD5B57C391
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........sMt. Mt. Mt. D.0 Gt. ...!Ot. ...!Nt. ...!Gt. ...!^t. ...!Nt. Mt. .t. X..!Lt. X.\ Lt. X..!Lt. RichMt. ........PE..d......f...
Icon Hash:00928e8e8686b000
Entrypoint:0x1400027d0
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x66CBBBC7 [Sun Aug 25 23:18:31 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:b77ae6ce2e7665d976d37bf6afd1b097
Instruction
dec eax
sub esp, 28h
call 00007F07A87DA65Ch
dec eax
add esp, 28h
jmp 00007F07A87DA107h
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, ecx
xor ecx, ecx
call dword ptr [000018BBh]
dec eax
mov ecx, ebx
call dword ptr [000018AAh]
call dword ptr [000018B4h]
dec eax
mov ecx, eax
mov edx, C0000409h
dec eax
add esp, 20h
pop ebx
dec eax
jmp dword ptr [00001800h]
dec eax
mov dword ptr [esp+08h], ecx
dec eax
sub esp, 38h
mov ecx, 00000017h
call dword ptr [000018CCh]
test eax, eax
je 00007F07A87DA299h
mov ecx, 00000002h
int 29h
dec eax
lea ecx, dword ptr [000038E2h]
call 00007F07A87DA33Eh
dec eax
mov eax, dword ptr [esp+38h]
dec eax
mov dword ptr [000039C9h], eax
dec eax
lea eax, dword ptr [esp+38h]
dec eax
add eax, 08h
dec eax
mov dword ptr [00003959h], eax
dec eax
mov eax, dword ptr [000039B2h]
dec eax
mov dword ptr [00003823h], eax
dec eax
mov eax, dword ptr [esp+40h]
dec eax
mov dword ptr [00003927h], eax
mov dword ptr [000037FDh], C0000409h
mov dword ptr [000037F7h], 00000001h
mov dword ptr [00003801h], 00000001h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x53c40xa0.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x80000x1e0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x70000x264.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x90000x30.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x4cb00x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x4b700x140.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x40000x228.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x23bc0x24000dbf95e1901fad5a329278287fead2e5False0.5842013888888888data6.125683203257169IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x40000x1c180x1e00a95cf607cf0e40ce45141269d74c840dFalse0.3360677083333333data4.613047706465255IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x60000x6900x20085c2aebd011c5c1b37c1009def59c2b6False0.09375data0.5324895658143383IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x70000x2640x400ba40d259e446f530e74f71fe958b51d3False0.3310546875PEX Binary Archive2.676088916813986IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x80000x1e00x200004d0e678e525ffdfdb49f756c3148c6False0.525390625data4.696122618599126IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x90000x300x20046867fc128c3ab0f3556f60be6666ee5False0.125data0.7221066890682607IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0x80600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
DLLImport
KERNEL32.dllReadFile, WriteProcessMemory, HeapFree, TerminateProcess, Wow64SetThreadContext, Wow64GetThreadContext, ResumeThread, CreateFileA, CloseHandle, HeapAlloc, GetThreadContext, VirtualAllocEx, GetFileSize, ReadProcessMemory, GetProcessHeap, CreateProcessA, SetThreadContext, IsWow64Process, RtlLookupFunctionEntry, RtlVirtualUnwind, RtlCaptureContext, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, GetModuleHandleW, IsDebuggerPresent, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, GetCurrentProcessId, QueryPerformanceCounter, IsProcessorFeaturePresent
VCRUNTIME140.dll__current_exception, __C_specific_handler, memcpy, __current_exception_context, memset
api-ms-win-crt-stdio-l1-1-0.dll__stdio_common_vfprintf, __acrt_iob_func, __p__commode, _set_fmode
api-ms-win-crt-runtime-l1-1-0.dll_initialize_onexit_table, _register_onexit_function, _crt_atexit, terminate, _seh_filter_exe, _register_thread_local_exe_atexit_callback, _c_exit, _cexit, __p___argv, __p___argc, _exit, exit, _initterm_e, _initterm, _get_initial_narrow_environment, _initialize_narrow_environment, _configure_narrow_argv, _set_app_type
api-ms-win-crt-math-l1-1-0.dll__setusermatherr
api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
api-ms-win-crt-heap-l1-1-0.dll_set_new_mode
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:21:24:04
Start date:29/09/2024
Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.32396.3970.exe"
Imagebase:0x7ff7dc6d0000
File size:20'480 bytes
MD5 hash:69CF2FF495C90C2BDD9182E9D1D83467
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:1
Start time:21:24:05
Start date:29/09/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff6d64d0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:9.9%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:75.3%
    Total number of Nodes:283
    Total number of Limit Nodes:1
    execution_graph 659 7ff7dc6d2654 660 7ff7dc6d266d 659->660 661 7ff7dc6d2675 __scrt_acquire_startup_lock 660->661 662 7ff7dc6d27ab 660->662 664 7ff7dc6d27b5 661->664 669 7ff7dc6d2693 __scrt_release_startup_lock 661->669 775 7ff7dc6d2cc0 IsProcessorFeaturePresent 662->775 665 7ff7dc6d2cc0 9 API calls 664->665 666 7ff7dc6d27c0 665->666 668 7ff7dc6d27c8 _exit 666->668 667 7ff7dc6d26b8 669->667 670 7ff7dc6d273e _get_initial_narrow_environment __p___argv __p___argc 669->670 673 7ff7dc6d2736 _register_thread_local_exe_atexit_callback 669->673 679 7ff7dc6d1f50 670->679 673->670 676 7ff7dc6d276b 677 7ff7dc6d2775 676->677 678 7ff7dc6d2770 _cexit 676->678 677->667 678->677 680 7ff7dc6d2520 679->680 681 7ff7dc6d1f7c 679->681 781 7ff7dc6d1010 __acrt_iob_func 680->781 683 7ff7dc6d1010 printf 2 API calls 681->683 685 7ff7dc6d1fb6 CreateFileA 683->685 684 7ff7dc6d252c 686 7ff7dc6d2004 GetFileSize 685->686 687 7ff7dc6d1fea 685->687 689 7ff7dc6d2031 GetProcessHeap HeapAlloc 686->689 690 7ff7dc6d2017 686->690 688 7ff7dc6d1010 printf 2 API calls 687->688 691 7ff7dc6d1ff6 CloseHandle 688->691 693 7ff7dc6d2071 ReadFile 689->693 694 7ff7dc6d204e 689->694 692 7ff7dc6d1010 printf 2 API calls 690->692 695 7ff7dc6d22fe 691->695 696 7ff7dc6d2023 CloseHandle 692->696 698 7ff7dc6d208c 693->698 699 7ff7dc6d20b8 CloseHandle 693->699 697 7ff7dc6d1010 printf 2 API calls 694->697 784 7ff7dc6d2550 695->784 696->695 701 7ff7dc6d205a CloseHandle CloseHandle 697->701 702 7ff7dc6d1010 printf 2 API calls 698->702 699->695 700 7ff7dc6d20ca 699->700 703 7ff7dc6d1010 printf 2 API calls 700->703 701->695 705 7ff7dc6d2098 CloseHandle 702->705 708 7ff7dc6d20d9 703->708 705->695 707 7ff7dc6d20aa CloseHandle 705->707 707->695 709 7ff7dc6d24fb 708->709 710 7ff7dc6d20ea 708->710 712 7ff7dc6d1010 printf 2 API calls 709->712 711 7ff7dc6d1010 printf 2 API calls 710->711 713 7ff7dc6d20f6 CreateProcessA 711->713 714 7ff7dc6d2507 GetProcessHeap HeapFree 712->714 715 7ff7dc6d2194 IsWow64Process 713->715 716 7ff7dc6d2188 713->716 714->695 717 7ff7dc6d21b5 memset Wow64GetThreadContext ReadProcessMemory 715->717 718 7ff7dc6d2220 memset GetThreadContext ReadProcessMemory 715->718 719 7ff7dc6d1010 printf 2 API calls 716->719 717->716 720 7ff7dc6d2202 717->720 718->716 718->720 721 7ff7dc6d24ae GetProcessHeap 719->721 720->716 723 7ff7dc6d1010 printf 2 API calls 720->723 722 7ff7dc6d24b7 HeapFree 721->722 724 7ff7dc6d24d2 722->724 725 7ff7dc6d24cc CloseHandle 722->725 726 7ff7dc6d228d 723->726 724->695 727 7ff7dc6d24e0 TerminateProcess CloseHandle 724->727 725->724 728 7ff7dc6d1010 printf 2 API calls 726->728 727->695 729 7ff7dc6d229c 728->729 730 7ff7dc6d1010 printf 2 API calls 729->730 731 7ff7dc6d22c7 730->731 732 7ff7dc6d1010 printf 2 API calls 731->732 733 7ff7dc6d22e4 732->733 734 7ff7dc6d2353 733->734 735 7ff7dc6d22f2 733->735 736 7ff7dc6d1010 printf 2 API calls 734->736 737 7ff7dc6d1010 printf 2 API calls 735->737 738 7ff7dc6d235f 736->738 737->695 739 7ff7dc6d1010 printf 2 API calls 738->739 740 7ff7dc6d237b 739->740 741 7ff7dc6d2392 740->741 742 7ff7dc6d238b 740->742 802 7ff7dc6d11d0 ReadProcessMemory 741->802 793 7ff7dc6d1070 ReadProcessMemory 742->793 745 7ff7dc6d2390 745->716 746 7ff7dc6d1010 printf 2 API calls 745->746 747 7ff7dc6d23b8 746->747 747->716 748 7ff7dc6d23c1 747->748 749 7ff7dc6d1010 printf 2 API calls 748->749 750 7ff7dc6d23cd 749->750 751 7ff7dc6d1010 printf 2 API calls 750->751 752 7ff7dc6d2404 751->752 753 7ff7dc6d2444 752->753 754 7ff7dc6d2412 752->754 755 7ff7dc6d2452 753->755 756 7ff7dc6d244b 753->756 757 7ff7dc6d2416 754->757 758 7ff7dc6d2421 754->758 897 7ff7dc6d1ba0 VirtualAllocEx 755->897 869 7ff7dc6d1580 VirtualAllocEx 756->869 811 7ff7dc6d1340 VirtualAllocEx 757->811 839 7ff7dc6d17c0 VirtualAllocEx 758->839 763 7ff7dc6d241b 764 7ff7dc6d241f 763->764 765 7ff7dc6d242a 763->765 767 7ff7dc6d1010 printf 2 API calls 764->767 766 7ff7dc6d1010 printf 2 API calls 765->766 768 7ff7dc6d2439 GetProcessHeap 766->768 769 7ff7dc6d2467 GetProcessHeap HeapFree 767->769 768->722 770 7ff7dc6d2485 CloseHandle 769->770 771 7ff7dc6d248b 769->771 770->771 771->695 772 7ff7dc6d2495 CloseHandle 771->772 772->695 773 7ff7dc6d2e10 GetModuleHandleW 774 7ff7dc6d2767 773->774 774->666 774->676 776 7ff7dc6d2ce6 775->776 777 7ff7dc6d2cf4 memset RtlCaptureContext RtlLookupFunctionEntry 776->777 778 7ff7dc6d2d2e RtlVirtualUnwind 777->778 779 7ff7dc6d2d6a memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 777->779 778->779 780 7ff7dc6d2dea 779->780 780->664 927 7ff7dc6d1000 781->927 783 7ff7dc6d1046 __stdio_common_vfprintf 783->684 785 7ff7dc6d2559 784->785 786 7ff7dc6d2342 785->786 787 7ff7dc6d2818 IsProcessorFeaturePresent 785->787 786->773 788 7ff7dc6d2830 787->788 928 7ff7dc6d28ec RtlCaptureContext 788->928 794 7ff7dc6d10f2 ReadProcessMemory 793->794 795 7ff7dc6d10dc 793->795 797 7ff7dc6d10e8 794->797 798 7ff7dc6d119a 794->798 796 7ff7dc6d1010 printf 2 API calls 795->796 796->797 800 7ff7dc6d2550 8 API calls 797->800 799 7ff7dc6d1010 printf 2 API calls 798->799 799->797 801 7ff7dc6d11bd 800->801 801->745 803 7ff7dc6d1242 802->803 804 7ff7dc6d1258 ReadProcessMemory 802->804 805 7ff7dc6d1010 printf 2 API calls 803->805 806 7ff7dc6d1306 804->806 807 7ff7dc6d124e 804->807 805->807 808 7ff7dc6d1010 printf 2 API calls 806->808 809 7ff7dc6d2550 8 API calls 807->809 808->807 810 7ff7dc6d132c 809->810 810->745 812 7ff7dc6d1395 811->812 813 7ff7dc6d13a8 811->813 814 7ff7dc6d1010 printf 2 API calls 812->814 815 7ff7dc6d1010 printf 2 API calls 813->815 816 7ff7dc6d13a1 814->816 817 7ff7dc6d13b7 WriteProcessMemory 815->817 820 7ff7dc6d2550 8 API calls 816->820 818 7ff7dc6d13d5 817->818 819 7ff7dc6d13e8 817->819 821 7ff7dc6d1010 printf 2 API calls 818->821 822 7ff7dc6d1010 printf 2 API calls 819->822 823 7ff7dc6d1566 820->823 821->816 825 7ff7dc6d140f 822->825 823->763 824 7ff7dc6d1477 memset Wow64GetThreadContext 827 7ff7dc6d14a4 824->827 828 7ff7dc6d14c7 WriteProcessMemory 824->828 825->824 826 7ff7dc6d1420 WriteProcessMemory 825->826 835 7ff7dc6d1010 printf 2 API calls 825->835 826->825 829 7ff7dc6d14b7 826->829 830 7ff7dc6d1010 printf 2 API calls 827->830 831 7ff7dc6d1500 Wow64SetThreadContext 828->831 832 7ff7dc6d14f0 828->832 836 7ff7dc6d1010 printf 2 API calls 829->836 830->816 833 7ff7dc6d152f ResumeThread 831->833 834 7ff7dc6d151f 831->834 837 7ff7dc6d1010 printf 2 API calls 832->837 833->816 838 7ff7dc6d1010 printf 2 API calls 834->838 835->825 836->816 837->816 838->816 840 7ff7dc6d182b 839->840 841 7ff7dc6d1818 839->841 843 7ff7dc6d1010 printf 2 API calls 840->843 842 7ff7dc6d1010 printf 2 API calls 841->842 854 7ff7dc6d1824 842->854 844 7ff7dc6d183a WriteProcessMemory 843->844 845 7ff7dc6d1884 844->845 846 7ff7dc6d1871 844->846 848 7ff7dc6d1010 printf 2 API calls 845->848 847 7ff7dc6d1010 printf 2 API calls 846->847 847->854 856 7ff7dc6d18ad 848->856 849 7ff7dc6d2550 8 API calls 850 7ff7dc6d1b89 849->850 850->763 851 7ff7dc6d1ab7 852 7ff7dc6d1010 printf 2 API calls 851->852 852->854 853 7ff7dc6d1921 WriteProcessMemory 855 7ff7dc6d1b35 853->855 853->856 854->849 857 7ff7dc6d1010 printf 2 API calls 855->857 856->851 856->853 858 7ff7dc6d1010 printf 2 API calls 856->858 859 7ff7dc6d1977 856->859 857->854 858->856 859->851 860 7ff7dc6d1010 printf 2 API calls 859->860 863 7ff7dc6d198f 860->863 861 7ff7dc6d1a78 862 7ff7dc6d1010 printf 2 API calls 861->862 864 7ff7dc6d1a89 memset Wow64GetThreadContext 862->864 863->861 867 7ff7dc6d19f5 ReadProcessMemory WriteProcessMemory 863->867 864->851 865 7ff7dc6d1ac3 WriteProcessMemory 864->865 865->851 866 7ff7dc6d1af7 Wow64SetThreadContext 865->866 866->851 868 7ff7dc6d1b23 ResumeThread 866->868 867->863 868->854 870 7ff7dc6d15d6 869->870 871 7ff7dc6d15e9 869->871 873 7ff7dc6d1010 printf 2 API calls 870->873 872 7ff7dc6d1010 printf 2 API calls 871->872 874 7ff7dc6d15f8 WriteProcessMemory 872->874 875 7ff7dc6d15e2 873->875 876 7ff7dc6d1616 874->876 877 7ff7dc6d1629 874->877 880 7ff7dc6d2550 8 API calls 875->880 878 7ff7dc6d1010 printf 2 API calls 876->878 879 7ff7dc6d1010 printf 2 API calls 877->879 878->875 888 7ff7dc6d1651 879->888 881 7ff7dc6d17a9 880->881 881->763 882 7ff7dc6d16b7 memset GetThreadContext 884 7ff7dc6d16e4 882->884 885 7ff7dc6d1707 WriteProcessMemory 882->885 883 7ff7dc6d1660 WriteProcessMemory 883->888 889 7ff7dc6d16f7 883->889 890 7ff7dc6d1010 printf 2 API calls 884->890 886 7ff7dc6d1741 SetThreadContext 885->886 887 7ff7dc6d1731 885->887 893 7ff7dc6d1772 ResumeThread 886->893 894 7ff7dc6d1762 886->894 892 7ff7dc6d1010 printf 2 API calls 887->892 888->882 888->883 895 7ff7dc6d1010 printf 2 API calls 888->895 891 7ff7dc6d1010 printf 2 API calls 889->891 890->875 891->875 892->875 893->875 896 7ff7dc6d1010 printf 2 API calls 894->896 895->888 896->875 898 7ff7dc6d1c0b 897->898 899 7ff7dc6d1bf8 897->899 901 7ff7dc6d1010 printf 2 API calls 898->901 900 7ff7dc6d1010 printf 2 API calls 899->900 912 7ff7dc6d1c04 900->912 902 7ff7dc6d1c1a WriteProcessMemory 901->902 903 7ff7dc6d1c5c 902->903 904 7ff7dc6d1c49 902->904 906 7ff7dc6d1010 printf 2 API calls 903->906 905 7ff7dc6d1010 printf 2 API calls 904->905 905->912 914 7ff7dc6d1c83 906->914 907 7ff7dc6d2550 8 API calls 908 7ff7dc6d1f41 907->908 908->763 909 7ff7dc6d1e78 910 7ff7dc6d1010 printf 2 API calls 909->910 910->912 911 7ff7dc6d1ce2 WriteProcessMemory 913 7ff7dc6d1ef5 911->913 911->914 912->907 915 7ff7dc6d1010 printf 2 API calls 913->915 914->909 914->911 916 7ff7dc6d1010 printf 2 API calls 914->916 917 7ff7dc6d1d38 914->917 915->912 916->914 917->909 918 7ff7dc6d1010 printf 2 API calls 917->918 921 7ff7dc6d1d50 918->921 919 7ff7dc6d1e36 920 7ff7dc6d1010 printf 2 API calls 919->920 922 7ff7dc6d1e47 memset GetThreadContext 920->922 921->919 925 7ff7dc6d1db5 ReadProcessMemory WriteProcessMemory 921->925 922->909 923 7ff7dc6d1e84 WriteProcessMemory 922->923 923->909 924 7ff7dc6d1eb8 SetThreadContext 923->924 924->909 926 7ff7dc6d1ee3 ResumeThread 924->926 925->921 926->912 927->783 929 7ff7dc6d2906 RtlLookupFunctionEntry 928->929 930 7ff7dc6d2843 929->930 931 7ff7dc6d291c RtlVirtualUnwind 929->931 932 7ff7dc6d27e4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 930->932 931->929 931->930 933 7ff7dc6d3386 _seh_filter_exe 934 7ff7dc6d2570 935 7ff7dc6d2580 934->935 947 7ff7dc6d29d8 935->947 937 7ff7dc6d2cc0 9 API calls 938 7ff7dc6d2625 937->938 939 7ff7dc6d25a4 _RTC_Initialize 945 7ff7dc6d2607 939->945 955 7ff7dc6d2c60 InitializeSListHead 939->955 945->937 946 7ff7dc6d2615 945->946 948 7ff7dc6d2a1b 947->948 949 7ff7dc6d29e9 947->949 948->939 950 7ff7dc6d2a58 949->950 953 7ff7dc6d29ee __scrt_release_startup_lock 949->953 951 7ff7dc6d2cc0 9 API calls 950->951 952 7ff7dc6d2a62 951->952 953->948 954 7ff7dc6d2a0b _initialize_onexit_table 953->954 954->948 956 7ff7dc6d27d0 959 7ff7dc6d2ba0 956->959 960 7ff7dc6d2bc3 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 959->960 961 7ff7dc6d27d9 959->961 960->961 962 7ff7dc6d2782 963 7ff7dc6d2e10 GetModuleHandleW 962->963 964 7ff7dc6d2789 963->964 965 7ff7dc6d278d 964->965 966 7ff7dc6d27c8 _exit 964->966 967 7ff7dc6d2638 971 7ff7dc6d2e64 SetUnhandledExceptionFilter 967->971

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_00007FF7DC6D3214 1 Function_00007FF7DC6D2E10 2 Function_00007FF7DC6D1010 8 Function_00007FF7DC6D1000 2->8 3 Function_00007FF7DC6D2F0C 4 Function_00007FF7DC6D2B88 35 Function_00007FF7DC6D2B4C 4->35 5 Function_00007FF7DC6D3386 6 Function_00007FF7DC6D2C80 6->8 11 Function_00007FF7DC6D2C78 6->11 7 Function_00007FF7DC6D1580 7->2 29 Function_00007FF7DC6D2550 7->29 9 Function_00007FF7DC6D2782 9->1 10 Function_00007FF7DC6D2AFC 10->0 12 Function_00007FF7DC6D2C74 13 Function_00007FF7DC6D2E74 14 Function_00007FF7DC6D2AF5 15 Function_00007FF7DC6D2570 15->4 15->6 15->12 16 Function_00007FF7DC6D2C70 15->16 24 Function_00007FF7DC6D2C60 15->24 25 Function_00007FF7DC6D2C58 15->25 26 Function_00007FF7DC6D29D8 15->26 32 Function_00007FF7DC6D2ED0 15->32 33 Function_00007FF7DC6D2C50 15->33 34 Function_00007FF7DC6D2C4C 15->34 40 Function_00007FF7DC6D2CC0 15->40 49 Function_00007FF7DC6D2C9C 15->49 17 Function_00007FF7DC6D1070 17->2 17->29 18 Function_00007FF7DC6D28EC 19 Function_00007FF7DC6D32E4 20 Function_00007FF7DC6D2A64 21 Function_00007FF7DC6D2E64 22 Function_00007FF7DC6D27E4 23 Function_00007FF7DC6D2960 23->0 26->0 26->40 27 Function_00007FF7DC6D2654 27->1 27->10 27->20 27->23 28 Function_00007FF7DC6D1F50 27->28 27->40 43 Function_00007FF7DC6D2CB0 27->43 44 Function_00007FF7DC6D2CA8 27->44 48 Function_00007FF7DC6D2B20 27->48 50 Function_00007FF7DC6D299C 27->50 28->2 28->7 28->17 28->29 30 Function_00007FF7DC6D11D0 28->30 38 Function_00007FF7DC6D1340 28->38 39 Function_00007FF7DC6D17C0 28->39 47 Function_00007FF7DC6D1BA0 28->47 29->18 29->22 30->2 30->29 31 Function_00007FF7DC6D27D0 46 Function_00007FF7DC6D2BA0 31->46 36 Function_00007FF7DC6D2F48 37 Function_00007FF7DC6D32C4 37->19 38->2 38->29 39->2 39->29 41 Function_00007FF7DC6D2CB8 40->41 42 Function_00007FF7DC6D2638 42->21 42->34 45 Function_00007FF7DC6D33A4 47->2 47->29 48->16 50->16 50->36

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 7ff7dc6d1f50-7ff7dc6d1f76 1 7ff7dc6d2520-7ff7dc6d2527 call 7ff7dc6d1010 0->1 2 7ff7dc6d1f7c-7ff7dc6d1fe8 call 7ff7dc6d1010 CreateFileA 0->2 5 7ff7dc6d252c 1->5 7 7ff7dc6d2004-7ff7dc6d2015 GetFileSize 2->7 8 7ff7dc6d1fea-7ff7dc6d1fff call 7ff7dc6d1010 CloseHandle 2->8 10 7ff7dc6d2031-7ff7dc6d204c GetProcessHeap HeapAlloc 7->10 11 7ff7dc6d2017-7ff7dc6d202c call 7ff7dc6d1010 CloseHandle 7->11 16 7ff7dc6d22fe 8->16 14 7ff7dc6d2071-7ff7dc6d208a ReadFile 10->14 15 7ff7dc6d204e-7ff7dc6d206c call 7ff7dc6d1010 CloseHandle * 2 10->15 11->16 19 7ff7dc6d208c-7ff7dc6d20a4 call 7ff7dc6d1010 CloseHandle 14->19 20 7ff7dc6d20b8-7ff7dc6d20c4 CloseHandle 14->20 15->16 23 7ff7dc6d2303-7ff7dc6d234a call 7ff7dc6d2550 16->23 19->16 29 7ff7dc6d20aa-7ff7dc6d20b3 CloseHandle 19->29 20->16 21 7ff7dc6d20ca-7ff7dc6d20e4 call 7ff7dc6d1010 20->21 31 7ff7dc6d24fb-7ff7dc6d251b call 7ff7dc6d1010 GetProcessHeap HeapFree 21->31 32 7ff7dc6d20ea-7ff7dc6d2186 call 7ff7dc6d1010 CreateProcessA 21->32 29->16 31->16 37 7ff7dc6d2194-7ff7dc6d21b3 IsWow64Process 32->37 38 7ff7dc6d2188-7ff7dc6d218f 32->38 40 7ff7dc6d21b5-7ff7dc6d2200 memset Wow64GetThreadContext ReadProcessMemory 37->40 41 7ff7dc6d2220-7ff7dc6d226c memset GetThreadContext ReadProcessMemory 37->41 39 7ff7dc6d24a9-7ff7dc6d24b4 call 7ff7dc6d1010 GetProcessHeap 38->39 50 7ff7dc6d24b7-7ff7dc6d24ca HeapFree 39->50 43 7ff7dc6d2214-7ff7dc6d221b 40->43 44 7ff7dc6d2202-7ff7dc6d220d 40->44 41->43 45 7ff7dc6d226e-7ff7dc6d227a 41->45 43->39 44->43 48 7ff7dc6d220f-7ff7dc6d2212 44->48 45->43 46 7ff7dc6d227c-7ff7dc6d227f 45->46 46->43 49 7ff7dc6d2281-7ff7dc6d22e8 call 7ff7dc6d1010 * 4 46->49 48->43 48->49 62 7ff7dc6d234b-7ff7dc6d2351 49->62 63 7ff7dc6d22ea-7ff7dc6d22f0 49->63 52 7ff7dc6d24d2-7ff7dc6d24da 50->52 53 7ff7dc6d24cc CloseHandle 50->53 52->16 55 7ff7dc6d24e0-7ff7dc6d24f6 TerminateProcess CloseHandle 52->55 53->52 55->16 64 7ff7dc6d2353-7ff7dc6d2389 call 7ff7dc6d1010 * 2 62->64 65 7ff7dc6d22f2-7ff7dc6d22f9 call 7ff7dc6d1010 62->65 63->64 63->65 71 7ff7dc6d2392 call 7ff7dc6d11d0 64->71 72 7ff7dc6d238b-7ff7dc6d2390 call 7ff7dc6d1070 64->72 65->16 76 7ff7dc6d2397-7ff7dc6d239c 71->76 72->76 77 7ff7dc6d239e-7ff7dc6d23a5 76->77 78 7ff7dc6d23aa-7ff7dc6d23bb call 7ff7dc6d1010 76->78 77->39 81 7ff7dc6d23c1-7ff7dc6d23d5 call 7ff7dc6d1010 78->81 82 7ff7dc6d24a2 78->82 85 7ff7dc6d23e0 81->85 86 7ff7dc6d23d7-7ff7dc6d23de 81->86 82->39 87 7ff7dc6d23e7-7ff7dc6d2410 call 7ff7dc6d1010 85->87 86->87 90 7ff7dc6d2444-7ff7dc6d2449 87->90 91 7ff7dc6d2412-7ff7dc6d2414 87->91 92 7ff7dc6d2452 call 7ff7dc6d1ba0 90->92 93 7ff7dc6d244b-7ff7dc6d2450 call 7ff7dc6d1580 90->93 94 7ff7dc6d2416-7ff7dc6d241d call 7ff7dc6d1340 91->94 95 7ff7dc6d2421-7ff7dc6d2428 call 7ff7dc6d17c0 91->95 102 7ff7dc6d2457-7ff7dc6d2459 92->102 93->102 105 7ff7dc6d242a 94->105 107 7ff7dc6d241f 94->107 104 7ff7dc6d245b-7ff7dc6d2483 call 7ff7dc6d1010 GetProcessHeap HeapFree 95->104 95->105 102->104 106 7ff7dc6d242d-7ff7dc6d2442 call 7ff7dc6d1010 GetProcessHeap 102->106 112 7ff7dc6d2485 CloseHandle 104->112 113 7ff7dc6d248b-7ff7dc6d2493 104->113 105->106 106->50 107->104 112->113 114 7ff7dc6d2495 CloseHandle 113->114 115 7ff7dc6d249b-7ff7dc6d249d 113->115 114->115 115->23
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2113803714.00007FF7DC6D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7DC6D0000, based on PE: true
    • Associated: 00000000.00000002.2113791532.00007FF7DC6D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2113816941.00007FF7DC6D4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2113829531.00007FF7DC6D7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7dc6d0000_SecuriteInfo.jbxd
    Similarity
    • API ID: printf$Heap$CloseHandle$Process$Free$File$CreateSizeTerminate__acrt_iob_func__stdio_common_vfprintf
    • String ID: [+] Architecture are compatible !$[+] PE file content : 0x%p$[+] Source Image subsystem : 0x%X$[+] Source PE Image architecture : x64$[+] Source PE Image architecture : x86$[+] Subsytems are compatible.$[+] Target PE Image architecture : x64$[+] Target PE Image architecture : x86$[+] Target Process Image Base : 0x%p$[+] Target Process PEB : 0x%p$[+] Target Process subsystem : 0x%X$[+] The PE file is valid.$[+] The injection has succeed !$[+] The source image doesn't have a relocation table.$[+] The source image has a relocation table.$[-] An error is occured when trying to create the target process !$[-] An error is occured when trying to get the image base address of the target process !$[-] An error is occured when trying to get the subsytem of the target process.$[-] An error occured when trying to allocate memory for the PE file content !$[-] An error occured when trying to get the PE file size !$[-] An error occured when trying to open the PE file !$[-] An error occured when trying to read the PE file content !$[-] Architecture are not compatible !$[-] Subsytems are not compatible.$[-] The PE file is not valid !$[-] The injection has failed !$[HELP] runpe.exe <pe_file> <target_process>$[PROCESS HOLLOWING]
    • API String ID: 3459790226-1868882180
    • Opcode ID: 64542bc872d6313a066b2aefc22a29052c43f9e3111da2f48eaafb1c6aae214b
    • Instruction ID: e0977408aaa6e53989d54de412805dc63d028d84872e8f4cbebf49b6e7f79844
    • Opcode Fuzzy Hash: 64542bc872d6313a066b2aefc22a29052c43f9e3111da2f48eaafb1c6aae214b
    • Instruction Fuzzy Hash: 42F17321A0CA8281EA12FF61E85027DA362FF94794FC84137D94D4369DDF7CE966C320

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2113803714.00007FF7DC6D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7DC6D0000, based on PE: true
    • Associated: 00000000.00000002.2113791532.00007FF7DC6D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2113816941.00007FF7DC6D4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2113829531.00007FF7DC6D7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7dc6d0000_SecuriteInfo.jbxd
    Similarity
    • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
    • String ID:
    • API String ID: 1133592946-0
    • Opcode ID: 7caab236d34ee5f11e47767e2132abdfc97ca38f7c899667bcb997c5f665ea03
    • Instruction ID: 3bca1abbf8930689b90e228364d21127a66212fa588e276aee61bbda1dce5d49
    • Opcode Fuzzy Hash: 7caab236d34ee5f11e47767e2132abdfc97ca38f7c899667bcb997c5f665ea03
    • Instruction Fuzzy Hash: B331E821E0C20241EA67BF6594553BD93A3AF45B84FCC5436EA4E4729FDE2CAC678270

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 170 7ff7dc6d17c0-7ff7dc6d1816 VirtualAllocEx 171 7ff7dc6d182b-7ff7dc6d186f call 7ff7dc6d1010 WriteProcessMemory 170->171 172 7ff7dc6d1818-7ff7dc6d1826 call 7ff7dc6d1010 170->172 177 7ff7dc6d1884-7ff7dc6d18bc call 7ff7dc6d1010 171->177 178 7ff7dc6d1871-7ff7dc6d187f call 7ff7dc6d1010 171->178 179 7ff7dc6d1b79-7ff7dc6d1b96 call 7ff7dc6d2550 172->179 186 7ff7dc6d18be-7ff7dc6d18c6 177->186 187 7ff7dc6d18c8 177->187 178->179 188 7ff7dc6d18cb-7ff7dc6d18eb 186->188 187->188 189 7ff7dc6d1b43 188->189 190 7ff7dc6d18f1-7ff7dc6d18f8 188->190 191 7ff7dc6d1b4a call 7ff7dc6d1010 189->191 192 7ff7dc6d1900-7ff7dc6d1914 190->192 196 7ff7dc6d1b4f 191->196 194 7ff7dc6d1916-7ff7dc6d191d 192->194 195 7ff7dc6d1921-7ff7dc6d1945 WriteProcessMemory 192->195 194->195 197 7ff7dc6d1b35-7ff7dc6d1b41 call 7ff7dc6d1010 195->197 198 7ff7dc6d194b-7ff7dc6d1975 call 7ff7dc6d1010 195->198 200 7ff7dc6d1b51-7ff7dc6d1b71 196->200 197->196 198->192 204 7ff7dc6d1977-7ff7dc6d197a 198->204 200->179 204->189 205 7ff7dc6d1980-7ff7dc6d1999 call 7ff7dc6d1010 204->205 208 7ff7dc6d199f-7ff7dc6d19ad 205->208 209 7ff7dc6d1a7d-7ff7dc6d1ab5 call 7ff7dc6d1010 memset Wow64GetThreadContext 205->209 210 7ff7dc6d19b0-7ff7dc6d19cc 208->210 215 7ff7dc6d1ac3-7ff7dc6d1aec WriteProcessMemory 209->215 216 7ff7dc6d1ab7-7ff7dc6d1abe 209->216 212 7ff7dc6d19d2-7ff7dc6d19d8 210->212 213 7ff7dc6d1a6e-7ff7dc6d1a72 210->213 217 7ff7dc6d19e0-7ff7dc6d19f3 212->217 213->210 218 7ff7dc6d1a78 213->218 219 7ff7dc6d1aee-7ff7dc6d1af5 215->219 220 7ff7dc6d1af7-7ff7dc6d1b18 Wow64SetThreadContext 215->220 216->191 221 7ff7dc6d1a64-7ff7dc6d1a68 217->221 222 7ff7dc6d19f5-7ff7dc6d1a5e ReadProcessMemory WriteProcessMemory 217->222 218->209 219->191 223 7ff7dc6d1b23-7ff7dc6d1b33 ResumeThread 220->223 224 7ff7dc6d1b1a-7ff7dc6d1b21 220->224 221->213 221->217 222->221 223->200 224->191
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2113803714.00007FF7DC6D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7DC6D0000, based on PE: true
    • Associated: 00000000.00000002.2113791532.00007FF7DC6D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2113816941.00007FF7DC6D4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2113829531.00007FF7DC6D7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7dc6d0000_SecuriteInfo.jbxd
    Similarity
    • API ID: printf$AllocMemoryProcessVirtualWrite__acrt_iob_func__stdio_common_vfprintf
    • String ID: @$[+] Headers write at : 0x%p$[+] Memory allocate at : 0x%p$[+] Relocation section : %s$[+] Relocations done.$[+] Section %s write at : 0x%p.$[-] An error is occured when trying to allocate memory for the new image.$[-] An error is occured when trying to get the relocation section of the source image.$[-] An error is occured when trying to get the thread context.$[-] An error is occured when trying to set the thread context.$[-] An error is occured when trying to write the headers of the new image.$[-] An error is occured when trying to write the image base in the PEB.$[-] An error is occured when trying to write the section : %s.
    • API String ID: 1825148790-1050904861
    • Opcode ID: 46df68eb264dc7caad52fd1d5a9c9397ea49e1269be75ecd3a6ccb21ca377ebe
    • Instruction ID: 3be58b29f3c03827fc79ff5729a12c7c19cfa145274041900e2b8370982930cd
    • Opcode Fuzzy Hash: 46df68eb264dc7caad52fd1d5a9c9397ea49e1269be75ecd3a6ccb21ca377ebe
    • Instruction Fuzzy Hash: 81A16272A0868186D762EB11E8447BEB366FB88B94FC84032EA8D4775CDF7CD566C710

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 225 7ff7dc6d1ba0-7ff7dc6d1bf6 VirtualAllocEx 226 7ff7dc6d1c0b-7ff7dc6d1c47 call 7ff7dc6d1010 WriteProcessMemory 225->226 227 7ff7dc6d1bf8-7ff7dc6d1c06 call 7ff7dc6d1010 225->227 232 7ff7dc6d1c5c-7ff7dc6d1c92 call 7ff7dc6d1010 226->232 233 7ff7dc6d1c49-7ff7dc6d1c57 call 7ff7dc6d1010 226->233 234 7ff7dc6d1f31-7ff7dc6d1f4f call 7ff7dc6d2550 227->234 241 7ff7dc6d1c94-7ff7dc6d1c9c 232->241 242 7ff7dc6d1c9e 232->242 233->234 243 7ff7dc6d1ca1-7ff7dc6d1cb9 241->243 242->243 244 7ff7dc6d1f03 243->244 245 7ff7dc6d1cbf 243->245 246 7ff7dc6d1f0a call 7ff7dc6d1010 244->246 247 7ff7dc6d1cc2-7ff7dc6d1cd5 245->247 251 7ff7dc6d1f0f 246->251 249 7ff7dc6d1ce2-7ff7dc6d1d04 WriteProcessMemory 247->249 250 7ff7dc6d1cd7-7ff7dc6d1cde 247->250 252 7ff7dc6d1ef5-7ff7dc6d1f01 call 7ff7dc6d1010 249->252 253 7ff7dc6d1d0a-7ff7dc6d1d36 call 7ff7dc6d1010 249->253 250->249 255 7ff7dc6d1f11-7ff7dc6d1f29 251->255 252->251 253->247 259 7ff7dc6d1d38-7ff7dc6d1d3b 253->259 255->234 259->244 260 7ff7dc6d1d41-7ff7dc6d1d58 call 7ff7dc6d1010 259->260 263 7ff7dc6d1e3b-7ff7dc6d1e76 call 7ff7dc6d1010 memset GetThreadContext 260->263 264 7ff7dc6d1d5e-7ff7dc6d1d68 260->264 272 7ff7dc6d1e84-7ff7dc6d1ead WriteProcessMemory 263->272 273 7ff7dc6d1e78-7ff7dc6d1e7f 263->273 265 7ff7dc6d1d70-7ff7dc6d1d8c 264->265 267 7ff7dc6d1d92-7ff7dc6d1d98 265->267 268 7ff7dc6d1e2c-7ff7dc6d1e30 265->268 270 7ff7dc6d1da0-7ff7dc6d1db3 267->270 268->265 271 7ff7dc6d1e36 268->271 276 7ff7dc6d1db5-7ff7dc6d1e1c ReadProcessMemory WriteProcessMemory 270->276 277 7ff7dc6d1e22-7ff7dc6d1e26 270->277 271->263 274 7ff7dc6d1eaf-7ff7dc6d1eb6 272->274 275 7ff7dc6d1eb8-7ff7dc6d1ed8 SetThreadContext 272->275 273->246 274->246 278 7ff7dc6d1ee3-7ff7dc6d1ef3 ResumeThread 275->278 279 7ff7dc6d1eda-7ff7dc6d1ee1 275->279 276->277 277->268 277->270 278->255 279->246
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2113803714.00007FF7DC6D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7DC6D0000, based on PE: true
    • Associated: 00000000.00000002.2113791532.00007FF7DC6D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2113816941.00007FF7DC6D4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2113829531.00007FF7DC6D7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7dc6d0000_SecuriteInfo.jbxd
    Similarity
    • API ID: printf$AllocMemoryProcessVirtualWrite__acrt_iob_func__stdio_common_vfprintf
    • String ID: @$[+] Headers write at : 0x%p$[+] Memory allocate at : 0x%p$[+] Relocation section : %s$[+] Relocations done.$[+] Section %s write at : 0x%p.$[-] An error is occured when trying to allocate memory for the new image.$[-] An error is occured when trying to get the relocation section of the source image.$[-] An error is occured when trying to get the thread context.$[-] An error is occured when trying to set the thread context.$[-] An error is occured when trying to write the headers of the new image.$[-] An error is occured when trying to write the image base in the PEB.$[-] An error is occured when trying to write the section : %s.
    • API String ID: 1825148790-1050904861
    • Opcode ID: 5111907c36a7c067edea16358a1eec2d34b7670fc1e5a9d60c7ecc8d3410fb5a
    • Instruction ID: c0f23245d42d794902e2e183ed81ee1c7b90db6dbb0b6f37db3f18bd8c574463
    • Opcode Fuzzy Hash: 5111907c36a7c067edea16358a1eec2d34b7670fc1e5a9d60c7ecc8d3410fb5a
    • Instruction Fuzzy Hash: 71A16072A08A8282D761EB11F94037EB3A2FB84795FC84032DA8D87758DF7CE566D710

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2113803714.00007FF7DC6D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7DC6D0000, based on PE: true
    • Associated: 00000000.00000002.2113791532.00007FF7DC6D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2113816941.00007FF7DC6D4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2113829531.00007FF7DC6D7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7dc6d0000_SecuriteInfo.jbxd
    Similarity
    • API ID: printf$AllocMemoryProcessVirtualWrite__acrt_iob_func__stdio_common_vfprintf
    • String ID: @$[+] Headers write at : 0x%p$[+] Memory allocate at : 0x%p$[+] Section %s write at : 0x%p.$[-] An error is occured when trying to allocate memory for the new image.$[-] An error is occured when trying to get the thread context.$[-] An error is occured when trying to set the thread context.$[-] An error is occured when trying to write the headers of the new image.$[-] An error is occured when trying to write the image base in the PEB.$[-] An error is occured when trying to write the section : %s.
    • API String ID: 1825148790-4082286488
    • Opcode ID: 06f932b3448f5f9b29d4501537bdc68b982efc0c7f80d876f9352d97065a607a
    • Instruction ID: a415b4fd55b9366d9320403ac5efa1eef26b307fbf40bac4e073d584e390f06a
    • Opcode Fuzzy Hash: 06f932b3448f5f9b29d4501537bdc68b982efc0c7f80d876f9352d97065a607a
    • Instruction Fuzzy Hash: 09517371B1898285E761EB21E85077EA362FB44B94FC84433DA4D8369DEF7CE466C720

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2113803714.00007FF7DC6D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7DC6D0000, based on PE: true
    • Associated: 00000000.00000002.2113791532.00007FF7DC6D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2113816941.00007FF7DC6D4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2113829531.00007FF7DC6D7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7dc6d0000_SecuriteInfo.jbxd
    Similarity
    • API ID: printf$AllocMemoryProcessVirtualWrite__acrt_iob_func__stdio_common_vfprintf
    • String ID: @$[+] Headers write at : 0x%p$[+] Memory allocate at : 0x%p$[+] Section %s write at : 0x%p.$[-] An error is occured when trying to allocate memory for the new image.$[-] An error is occured when trying to get the thread context.$[-] An error is occured when trying to set the thread context.$[-] An error is occured when trying to write the headers of the new image.$[-] An error is occured when trying to write the image base in the PEB.$[-] An error is occured when trying to write the section : %s.
    • API String ID: 1825148790-4082286488
    • Opcode ID: 8296906e7b8256aa4090aff3f0cf6f138f937fa72e70ce524ba815d540cc21d4
    • Instruction ID: 3f2f65b4642785bd58d3a69909956fca6e53a0c00f9765b75016d1835a41887f
    • Opcode Fuzzy Hash: 8296906e7b8256aa4090aff3f0cf6f138f937fa72e70ce524ba815d540cc21d4
    • Instruction Fuzzy Hash: 10518271B1858282E722EB21E94077DA362FB44B94FC84533DA4E8364CDF7CE566C720

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2113803714.00007FF7DC6D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7DC6D0000, based on PE: true
    • Associated: 00000000.00000002.2113791532.00007FF7DC6D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2113816941.00007FF7DC6D4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2113829531.00007FF7DC6D7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7dc6d0000_SecuriteInfo.jbxd
    Similarity
    • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
    • String ID:
    • API String ID: 313767242-0
    • Opcode ID: 86d23c2d511148724402838b6e20c8d33ffe92cf68255a0d0349382d95f5f3d0
    • Instruction ID: 6d4a63697543b829bfd710c14e2c69317dbeb9cb224ddf52a21eac0e43910419
    • Opcode Fuzzy Hash: 86d23c2d511148724402838b6e20c8d33ffe92cf68255a0d0349382d95f5f3d0
    • Instruction Fuzzy Hash: B3312D72609B818AEB619F60E8407FDB365FB84744FC8403ADA4E47B98DF38D959C724

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2113803714.00007FF7DC6D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7DC6D0000, based on PE: true
    • Associated: 00000000.00000002.2113791532.00007FF7DC6D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2113816941.00007FF7DC6D4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2113829531.00007FF7DC6D7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7dc6d0000_SecuriteInfo.jbxd
    Similarity
    • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
    • String ID:
    • API String ID: 2933794660-0
    • Opcode ID: a068a9d1530fac2da6250eb87f221b6a43d7bf40cbf4bafb513178ad331510ca
    • Instruction ID: 38e57e1ac50d96fde6892b792688831ce2b2043b54280860b215538ce200cfd4
    • Opcode Fuzzy Hash: a068a9d1530fac2da6250eb87f221b6a43d7bf40cbf4bafb513178ad331510ca
    • Instruction Fuzzy Hash: 08117036B14F018AEB00DF60E8442BC73A4FB18758F880E32DA6D827A8DF7CD5698350
    Memory Dump Source
    • Source File: 00000000.00000002.2113803714.00007FF7DC6D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7DC6D0000, based on PE: true
    • Associated: 00000000.00000002.2113791532.00007FF7DC6D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2113816941.00007FF7DC6D4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2113829531.00007FF7DC6D7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7dc6d0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 9511fbd7afa4ad21328c4c2650442df0d5d07feab4356b821a062b44ea0b29a4
    • Instruction ID: f29642b4fd24a32e80d2163fdca4663eb6e5d170015bc2f952a26866f899d6be
    • Opcode Fuzzy Hash: 9511fbd7afa4ad21328c4c2650442df0d5d07feab4356b821a062b44ea0b29a4
    • Instruction Fuzzy Hash: 1EA0012190884290E60AAB10A950178A372EB50300BC94232C00D42069AE6CAD228225

    Control-flow Graph

    APIs
    Strings
    • [-] An error is occured when trying to get the target DOS header., xrefs: 00007FF7DC6D1242
    • [-] An error is occured when trying to get the target NT header., xrefs: 00007FF7DC6D1306
    Memory Dump Source
    • Source File: 00000000.00000002.2113803714.00007FF7DC6D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7DC6D0000, based on PE: true
    • Associated: 00000000.00000002.2113791532.00007FF7DC6D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2113816941.00007FF7DC6D4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2113829531.00007FF7DC6D7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7dc6d0000_SecuriteInfo.jbxd
    Similarity
    • API ID: MemoryProcessReadprintf$__acrt_iob_func__stdio_common_vfprintf
    • String ID: [-] An error is occured when trying to get the target DOS header.$[-] An error is occured when trying to get the target NT header.
    • API String ID: 1426470551-3256225024
    • Opcode ID: 38f2ee33b04cb0d9f214a75db2572192d26045c2f4c13df2e77287e84c3d5c39
    • Instruction ID: b9897bbec71ef128f51b721c900493f1deb1001873fd704bfa383b2d21de2532
    • Opcode Fuzzy Hash: 38f2ee33b04cb0d9f214a75db2572192d26045c2f4c13df2e77287e84c3d5c39
    • Instruction Fuzzy Hash: E3419532A24BA089F3109F65BC4029D77BDF744B98F54422AFAD957E98CF38D562C740

    Control-flow Graph

    APIs
    Strings
    • [-] An error is occured when trying to get the target DOS header., xrefs: 00007FF7DC6D10DC
    • [-] An error is occured when trying to get the target NT header., xrefs: 00007FF7DC6D119A
    Memory Dump Source
    • Source File: 00000000.00000002.2113803714.00007FF7DC6D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7DC6D0000, based on PE: true
    • Associated: 00000000.00000002.2113791532.00007FF7DC6D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2113816941.00007FF7DC6D4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2113829531.00007FF7DC6D7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7dc6d0000_SecuriteInfo.jbxd
    Similarity
    • API ID: MemoryProcessReadprintf$__acrt_iob_func__stdio_common_vfprintf
    • String ID: [-] An error is occured when trying to get the target DOS header.$[-] An error is occured when trying to get the target NT header.
    • API String ID: 1426470551-3256225024
    • Opcode ID: 53301d3c3261a7766ab4efdd2918408288b200040d4c61ce9cf1da957b60c3af
    • Instruction ID: f2128320a7f3538165e16350f9f0ec24dbadc215fdefe06373fe19264a93a510
    • Opcode Fuzzy Hash: 53301d3c3261a7766ab4efdd2918408288b200040d4c61ce9cf1da957b60c3af
    • Instruction Fuzzy Hash: 5541C332A29B6089F310DF65B9401ADB3BDF744B98F54412AFA9913E98CF38C563CB40