Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe

Overview

General Information

Sample name:SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe
Analysis ID:1531476
MD5:e34989a504f009621c104f1b0d2b96a3
SHA1:d81ca519a01c142fd9daaf7ff2f209a811eedeec
SHA256:4a97dac518b8632b89ddd91bb3a8fb641a7a992e346aa4f8a1023f1d260b48bb
Tags:exe
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Program does not show much activity (idle)

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeVirustotal: Detection: 19%Perma Link
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\user\source\repos\ConsoleApplication2\x64\Release\ConsoleApplication2.pdb source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe
Source: classification engineClassification label: mal48.winEXE@2/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2132:120:WilError_03
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeVirustotal: Detection: 19%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe "C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeSection loaded: wintypes.dllJump to behavior
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\user\source\repos\ConsoleApplication2\x64\Release\ConsoleApplication2.pdb source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeCode function: 0_2_00007FF63AFE17CC IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF63AFE17CC
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeCode function: 0_2_00007FF63AFE17CC IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF63AFE17CC
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeCode function: 0_2_00007FF63AFE12D8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF63AFE12D8
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeCode function: 0_2_00007FF63AFE1974 SetUnhandledExceptionFilter,0_2_00007FF63AFE1974
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exeCode function: 0_2_00007FF63AFE16A4 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF63AFE16A4
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Process Injection
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager2
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe20%VirustotalBrowse
SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe5%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1531476
Start date and time:2024-10-11 09:39:04 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 1m 46s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:3
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe
Detection:MAL
Classification:mal48.winEXE@2/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 2
  • Number of non-executed functions: 2
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): dllhost.exe
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (console) x86-64, for MS Windows
Entropy (8bit):4.6607518800476955
TrID:
  • Win64 Executable Console (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe
File size:10'752 bytes
MD5:e34989a504f009621c104f1b0d2b96a3
SHA1:d81ca519a01c142fd9daaf7ff2f209a811eedeec
SHA256:4a97dac518b8632b89ddd91bb3a8fb641a7a992e346aa4f8a1023f1d260b48bb
SHA512:2e9b35f62979ab3c7efd910d29a616b6e2b654bdbb7eaf471213556e6f31d0c68c4d4da86bb6e67b02d4bba6b4cebbb49752c8332c1301aedeea09d045d531ee
SSDEEP:96:FQSrlRy3pkJ4+DmuVYJg2IGcgwsPMe6sTnTlyBvAejnTmm73Q5tfqXU/EZqXNpx7:eS/yiJUuwIGj9soejz3Q5tfqXU/Yqd
TLSH:4C22294EF7610DF9C5198270CA3B4B5EF0757B516B62638B13AC812A1F2A7F1702A6CD
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......N....b...b...b....D..b.......b.......b.......b.......b..Q....b...b..:b.......b....(..b.......b..Rich.b..................PE..d..
Icon Hash:00928e8e8686b000
Entrypoint:0x1400012c4
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x60BA5F3A [Fri Jun 4 17:13:30 2021 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:265c45f9aa037bd5ad870931c7c88c90
Instruction
dec eax
sub esp, 28h
call 00007FF5A54F833Ch
dec eax
add esp, 28h
jmp 00007FF5A54F7DD7h
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, ecx
xor ecx, ecx
call dword ptr [00000D6Fh]
dec eax
mov ecx, ebx
call dword ptr [00000D6Eh]
call dword ptr [00000D58h]
dec eax
mov ecx, eax
mov edx, C0000409h
dec eax
add esp, 20h
pop ebx
dec eax
jmp dword ptr [00000D3Ch]
dec eax
mov dword ptr [esp+08h], ecx
dec eax
sub esp, 38h
mov ecx, 00000017h
call 00007FF5A54F88F8h
test eax, eax
je 00007FF5A54F7F69h
mov ecx, 00000002h
int 29h
dec eax
lea ecx, dword ptr [00001DAFh]
call 00007FF5A54F800Fh
dec eax
mov eax, dword ptr [esp+38h]
dec eax
mov dword ptr [00001E96h], eax
dec eax
lea eax, dword ptr [esp+38h]
dec eax
add eax, 08h
dec eax
mov dword ptr [00001E26h], eax
dec eax
mov eax, dword ptr [00001E7Fh]
dec eax
mov dword ptr [00001CF0h], eax
dec eax
mov eax, dword ptr [esp+40h]
dec eax
mov dword ptr [00001DF4h], eax
mov dword ptr [00001CCAh], C0000409h
mov dword ptr [00001CC4h], 00000001h
mov dword ptr [00001CCEh], 00000001h
mov eax, 00000008h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x28640xb4.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x50000x1e0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x40000x168.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x60000x2c.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x22600x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x22d00x138.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x198.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xd2c0xe0039bcb18cfca1fe89c5f620559dd73a75False0.6141183035714286data5.789481692214558IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x20000xef40x1000ef82071d641d182a8e5c6ac5ce3a2147False0.356201171875data3.927729296305679IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x30000x6480x200df472dc55d3b30057eb5fc703f6e33faFalse0.09375data0.4646630272644706IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x40000x1680x2006ee72adde448b68c541a3d93653a52c1False0.423828125data2.7651431255458387IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x50000x1e00x2004dde323af9808a00b376d6895922dc1fFalse0.525390625data4.696122618599126IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x60000x2c0x2005036619911d1c3300abe96e3d9760a90False0.11328125data0.6176131689082892IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0x50600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
DLLImport
USER32.dllMessageBoxA
VCRUNTIME140.dllmemset, __current_exception_context, __current_exception, __C_specific_handler
api-ms-win-crt-runtime-l1-1-0.dll_crt_atexit, terminate, _exit, _register_thread_local_exe_atexit_callback, _c_exit, exit, _initterm_e, _initterm, _get_initial_narrow_environment, _initialize_narrow_environment, _configure_narrow_argv, _initialize_onexit_table, _set_app_type, _seh_filter_exe, _cexit, __p___argv, __p___argc, _register_onexit_function
api-ms-win-crt-math-l1-1-0.dll__setusermatherr
api-ms-win-crt-stdio-l1-1-0.dll__p__commode, _set_fmode
api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
api-ms-win-crt-heap-l1-1-0.dll_set_new_mode
KERNEL32.dllQueryPerformanceCounter, GetModuleHandleW, IsDebuggerPresent, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, GetCurrentProcessId, RtlCaptureContext, IsProcessorFeaturePresent, TerminateProcess, GetCurrentProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:03:39:55
Start date:11/10/2024
Path:C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.W64.Rozena.EL.gen.Eldorado.9177.9340.exe"
Imagebase:0x7ff63afe0000
File size:10'752 bytes
MD5 hash:E34989A504F009621C104F1B0D2B96A3
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:1
Start time:03:39:55
Start date:11/10/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff6d64d0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:19.7%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:17.5%
    Total number of Nodes:63
    Total number of Limit Nodes:2
    execution_graph 336 7ff63afe12c4 339 7ff63afe16a4 336->339 340 7ff63afe12cd 339->340 341 7ff63afe16c7 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 339->341 341->340 342 7ff63afe1064 343 7ff63afe1074 342->343 355 7ff63afe14dc 343->355 345 7ff63afe17cc __scrt_fastfail 9 API calls 346 7ff63afe1119 345->346 347 7ff63afe1098 _RTC_Initialize 353 7ff63afe10fb 347->353 363 7ff63afe1764 InitializeSListHead 347->363 353->345 354 7ff63afe1109 353->354 356 7ff63afe151f 355->356 357 7ff63afe14ed 355->357 356->347 358 7ff63afe155c 357->358 361 7ff63afe14f2 __scrt_acquire_startup_lock 357->361 359 7ff63afe17cc __scrt_fastfail 9 API calls 358->359 360 7ff63afe1566 359->360 361->356 362 7ff63afe150f _initialize_onexit_table 361->362 362->356 364 7ff63afe1040 365 7ff63afe104a 364->365 366 7ff63afe1056 365->366 367 7ff63afe130c IsProcessorFeaturePresent 365->367 368 7ff63afe1323 367->368 373 7ff63afe13e0 RtlCaptureContext 368->373 374 7ff63afe13fa RtlLookupFunctionEntry 373->374 375 7ff63afe1410 RtlVirtualUnwind 374->375 376 7ff63afe1336 374->376 375->374 375->376 377 7ff63afe12d8 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 376->377 378 7ff63afe112c 382 7ff63afe1974 SetUnhandledExceptionFilter 378->382 383 7ff63afe1276 384 7ff63afe1920 __scrt_is_managed_app GetModuleHandleW 383->384 385 7ff63afe127d 384->385 386 7ff63afe1281 385->386 387 7ff63afe12bc _exit 385->387 388 7ff63afe1cf6 _seh_filter_exe 307 7ff63afe1148 308 7ff63afe1161 __scrt_initialize_crt 307->308 309 7ff63afe129f 308->309 310 7ff63afe1169 __scrt_acquire_startup_lock 308->310 330 7ff63afe17cc IsProcessorFeaturePresent 309->330 312 7ff63afe12a9 310->312 313 7ff63afe1187 __scrt_release_startup_lock 310->313 314 7ff63afe17cc __scrt_fastfail 9 API calls 312->314 316 7ff63afe11ac 313->316 318 7ff63afe1232 _get_initial_narrow_environment __p___argv __p___argc 313->318 321 7ff63afe122a _register_thread_local_exe_atexit_callback 313->321 315 7ff63afe12b4 314->315 317 7ff63afe12bc _exit 315->317 327 7ff63afe1000 MessageBoxA 318->327 320 7ff63afe1254 328 7ff63afe1920 GetModuleHandleW 320->328 321->318 324 7ff63afe125f 325 7ff63afe1264 _cexit 324->325 326 7ff63afe1269 324->326 325->326 326->316 327->320 329 7ff63afe125b 328->329 329->315 329->324 331 7ff63afe17f1 __scrt_fastfail 330->331 332 7ff63afe17ff memset RtlCaptureContext RtlLookupFunctionEntry 331->332 333 7ff63afe1875 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 332->333 334 7ff63afe1839 RtlVirtualUnwind 332->334 335 7ff63afe18f9 __scrt_fastfail 333->335 334->333 335->312

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_00007FF63AFE17C4 1 Function_00007FF63AFE12C4 26 Function_00007FF63AFE16A4 1->26 2 Function_00007FF63AFE1784 3 Function_00007FF63AFE1984 4 Function_00007FF63AFE1000 5 Function_00007FF63AFE1040 29 Function_00007FF63AFE13E0 5->29 34 Function_00007FF63AFE12D8 5->34 6 Function_00007FF63AFE1600 9 Function_00007FF63AFE1BFC 6->9 7 Function_00007FF63AFE17BC 8 Function_00007FF63AFE177C 10 Function_00007FF63AFE1276 30 Function_00007FF63AFE1920 10->30 11 Function_00007FF63AFE1CF6 12 Function_00007FF63AFE15F9 13 Function_00007FF63AFE1778 14 Function_00007FF63AFE1754 15 Function_00007FF63AFE1454 15->9 16 Function_00007FF63AFE1D14 17 Function_00007FF63AFE1650 18 Function_00007FF63AFE1750 19 Function_00007FF63AFE1490 35 Function_00007FF63AFE1A58 19->35 37 Function_00007FF63AFE1774 19->37 20 Function_00007FF63AFE17CC 20->0 21 Function_00007FF63AFE178C 21->2 21->8 22 Function_00007FF63AFE168C 22->17 23 Function_00007FF63AFE1148 23->4 23->6 23->7 23->15 23->19 23->20 27 Function_00007FF63AFE1624 23->27 23->30 38 Function_00007FF63AFE17B4 23->38 40 Function_00007FF63AFE1568 23->40 24 Function_00007FF63AFE1064 24->13 24->14 24->18 24->20 24->21 24->22 25 Function_00007FF63AFE1764 24->25 28 Function_00007FF63AFE19E0 24->28 31 Function_00007FF63AFE14DC 24->31 32 Function_00007FF63AFE175C 24->32 24->37 41 Function_00007FF63AFE17A8 24->41 27->37 31->9 31->20 33 Function_00007FF63AFE1A1C 36 Function_00007FF63AFE1974 39 Function_00007FF63AFE112C 39->18 39->36

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2099508168.00007FF63AFE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63AFE0000, based on PE: true
    • Associated: 00000000.00000002.2099493068.00007FF63AFE0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2099523522.00007FF63AFE2000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2099539740.00007FF63AFE4000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff63afe0000_SecuriteInfo.jbxd
    Similarity
    • API ID: __scrt_fastfail$__p___argc__p___argv__scrt_acquire_startup_lock__scrt_initialize_crt__scrt_is_managed_app__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
    • String ID:
    • API String ID: 4132370017-0
    • Opcode ID: aae775795ef86170569b7dd914b0190fc12d711c16cd7f2c04ff37f2d3330d05
    • Instruction ID: 0eb2d3b5072f0e09adfb8a9cc6fd8cb83d508ee48795d9c670e5f0d37b1c3b26
    • Opcode Fuzzy Hash: aae775795ef86170569b7dd914b0190fc12d711c16cd7f2c04ff37f2d3330d05
    • Instruction Fuzzy Hash: 4B317E29E0C24381FA14BB269815BF99391AF65784F4470BCDA4EC73D7DF2CE844B249

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 51 7ff63afe1000-7ff63afe1023 MessageBoxA
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2099508168.00007FF63AFE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63AFE0000, based on PE: true
    • Associated: 00000000.00000002.2099493068.00007FF63AFE0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2099523522.00007FF63AFE2000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2099539740.00007FF63AFE4000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff63afe0000_SecuriteInfo.jbxd
    Similarity
    • API ID: Message
    • String ID: Hello from dumpco.re
    • API String ID: 2030045667-1536484982
    • Opcode ID: fb3ef5bfb32c55b0ad5e088713e6b5794a4dc55d9cef42e37a200eb4bf6a5dc2
    • Instruction ID: d1a55bb26dc18c1f2086dd748d3f9d9caae57ec81a827198880aeb8c35901e93
    • Opcode Fuzzy Hash: fb3ef5bfb32c55b0ad5e088713e6b5794a4dc55d9cef42e37a200eb4bf6a5dc2
    • Instruction Fuzzy Hash: A4C0126AE1464780EE0C2720AC41AA212A0AB18304FC024BAC109CB220FDACD28AF300
    Memory Dump Source
    • Source File: 00000000.00000002.2099508168.00007FF63AFE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63AFE0000, based on PE: true
    • Associated: 00000000.00000002.2099493068.00007FF63AFE0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2099523522.00007FF63AFE2000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2099539740.00007FF63AFE4000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff63afe0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 0b7f64daedaa7754ac4923b81b29c6ba456075c8d7b55548625ed2e035dcb28a
    • Instruction ID: fc5e36d0d41cd789233ae821def88f2db2da8a1be2b62751b7f8603b67eb1e66
    • Opcode Fuzzy Hash: 0b7f64daedaa7754ac4923b81b29c6ba456075c8d7b55548625ed2e035dcb28a
    • Instruction Fuzzy Hash: 44A0022994DC46D0EA18DB01F950974A330EFB0300B4120B9C50DC32A0FF3CE985F304

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2099508168.00007FF63AFE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63AFE0000, based on PE: true
    • Associated: 00000000.00000002.2099493068.00007FF63AFE0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2099523522.00007FF63AFE2000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2099539740.00007FF63AFE4000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff63afe0000_SecuriteInfo.jbxd
    Similarity
    • API ID: Initialize__scrt_fastfail_configthreadlocale_initialize_narrow_environment_initialize_onexit_table
    • String ID:
    • API String ID: 1791763055-0
    • Opcode ID: 832aa19a917b24a974b49e6af153f10f888c3348cbe48af77a1fd2e6e3faaa02
    • Instruction ID: cb627b42000bc8db379207b46a5a7ce4bd5e9c4d38dfec18a23cf12990d49fb6
    • Opcode Fuzzy Hash: 832aa19a917b24a974b49e6af153f10f888c3348cbe48af77a1fd2e6e3faaa02
    • Instruction Fuzzy Hash: 3F11691CF0824702FA1873B74552AF992864FB4B85F4424FCE95DC73C3AE2CA894726A