Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exe
Analysis ID:1532743
MD5:5656520dd201e786dbcbd4043409c921
SHA1:c1ffb9889a94f6fb5d34386ebdd0e7dac3b2858c
SHA256:fd8d9c433aad9059017c03b07f6d59458b1c9cb0829ee08dc65f816b15ddfdfc
Tags:exe
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to retrieve information about pressed keystrokes
Found large amount of non-executed APIs
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeReversingLabs: Detection: 31%
Source: SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\net\source\repos\macro external\x64\Release\macro external.pdb&& source: SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exe
Source: Binary string: C:\Users\net\source\repos\macro external\x64\Release\macro external.pdb source: SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exe
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeCode function: 0_2_00007FF6CEBF1570 GetStdHandle,SetConsoleTextAttribute,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A,system,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A,??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,system,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,GetAsyncKeyState,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,system,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,GetAsyncKeyState,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,system,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,Sleep,FreeConsole,GetAsyncKeyState,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,Sleep,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,Sleep,_invalid_parameter_noinfo_noreturn,0_2_00007FF6CEBF1570
Source: classification engineClassification label: mal48.winEXE@2/1@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7324:120:WilError_03
Source: SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeReversingLabs: Detection: 31%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\net\source\repos\macro external\x64\Release\macro external.pdb&& source: SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exe
Source: Binary string: C:\Users\net\source\repos\macro external\x64\Release\macro external.pdb source: SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exe
Source: SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeAPI coverage: 9.1 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeCode function: 0_2_00007FF6CEBF2F40 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6CEBF2F40
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeCode function: 0_2_00007FF6CEBF30E4 SetUnhandledExceptionFilter,0_2_00007FF6CEBF30E4
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeCode function: 0_2_00007FF6CEBF2F40 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6CEBF2F40
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeCode function: 0_2_00007FF6CEBF2C60 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6CEBF2C60
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exeCode function: 0_2_00007FF6CEBF2E1C GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6CEBF2E1C
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Process Injection
11
Input Capture
1
System Time Discovery
Remote Services11
Input Capture
Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager2
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exe32%ReversingLabsWin64.Trojan.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1532743
Start date and time:2024-10-13 21:33:06 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 15s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exe
Detection:MAL
Classification:mal48.winEXE@2/1@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 4
  • Number of non-executed functions: 8
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, d.3.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.8.0.4.0.0.3.0.1.3.0.6.2.ip6.arpa, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exe
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exe
File Type:ASCII text, with no line terminators
Category:dropped
Size (bytes):19
Entropy (8bit):3.471354487013931
Encrypted:false
SSDEEP:3:ORyDAIn:OgD9n
MD5:6B014F5D322C53A5470DF23BB1A090D9
SHA1:A4F9425020181B71587BE4CABD429038365E648C
SHA-256:9EEC27CADB0D5AB8C42D4A909ADCE5C8D28AEC6B790F7F8AD9244158BFBACE13
SHA-512:B939AB6DCA69867F61CE96764A4E98CFF7A3838A0DDA40A281D72D70E2F84E0E23C04F014D3545FDEF5F2AB581E41CB73016F439B22C444D1DD2937370CAB418
Malicious:false
Reputation:low
Preview:Enter license key:
File type:PE32+ executable (console) x86-64, for MS Windows
Entropy (8bit):5.49914756713893
TrID:
  • Win64 Executable Console (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exe
File size:23'552 bytes
MD5:5656520dd201e786dbcbd4043409c921
SHA1:c1ffb9889a94f6fb5d34386ebdd0e7dac3b2858c
SHA256:fd8d9c433aad9059017c03b07f6d59458b1c9cb0829ee08dc65f816b15ddfdfc
SHA512:9b53b24734dc1f32382d362c0ba1600058f1e2b816518b10a573fe326225a0e0744ab669cee6c5ebe64b1f4a653ba5b6632895de454a11fade0d3eed099797be
SSDEEP:384:i//3TosYlpm7BYUaKvVqTCJ06O5cS992oTBP3Y+D+t3:vs3KUaIVsCJ06ONdTBP3Y+S
TLSH:32B24C27775608D7D12B61B885E2521AD2727E193362E3CF13D2422E1F6A3D0BC7AE46
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........U..............n......v.......v.......v.......v.......................v.......v.......v......Rich....................PE..d..
Icon Hash:90cececece8e8eb0
Entrypoint:0x140002a08
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x66252821 [Sun Apr 21 14:52:17 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:671a1463842121ba57af655bdf3da007
Instruction
dec eax
sub esp, 28h
call 00007F7EB11F6980h
dec eax
add esp, 28h
jmp 00007F7EB11F63E7h
int3
int3
dec eax
sub esp, 28h
call 00007F7EB11F6EC4h
test eax, eax
je 00007F7EB11F6593h
dec eax
mov eax, dword ptr [00000030h]
dec eax
mov ecx, dword ptr [eax+08h]
jmp 00007F7EB11F6577h
dec eax
cmp ecx, eax
je 00007F7EB11F6586h
xor eax, eax
dec eax
cmpxchg dword ptr [00004750h], ecx
jne 00007F7EB11F6560h
xor al, al
dec eax
add esp, 28h
ret
mov al, 01h
jmp 00007F7EB11F6569h
int3
int3
int3
dec eax
sub esp, 28h
test ecx, ecx
jne 00007F7EB11F6579h
mov byte ptr [00004739h], 00000001h
call 00007F7EB11F6CD1h
call 00007F7EB11F69F0h
test al, al
jne 00007F7EB11F6576h
xor al, al
jmp 00007F7EB11F6586h
call 00007F7EB11F69E3h
test al, al
jne 00007F7EB11F657Bh
xor ecx, ecx
call 00007F7EB11F69D8h
jmp 00007F7EB11F655Ch
mov al, 01h
dec eax
add esp, 28h
ret
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
cmp byte ptr [00004700h], 00000000h
mov ebx, ecx
jne 00007F7EB11F65D9h
cmp ecx, 01h
jnbe 00007F7EB11F65DCh
call 00007F7EB11F6E3Ah
test eax, eax
je 00007F7EB11F659Ah
test ebx, ebx
jne 00007F7EB11F6596h
dec eax
lea ecx, dword ptr [000046EAh]
call 00007F7EB11F6EE0h
test eax, eax
jne 00007F7EB11F6582h
dec eax
lea ecx, dword ptr [000046F2h]
call 00007F7EB11F65D0h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x55bc0xdc.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x90000x1e8.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x80000x324.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0xa0000x64.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x49400x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x48000x140.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x40000x320.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x27830x2800aee0326a47efbae5b6a166ad9fded467False0.58095703125data6.0803169187808965IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x40000x25120x2600324fa72e122befaee26ee8668e0a7bf5False0.3755139802631579COM executable for DOS4.614396128104878IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x70000x7a00x200a5251d34c90bd7c6631fde061fd04ce5False0.263671875DOS executable (block device driver)2.2857040349567774IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x80000x3240x400e10ed82ae93ecf908c5154341ee7b855False0.423828125PEX Binary Archive3.335141021233937IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x90000x1e80x200b62c408e2a33a54eed41bd643e2fddeeFalse0.5390625data4.756146432197578IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0xa0000x640x200a42c7e1b05d224021d9f580ecd543fd9False0.216796875data1.3527079886812914IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0x90600x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
DLLImport
KERNEL32.dllSetConsoleTextAttribute, GetStdHandle, Sleep, FreeConsole, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetModuleHandleW, RtlCaptureContext
USER32.dllSendInput, GetAsyncKeyState
MSVCP140.dll_Thrd_sleep, _Query_perf_counter, _Xtime_get_ticks, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z, ?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z, ?id@?$ctype@D@std@@2V0locale@2@A, ?good@ios_base@std@@QEBA_NXZ, ?_Getcat@?$ctype@D@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ??Bid@locale@std@@QEAA_KXZ, ?_Xlength_error@std@@YAXPEBD@Z, _Query_perf_frequency, ??1_Lockit@std@@QEAA@XZ, ??0_Lockit@std@@QEAA@H@Z, ?uncaught_exceptions@std@@YAHXZ, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ, ?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A, ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z, ?getloc@ios_base@std@@QEBA?AVlocale@2@XZ
VCRUNTIME140_1.dll__CxxFrameHandler4
VCRUNTIME140.dll__std_terminate, __std_exception_destroy, memcmp, __C_specific_handler, __current_exception_context, _CxxThrowException, __current_exception, __std_exception_copy, memset, memcpy
api-ms-win-crt-heap-l1-1-0.dll_callnewh, malloc, free, _set_new_mode
api-ms-win-crt-runtime-l1-1-0.dll_crt_atexit, terminate, _register_onexit_function, _exit, _initialize_onexit_table, __p___argc, _initterm_e, _initterm, _get_initial_narrow_environment, _initialize_narrow_environment, _configure_narrow_argv, __p___argv, _set_app_type, _seh_filter_exe, _register_thread_local_exe_atexit_callback, _c_exit, _cexit, _invalid_parameter_noinfo_noreturn, system, exit
api-ms-win-crt-math-l1-1-0.dll__setusermatherr
api-ms-win-crt-stdio-l1-1-0.dll_set_fmode, __p__commode
api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
TimestampSource PortDest PortSource IPDest IP
Oct 13, 2024 21:35:12.887876987 CEST5350471162.159.36.2192.168.2.4
Oct 13, 2024 21:35:13.424698114 CEST53586611.1.1.1192.168.2.4

Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:15:34:22
Start date:13/10/2024
Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.73712167.7295.25660.exe"
Imagebase:0x7ff6cebf0000
File size:23'552 bytes
MD5 hash:5656520DD201E786DBCBD4043409C921
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Target ID:1
Start time:15:34:22
Start date:13/10/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

Reset < >

    Execution Graph

    Execution Coverage:12%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:18.5%
    Total number of Nodes:238
    Total number of Limit Nodes:2
    execution_graph 1033 7ff6cebf34c4 1034 7ff6cebf34fc __GSHandlerCheckCommon 1033->1034 1035 7ff6cebf3528 1034->1035 1036 7ff6cebf3517 __CxxFrameHandler4 1034->1036 1036->1035 1037 7ff6cebf10c0 __std_exception_destroy 1072 7ff6cebf2020 ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 1038 7ff6cebf277c 1039 7ff6cebf2794 1038->1039 1040 7ff6cebf279e 1038->1040 1041 7ff6cebf2774 free 1039->1041 1041->1040 1042 7ff6cebf29ba 1043 7ff6cebf3090 GetModuleHandleW 1042->1043 1044 7ff6cebf29c1 1043->1044 1045 7ff6cebf29c5 1044->1045 1046 7ff6cebf2a00 _exit 1044->1046 1073 7ff6cebf20d6 1074 7ff6cebf20df ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N 1073->1074 1075 7ff6cebf2106 1074->1075 1047 7ff6cebf1010 __std_exception_copy 1048 7ff6cebf1b10 1049 7ff6cebf1b23 1048->1049 1050 7ff6cebf1b4f 1048->1050 1051 7ff6cebf1b47 1049->1051 1052 7ff6cebf1b68 _invalid_parameter_noinfo_noreturn 1049->1052 1053 7ff6cebf2774 free 1051->1053 1053->1050 1054 7ff6cebf24d0 ?uncaught_exceptions@std@ 1055 7ff6cebf24e3 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 1054->1055 1056 7ff6cebf24ed 1054->1056 1055->1056 1077 7ff6cebf35b0 ??1_Lockit@std@@QEAA 1079 7ff6cebf1070 __std_exception_destroy 1080 7ff6cebf10a5 1079->1080 1081 7ff6cebf1098 1079->1081 1082 7ff6cebf2774 free 1081->1082 1082->1080 1083 7ff6cebf2870 1087 7ff6cebf30e4 SetUnhandledExceptionFilter 1083->1087 1088 7ff6cebf36ef _seh_filter_exe 809 7ff6cebf288c 810 7ff6cebf28a5 809->810 811 7ff6cebf29e3 810->811 812 7ff6cebf28ad __scrt_acquire_startup_lock 810->812 876 7ff6cebf2f40 IsProcessorFeaturePresent 811->876 814 7ff6cebf29ed 812->814 819 7ff6cebf28cb __scrt_release_startup_lock 812->819 815 7ff6cebf2f40 9 API calls 814->815 816 7ff6cebf29f8 815->816 818 7ff6cebf2a00 _exit 816->818 817 7ff6cebf28f0 819->817 820 7ff6cebf2976 _get_initial_narrow_environment __p___argv __p___argc 819->820 823 7ff6cebf296e _register_thread_local_exe_atexit_callback 819->823 829 7ff6cebf1570 GetStdHandle SetConsoleTextAttribute 820->829 823->820 882 7ff6cebf1c80 829->882 835 7ff6cebf160c 836 7ff6cebf1a52 835->836 852 7ff6cebf1676 835->852 837 7ff6cebf1c80 9 API calls 836->837 838 7ff6cebf1a65 Sleep 837->838 839 7ff6cebf1c80 9 API calls 838->839 841 7ff6cebf1a83 Sleep 839->841 840 7ff6cebf1690 system ?setw@std@@YA?AU?$_Smanip@_J@1@_J 840->852 867 7ff6cebf1a50 841->867 850 7ff6cebf1c80 9 API calls 851 7ff6cebf1748 ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH 850->851 851->852 852->840 852->850 854 7ff6cebf18c1 system 852->854 855 7ff6cebf17ad system 852->855 857 7ff6cebf1a05 system 852->857 859 7ff6cebf1c80 9 API calls 852->859 865 7ff6cebf2530 12 API calls 852->865 868 7ff6cebf1915 GetAsyncKeyState 852->868 869 7ff6cebf1805 GetAsyncKeyState 852->869 870 7ff6cebf1e50 9 API calls 852->870 871 7ff6cebf2060 ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N 852->871 872 7ff6cebf1c80 9 API calls 852->872 873 7ff6cebf1290 _Query_perf_frequency _Query_perf_counter 852->873 919 7ff6cebf1370 system 852->919 856 7ff6cebf1c80 9 API calls 854->856 858 7ff6cebf1c80 9 API calls 855->858 856->852 860 7ff6cebf1c80 9 API calls 857->860 858->852 861 7ff6cebf1798 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 859->861 862 7ff6cebf1a25 Sleep FreeConsole 860->862 861->840 863 7ff6cebf1370 41 API calls 862->863 864 7ff6cebf1a3b 863->864 866 7ff6cebf1a40 GetAsyncKeyState 864->866 865->852 866->866 866->867 943 7ff6cebf2774 867->943 868->852 869->852 870->852 871->852 872->852 873->852 877 7ff6cebf2f66 876->877 878 7ff6cebf2f74 memset RtlCaptureContext RtlLookupFunctionEntry 877->878 879 7ff6cebf2fae RtlVirtualUnwind 878->879 880 7ff6cebf2fea memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 878->880 879->880 881 7ff6cebf306a 880->881 881->814 885 7ff6cebf1cb0 ?good@ios_base@std@ 882->885 884 7ff6cebf1d03 886 7ff6cebf1d31 884->886 888 7ff6cebf1d19 ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 ?good@ios_base@std@ 884->888 885->884 885->886 887 7ff6cebf1d8b ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 886->887 890 7ff6cebf1d3b ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exceptions@std@ 886->890 894 7ff6cebf1d65 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 886->894 887->890 891 7ff6cebf1da8 887->891 888->886 892 7ff6cebf1e15 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 890->892 893 7ff6cebf15ed 890->893 891->890 895 7ff6cebf1dad ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 891->895 892->893 896 7ff6cebf2120 893->896 894->886 894->890 895->890 895->891 897 7ff6cebf2170 ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N 896->897 901 7ff6cebf2169 896->901 898 7ff6cebf221a ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N 897->898 899 7ff6cebf2187 ?getloc@ios_base@std@@QEBA?AVlocale@2 897->899 903 7ff6cebf15fd 898->903 946 7ff6cebf1b70 ??0_Lockit@std@@QEAA@H ??Bid@locale@std@ 899->946 901->897 909 7ff6cebf2730 903->909 906 7ff6cebf2210 906->898 908 7ff6cebf2268 ?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 906->908 960 7ff6cebf2300 906->960 908->898 908->906 910 7ff6cebf274a malloc 909->910 911 7ff6cebf2754 910->911 912 7ff6cebf273b 910->912 911->835 912->910 913 7ff6cebf275a 912->913 916 7ff6cebf2765 913->916 1004 7ff6cebf2dfc 913->1004 915 7ff6cebf1110 Concurrency::cancel_current_task __std_exception_copy 917 7ff6cebf276b free 915->917 916->915 920 7ff6cebf1c80 9 API calls 919->920 921 7ff6cebf13ba 920->921 1008 7ff6cebf1e50 921->1008 924 7ff6cebf1c80 9 API calls 925 7ff6cebf13d8 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 924->925 926 7ff6cebf1400 GetAsyncKeyState 925->926 927 7ff6cebf1411 GetAsyncKeyState 926->927 942 7ff6cebf1427 926->942 927->942 928 7ff6cebf152e GetAsyncKeyState 928->926 930 7ff6cebf1542 FreeConsole 928->930 929 7ff6cebf146b SendInput 931 7ff6cebf1290 2 API calls 929->931 933 7ff6cebf2710 8 API calls 930->933 934 7ff6cebf14a2 931->934 935 7ff6cebf1554 933->935 936 7ff6cebf2530 12 API calls 934->936 935->852 939 7ff6cebf14c4 SendInput 936->939 940 7ff6cebf1290 2 API calls 939->940 940->942 941 7ff6cebf2530 12 API calls 941->942 942->926 942->928 942->929 942->941 1023 7ff6cebf1290 _Query_perf_frequency _Query_perf_counter 942->1023 1025 7ff6cebf2530 942->1025 944 7ff6cebf276c 943->944 945 7ff6cebf33b6 free 943->945 944->945 948 7ff6cebf1bd2 946->948 947 7ff6cebf1c47 ??1_Lockit@std@@QEAA 982 7ff6cebf2710 947->982 948->947 950 7ff6cebf1bf5 948->950 951 7ff6cebf1be9 ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12 948->951 950->947 953 7ff6cebf1c0c ?_Getcat@?$ctype@D@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@ 950->953 951->950 954 7ff6cebf1c20 953->954 955 7ff6cebf1c77 953->955 979 7ff6cebf26bc 954->979 991 7ff6cebf1200 955->991 959 7ff6cebf1c7c 961 7ff6cebf2330 960->961 962 7ff6cebf2458 960->962 964 7ff6cebf238b 961->964 966 7ff6cebf23b3 961->966 967 7ff6cebf237e 961->967 1000 7ff6cebf11b0 ?_Xlength_error@std@@YAXPEBD 962->1000 968 7ff6cebf2730 std::_Facet_Register 4 API calls 964->968 965 7ff6cebf245d 1001 7ff6cebf1110 965->1001 970 7ff6cebf23a0 966->970 971 7ff6cebf2730 std::_Facet_Register 4 API calls 966->971 967->964 967->965 968->970 973 7ff6cebf241f _invalid_parameter_noinfo_noreturn 970->973 974 7ff6cebf23db memcpy 970->974 978 7ff6cebf241d 970->978 971->970 972 7ff6cebf2463 972->908 973->978 975 7ff6cebf2412 974->975 976 7ff6cebf23fd 974->976 977 7ff6cebf2774 free 975->977 976->973 976->975 977->978 978->908 980 7ff6cebf2730 std::_Facet_Register 4 API calls 979->980 981 7ff6cebf1c32 980->981 981->947 983 7ff6cebf2719 982->983 984 7ff6cebf1c62 ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 983->984 985 7ff6cebf2c94 IsProcessorFeaturePresent 983->985 984->906 986 7ff6cebf2cac 985->986 994 7ff6cebf2d68 RtlCaptureContext 986->994 999 7ff6cebf11d0 991->999 993 7ff6cebf120e _CxxThrowException __std_exception_copy 993->959 995 7ff6cebf2d82 RtlLookupFunctionEntry 994->995 996 7ff6cebf2cbf 995->996 997 7ff6cebf2d98 RtlVirtualUnwind 995->997 998 7ff6cebf2c60 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 996->998 997->995 997->996 999->993 1002 7ff6cebf111e Concurrency::cancel_current_task 1001->1002 1003 7ff6cebf112f __std_exception_copy 1002->1003 1003->972 1007 7ff6cebf2ddc 1004->1007 1006 7ff6cebf2e0a _CxxThrowException 1007->1006 1009 7ff6cebf1e93 ?good@ios_base@std@ 1008->1009 1010 7ff6cebf1e8c 1008->1010 1011 7ff6cebf1ea7 1009->1011 1016 7ff6cebf1ed5 1009->1016 1010->1009 1013 7ff6cebf1ebd ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 ?good@ios_base@std@ 1011->1013 1011->1016 1012 7ff6cebf1fb2 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exceptions@std@ 1015 7ff6cebf1fe2 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 1012->1015 1019 7ff6cebf13c9 1012->1019 1013->1016 1014 7ff6cebf1f49 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 1018 7ff6cebf1f67 1014->1018 1015->1019 1016->1012 1016->1014 1016->1018 1020 7ff6cebf1f1c ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 1016->1020 1021 7ff6cebf1f46 1016->1021 1017 7ff6cebf1fa2 1017->1012 1018->1017 1022 7ff6cebf1f7c ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 1018->1022 1019->924 1020->1016 1021->1014 1022->1018 1024 7ff6cebf12b8 1023->1024 1024->942 1026 7ff6cebf2585 _Query_perf_frequency _Query_perf_counter 1025->1026 1027 7ff6cebf25a0 1026->1027 1028 7ff6cebf2686 1027->1028 1030 7ff6cebf2624 _Xtime_get_ticks 1027->1030 1032 7ff6cebf264c _Thrd_sleep 1027->1032 1029 7ff6cebf2710 8 API calls 1028->1029 1031 7ff6cebf1452 GetAsyncKeyState 1029->1031 1030->1027 1031->942 1032->1026 1057 7ff6cebf2a08 1060 7ff6cebf2e1c 1057->1060 1061 7ff6cebf2a11 1060->1061 1062 7ff6cebf2e3f GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 1060->1062 1062->1061 1089 7ff6cebf3728 1091 7ff6cebf3730 1089->1091 1090 7ff6cebf377d 1091->1090 1092 7ff6cebf2774 free 1091->1092 1092->1091 1093 7ff6cebf27a8 1094 7ff6cebf27b8 1093->1094 1106 7ff6cebf2a94 1094->1106 1096 7ff6cebf2f40 9 API calls 1097 7ff6cebf285d 1096->1097 1098 7ff6cebf27dc _RTC_Initialize 1104 7ff6cebf283f 1098->1104 1114 7ff6cebf2edc InitializeSListHead 1098->1114 1104->1096 1105 7ff6cebf284d 1104->1105 1107 7ff6cebf2aa5 1106->1107 1112 7ff6cebf2ad7 1106->1112 1108 7ff6cebf2b14 1107->1108 1111 7ff6cebf2aaa __scrt_release_startup_lock 1107->1111 1109 7ff6cebf2f40 9 API calls 1108->1109 1110 7ff6cebf2b1e 1109->1110 1111->1112 1113 7ff6cebf2ac7 _initialize_onexit_table 1111->1113 1112->1098 1113->1112 1115 7ff6cebf35e8 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N 1116 7ff6cebf1de7 1117 7ff6cebf1df5 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exceptions@std@ 1116->1117 1118 7ff6cebf1e15 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 1117->1118 1119 7ff6cebf1e1f 1117->1119 1118->1119

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_00007FF6CEBF1000 22 Function_00007FF6CEBF2C08 0->22 1 Function_00007FF6CEBF1200 59 Function_00007FF6CEBF11D0 1->59 2 Function_00007FF6CEBF2300 9 Function_00007FF6CEBF1110 2->9 37 Function_00007FF6CEBF2730 2->37 39 Function_00007FF6CEBF11B0 2->39 81 Function_00007FF6CEBF2774 2->81 3 Function_00007FF6CEBF2F00 7 Function_00007FF6CEBF2EF8 3->7 83 Function_00007FF6CEBF2EF0 3->83 4 Function_00007FF6CEBF1C80 5 Function_00007FF6CEBF2DFC 76 Function_00007FF6CEBF2DDC 5->76 6 Function_00007FF6CEBF277C 6->81 8 Function_00007FF6CEBF2A94 49 Function_00007FF6CEBF2F40 8->49 82 Function_00007FF6CEBF3374 8->82 69 Function_00007FF6CEBF10E0 9->69 10 Function_00007FF6CEBF1010 11 Function_00007FF6CEBF2710 71 Function_00007FF6CEBF2C60 11->71 93 Function_00007FF6CEBF2D68 11->93 12 Function_00007FF6CEBF1B10 12->81 13 Function_00007FF6CEBF2510 14 Function_00007FF6CEBF1290 15 Function_00007FF6CEBF3090 16 Function_00007FF6CEBF3590 17 Function_00007FF6CEBF3690 18 Function_00007FF6CEBF288C 18->15 25 Function_00007FF6CEBF2B20 18->25 29 Function_00007FF6CEBF2A1C 18->29 36 Function_00007FF6CEBF2F30 18->36 43 Function_00007FF6CEBF2F28 18->43 18->49 54 Function_00007FF6CEBF2BB8 18->54 74 Function_00007FF6CEBF2BDC 18->74 78 Function_00007FF6CEBF2A58 18->78 84 Function_00007FF6CEBF1570 18->84 19 Function_00007FF6CEBF318C 20 Function_00007FF6CEBF370D 21 Function_00007FF6CEBF2A08 31 Function_00007FF6CEBF2E1C 21->31 23 Function_00007FF6CEBF2287 24 Function_00007FF6CEBF1FA4 26 Function_00007FF6CEBF2020 27 Function_00007FF6CEBF2120 27->2 88 Function_00007FF6CEBF1B70 27->88 28 Function_00007FF6CEBF24A0 29->82 30 Function_00007FF6CEBF2F1C 32 Function_00007FF6CEBF359C 33 Function_00007FF6CEBF369C 34 Function_00007FF6CEBF36B4 35 Function_00007FF6CEBF3630 37->5 37->9 38 Function_00007FF6CEBF2530 38->11 40 Function_00007FF6CEBF35B0 41 Function_00007FF6CEBF2BB1 42 Function_00007FF6CEBF3728 42->81 44 Function_00007FF6CEBF27A8 44->3 44->8 44->30 47 Function_00007FF6CEBF2C44 44->47 44->49 56 Function_00007FF6CEBF2ED4 44->56 62 Function_00007FF6CEBF3150 44->62 63 Function_00007FF6CEBF2ECC 44->63 65 Function_00007FF6CEBF2EC8 44->65 75 Function_00007FF6CEBF2EDC 44->75 77 Function_00007FF6CEBF2C5C 44->77 91 Function_00007FF6CEBF2EEC 44->91 45 Function_00007FF6CEBF36A8 46 Function_00007FF6CEBF34C4 94 Function_00007FF6CEBF3468 46->94 47->22 48 Function_00007FF6CEBF10C0 55 Function_00007FF6CEBF2F38 49->55 50 Function_00007FF6CEBF35BE 51 Function_00007FF6CEBF26BC 51->37 52 Function_00007FF6CEBF363C 53 Function_00007FF6CEBF29BA 53->15 54->82 57 Function_00007FF6CEBF35D0 58 Function_00007FF6CEBF24D0 60 Function_00007FF6CEBF1050 61 Function_00007FF6CEBF1E50 64 Function_00007FF6CEBF31C8 66 Function_00007FF6CEBF3448 66->94 67 Function_00007FF6CEBF3648 68 Function_00007FF6CEBF30E4 70 Function_00007FF6CEBF1260 72 Function_00007FF6CEBF2060 73 Function_00007FF6CEBF35DC 74->91 78->64 78->91 79 Function_00007FF6CEBF20D6 80 Function_00007FF6CEBF30F4 84->4 84->11 84->14 84->27 84->37 84->38 84->61 84->72 84->81 87 Function_00007FF6CEBF1370 84->87 85 Function_00007FF6CEBF1170 86 Function_00007FF6CEBF1070 86->81 87->4 87->11 87->14 87->38 87->61 88->1 88->11 88->51 89 Function_00007FF6CEBF2870 89->65 89->68 90 Function_00007FF6CEBF36EF 92 Function_00007FF6CEBF35E8 95 Function_00007FF6CEBF1DE7

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 7ff6cebf1570-7ff6cebf15f8 GetStdHandle SetConsoleTextAttribute call 7ff6cebf1c80 call 7ff6cebf2120 4 7ff6cebf15fd-7ff6cebf1660 call 7ff6cebf2730 0->4 7 7ff6cebf1a52-7ff6cebf1a8e call 7ff6cebf1c80 Sleep call 7ff6cebf1c80 Sleep 4->7 8 7ff6cebf1666-7ff6cebf1670 call 7ff6cebf3543 4->8 17 7ff6cebf1a8f-7ff6cebf1aa1 call 7ff6cebf2774 7->17 8->7 13 7ff6cebf1676-7ff6cebf168a 8->13 15 7ff6cebf1690-7ff6cebf175f system ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z call 7ff6cebf1c80 * 7 ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z 13->15 43 7ff6cebf1765-7ff6cebf1768 15->43 44 7ff6cebf19fb-7ff6cebf1a00 call 7ff6cebf1370 15->44 23 7ff6cebf1aa3-7ff6cebf1ab1 17->23 24 7ff6cebf1ad7-7ff6cebf1b05 call 7ff6cebf2710 17->24 26 7ff6cebf1ab3-7ff6cebf1ac6 23->26 27 7ff6cebf1acf-7ff6cebf1ad2 call 7ff6cebf2774 23->27 26->27 30 7ff6cebf1ac8-7ff6cebf1ace _invalid_parameter_noinfo_noreturn 26->30 27->24 30->27 43->15 45 7ff6cebf176e-7ff6cebf1771 43->45 44->15 47 7ff6cebf18c1-7ff6cebf18f1 system call 7ff6cebf1c80 call 7ff6cebf1290 45->47 48 7ff6cebf1777-7ff6cebf177a 45->48 67 7ff6cebf18f3-7ff6cebf18fd 47->67 68 7ff6cebf18ff 47->68 50 7ff6cebf177c-7ff6cebf177f 48->50 51 7ff6cebf17ad-7ff6cebf17dd system call 7ff6cebf1c80 call 7ff6cebf1290 48->51 53 7ff6cebf1a05-7ff6cebf1a3b system call 7ff6cebf1c80 Sleep FreeConsole call 7ff6cebf1370 50->53 54 7ff6cebf1785-7ff6cebf17a8 call 7ff6cebf1c80 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 50->54 70 7ff6cebf17df-7ff6cebf17e9 51->70 71 7ff6cebf17eb 51->71 74 7ff6cebf1a40-7ff6cebf1a4e GetAsyncKeyState 53->74 54->15 72 7ff6cebf1903-7ff6cebf190c call 7ff6cebf2530 67->72 68->72 75 7ff6cebf17ef-7ff6cebf17f8 call 7ff6cebf2530 70->75 71->75 79 7ff6cebf1910 72->79 74->74 77 7ff6cebf1a50 74->77 81 7ff6cebf1800 75->81 77->17 82 7ff6cebf1915-7ff6cebf1920 GetAsyncKeyState 79->82 83 7ff6cebf1805-7ff6cebf1810 GetAsyncKeyState 81->83 84 7ff6cebf1922-7ff6cebf1978 call 7ff6cebf1c80 call 7ff6cebf1e50 call 7ff6cebf1c80 call 7ff6cebf2060 82->84 85 7ff6cebf1986-7ff6cebf198e 82->85 87 7ff6cebf1812-7ff6cebf1868 call 7ff6cebf1c80 call 7ff6cebf1e50 call 7ff6cebf1c80 call 7ff6cebf2060 83->87 88 7ff6cebf1876-7ff6cebf187e 83->88 106 7ff6cebf1995-7ff6cebf19c8 call 7ff6cebf1c80 call 7ff6cebf1e50 call 7ff6cebf1c80 call 7ff6cebf1290 84->106 107 7ff6cebf197a-7ff6cebf1981 call 7ff6cebf1c80 84->107 85->82 86 7ff6cebf1990 85->86 86->79 109 7ff6cebf1885-7ff6cebf18bc call 7ff6cebf1c80 call 7ff6cebf1e50 call 7ff6cebf1c80 call 7ff6cebf1290 87->109 110 7ff6cebf186a-7ff6cebf1871 call 7ff6cebf1c80 87->110 88->83 92 7ff6cebf1880 88->92 92->81 128 7ff6cebf19cc-7ff6cebf19cf 106->128 107->85 109->128 110->88 129 7ff6cebf19d1-7ff6cebf19e4 call 7ff6cebf2530 128->129 130 7ff6cebf19e9-7ff6cebf19f6 call 7ff6cebf2530 128->130 129->15 130->15
    APIs
    • GetStdHandle.KERNEL32 ref: 00007FF6CEBF15AD
    • SetConsoleTextAttribute.KERNELBASE ref: 00007FF6CEBF15B9
      • Part of subcall function 00007FF6CEBF1C80: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,?,?,?,00007FF6CEBF13BA), ref: 00007FF6CEBF1CF9
      • Part of subcall function 00007FF6CEBF1C80: ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,?,?,?,00007FF6CEBF13BA), ref: 00007FF6CEBF1D19
      • Part of subcall function 00007FF6CEBF1C80: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,?,?,?,00007FF6CEBF13BA), ref: 00007FF6CEBF1D29
      • Part of subcall function 00007FF6CEBF1C80: ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,00007FF6CEBF13BA), ref: 00007FF6CEBF1E04
      • Part of subcall function 00007FF6CEBF1C80: ?uncaught_exceptions@std@@YAHXZ.MSVCP140(?,?,?,?,?,00007FF6CEBF13BA), ref: 00007FF6CEBF1E0B
      • Part of subcall function 00007FF6CEBF1C80: ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,00007FF6CEBF13BA), ref: 00007FF6CEBF1E18
      • Part of subcall function 00007FF6CEBF2120: ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z.MSVCP140(?,?,?,?,?,?,?,?,?,00007FF6CEBF15FD), ref: 00007FF6CEBF2175
      • Part of subcall function 00007FF6CEBF2120: ?getloc@ios_base@std@@QEBA?AVlocale@2@XZ.MSVCP140(?,?,?,?,?,?,?,?,?,00007FF6CEBF15FD), ref: 00007FF6CEBF2196
      • Part of subcall function 00007FF6CEBF2120: ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140(?,?,?,?,?,?,?,?,?,00007FF6CEBF15FD), ref: 00007FF6CEBF220A
      • Part of subcall function 00007FF6CEBF2120: ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,?,?,?,?,00007FF6CEBF15FD), ref: 00007FF6CEBF22C2
      • Part of subcall function 00007FF6CEBF2730: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6CEBF26CF,?,?,?,00007FF6CEBF1C32,?,?,?,?,?,?,00007FFE0EC65E50,00007FF6CEBF21A5), ref: 00007FF6CEBF274A
    • system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CEBF1697
    • ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z.MSVCP140 ref: 00007FF6CEBF16AD
      • Part of subcall function 00007FF6CEBF1C80: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,?,?,?,00007FF6CEBF13BA), ref: 00007FF6CEBF1D76
      • Part of subcall function 00007FF6CEBF1C80: ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,?,?,?,?,00007FF6CEBF13BA), ref: 00007FF6CEBF1D9D
      • Part of subcall function 00007FF6CEBF1C80: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,?,?,?,00007FF6CEBF13BA), ref: 00007FF6CEBF1DBE
    • ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z.MSVCP140 ref: 00007FF6CEBF1753
    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6CEBF17A2
    • system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CEBF17B4
    • GetAsyncKeyState.USER32 ref: 00007FF6CEBF1807
    • system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CEBF18C8
    • GetAsyncKeyState.USER32 ref: 00007FF6CEBF1917
    • system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CEBF1A0C
    • Sleep.KERNEL32 ref: 00007FF6CEBF1A2A
    • FreeConsole.KERNEL32 ref: 00007FF6CEBF1A30
    • GetAsyncKeyState.USER32 ref: 00007FF6CEBF1A45
    • Sleep.KERNEL32 ref: 00007FF6CEBF1A6A
    • Sleep.KERNEL32 ref: 00007FF6CEBF1A88
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CEBF1AC8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3168117960.00007FF6CEBF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEBF0000, based on PE: true
    • Associated: 00000000.00000002.3168104147.00007FF6CEBF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168133185.00007FF6CEBF4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168147731.00007FF6CEBF7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168161313.00007FF6CEBF8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6cebf0000_SecuriteInfo.jbxd
    Similarity
    • API ID: D@std@@@std@@U?$char_traits@$system$AsyncSleepStateV01@$?good@ios_base@std@@?setstate@?$basic_ios@?sputc@?$basic_streambuf@Console$??5?$basic_istream@??6?$basic_ostream@?flush@?$basic_ostream@?getloc@ios_base@std@@?setw@std@@?sgetc@?$basic_streambuf@?sputn@?$basic_streambuf@?uncaught_exceptions@std@@AttributeFreeHandleIpfx@?$basic_istream@J@1@_Osfx@?$basic_ostream@Smanip@_TextU?$_V01@@V12@Vlocale@2@_invalid_parameter_noinfo_noreturnmalloc
    • String ID: k/6Iy$Choose an option:$Keybind for macro is now $Keybind for noclip is now $Closing loader...$Invalid choice | Please choose a valid option.$Invalid license | Check discord$Keybind for macro has now been set to $Keybind for noclip has now been set to $ | Confirm? (Y/N): $1. Load macro$2. Load noclip [SOON]$3. Set keybind for macro$4. Set keybind for noclip [SOON]$5. Hidden mode | Must set keybind before choosing this option$Choose keybind for macro: $Choose keybind for noclip: $Choose the key you would like to set for noclip$Choose the key you would like to set the macro$DA HOOD C++ MACRO discord.gg/C38FkMe6Za$Enter license key: $Hiding... | Click F1 to exit program while hidden$Me6Za$cls
    • API String ID: 1354492205-208671924
    • Opcode ID: d6d960191333b73d70d98121adf6e98090ae4bbc84c275f051f8f9a5f06ca457
    • Instruction ID: 4fc291d61ee47df9ac05b5bd7a1b510e96aa0a84d07c1a2af820b412325d6977
    • Opcode Fuzzy Hash: d6d960191333b73d70d98121adf6e98090ae4bbc84c275f051f8f9a5f06ca457
    • Instruction Fuzzy Hash: 23F1703EE08A8291FB00DF64EA902B86771AF67782F414435F99DF62A6DE2CE545C344

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 135 7ff6cebf1c80-7ff6cebf1ca9 136 7ff6cebf1cb0-7ff6cebf1cb7 135->136 136->136 137 7ff6cebf1cb9-7ff6cebf1cc8 136->137 138 7ff6cebf1cd4 137->138 139 7ff6cebf1cca-7ff6cebf1ccd 137->139 141 7ff6cebf1cd6-7ff6cebf1ce6 138->141 139->138 140 7ff6cebf1ccf-7ff6cebf1cd2 139->140 140->141 142 7ff6cebf1cef-7ff6cebf1d01 ?good@ios_base@std@@QEBA_NXZ 141->142 143 7ff6cebf1ce8-7ff6cebf1cee 141->143 144 7ff6cebf1d33-7ff6cebf1d39 142->144 145 7ff6cebf1d03-7ff6cebf1d12 142->145 143->142 149 7ff6cebf1d45-7ff6cebf1d58 144->149 150 7ff6cebf1d3b-7ff6cebf1d40 144->150 147 7ff6cebf1d14-7ff6cebf1d17 145->147 148 7ff6cebf1d31 145->148 147->148 153 7ff6cebf1d19-7ff6cebf1d2f ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ ?good@ios_base@std@@QEBA_NXZ 147->153 148->144 151 7ff6cebf1d5a 149->151 152 7ff6cebf1d8b-7ff6cebf1da6 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z 149->152 154 7ff6cebf1df5-7ff6cebf1e13 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z ?uncaught_exceptions@std@@YAHXZ 150->154 155 7ff6cebf1d60-7ff6cebf1d63 151->155 156 7ff6cebf1dce 152->156 157 7ff6cebf1da8-7ff6cebf1dab 152->157 153->144 158 7ff6cebf1e15-7ff6cebf1e1e ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ 154->158 159 7ff6cebf1e1f-7ff6cebf1e2f 154->159 155->152 160 7ff6cebf1d65-7ff6cebf1d7f ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 155->160 163 7ff6cebf1dd1 156->163 161 7ff6cebf1dd5-7ff6cebf1de5 157->161 162 7ff6cebf1dad-7ff6cebf1dc7 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 157->162 158->159 164 7ff6cebf1e31-7ff6cebf1e37 159->164 165 7ff6cebf1e38-7ff6cebf1e4c 159->165 166 7ff6cebf1d81-7ff6cebf1d84 160->166 167 7ff6cebf1d86-7ff6cebf1d89 160->167 161->154 162->156 168 7ff6cebf1dc9-7ff6cebf1dcc 162->168 163->161 164->165 166->163 167->155 168->157
    APIs
    • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,?,?,?,00007FF6CEBF13BA), ref: 00007FF6CEBF1CF9
    • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,?,?,?,00007FF6CEBF13BA), ref: 00007FF6CEBF1D19
    • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,?,?,?,00007FF6CEBF13BA), ref: 00007FF6CEBF1D29
    • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,?,?,?,00007FF6CEBF13BA), ref: 00007FF6CEBF1D76
    • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,?,?,?,?,00007FF6CEBF13BA), ref: 00007FF6CEBF1D9D
    • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,?,?,?,00007FF6CEBF13BA), ref: 00007FF6CEBF1DBE
    • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,00007FF6CEBF13BA), ref: 00007FF6CEBF1E04
    • ?uncaught_exceptions@std@@YAHXZ.MSVCP140(?,?,?,?,?,00007FF6CEBF13BA), ref: 00007FF6CEBF1E0B
    • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,00007FF6CEBF13BA), ref: 00007FF6CEBF1E18
    Memory Dump Source
    • Source File: 00000000.00000002.3168117960.00007FF6CEBF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEBF0000, based on PE: true
    • Associated: 00000000.00000002.3168104147.00007FF6CEBF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168133185.00007FF6CEBF4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168147731.00007FF6CEBF7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168161313.00007FF6CEBF8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6cebf0000_SecuriteInfo.jbxd
    Similarity
    • API ID: D@std@@@std@@U?$char_traits@$?good@ios_base@std@@?sputc@?$basic_streambuf@$?flush@?$basic_ostream@?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exceptions@std@@Osfx@?$basic_ostream@V12@
    • String ID:
    • API String ID: 4121003011-0
    • Opcode ID: 9e83c4badbd5e9cd408e6e22275766ef4500bc0d983ed6f82603d398f241131f
    • Instruction ID: 1d8c8f1614556a1ba236589e55c3a41932700f97d62a761393b7acf5d9f2db8f
    • Opcode Fuzzy Hash: 9e83c4badbd5e9cd408e6e22275766ef4500bc0d983ed6f82603d398f241131f
    • Instruction Fuzzy Hash: 5951053F60994181EB208F19D690238A770EF66F96F15CA31DADEA77A1CF3DD5468304

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3168117960.00007FF6CEBF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEBF0000, based on PE: true
    • Associated: 00000000.00000002.3168104147.00007FF6CEBF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168133185.00007FF6CEBF4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168147731.00007FF6CEBF7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168161313.00007FF6CEBF8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6cebf0000_SecuriteInfo.jbxd
    Similarity
    • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
    • String ID:
    • API String ID: 1133592946-0
    • Opcode ID: f7306ed2455a16da05797062c5d1c371b5640d7dfb2a6b0b0df56b3567c29dd4
    • Instruction ID: 3d218e4ccbf227cf3c25a895d533ade5c91ed318c063a594b3bb0c2cf88854ce
    • Opcode Fuzzy Hash: f7306ed2455a16da05797062c5d1c371b5640d7dfb2a6b0b0df56b3567c29dd4
    • Instruction Fuzzy Hash: 02316D3DE0CA4341FA14AF2597523B962B1AF63786F448435FACDE72D7DE2DE8468210

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 221 7ff6cebf2120-7ff6cebf2167 222 7ff6cebf2170-7ff6cebf2181 ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z 221->222 223 7ff6cebf2169-7ff6cebf216f 221->223 224 7ff6cebf229b-7ff6cebf22ae 222->224 225 7ff6cebf2187-7ff6cebf21b0 ?getloc@ios_base@std@@QEBA?AVlocale@2@XZ call 7ff6cebf1b70 222->225 223->222 226 7ff6cebf22b3-7ff6cebf22d9 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z 224->226 227 7ff6cebf22b0 224->227 233 7ff6cebf21b2-7ff6cebf21be 225->233 234 7ff6cebf21ca-7ff6cebf21d2 225->234 230 7ff6cebf22e2-7ff6cebf22fe 226->230 231 7ff6cebf22db-7ff6cebf22e1 226->231 227->226 231->230 233->234 242 7ff6cebf21c0-7ff6cebf21c3 233->242 235 7ff6cebf21d4 234->235 236 7ff6cebf21d7-7ff6cebf21fb 234->236 235->236 238 7ff6cebf2202 236->238 239 7ff6cebf21fd-7ff6cebf2200 236->239 241 7ff6cebf2205-7ff6cebf220a ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ 238->241 239->238 239->241 243 7ff6cebf2210-7ff6cebf2213 241->243 242->234 244 7ff6cebf2215-7ff6cebf2218 243->244 245 7ff6cebf2223 243->245 246 7ff6cebf2225-7ff6cebf2232 244->246 247 7ff6cebf221a-7ff6cebf221f 244->247 245->224 246->245 248 7ff6cebf2234-7ff6cebf223f 246->248 247->245 249 7ff6cebf2260-7ff6cebf2263 call 7ff6cebf2300 248->249 250 7ff6cebf2241-7ff6cebf2250 248->250 254 7ff6cebf2268-7ff6cebf2285 ?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ 249->254 252 7ff6cebf2255-7ff6cebf225e 250->252 253 7ff6cebf2252 250->253 252->254 253->252 254->224 254->243
    APIs
    • ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z.MSVCP140(?,?,?,?,?,?,?,?,?,00007FF6CEBF15FD), ref: 00007FF6CEBF2175
    • ?getloc@ios_base@std@@QEBA?AVlocale@2@XZ.MSVCP140(?,?,?,?,?,?,?,?,?,00007FF6CEBF15FD), ref: 00007FF6CEBF2196
    • ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140(?,?,?,?,?,?,?,?,?,00007FF6CEBF15FD), ref: 00007FF6CEBF220A
    • ?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140(?,?,?,?,?,?,?,?,?,00007FF6CEBF15FD), ref: 00007FF6CEBF227F
    • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,?,?,?,?,00007FF6CEBF15FD), ref: 00007FF6CEBF22C2
    Memory Dump Source
    • Source File: 00000000.00000002.3168117960.00007FF6CEBF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEBF0000, based on PE: true
    • Associated: 00000000.00000002.3168104147.00007FF6CEBF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168133185.00007FF6CEBF4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168147731.00007FF6CEBF7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168161313.00007FF6CEBF8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6cebf0000_SecuriteInfo.jbxd
    Similarity
    • API ID: D@std@@@std@@U?$char_traits@$?getloc@ios_base@std@@?setstate@?$basic_ios@?sgetc@?$basic_streambuf@?snextc@?$basic_streambuf@Ipfx@?$basic_istream@Vlocale@2@
    • String ID:
    • API String ID: 481934583-0
    • Opcode ID: e75d25fe2333d208ca671973e46b9a8b923d0db92407f5264c54284efe99180c
    • Instruction ID: cb4f078da402df553c1e791d46f2dfdb23add5110c3fc1e82dd9922d7bed1fae
    • Opcode Fuzzy Hash: e75d25fe2333d208ca671973e46b9a8b923d0db92407f5264c54284efe99180c
    • Instruction Fuzzy Hash: 09515E2A609A4481DB14CF1AE6903396BB0FB9AF96F058631EE9E93764CF3DC452C340

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3168117960.00007FF6CEBF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEBF0000, based on PE: true
    • Associated: 00000000.00000002.3168104147.00007FF6CEBF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168133185.00007FF6CEBF4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168147731.00007FF6CEBF7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168161313.00007FF6CEBF8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6cebf0000_SecuriteInfo.jbxd
    Similarity
    • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
    • String ID:
    • API String ID: 313767242-0
    • Opcode ID: 7b4c94b4b4f4d8de3535a09c8c6ebfe72010b80b48628db96c5f573dfe4eab8a
    • Instruction ID: 0a1635c5f472cb4705fb3a951c40532c6e09d15e09081d919695aaad51056e5d
    • Opcode Fuzzy Hash: 7b4c94b4b4f4d8de3535a09c8c6ebfe72010b80b48628db96c5f573dfe4eab8a
    • Instruction Fuzzy Hash: B6313B7A619B8286EB608F60E9407FD6374FB95745F40403AEA8D97B98DF3CD648C704

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3168117960.00007FF6CEBF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEBF0000, based on PE: true
    • Associated: 00000000.00000002.3168104147.00007FF6CEBF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168133185.00007FF6CEBF4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168147731.00007FF6CEBF7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168161313.00007FF6CEBF8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6cebf0000_SecuriteInfo.jbxd
    Similarity
    • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
    • String ID: k/6Iy
    • API String ID: 2933794660-2835000745
    • Opcode ID: cbf7e9e87b7f2c56386ec502426db03d1065129625e31276710674a896baef45
    • Instruction ID: b414d8c36045a24cc61364b7e7de15f8708dc5b6c107191324e678af007e405c
    • Opcode Fuzzy Hash: cbf7e9e87b7f2c56386ec502426db03d1065129625e31276710674a896baef45
    • Instruction Fuzzy Hash: 35114F3AB14F0289EB00CF70E9542B833B4FB6A759F041A31EA6D92794DF3CD5548340
    Memory Dump Source
    • Source File: 00000000.00000002.3168117960.00007FF6CEBF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEBF0000, based on PE: true
    • Associated: 00000000.00000002.3168104147.00007FF6CEBF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168133185.00007FF6CEBF4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168147731.00007FF6CEBF7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168161313.00007FF6CEBF8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6cebf0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: f0fa996f130a0cbb3f0a103395ad643080d76e45cfdee8b521752340b5ac105e
    • Instruction ID: 82dcd96f4d1ad22cd0465dc4e52f46bfafd9127f5985457cb88fbdd1c5413782
    • Opcode Fuzzy Hash: f0fa996f130a0cbb3f0a103395ad643080d76e45cfdee8b521752340b5ac105e
    • Instruction Fuzzy Hash: 52A0023E90CC43D0E6088F30EB51930A770EF72342B420072E58DE1060AF3EA954C308

    Control-flow Graph

    APIs
    • system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6CEBF13A1
      • Part of subcall function 00007FF6CEBF1C80: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,?,?,?,00007FF6CEBF13BA), ref: 00007FF6CEBF1CF9
      • Part of subcall function 00007FF6CEBF1C80: ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,?,?,?,00007FF6CEBF13BA), ref: 00007FF6CEBF1D19
      • Part of subcall function 00007FF6CEBF1C80: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,?,?,?,00007FF6CEBF13BA), ref: 00007FF6CEBF1D29
      • Part of subcall function 00007FF6CEBF1C80: ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,00007FF6CEBF13BA), ref: 00007FF6CEBF1E04
      • Part of subcall function 00007FF6CEBF1C80: ?uncaught_exceptions@std@@YAHXZ.MSVCP140(?,?,?,?,?,00007FF6CEBF13BA), ref: 00007FF6CEBF1E0B
      • Part of subcall function 00007FF6CEBF1C80: ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,00007FF6CEBF13BA), ref: 00007FF6CEBF1E18
      • Part of subcall function 00007FF6CEBF1E50: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,?,?,?,00007FF6CEBF13C9), ref: 00007FF6CEBF1E9D
      • Part of subcall function 00007FF6CEBF1E50: ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,?,?,?,00007FF6CEBF13C9), ref: 00007FF6CEBF1EBD
      • Part of subcall function 00007FF6CEBF1E50: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,?,?,?,00007FF6CEBF13C9), ref: 00007FF6CEBF1ECD
      • Part of subcall function 00007FF6CEBF1E50: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,?,?,?,00007FF6CEBF13C9), ref: 00007FF6CEBF1F2D
      • Part of subcall function 00007FF6CEBF1E50: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,?,?,?,00007FF6CEBF13C9), ref: 00007FF6CEBF1F56
      • Part of subcall function 00007FF6CEBF1E50: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,?,?,?,00007FF6CEBF13C9), ref: 00007FF6CEBF1F8D
      • Part of subcall function 00007FF6CEBF1C80: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,?,?,?,00007FF6CEBF13BA), ref: 00007FF6CEBF1D76
    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6CEBF13E2
    • GetAsyncKeyState.USER32 ref: 00007FF6CEBF1406
    • GetAsyncKeyState.USER32 ref: 00007FF6CEBF141C
    • GetAsyncKeyState.USER32 ref: 00007FF6CEBF1458
    • SendInput.USER32 ref: 00007FF6CEBF1493
    • SendInput.USER32 ref: 00007FF6CEBF14EC
    • GetAsyncKeyState.USER32 ref: 00007FF6CEBF1533
    • FreeConsole.KERNEL32 ref: 00007FF6CEBF1542
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3168117960.00007FF6CEBF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEBF0000, based on PE: true
    • Associated: 00000000.00000002.3168104147.00007FF6CEBF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168133185.00007FF6CEBF4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168147731.00007FF6CEBF7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168161313.00007FF6CEBF8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6cebf0000_SecuriteInfo.jbxd
    Similarity
    • API ID: D@std@@@std@@U?$char_traits@$?good@ios_base@std@@?sputc@?$basic_streambuf@AsyncState$?flush@?$basic_ostream@InputSendV01@V12@$??6?$basic_ostream@?setstate@?$basic_ios@?uncaught_exceptions@std@@ConsoleFreeOsfx@?$basic_ostream@V01@@system
    • String ID: k/6Iy$ to enable macro.$Press $cls$x
    • API String ID: 295624492-179314222
    • Opcode ID: c48e571d6b2f5fd420d0086bb821fb095e3cebfa92dff5ed44bd96d240b60180
    • Instruction ID: c95f3c6fe7a01093a218905d596fdb2ceb487d86992c91de56a7a79e81672aca
    • Opcode Fuzzy Hash: c48e571d6b2f5fd420d0086bb821fb095e3cebfa92dff5ed44bd96d240b60180
    • Instruction Fuzzy Hash: 99516D3EE18A5284FB009FA0E9402BC27B5BF66796F400535E99DB7AA5DF3CA506C700

    Control-flow Graph

    APIs
    • ??0_Lockit@std@@QEAA@H@Z.MSVCP140(?,?,?,?,?,?,00007FFE0EC65E50,00007FF6CEBF21A5), ref: 00007FF6CEBF1B9D
    • ??Bid@locale@std@@QEAA_KXZ.MSVCP140(?,?,?,?,?,?,00007FFE0EC65E50,00007FF6CEBF21A5), ref: 00007FF6CEBF1BB7
    • ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140(?,?,?,?,?,?,00007FFE0EC65E50,00007FF6CEBF21A5), ref: 00007FF6CEBF1BE9
    • ?_Getcat@?$ctype@D@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z.MSVCP140(?,?,?,?,?,?,00007FFE0EC65E50,00007FF6CEBF21A5), ref: 00007FF6CEBF1C14
    • std::_Facet_Register.LIBCPMT ref: 00007FF6CEBF1C2D
    • ??1_Lockit@std@@QEAA@XZ.MSVCP140(?,?,?,?,?,?,00007FFE0EC65E50,00007FF6CEBF21A5), ref: 00007FF6CEBF1C4C
    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6CEBF1C77
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3168117960.00007FF6CEBF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEBF0000, based on PE: true
    • Associated: 00000000.00000002.3168104147.00007FF6CEBF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168133185.00007FF6CEBF4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168147731.00007FF6CEBF7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168161313.00007FF6CEBF8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6cebf0000_SecuriteInfo.jbxd
    Similarity
    • API ID: Lockit@std@@$??0_??1_Bid@locale@std@@Concurrency::cancel_current_taskD@std@@Facet_Getcat@?$ctype@Getgloballocale@locale@std@@Locimp@12@RegisterV42@@Vfacet@locale@2@std::_
    • String ID: k/6Iy
    • API String ID: 3790006010-2835000745
    • Opcode ID: b77e1dc1e71a74cda87dfe5983cb2545867ddcf7109f9fb0d59876be80730e10
    • Instruction ID: 24dd9587c61b765fcacdcbb445e9dc629a1eaba4e6d27d3b6cc59ff48f3bfef6
    • Opcode Fuzzy Hash: b77e1dc1e71a74cda87dfe5983cb2545867ddcf7109f9fb0d59876be80730e10
    • Instruction Fuzzy Hash: 33318F3EA08B4181EA148F11E540179B770FBAAB95F080A31EBDEA77A9DF3CE550C700

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 313 7ff6cebf1e50-7ff6cebf1e8a 314 7ff6cebf1e93-7ff6cebf1ea5 ?good@ios_base@std@@QEBA_NXZ 313->314 315 7ff6cebf1e8c-7ff6cebf1e92 313->315 316 7ff6cebf1ed7-7ff6cebf1edd 314->316 317 7ff6cebf1ea7-7ff6cebf1eb6 314->317 315->314 321 7ff6cebf1fb2-7ff6cebf1fe0 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z ?uncaught_exceptions@std@@YAHXZ 316->321 322 7ff6cebf1ee3-7ff6cebf1f09 316->322 319 7ff6cebf1ed5 317->319 320 7ff6cebf1eb8-7ff6cebf1ebb 317->320 319->316 320->319 323 7ff6cebf1ebd-7ff6cebf1ed3 ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ ?good@ios_base@std@@QEBA_NXZ 320->323 326 7ff6cebf1fe2-7ff6cebf1feb ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ 321->326 327 7ff6cebf1fec-7ff6cebf1ffb 321->327 324 7ff6cebf1f0b 322->324 325 7ff6cebf1f49-7ff6cebf1f64 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 322->325 323->316 328 7ff6cebf1f10-7ff6cebf1f15 324->328 329 7ff6cebf1f67-7ff6cebf1f6b 325->329 326->327 330 7ff6cebf2004-7ff6cebf2018 327->330 331 7ff6cebf1ffd-7ff6cebf2003 327->331 332 7ff6cebf1f70-7ff6cebf1f75 328->332 333 7ff6cebf1f17-7ff6cebf1f1a 328->333 329->332 331->330 334 7ff6cebf1fa2 332->334 335 7ff6cebf1f77-7ff6cebf1f7a 332->335 337 7ff6cebf1f1c-7ff6cebf1f44 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 333->337 338 7ff6cebf1f46 333->338 334->321 335->334 339 7ff6cebf1f7c-7ff6cebf1fa0 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 335->339 337->328 338->325 339->329
    APIs
    • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,?,?,?,00007FF6CEBF13C9), ref: 00007FF6CEBF1E9D
    • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,?,?,?,00007FF6CEBF13C9), ref: 00007FF6CEBF1EBD
    • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,?,?,?,00007FF6CEBF13C9), ref: 00007FF6CEBF1ECD
    • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,?,?,?,00007FF6CEBF13C9), ref: 00007FF6CEBF1F2D
    • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,?,?,?,00007FF6CEBF13C9), ref: 00007FF6CEBF1F56
    • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,?,?,?,00007FF6CEBF13C9), ref: 00007FF6CEBF1F8D
    • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,00007FF6CEBF13C9), ref: 00007FF6CEBF1FD1
    • ?uncaught_exceptions@std@@YAHXZ.MSVCP140(?,?,?,?,?,00007FF6CEBF13C9), ref: 00007FF6CEBF1FD8
    • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,00007FF6CEBF13C9), ref: 00007FF6CEBF1FE5
    Memory Dump Source
    • Source File: 00000000.00000002.3168117960.00007FF6CEBF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEBF0000, based on PE: true
    • Associated: 00000000.00000002.3168104147.00007FF6CEBF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168133185.00007FF6CEBF4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168147731.00007FF6CEBF7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168161313.00007FF6CEBF8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6cebf0000_SecuriteInfo.jbxd
    Similarity
    • API ID: D@std@@@std@@U?$char_traits@$?sputc@?$basic_streambuf@$?good@ios_base@std@@$?flush@?$basic_ostream@?setstate@?$basic_ios@?uncaught_exceptions@std@@Osfx@?$basic_ostream@V12@
    • String ID:
    • API String ID: 3107587312-0
    • Opcode ID: 3475ae3367ac5b3555870406d87b0f665e02c179f34185b93d658a3bce04b5a7
    • Instruction ID: 37955b723b7ab882f9a828c35e3a8006ccafb2440f4fd0af38b5511a1c691b30
    • Opcode Fuzzy Hash: 3475ae3367ac5b3555870406d87b0f665e02c179f34185b93d658a3bce04b5a7
    • Instruction Fuzzy Hash: 9451633B609A8182DB108F1AD6D0238BBB0FF96B96B158531EE9ED3761CF3CD4568700

    Control-flow Graph

    APIs
    • _Query_perf_frequency.MSVCP140(?,?,?,?,?,?,?,?,00000000,00007FF6CEBF14C4), ref: 00007FF6CEBF2585
    • _Query_perf_counter.MSVCP140(?,?,?,?,?,?,?,?,00000000,00007FF6CEBF14C4), ref: 00007FF6CEBF258E
    • _Xtime_get_ticks.MSVCP140(?,?,?,?,?,?,?,?,00000000,00007FF6CEBF14C4), ref: 00007FF6CEBF2624
    • _Thrd_sleep.MSVCP140(?,?,?,?,?,?,?,?,00000000,00007FF6CEBF14C4), ref: 00007FF6CEBF267B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3168117960.00007FF6CEBF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEBF0000, based on PE: true
    • Associated: 00000000.00000002.3168104147.00007FF6CEBF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168133185.00007FF6CEBF4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168147731.00007FF6CEBF7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168161313.00007FF6CEBF8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6cebf0000_SecuriteInfo.jbxd
    Similarity
    • API ID: Query_perf_counterQuery_perf_frequencyThrd_sleepXtime_get_ticks
    • String ID: k/6Iy
    • API String ID: 3083224308-2835000745
    • Opcode ID: 37f0d3b8beed179970ca1e0656e8ab12b1078a7de3e8eba1a51bd6fc24820740
    • Instruction ID: f84966a6bc49afed59e2baf6decc7ab870a55e7902a0fc3cb73e4ada9b98bf81
    • Opcode Fuzzy Hash: 37f0d3b8beed179970ca1e0656e8ab12b1078a7de3e8eba1a51bd6fc24820740
    • Instruction Fuzzy Hash: 6A314C29B08B8685DD148F69B9151B5E3B5BF99BC1F495133EACF6B750EE3CE1028700

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3168117960.00007FF6CEBF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEBF0000, based on PE: true
    • Associated: 00000000.00000002.3168104147.00007FF6CEBF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168133185.00007FF6CEBF4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168147731.00007FF6CEBF7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3168161313.00007FF6CEBF8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6cebf0000_SecuriteInfo.jbxd
    Similarity
    • API ID: FeaturePresentProcessor__raise_securityfailurecapture_previous_context
    • String ID: k/6Iy
    • API String ID: 838830666-2835000745
    • Opcode ID: ebb65bae164a0ba8c0dbfa75d20d409f0005065d9c7faebb9dc607d17e132868
    • Instruction ID: e0a40da818dfb9cc51ce6b414ce82a0e007da2b7bf869d36d4d182dfa2dddcf3
    • Opcode Fuzzy Hash: ebb65bae164a0ba8c0dbfa75d20d409f0005065d9c7faebb9dc607d17e132868
    • Instruction Fuzzy Hash: 5721C73CA28B1281FA408F54FA5137466B4FBA6746F9001B6F9CDE27A1DF7CE5168704