Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
XSLHv0kxy7.exe

Overview

General Information

Sample name:XSLHv0kxy7.exe
renamed because original name is a hash value
Original sample name:310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe
Analysis ID:1557205
MD5:a8bf7d1f42ce4fe13c76e01befe367fa
SHA1:add32173cf45061d651b75f8b7ab33f86fdfbee7
SHA256:310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8
Tags:exeuser-Chainskilabs
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Machine Learning detection for dropped file
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • XSLHv0kxy7.exe (PID: 7468 cmdline: "C:\Users\user\Desktop\XSLHv0kxy7.exe" MD5: A8BF7D1F42CE4FE13C76E01BEFE367FA)
    • P00LCUE.exe (PID: 7552 cmdline: "C:\Users\user\AppData\Local\Temp\P00LCUE.exe" MD5: 82389ACF1B04E8442FDAFA7C49C29A97)
      • conhost.exe (PID: 7560 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 7624 cmdline: C:\Windows\system32\cmd.exe /c cls MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • cmd.exe (PID: 7652 cmdline: C:\Windows\system32\cmd.exe /c cls MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • BLACKSUPER X.exe (PID: 7576 cmdline: "C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exe" MD5: 2D58B179EC133F1016A2496A96C5DA20)
      • WerFault.exe (PID: 7892 cmdline: C:\Windows\system32\WerFault.exe -u -p 7576 -s 1684 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
{"C2 url": ["185.84.161.66"], "Port": 5000, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeJoeSecurity_XWormYara detected XWormJoe Security
    C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0xcba4:$s6: VirtualBox
      • 0xcb02:$s8: Win32_ComputerSystem
      • 0xeff0:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0xf08d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0xf1a2:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0xe23c:$cnc4: POST / HTTP/1.1
      SourceRuleDescriptionAuthorStrings
      00000003.00000000.1713951503.0000000000952000.00000002.00000001.01000000.00000007.sdmpJoeSecurity_XWormYara detected XWormJoe Security
        00000003.00000000.1713951503.0000000000952000.00000002.00000001.01000000.00000007.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
        • 0xc9a4:$s6: VirtualBox
        • 0xc902:$s8: Win32_ComputerSystem
        • 0xedf0:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
        • 0xee8d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
        • 0xefa2:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
        • 0xe03c:$cnc4: POST / HTTP/1.1
        00000003.00000002.1998540533.0000000002C11000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
          00000000.00000002.1715918741.0000000002F71000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
            00000000.00000002.1715918741.0000000002F71000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0x48a94:$s6: VirtualBox
            • 0x5ad14:$s6: VirtualBox
            • 0x489f2:$s8: Win32_ComputerSystem
            • 0x5ac72:$s8: Win32_ComputerSystem
            • 0x4aee0:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x5d160:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x4af7d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x5d1fd:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x4b092:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x5d312:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x4a12c:$cnc4: POST / HTTP/1.1
            • 0x5c3ac:$cnc4: POST / HTTP/1.1
            Click to see the 2 entries
            SourceRuleDescriptionAuthorStrings
            3.0.BLACKSUPER X.exe.950000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
              3.0.BLACKSUPER X.exe.950000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                3.0.BLACKSUPER X.exe.950000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                • 0xcba4:$s6: VirtualBox
                • 0xcb02:$s8: Win32_ComputerSystem
                • 0xeff0:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                • 0xf08d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                • 0xf1a2:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                • 0xe23c:$cnc4: POST / HTTP/1.1
                0.2.XSLHv0kxy7.exe.2fbf170.1.unpackJoeSecurity_XWormYara detected XWormJoe Security
                  0.2.XSLHv0kxy7.exe.2fbf170.1.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                  • 0xada4:$s6: VirtualBox
                  • 0xad02:$s8: Win32_ComputerSystem
                  • 0xd1f0:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                  • 0xd28d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                  • 0xd3a2:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                  • 0xc43c:$cnc4: POST / HTTP/1.1
                  Click to see the 5 entries
                  No Sigma rule has matched
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: XSLHv0kxy7.exeAvira: detected
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeAvira: detection malicious, Label: TR/Spy.Gen
                  Source: 00000000.00000002.1715918741.0000000002F71000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["185.84.161.66"], "Port": 5000, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeReversingLabs: Detection: 91%
                  Source: XSLHv0kxy7.exeReversingLabs: Detection: 68%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeJoe Sandbox ML: detected
                  Source: XSLHv0kxy7.exeJoe Sandbox ML: detected
                  Source: 3.0.BLACKSUPER X.exe.950000.0.unpackString decryptor: 185.84.161.66
                  Source: 3.0.BLACKSUPER X.exe.950000.0.unpackString decryptor: 5000
                  Source: 3.0.BLACKSUPER X.exe.950000.0.unpackString decryptor: <123456789>
                  Source: 3.0.BLACKSUPER X.exe.950000.0.unpackString decryptor: <Xwormmm>
                  Source: 3.0.BLACKSUPER X.exe.950000.0.unpackString decryptor: XWorm V5.6
                  Source: 3.0.BLACKSUPER X.exe.950000.0.unpackString decryptor: USB.exe
                  Source: 3.0.BLACKSUPER X.exe.950000.0.unpackString decryptor: %AppData%
                  Source: 3.0.BLACKSUPER X.exe.950000.0.unpackString decryptor: XClient.exe
                  Source: XSLHv0kxy7.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: XSLHv0kxy7.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: D:\Source Code\AntiHead\AntiHead\x64\Release\aobtoaddrrw.pdb source: XSLHv0kxy7.exe, 00000000.00000002.1715918741.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, P00LCUE.exe, 00000001.00000000.1713302423.00007FF620378000.00000002.00000001.01000000.00000006.sdmp, P00LCUE.exe, 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmp, P00LCUE.exe.0.dr
                  Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: System.Xml.ni.pdb source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: mscorlib.pdb source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: System.ni.pdbRSDS source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: System.Management.pdb source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: mscorlib.ni.pdb source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: System.Management.ni.pdb source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: System.Core.pdb source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: System.Configuration.ni.pdb source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: System.Configuration.pdb source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: D:\Source Code\AntiHead\AntiHead\x64\Release\aobtoaddrrw.pdb'' source: XSLHv0kxy7.exe, 00000000.00000002.1715918741.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, P00LCUE.exe, 00000001.00000000.1713302423.00007FF620378000.00000002.00000001.01000000.00000006.sdmp, P00LCUE.exe, 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmp, P00LCUE.exe.0.dr
                  Source: Binary string: System.Xml.pdb source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: System.ni.pdb source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: System.pdb source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: System.Core.ni.pdbRSDS source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: System.Xml.ni.pdbRSDS# source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: System.Core.ni.pdb source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: Microsoft.VisualBasic.pdb source: WER5045.tmp.dmp.8.dr

                  Networking

                  barindex
                  Source: Malware configuration extractorURLs: 185.84.161.66
                  Source: Yara matchFile source: 3.0.BLACKSUPER X.exe.950000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.XSLHv0kxy7.exe.2fbf170.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exe, type: DROPPED
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                  Source: unknownDNS query: name: ip-api.com
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: ip-api.com
                  Source: BLACKSUPER X.exe, 00000003.00000002.1998540533.0000000002CD2000.00000004.00000800.00020000.00000000.sdmp, BLACKSUPER X.exe, 00000003.00000002.1998540533.0000000002CB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                  Source: XSLHv0kxy7.exe, 00000000.00000002.1715918741.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, BLACKSUPER X.exe, 00000003.00000000.1713951503.0000000000952000.00000002.00000001.01000000.00000007.sdmp, BLACKSUPER X.exe, 00000003.00000002.1998540533.0000000002C38000.00000004.00000800.00020000.00000000.sdmp, BLACKSUPER X.exe.0.drString found in binary or memory: http://ip-api.com/line/?fields=hosting
                  Source: BLACKSUPER X.exe, 00000003.00000002.1998540533.0000000002CB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: Amcache.hve.8.drString found in binary or memory: http://upx.sf.net
                  Source: P00LCUE.exe, P00LCUE.exe, 00000001.00000002.1836572125.00000203B8FEC000.00000004.00000020.00020000.00000000.sdmp, P00LCUE.exe, 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
                  Source: P00LCUE.exe, 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpString found in binary or memory: https://keyauth.win/api/1.2/k
                  Source: P00LCUE.exe, 00000001.00000002.1836572125.00000203B8FEC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/y
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeCode function: 1_2_00007FF620374160 GetAsyncKeyState,ShowWindow,Sleep,1_2_00007FF620374160

                  System Summary

                  barindex
                  Source: 3.0.BLACKSUPER X.exe.950000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: 0.2.XSLHv0kxy7.exe.2fbf170.1.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: 0.2.XSLHv0kxy7.exe.2fbf170.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: 0.2.XSLHv0kxy7.exe.2f90c68.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: 00000003.00000000.1713951503.0000000000952000.00000002.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: 00000000.00000002.1715918741.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeCode function: 1_2_00007FF620373550 CreateToolhelp32Snapshot,Process32FirstW,_wcsicmp,OpenProcess,Process32NextW,CloseHandle,TerminateProcess,CloseHandle,memset,??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ,??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z,??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ,?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ,?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z,?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,system,MessageBoxW,ShellExecuteW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,ExitWindowsEx,CloseHandle,??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,1_2_00007FF620373550
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeCode function: 0_2_00007FFD9B780A210_2_00007FFD9B780A21
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeCode function: 1_2_00007FF620373D501_2_00007FF620373D50
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeCode function: 1_2_00007FF6203741C01_2_00007FF6203741C0
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeCode function: 1_2_00007FF620373A401_2_00007FF620373A40
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeCode function: 1_2_00007FF6203713401_2_00007FF620371340
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeCode function: 1_2_00007FF6203735501_2_00007FF620373550
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeCode function: 3_2_00007FFD9B7917193_2_00007FFD9B791719
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeCode function: 3_2_00007FFD9B796E723_2_00007FFD9B796E72
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeCode function: 3_2_00007FFD9B7960C63_2_00007FFD9B7960C6
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeCode function: 3_2_00007FFD9B7910383_2_00007FFD9B791038
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeCode function: 3_2_00007FFD9B7920F13_2_00007FFD9B7920F1
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7576 -s 1684
                  Source: XSLHv0kxy7.exe, 00000000.00000002.1716093621.000000001B92E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBLACKSUPER X.exe4 vs XSLHv0kxy7.exe
                  Source: XSLHv0kxy7.exe, 00000000.00000000.1686464082.0000000000C66000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameP00LCUE.exe4 vs XSLHv0kxy7.exe
                  Source: XSLHv0kxy7.exe, 00000000.00000002.1715918741.0000000002F71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBLACKSUPER X.exe4 vs XSLHv0kxy7.exe
                  Source: XSLHv0kxy7.exeBinary or memory string: OriginalFilenameP00LCUE.exe4 vs XSLHv0kxy7.exe
                  Source: XSLHv0kxy7.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 3.0.BLACKSUPER X.exe.950000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: 0.2.XSLHv0kxy7.exe.2fbf170.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: 0.2.XSLHv0kxy7.exe.2fbf170.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: 0.2.XSLHv0kxy7.exe.2f90c68.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: 00000003.00000000.1713951503.0000000000952000.00000002.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: 00000000.00000002.1715918741.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: XSLHv0kxy7.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: BLACKSUPER X.exe.0.dr, tpDAhG0zUl.csCryptographic APIs: 'TransformFinalBlock'
                  Source: BLACKSUPER X.exe.0.dr, tpDAhG0zUl.csCryptographic APIs: 'TransformFinalBlock'
                  Source: BLACKSUPER X.exe.0.dr, HZi2QofiYG.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.XSLHv0kxy7.exe.2fbf170.1.raw.unpack, tpDAhG0zUl.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.XSLHv0kxy7.exe.2fbf170.1.raw.unpack, tpDAhG0zUl.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.XSLHv0kxy7.exe.2fbf170.1.raw.unpack, HZi2QofiYG.csCryptographic APIs: 'TransformFinalBlock'
                  Source: BLACKSUPER X.exe.0.dr, ErDSEmjKOU.csBase64 encoded string: 'WE1AmsCB2TWvNaF1KPhUwSHbKi3Z9SmiOYvXoEA26vDq3zuas768HnJdTGMt'
                  Source: BLACKSUPER X.exe.0.dr, GUgccjJtjJ.csBase64 encoded string: 'MgmiczaY3BkFwWAsYXke543AHRV8FT9fYUnqfFqPYtuYYQiCCMGys5HYnAKP', 'hFc50vYm8887299Fdxp2hn44dmsVG28LfBPiTEShEjVl407eVpQPe5xFZk8t', 'uMzoEzFe7CEn7byPxHI3nFqEqtfTe776giARKpwHhMJ2IfWgnjvVMAbW3lbU', 'qZAG5hC16c2eNFepVxabxEdUj57hVumr3O7W0i0PmVs4SdQMmjNfoeMS7XF4', 'xCIRlcMxX1lgBCvsBuv0ZmhzJfytmnlsPaD3pFfmXHfptnJPO7IX3mQjb52i', 'g0PZNoSneTGDhbk8J934ioFZ2OTBUUHfpqaDIopJL7n4U6vhSchRTNZkkbBY', 'KtDkKK7th3WX1bE8rLGIKIm216PToiUZKjFnc7OIvuwqBkldyCObPG4TatCk', 'o0PZpqp6GUzOwgFN5fRvFZxt8nUkjlVpwvKTY3rsWPMNVo4jeZgx2KWrtXnS', 'q3J9g8TKg86eB2Uoqj4FJAx9723VsXanLeZkwO6T1Lbrw46agDT0hrNmqaFy'
                  Source: BLACKSUPER X.exe.0.dr, PY7JtnPMei.csBase64 encoded string: 'HBNoFrOxkbuAdBpXCEZtxhHUabWlzT57T0CUHQEXdS6mSUmAw1wWYuWDWsX6'
                  Source: BLACKSUPER X.exe.0.dr, n3KIdyQiO9.csBase64 encoded string: 'rgSOwPY8xVfDT9ZrBCnqTPkJ7GsCHwhqivO1mpH9TuSZ39QxGYhp6PjrQC6f', 'If1K0jS9QK4WQf73BUZfHJrFSvOflBIS5OMSCfMGJvjnEBgDy24cV8OQEjrD', 'qpJl67ANVjsQssJODQpyQZOe8ykoNXyRMvmsbut3Xhy6LO3Yju8rUvwz9i11', 'hVSSuRpw4Vfi9ytiumdRo3v8RHZTMYa5YyLvqMziBWU6x2egUR87g12NTEra', 'XrYyqd6F6fK8GUVPBOqxIgHnDqZ6juGRR8dB8UaK8QJUVbrrV2gxtuhEYUCI', 'SHL7hejTQPRyD7AqB7zxDgMPIvBir7Rs16ziWChiHK6GD8aI13oinC00uK5p'
                  Source: 0.2.XSLHv0kxy7.exe.2fbf170.1.raw.unpack, ErDSEmjKOU.csBase64 encoded string: 'WE1AmsCB2TWvNaF1KPhUwSHbKi3Z9SmiOYvXoEA26vDq3zuas768HnJdTGMt'
                  Source: 0.2.XSLHv0kxy7.exe.2fbf170.1.raw.unpack, GUgccjJtjJ.csBase64 encoded string: 'MgmiczaY3BkFwWAsYXke543AHRV8FT9fYUnqfFqPYtuYYQiCCMGys5HYnAKP', 'hFc50vYm8887299Fdxp2hn44dmsVG28LfBPiTEShEjVl407eVpQPe5xFZk8t', 'uMzoEzFe7CEn7byPxHI3nFqEqtfTe776giARKpwHhMJ2IfWgnjvVMAbW3lbU', 'qZAG5hC16c2eNFepVxabxEdUj57hVumr3O7W0i0PmVs4SdQMmjNfoeMS7XF4', 'xCIRlcMxX1lgBCvsBuv0ZmhzJfytmnlsPaD3pFfmXHfptnJPO7IX3mQjb52i', 'g0PZNoSneTGDhbk8J934ioFZ2OTBUUHfpqaDIopJL7n4U6vhSchRTNZkkbBY', 'KtDkKK7th3WX1bE8rLGIKIm216PToiUZKjFnc7OIvuwqBkldyCObPG4TatCk', 'o0PZpqp6GUzOwgFN5fRvFZxt8nUkjlVpwvKTY3rsWPMNVo4jeZgx2KWrtXnS', 'q3J9g8TKg86eB2Uoqj4FJAx9723VsXanLeZkwO6T1Lbrw46agDT0hrNmqaFy'
                  Source: 0.2.XSLHv0kxy7.exe.2fbf170.1.raw.unpack, PY7JtnPMei.csBase64 encoded string: 'HBNoFrOxkbuAdBpXCEZtxhHUabWlzT57T0CUHQEXdS6mSUmAw1wWYuWDWsX6'
                  Source: 0.2.XSLHv0kxy7.exe.2fbf170.1.raw.unpack, n3KIdyQiO9.csBase64 encoded string: 'rgSOwPY8xVfDT9ZrBCnqTPkJ7GsCHwhqivO1mpH9TuSZ39QxGYhp6PjrQC6f', 'If1K0jS9QK4WQf73BUZfHJrFSvOflBIS5OMSCfMGJvjnEBgDy24cV8OQEjrD', 'qpJl67ANVjsQssJODQpyQZOe8ykoNXyRMvmsbut3Xhy6LO3Yju8rUvwz9i11', 'hVSSuRpw4Vfi9ytiumdRo3v8RHZTMYa5YyLvqMziBWU6x2egUR87g12NTEra', 'XrYyqd6F6fK8GUVPBOqxIgHnDqZ6juGRR8dB8UaK8QJUVbrrV2gxtuhEYUCI', 'SHL7hejTQPRyD7AqB7zxDgMPIvBir7Rs16ziWChiHK6GD8aI13oinC00uK5p'
                  Source: BLACKSUPER X.exe.0.dr, n3KIdyQiO9.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                  Source: BLACKSUPER X.exe.0.dr, n3KIdyQiO9.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.XSLHv0kxy7.exe.2fbf170.1.raw.unpack, n3KIdyQiO9.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                  Source: 0.2.XSLHv0kxy7.exe.2fbf170.1.raw.unpack, n3KIdyQiO9.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: classification engineClassification label: mal100.troj.evad.winEXE@11/9@1/1
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeCode function: 1_2_00007FF620373550 CreateToolhelp32Snapshot,Process32FirstW,_wcsicmp,OpenProcess,Process32NextW,CloseHandle,TerminateProcess,CloseHandle,memset,??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ,??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z,??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ,?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ,?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z,?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,system,MessageBoxW,ShellExecuteW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,ExitWindowsEx,CloseHandle,??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,1_2_00007FF620373550
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeCode function: 1_2_00007FF6203725B0 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,_invalid_parameter_noinfo_noreturn,CloseHandle,1_2_00007FF6203725B0
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\XSLHv0kxy7.exe.logJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeMutant created: NULL
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeMutant created: \Sessions\1\BaseNamedObjects\kTN3ZgltU7MG4IpH
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7560:120:WilError_03
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeMutant created: \Sessions\1\BaseNamedObjects\JUtjwRb1a5YSYhsFv
                  Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7576
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeFile created: C:\Users\user\AppData\Local\Temp\P00LCUE.exeJump to behavior
                  Source: XSLHv0kxy7.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: XSLHv0kxy7.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: XSLHv0kxy7.exeReversingLabs: Detection: 68%
                  Source: unknownProcess created: C:\Users\user\Desktop\XSLHv0kxy7.exe "C:\Users\user\Desktop\XSLHv0kxy7.exe"
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeProcess created: C:\Users\user\AppData\Local\Temp\P00LCUE.exe "C:\Users\user\AppData\Local\Temp\P00LCUE.exe"
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeProcess created: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exe "C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exe"
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c cls
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c cls
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7576 -s 1684
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeProcess created: C:\Users\user\AppData\Local\Temp\P00LCUE.exe "C:\Users\user\AppData\Local\Temp\P00LCUE.exe" Jump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeProcess created: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exe "C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeSection loaded: msvcp140.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeSection loaded: vcruntime140_1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeSection loaded: vcruntime140_1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                  Source: XSLHv0kxy7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: XSLHv0kxy7.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: D:\Source Code\AntiHead\AntiHead\x64\Release\aobtoaddrrw.pdb source: XSLHv0kxy7.exe, 00000000.00000002.1715918741.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, P00LCUE.exe, 00000001.00000000.1713302423.00007FF620378000.00000002.00000001.01000000.00000006.sdmp, P00LCUE.exe, 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmp, P00LCUE.exe.0.dr
                  Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: System.Xml.ni.pdb source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: mscorlib.pdb source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: System.ni.pdbRSDS source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: System.Management.pdb source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: mscorlib.ni.pdb source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: System.Management.ni.pdb source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: System.Core.pdb source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: System.Configuration.ni.pdb source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: System.Configuration.pdb source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: D:\Source Code\AntiHead\AntiHead\x64\Release\aobtoaddrrw.pdb'' source: XSLHv0kxy7.exe, 00000000.00000002.1715918741.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, P00LCUE.exe, 00000001.00000000.1713302423.00007FF620378000.00000002.00000001.01000000.00000006.sdmp, P00LCUE.exe, 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmp, P00LCUE.exe.0.dr
                  Source: Binary string: System.Xml.pdb source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: System.ni.pdb source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: System.pdb source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: System.Core.ni.pdbRSDS source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: System.Xml.ni.pdbRSDS# source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: System.Core.ni.pdb source: WER5045.tmp.dmp.8.dr
                  Source: Binary string: Microsoft.VisualBasic.pdb source: WER5045.tmp.dmp.8.dr

                  Data Obfuscation

                  barindex
                  Source: BLACKSUPER X.exe.0.dr, GUgccjJtjJ.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{a0XWIyjkU8Lc5tDyCbTtWGsCj5NYirpaA1BuwDjUVy6LHfTQLZKpTsfLnJURN3t7aIqt.kMDuGc02ge8cpng7ZsmLHbLlNFJehosu6PueqNeFTpFroP3Ez6Qf31H7kcmf7i17tVoZ,a0XWIyjkU8Lc5tDyCbTtWGsCj5NYirpaA1BuwDjUVy6LHfTQLZKpTsfLnJURN3t7aIqt._5w5tbhXWOeI8QMmQjxaviweEbjZQI8FEX4fgA01PL4ALkA4Qlmt3ulbW66O3Cuog4ne0,a0XWIyjkU8Lc5tDyCbTtWGsCj5NYirpaA1BuwDjUVy6LHfTQLZKpTsfLnJURN3t7aIqt.T7pUBdp507p6EP0P1Z0pSQExwbTJKlftMvMh1cq2bI5uEY7eZLz3ShCTblaY8AVzlCjc,a0XWIyjkU8Lc5tDyCbTtWGsCj5NYirpaA1BuwDjUVy6LHfTQLZKpTsfLnJURN3t7aIqt.VsewsTRWPJw52kvXd5Rc6Pefmw9KaWkL5tneRgIvzGqvJNrXhT0lTEnfAidFyJrPZZPE,tpDAhG0zUl.gcBtaiO2Ox()}}, (string[])null, (Type[])null, (bool[])null, true)
                  Source: BLACKSUPER X.exe.0.dr, GUgccjJtjJ.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Rp5lo6l6F7[2],tpDAhG0zUl.VpSQw46ypp(Convert.FromBase64String(Rp5lo6l6F7[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                  Source: 0.2.XSLHv0kxy7.exe.2fbf170.1.raw.unpack, GUgccjJtjJ.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{a0XWIyjkU8Lc5tDyCbTtWGsCj5NYirpaA1BuwDjUVy6LHfTQLZKpTsfLnJURN3t7aIqt.kMDuGc02ge8cpng7ZsmLHbLlNFJehosu6PueqNeFTpFroP3Ez6Qf31H7kcmf7i17tVoZ,a0XWIyjkU8Lc5tDyCbTtWGsCj5NYirpaA1BuwDjUVy6LHfTQLZKpTsfLnJURN3t7aIqt._5w5tbhXWOeI8QMmQjxaviweEbjZQI8FEX4fgA01PL4ALkA4Qlmt3ulbW66O3Cuog4ne0,a0XWIyjkU8Lc5tDyCbTtWGsCj5NYirpaA1BuwDjUVy6LHfTQLZKpTsfLnJURN3t7aIqt.T7pUBdp507p6EP0P1Z0pSQExwbTJKlftMvMh1cq2bI5uEY7eZLz3ShCTblaY8AVzlCjc,a0XWIyjkU8Lc5tDyCbTtWGsCj5NYirpaA1BuwDjUVy6LHfTQLZKpTsfLnJURN3t7aIqt.VsewsTRWPJw52kvXd5Rc6Pefmw9KaWkL5tneRgIvzGqvJNrXhT0lTEnfAidFyJrPZZPE,tpDAhG0zUl.gcBtaiO2Ox()}}, (string[])null, (Type[])null, (bool[])null, true)
                  Source: 0.2.XSLHv0kxy7.exe.2fbf170.1.raw.unpack, GUgccjJtjJ.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Rp5lo6l6F7[2],tpDAhG0zUl.VpSQw46ypp(Convert.FromBase64String(Rp5lo6l6F7[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                  Source: BLACKSUPER X.exe.0.dr, GUgccjJtjJ.cs.Net Code: e59VesoClT System.AppDomain.Load(byte[])
                  Source: BLACKSUPER X.exe.0.dr, GUgccjJtjJ.cs.Net Code: PvWbVsbuTk System.AppDomain.Load(byte[])
                  Source: BLACKSUPER X.exe.0.dr, GUgccjJtjJ.cs.Net Code: PvWbVsbuTk
                  Source: 0.2.XSLHv0kxy7.exe.2fbf170.1.raw.unpack, GUgccjJtjJ.cs.Net Code: e59VesoClT System.AppDomain.Load(byte[])
                  Source: 0.2.XSLHv0kxy7.exe.2fbf170.1.raw.unpack, GUgccjJtjJ.cs.Net Code: PvWbVsbuTk System.AppDomain.Load(byte[])
                  Source: 0.2.XSLHv0kxy7.exe.2fbf170.1.raw.unpack, GUgccjJtjJ.cs.Net Code: PvWbVsbuTk
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeCode function: 0_2_00007FFD9B7800BD pushad ; iretd 0_2_00007FFD9B7800C1
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeCode function: 3_2_00007FFD9B7900BD pushad ; iretd 3_2_00007FFD9B7900C1
                  Source: XSLHv0kxy7.exeStatic PE information: section name: .text entropy: 7.90058172087949
                  Source: BLACKSUPER X.exe.0.dr, 6y6fTLfdmw.csHigh entropy of concatenated method names: 'r1pE7cxAi3', 'leUKedZ8We', 'f1y2ifNPgq', 'bWirCDm5tCoJAueejbZUoAml9i3IX6hhOHcRw8Ni3dmKHQ2uplSY9PX1oxTTtSItxtqLvnNfCUPpp', 'Ufm2NbBWFFUJluMp1pQ7', '_1IfTyBLLBGCPGzQjdLJ7', 'Bow0iJ0WkmQmLKCzmfrf', 'viXhBtxHrSIWsh6BsCWH', 'N4Hg7Akgr7RQbYxVdIvS', 'oFCWSJmO6zWON5T7JNvw'
                  Source: BLACKSUPER X.exe.0.dr, HGK41wUbpnbAJKkqXT5m1RUGLtrCjERgv4S3U45gom3hlGxjzKRGYtj72FjsSjZ4BP7SDymwVtxo2pnQrh.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'ZwN4yuWNRde3fqG8wbmCi241tDr', 'xhgKOfLcxuNWikE7Z4i8y6Mud81', 'AID4WqfPr1DUu8TJuHvjLWkm4lM', 'NUm2yOsuOyb9yhggxzlRONTzVn3'
                  Source: BLACKSUPER X.exe.0.dr, ErDSEmjKOU.csHigh entropy of concatenated method names: '_85jw7v8ahg', 'pqbOR3hCLygYVdNL7vbNnmUUT8V1ULI0oOAcaJsFduBHBu6zYETViqVIMe5h', '_35xXSt1vBIliGX7KrzW4HoRwGXasNzmWPjO0fYQoVySp84SvcVgR5NBChApE', 'bwR1ZQ4yhHjNRGLnQgxESC07ECdQpu4PqRNJK0AYp6QOqnOfe4jefE11pTGq', 'Wh247KdpiQv4UUVEPozh7kULebWztqasCKxBJvSzdNV4kxyxfYXLUyGTOMz1'
                  Source: BLACKSUPER X.exe.0.dr, GUgccjJtjJ.csHigh entropy of concatenated method names: '_5BuAtO1BOY', 'e59VesoClT', 'Mrb22HR30q', 'ctbCX7z6KO', 'SoGW4iJen1', 'huexvCvWye', 'wjUywfnS3E', 'UIrPwhbo6o', 'mZ4RUgPZM6', 'dT2Fzruxk2'
                  Source: BLACKSUPER X.exe.0.dr, tpDAhG0zUl.csHigh entropy of concatenated method names: 'EPw49eRJh5', 'se8fVe7jL8', 'XBaVO5EGTW', 'R5BPXXXfsU', 'UajYYsAZEA', 'rJZGYY0taE', '_4MzPbwUjeC', '_3skLWU8FHH', 'ZWft8eomYs', 'Hq7h9DJ9wv'
                  Source: BLACKSUPER X.exe.0.dr, P2Vqq9xwoV.csHigh entropy of concatenated method names: 'ORvjTTLwKq', 'mTYkfW3UWB', 'gnlBzsfBeV', 'veqXNgWGfk', 'TkAgxOp7OKlAyqYvvs2v8CubsxYb6AMivnnZU4u6TUdjq', 'Dyj528U9STg0sVox3191SsGkv8KnqVvQBlQu0FCBycp2T', 'StMlnb7c4Z9xV3mTCQQZJRXkXUxr5MYVSzIC3pm4qmUNv', 'psD1EP5HV49xlYVAinlNxSuKMSHVjwkTVbQcoxCvUM0gG', 'Y3vZqIeQQQ0hBXYPvWQF7OLGnW51wTezDYH5xn2bFrYA9', 'jShWleb5BLHS2pu2fN2Wsxu7OObfm5jscXvUZilt7dMKh'
                  Source: BLACKSUPER X.exe.0.dr, dbUysTjE0ENnFMBRDntG94GeNuwRYMkducDkPzxsgNXNaovfgGmW810rO1JUq62gGg8g.csHigh entropy of concatenated method names: 'TIbCNkcYyxuH9eL0ReWeGjNJcsx1YCanlAadyCevWS0cFYBR1K3JB99P2PWaqGuYuSQP', 'zX0ekSmTMBfTkaj40b69wGiz5GEL9OBvkgeCXZ5JerZZGeq66pXcr5ZRhU2pyJasygOA', '_30YJyjl2hLsQcB63fpcumhMkh45NyIXa5EWMXB5IdS0PZKQjr6PId7zOTyBBt3oe2FDc', 'FLLwHzwPXN6GglZILDJyjnoXDvBjiH04eB5UVh0zhcLGHnZ0gy3cHW2NrrMNnUp8tzzD', '_68o6uFW7msbGoUvfIbGEJKd1thvuaQVejXQVJOLtC3wVAzDwzF4zkaNUNykGJyd8kUUr', '_9H5NEYXIU8hWslae1Mgr5S3nhYTjkaYRdS1uchi46XZ64x8foVJHf4cllmXTv6uHIgVC', 'ElKXm4mN3IChSqVCnzICSdFgQG1NW12uAo6fYv44ecPOtj2S1X2ojuEb8g8Ma6Dk5Wvq', 'y6SLzeOwug7tygveKfaUgTuIoXEIchFRPm1TQ9uszdnThbjCBg1IiJkDjppNcmEX4CSc', 'htEXgwEFBnsVY3em3b67LblZ3eWG6FecG3ZJzBrndm9IKj27xEApNkk0liWf1UAuRi5U', '_5y5lJS2i0ny21jqL2roNHnCj8mL9f1NcYojpF4WCd5QCYT4DN0j6Oxzsi1oH1LlOXbQF'
                  Source: BLACKSUPER X.exe.0.dr, HZi2QofiYG.csHigh entropy of concatenated method names: 'T4SpxDr8NY', 'ToUOouwhj2Q2kIMkNjzebcjiLsDcNYxl7Js7wE3HnKUm9', 'qA4ugixNt7zMxcx61mjLzBpKv3Qj0hMp8pgOrlL6qsQBb', 't5y7kZYLRZvx2VQxUYFlDMVOOtZ6NmMz0irQBrzqS4eSr', '_1KDw1rQLHBRmlAh25BiKNYcVR2XsIg6iSsOBqmTUdSm05'
                  Source: BLACKSUPER X.exe.0.dr, PY7JtnPMei.csHigh entropy of concatenated method names: 'PIzi7fb2RQ', 'Y174dhc0Sy', 'tpymlfR0lq', 'v8a2lNM4Pk', '_88UlDrGuYM', 'yuQ8kIGqru', 'SyVUy8RwjX', 'FDpj49fNfe', '_6J8O3NCmM9', 'MifUmqNUvZ'
                  Source: BLACKSUPER X.exe.0.dr, n3KIdyQiO9.csHigh entropy of concatenated method names: '_9WHRSclXIP', 'eo7Gv6raPY', 'IGwpVYsrCP', 'MGWe0a8cvY', 'aKsxOtSHnl', 'p8PCcdpIXJ', 'UPkVeQIWtZ', 'DmGhX3DYyb', 'W4Qp0T1L6g', 'tAVZBIkjFZ'
                  Source: 0.2.XSLHv0kxy7.exe.2fbf170.1.raw.unpack, 6y6fTLfdmw.csHigh entropy of concatenated method names: 'r1pE7cxAi3', 'leUKedZ8We', 'f1y2ifNPgq', 'bWirCDm5tCoJAueejbZUoAml9i3IX6hhOHcRw8Ni3dmKHQ2uplSY9PX1oxTTtSItxtqLvnNfCUPpp', 'Ufm2NbBWFFUJluMp1pQ7', '_1IfTyBLLBGCPGzQjdLJ7', 'Bow0iJ0WkmQmLKCzmfrf', 'viXhBtxHrSIWsh6BsCWH', 'N4Hg7Akgr7RQbYxVdIvS', 'oFCWSJmO6zWON5T7JNvw'
                  Source: 0.2.XSLHv0kxy7.exe.2fbf170.1.raw.unpack, HGK41wUbpnbAJKkqXT5m1RUGLtrCjERgv4S3U45gom3hlGxjzKRGYtj72FjsSjZ4BP7SDymwVtxo2pnQrh.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'ZwN4yuWNRde3fqG8wbmCi241tDr', 'xhgKOfLcxuNWikE7Z4i8y6Mud81', 'AID4WqfPr1DUu8TJuHvjLWkm4lM', 'NUm2yOsuOyb9yhggxzlRONTzVn3'
                  Source: 0.2.XSLHv0kxy7.exe.2fbf170.1.raw.unpack, ErDSEmjKOU.csHigh entropy of concatenated method names: '_85jw7v8ahg', 'pqbOR3hCLygYVdNL7vbNnmUUT8V1ULI0oOAcaJsFduBHBu6zYETViqVIMe5h', '_35xXSt1vBIliGX7KrzW4HoRwGXasNzmWPjO0fYQoVySp84SvcVgR5NBChApE', 'bwR1ZQ4yhHjNRGLnQgxESC07ECdQpu4PqRNJK0AYp6QOqnOfe4jefE11pTGq', 'Wh247KdpiQv4UUVEPozh7kULebWztqasCKxBJvSzdNV4kxyxfYXLUyGTOMz1'
                  Source: 0.2.XSLHv0kxy7.exe.2fbf170.1.raw.unpack, GUgccjJtjJ.csHigh entropy of concatenated method names: '_5BuAtO1BOY', 'e59VesoClT', 'Mrb22HR30q', 'ctbCX7z6KO', 'SoGW4iJen1', 'huexvCvWye', 'wjUywfnS3E', 'UIrPwhbo6o', 'mZ4RUgPZM6', 'dT2Fzruxk2'
                  Source: 0.2.XSLHv0kxy7.exe.2fbf170.1.raw.unpack, tpDAhG0zUl.csHigh entropy of concatenated method names: 'EPw49eRJh5', 'se8fVe7jL8', 'XBaVO5EGTW', 'R5BPXXXfsU', 'UajYYsAZEA', 'rJZGYY0taE', '_4MzPbwUjeC', '_3skLWU8FHH', 'ZWft8eomYs', 'Hq7h9DJ9wv'
                  Source: 0.2.XSLHv0kxy7.exe.2fbf170.1.raw.unpack, P2Vqq9xwoV.csHigh entropy of concatenated method names: 'ORvjTTLwKq', 'mTYkfW3UWB', 'gnlBzsfBeV', 'veqXNgWGfk', 'TkAgxOp7OKlAyqYvvs2v8CubsxYb6AMivnnZU4u6TUdjq', 'Dyj528U9STg0sVox3191SsGkv8KnqVvQBlQu0FCBycp2T', 'StMlnb7c4Z9xV3mTCQQZJRXkXUxr5MYVSzIC3pm4qmUNv', 'psD1EP5HV49xlYVAinlNxSuKMSHVjwkTVbQcoxCvUM0gG', 'Y3vZqIeQQQ0hBXYPvWQF7OLGnW51wTezDYH5xn2bFrYA9', 'jShWleb5BLHS2pu2fN2Wsxu7OObfm5jscXvUZilt7dMKh'
                  Source: 0.2.XSLHv0kxy7.exe.2fbf170.1.raw.unpack, dbUysTjE0ENnFMBRDntG94GeNuwRYMkducDkPzxsgNXNaovfgGmW810rO1JUq62gGg8g.csHigh entropy of concatenated method names: 'TIbCNkcYyxuH9eL0ReWeGjNJcsx1YCanlAadyCevWS0cFYBR1K3JB99P2PWaqGuYuSQP', 'zX0ekSmTMBfTkaj40b69wGiz5GEL9OBvkgeCXZ5JerZZGeq66pXcr5ZRhU2pyJasygOA', '_30YJyjl2hLsQcB63fpcumhMkh45NyIXa5EWMXB5IdS0PZKQjr6PId7zOTyBBt3oe2FDc', 'FLLwHzwPXN6GglZILDJyjnoXDvBjiH04eB5UVh0zhcLGHnZ0gy3cHW2NrrMNnUp8tzzD', '_68o6uFW7msbGoUvfIbGEJKd1thvuaQVejXQVJOLtC3wVAzDwzF4zkaNUNykGJyd8kUUr', '_9H5NEYXIU8hWslae1Mgr5S3nhYTjkaYRdS1uchi46XZ64x8foVJHf4cllmXTv6uHIgVC', 'ElKXm4mN3IChSqVCnzICSdFgQG1NW12uAo6fYv44ecPOtj2S1X2ojuEb8g8Ma6Dk5Wvq', 'y6SLzeOwug7tygveKfaUgTuIoXEIchFRPm1TQ9uszdnThbjCBg1IiJkDjppNcmEX4CSc', 'htEXgwEFBnsVY3em3b67LblZ3eWG6FecG3ZJzBrndm9IKj27xEApNkk0liWf1UAuRi5U', '_5y5lJS2i0ny21jqL2roNHnCj8mL9f1NcYojpF4WCd5QCYT4DN0j6Oxzsi1oH1LlOXbQF'
                  Source: 0.2.XSLHv0kxy7.exe.2fbf170.1.raw.unpack, HZi2QofiYG.csHigh entropy of concatenated method names: 'T4SpxDr8NY', 'ToUOouwhj2Q2kIMkNjzebcjiLsDcNYxl7Js7wE3HnKUm9', 'qA4ugixNt7zMxcx61mjLzBpKv3Qj0hMp8pgOrlL6qsQBb', 't5y7kZYLRZvx2VQxUYFlDMVOOtZ6NmMz0irQBrzqS4eSr', '_1KDw1rQLHBRmlAh25BiKNYcVR2XsIg6iSsOBqmTUdSm05'
                  Source: 0.2.XSLHv0kxy7.exe.2fbf170.1.raw.unpack, PY7JtnPMei.csHigh entropy of concatenated method names: 'PIzi7fb2RQ', 'Y174dhc0Sy', 'tpymlfR0lq', 'v8a2lNM4Pk', '_88UlDrGuYM', 'yuQ8kIGqru', 'SyVUy8RwjX', 'FDpj49fNfe', '_6J8O3NCmM9', 'MifUmqNUvZ'
                  Source: 0.2.XSLHv0kxy7.exe.2fbf170.1.raw.unpack, n3KIdyQiO9.csHigh entropy of concatenated method names: '_9WHRSclXIP', 'eo7Gv6raPY', 'IGwpVYsrCP', 'MGWe0a8cvY', 'aKsxOtSHnl', 'p8PCcdpIXJ', 'UPkVeQIWtZ', 'DmGhX3DYyb', 'W4Qp0T1L6g', 'tAVZBIkjFZ'
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeFile created: C:\Users\user\AppData\Local\Temp\P00LCUE.exeJump to dropped file
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeFile created: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeJump to dropped file
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: BLACKSUPER X.exe, 00000003.00000002.1998540533.0000000002C11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: XSLHv0kxy7.exe, 00000000.00000002.1715918741.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, BLACKSUPER X.exe, 00000003.00000000.1713951503.0000000000952000.00000002.00000001.01000000.00000007.sdmp, BLACKSUPER X.exe.0.drBinary or memory string: SBIEDLL.DLL7V6VVHQ9EQASUJLXXJ932N5VFGVG7PMCLHKZALDQVDVPW86BGPH30YU97PJHUR5CD7LCYXXMMAOIBMMNAVOE7OAMSEHNBYKMXKEM1CLYAZXZHG4Q7YIBBPLBZGF68EMVUBNO3GTC8ZVV7OZEVCBMFDMVSTGKKJ2XVB2YHMKW78ZP4ZSIC2OHLEPL9XKUETGOFBOL73TSKLOBRGGUFBINRCIZEMYP2UHY72HKZ4IU9P090FBRZJDQICPFFPGH7ZLRBGUMG2VNUHYTUIWEYOKNPLTP7L3DEMEYE9CO99YM3DNQWYHKGTBX7TQOAY8JGBHXRCUN5EVCLCQFC4SE7F6OJ7K25SSWZRCPD3PGVEYK3KMI7AZVK5K2ZM0KYARFROZWZJ3VXIMNINFO
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeMemory allocated: 14A0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeMemory allocated: 1AF70000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeMemory allocated: 1090000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeMemory allocated: 1AC10000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exe TID: 7488Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeCode function: 1_2_00007FF620372340 GetSystemInfo,VirtualQueryEx,memset,ReadProcessMemory,_invalid_parameter_noinfo_noreturn,Concurrency::cancel_current_task,1_2_00007FF620372340
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: Amcache.hve.8.drBinary or memory string: VMware
                  Source: Amcache.hve.8.drBinary or memory string: VMware Virtual USB Mouse
                  Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin
                  Source: Amcache.hve.8.drBinary or memory string: VMware, Inc.
                  Source: Amcache.hve.8.drBinary or memory string: VMware20,1hbin@
                  Source: Amcache.hve.8.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                  Source: Amcache.hve.8.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: Amcache.hve.8.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                  Source: Amcache.hve.8.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: Amcache.hve.8.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                  Source: Amcache.hve.8.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                  Source: Amcache.hve.8.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: BLACKSUPER X.exe, 00000003.00000002.1999322026.000000001BAC8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: Amcache.hve.8.drBinary or memory string: vmci.sys
                  Source: Amcache.hve.8.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                  Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin`
                  Source: BLACKSUPER X.exe.0.drBinary or memory string: vmware
                  Source: Amcache.hve.8.drBinary or memory string: \driver\vmci,\driver\pci
                  Source: Amcache.hve.8.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: Amcache.hve.8.drBinary or memory string: VMware20,1
                  Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Generation Counter
                  Source: Amcache.hve.8.drBinary or memory string: NECVMWar VMware SATA CD00
                  Source: Amcache.hve.8.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                  Source: Amcache.hve.8.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                  Source: Amcache.hve.8.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                  Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                  Source: Amcache.hve.8.drBinary or memory string: VMware PCI VMCI Bus Device
                  Source: Amcache.hve.8.drBinary or memory string: VMware VMCI Bus Device
                  Source: Amcache.hve.8.drBinary or memory string: VMware Virtual RAM
                  Source: Amcache.hve.8.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                  Source: Amcache.hve.8.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeProcess information queried: ProcessInformationJump to behavior

                  Anti Debugging

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeCode function: 3_2_00007FFD9B797A81 CheckRemoteDebuggerPresent,3_2_00007FFD9B797A81
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeCode function: 1_2_00007FF62037740C IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF62037740C
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeCode function: 1_2_00007FF6203775B4 SetUnhandledExceptionFilter,1_2_00007FF6203775B4
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeCode function: 1_2_00007FF620376F68 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00007FF620376F68
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeCode function: 1_2_00007FF62037740C IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF62037740C
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeMemory allocated: page read and write | page guardJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeProcess created: C:\Users\user\AppData\Local\Temp\P00LCUE.exe "C:\Users\user\AppData\Local\Temp\P00LCUE.exe" Jump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeProcess created: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exe "C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeQueries volume information: C:\Users\user\Desktop\XSLHv0kxy7.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exeQueries volume information: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\P00LCUE.exeCode function: 1_2_00007FF620377628 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,1_2_00007FF620377628
                  Source: C:\Users\user\Desktop\XSLHv0kxy7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: Amcache.hve.8.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                  Source: Amcache.hve.8.drBinary or memory string: msmpeng.exe
                  Source: Amcache.hve.8.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                  Source: Amcache.hve.8.drBinary or memory string: MsMpEng.exe

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 3.0.BLACKSUPER X.exe.950000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.XSLHv0kxy7.exe.2fbf170.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.XSLHv0kxy7.exe.2fbf170.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.XSLHv0kxy7.exe.2f90c68.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000000.1713951503.0000000000952000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.1998540533.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1715918741.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: XSLHv0kxy7.exe PID: 7468, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: BLACKSUPER X.exe PID: 7576, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exe, type: DROPPED

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 3.0.BLACKSUPER X.exe.950000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.XSLHv0kxy7.exe.2fbf170.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.XSLHv0kxy7.exe.2fbf170.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.XSLHv0kxy7.exe.2f90c68.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000000.1713951503.0000000000952000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.1998540533.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1715918741.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: XSLHv0kxy7.exe PID: 7468, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: BLACKSUPER X.exe PID: 7576, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exe, type: DROPPED
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  Access Token Manipulation
                  1
                  Masquerading
                  11
                  Input Capture
                  1
                  System Time Discovery
                  Remote Services11
                  Input Capture
                  1
                  Encrypted Channel
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
                  Process Injection
                  1
                  Disable or Modify Tools
                  LSASS Memory441
                  Security Software Discovery
                  Remote Desktop Protocol11
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                  DLL Side-Loading
                  51
                  Virtualization/Sandbox Evasion
                  Security Account Manager51
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin SharesData from Network Shared Drive2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                  Access Token Manipulation
                  NTDS2
                  Process Discovery
                  Distributed Component Object ModelInput Capture12
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
                  Process Injection
                  LSA Secrets1
                  System Network Configuration Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  Deobfuscate/Decode Files or Information
                  Cached Domain Credentials1
                  File and Directory Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                  Obfuscated Files or Information
                  DCSync25
                  System Information Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job22
                  Software Packing
                  Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                  DLL Side-Loading
                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1557205 Sample: XSLHv0kxy7.exe Startdate: 17/11/2024 Architecture: WINDOWS Score: 100 32 ip-api.com 2->32 36 Found malware configuration 2->36 38 Malicious sample detected (through community Yara rule) 2->38 40 Antivirus detection for dropped file 2->40 42 14 other signatures 2->42 8 XSLHv0kxy7.exe 4 2->8         started        signatures3 process4 file5 26 C:\Users\user\AppData\Local\...\P00LCUE.exe, PE32+ 8->26 dropped 28 C:\Users\user\AppData\...\BLACKSUPER X.exe, PE32 8->28 dropped 30 C:\Users\user\AppData\...\XSLHv0kxy7.exe.log, CSV 8->30 dropped 44 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->44 12 BLACKSUPER X.exe 14 2 8->12         started        16 P00LCUE.exe 1 8->16         started        signatures6 process7 dnsIp8 34 ip-api.com 208.95.112.1, 49730, 80 TUT-ASUS United States 12->34 46 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 12->46 18 WerFault.exe 19 16 12->18         started        20 conhost.exe 16->20         started        22 cmd.exe 1 16->22         started        24 cmd.exe 1 16->24         started        signatures9 process10

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  XSLHv0kxy7.exe68%ReversingLabsByteCode-MSIL.Trojan.XWormRAT
                  XSLHv0kxy7.exe100%AviraTR/Dropper.Gen
                  XSLHv0kxy7.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exe100%AviraTR/Spy.Gen
                  C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exe92%ReversingLabsByteCode-MSIL.Spyware.AsyncRAT
                  C:\Users\user\AppData\Local\Temp\P00LCUE.exe11%ReversingLabs
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  185.84.161.660%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  ip-api.com
                  208.95.112.1
                  truefalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    185.84.161.66true
                    • Avira URL Cloud: safe
                    unknown
                    http://ip-api.com/line/?fields=hostingfalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://keyauth.win/api/1.2/kP00LCUE.exe, 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpfalse
                        high
                        http://upx.sf.netAmcache.hve.8.drfalse
                          high
                          https://keyauth.win/api/1.2/yP00LCUE.exe, 00000001.00000002.1836572125.00000203B8FEC000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameBLACKSUPER X.exe, 00000003.00000002.1998540533.0000000002CB6000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://keyauth.win/api/1.2/P00LCUE.exe, P00LCUE.exe, 00000001.00000002.1836572125.00000203B8FEC000.00000004.00000020.00020000.00000000.sdmp, P00LCUE.exe, 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpfalse
                                high
                                http://ip-api.comBLACKSUPER X.exe, 00000003.00000002.1998540533.0000000002CD2000.00000004.00000800.00020000.00000000.sdmp, BLACKSUPER X.exe, 00000003.00000002.1998540533.0000000002CB6000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  208.95.112.1
                                  ip-api.comUnited States
                                  53334TUT-ASUSfalse
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1557205
                                  Start date and time:2024-11-17 19:21:05 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 5m 19s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:13
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:XSLHv0kxy7.exe
                                  renamed because original name is a hash value
                                  Original Sample Name:310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8.exe
                                  Detection:MAL
                                  Classification:mal100.troj.evad.winEXE@11/9@1/1
                                  EGA Information:
                                  • Successful, ratio: 66.7%
                                  HCA Information:
                                  • Successful, ratio: 100%
                                  • Number of executed functions: 21
                                  • Number of non-executed functions: 15
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                  • Excluded IPs from analysis (whitelisted): 20.189.173.21
                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                  • Execution Graph export aborted for target XSLHv0kxy7.exe, PID 7468 because it is empty
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                  • Report size getting too big, too many NtSetInformationFile calls found.
                                  • VT rate limit hit for: XSLHv0kxy7.exe
                                  TimeTypeDescription
                                  13:22:28API Interceptor1x Sleep call for process: WerFault.exe modified
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  208.95.112.1oaUNY8P657.exeGet hashmaliciousXWormBrowse
                                  • ip-api.com/line/?fields=hosting
                                  IAdjMfB2A5.exeGet hashmaliciousXWormBrowse
                                  • ip-api.com/line/?fields=hosting
                                  dkKMw0OlZ9.exeGet hashmaliciousXWormBrowse
                                  • ip-api.com/line/?fields=hosting
                                  EternalPredictor.exeGet hashmaliciousBlank Grabber, Skuld Stealer, XWormBrowse
                                  • ip-api.com/json/?fields=225545
                                  program.exeGet hashmaliciousBlank GrabberBrowse
                                  • ip-api.com/json/?fields=225545
                                  skuld.exeGet hashmaliciousSkuld StealerBrowse
                                  • ip-api.com/line/?fields=hosting
                                  SolaraBostrappers.exeGet hashmaliciousDCRatBrowse
                                  • ip-api.com/line/?fields=hosting
                                  svhost.exeGet hashmaliciousDCRatBrowse
                                  • ip-api.com/line/?fields=hosting
                                  Midnight.exeGet hashmaliciousXWormBrowse
                                  • ip-api.com/line/?fields=hosting
                                  exe030.exeGet hashmaliciousXWormBrowse
                                  • ip-api.com/line/?fields=hosting
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  ip-api.comoaUNY8P657.exeGet hashmaliciousXWormBrowse
                                  • 208.95.112.1
                                  IAdjMfB2A5.exeGet hashmaliciousXWormBrowse
                                  • 208.95.112.1
                                  dkKMw0OlZ9.exeGet hashmaliciousXWormBrowse
                                  • 208.95.112.1
                                  EternalPredictor.exeGet hashmaliciousBlank Grabber, Skuld Stealer, XWormBrowse
                                  • 208.95.112.1
                                  program.exeGet hashmaliciousBlank GrabberBrowse
                                  • 208.95.112.1
                                  skuld.exeGet hashmaliciousSkuld StealerBrowse
                                  • 208.95.112.1
                                  SolaraBostrappers.exeGet hashmaliciousDCRatBrowse
                                  • 208.95.112.1
                                  svhost.exeGet hashmaliciousDCRatBrowse
                                  • 208.95.112.1
                                  Midnight.exeGet hashmaliciousXWormBrowse
                                  • 208.95.112.1
                                  exe030.exeGet hashmaliciousXWormBrowse
                                  • 208.95.112.1
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  TUT-ASUSoaUNY8P657.exeGet hashmaliciousXWormBrowse
                                  • 208.95.112.1
                                  IAdjMfB2A5.exeGet hashmaliciousXWormBrowse
                                  • 208.95.112.1
                                  dkKMw0OlZ9.exeGet hashmaliciousXWormBrowse
                                  • 208.95.112.1
                                  EternalPredictor.exeGet hashmaliciousBlank Grabber, Skuld Stealer, XWormBrowse
                                  • 208.95.112.1
                                  program.exeGet hashmaliciousBlank GrabberBrowse
                                  • 208.95.112.1
                                  skuld.exeGet hashmaliciousSkuld StealerBrowse
                                  • 208.95.112.1
                                  SolaraBostrappers.exeGet hashmaliciousDCRatBrowse
                                  • 208.95.112.1
                                  svhost.exeGet hashmaliciousDCRatBrowse
                                  • 208.95.112.1
                                  Midnight.exeGet hashmaliciousXWormBrowse
                                  • 208.95.112.1
                                  exe030.exeGet hashmaliciousXWormBrowse
                                  • 208.95.112.1
                                  No context
                                  No context
                                  Process:C:\Windows\System32\WerFault.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):65536
                                  Entropy (8bit):1.215040530468481
                                  Encrypted:false
                                  SSDEEP:384:p8aQcY6DL/NxMymca48ihxPzuiFhY4lO8e/G:uqNxMga45zuiFhY4lO8
                                  MD5:FB4D4F6CBED306714D134693580C12CF
                                  SHA1:067BCBB629C7BB64E1E801249F52D500B39BCAC0
                                  SHA-256:8AA3D28BA44FCA72E36798BCFE076E7A78E1626CF9336CA1A2DA5AC42D7FC37A
                                  SHA-512:B66053ABA457EE2C916CA9298AE1AC493B8572EA9DBC5FCCBA7F723676A88FB85E4165CEFA884B02510F84A9D113DD49AC652B4033BF97EA7A936AF70A779899
                                  Malicious:false
                                  Reputation:low
                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.6.3.4.1.3.3.2.8.4.7.4.0.8.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.6.3.4.1.3.3.3.5.1.9.2.7.6.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.e.4.1.0.f.f.c.-.c.d.a.7.-.4.4.d.4.-.9.6.7.5.-.d.d.6.2.b.f.f.6.3.7.2.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.8.6.2.a.0.0.0.-.7.c.a.4.-.4.e.8.5.-.9.6.c.4.-.2.4.b.3.f.c.c.c.e.b.e.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.B.L.A.C.K.S.U.P.E.R. .X...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.B.L.A.C.K.S.U.P.E.R. .X...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.9.8.-.0.0.0.1.-.0.0.1.4.-.6.d.d.5.-.e.f.9.7.1.d.3.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.9.e.1.c.b.d.4.4.b.2.9.e.a.7.e.9.f.4.6.2.c.f.f.4.b.c.2.5.d.2.9.4.0.0.0.0.0.0.0.0.!.0.0.0.0.f.5.b.5.9.d.6.c.3.c.3.8.2.2.9.5.d.5.d.5.f.e.d.1.a.e.d.0.4.3.4.2.a.7.a.b.7.f.2.e.!.B.L.A.C.K.
                                  Process:C:\Windows\System32\WerFault.exe
                                  File Type:Mini DuMP crash report, 16 streams, Sun Nov 17 18:22:13 2024, 0x1205a4 type
                                  Category:dropped
                                  Size (bytes):452363
                                  Entropy (8bit):3.0627863667152173
                                  Encrypted:false
                                  SSDEEP:3072:8ml12OU3cSJk91CCqeXw3+vrmtHsMff4bRkjXZ4NPyvjPZuIQK8:8M11+J+qeXw3QrmtHsMGoMmsb
                                  MD5:FC733299D947576D90A679FFED746769
                                  SHA1:8DAD7613B67AFF8B4DFE0E9EAEC45E51161EABBB
                                  SHA-256:267D361B5D743F679A1FA6642BB05CAFC89521D0D3B095DD090A6F454D8EF7E1
                                  SHA-512:B07DAE2A2DEE31580CCE224D172E463CAC55026A730AB9928D55600858F5BEA3E13A7625B7DE46D8B464785C4AFF35D5A307BDDC8008301CE6E5F97BDC4D4613
                                  Malicious:false
                                  Reputation:low
                                  Preview:MDMP..a..... .......U4:g........................d...........<...X(...........(.......7..\...........l.......8...........T............A..3............6...........8..............................................................................eJ......09......Lw......................T...........H4:g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\WerFault.exe
                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):6750
                                  Entropy (8bit):3.727914494515263
                                  Encrypted:false
                                  SSDEEP:192:R6l7wVeJUlmrYZiMULpDp89bDrLxff0JBm:R6lXJUkrYoMU4DJfL
                                  MD5:EC936D318ADB9D2F3213C7054786D542
                                  SHA1:F01165771E1F29F89DAB2B4AFAD0617B8565D13F
                                  SHA-256:C3731465866ECD8A4FD5CD5EB967A883E221D62EB3203995077FCE49C2C19750
                                  SHA-512:99EB3D35936713D6D8931C5DCE420F0612DA049E247759D95F5010F5AF43DCDB54824C6F468CDDB38E0A5DB28B6A0E92FE85BB2BC08AC49F14CCFC10A92F9638
                                  Malicious:false
                                  Reputation:low
                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.5.7.6.<./.P.i.
                                  Process:C:\Windows\System32\WerFault.exe
                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):4779
                                  Entropy (8bit):4.487575836180753
                                  Encrypted:false
                                  SSDEEP:48:cvIwWl8zsOJg771I93sWpW8VYqYm8M4J+FwZFPFYyq8vEwZF1GIYhYtpd:uIjfEI7sF7VeJoWHG7Wvd
                                  MD5:5E1B5FE35044F96BC22A1CA72717C091
                                  SHA1:4E8C7641A8658EFB2E3459A2B63FFE112735AE25
                                  SHA-256:E8677C31918E205466C7B59699604DDDD17A0F95CE17E32E9F15E8FE02479FB1
                                  SHA-512:9956D2D146DCE78231FDB045CF84865749667EB5F88CAF605DB807D9CDFF6B9DDF1DFEEA7B654A141B2B3A7C02610BC1F5CCCB8B9DC2CD88D16673C1748E4C83
                                  Malicious:false
                                  Reputation:low
                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="592404" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                  Process:C:\Users\user\Desktop\XSLHv0kxy7.exe
                                  File Type:CSV text
                                  Category:dropped
                                  Size (bytes):654
                                  Entropy (8bit):5.380476433908377
                                  Encrypted:false
                                  SSDEEP:12:Q3La/KDLI4MWuPXcp1OKbbDLI4MWuPOKfSSI6Khap+92n4MNQp3/VXM5gXu9tv:ML9E4KQwKDE4KGKZI6Kh6+84xp3/VclT
                                  MD5:30E4BDFC34907D0E4D11152CAEBE27FA
                                  SHA1:825402D6B151041BA01C5117387228EC9B7168BF
                                  SHA-256:A7B8F7FFB4822570DB1423D61ED74D7F4B538CE73521CC8745BC6B131C18BE63
                                  SHA-512:89FBCBCDB0BE5AD7A95685CF9AA4330D5B0250440E67DC40C6642260E024F52A402E9381F534A9824D2541B98B02094178A15BF2320148432EDB0D09B5F972BA
                                  Malicious:true
                                  Reputation:moderate, very likely benign file
                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\04de61553901f06e2f763b6f03a6f65a\Microsoft.VisualBasic.ni.dll",0..
                                  Process:C:\Users\user\Desktop\XSLHv0kxy7.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):71168
                                  Entropy (8bit):5.859722703433308
                                  Encrypted:false
                                  SSDEEP:1536:QzUaGOQZnchasDspc1hnVmbjlLXa36tgOwB7nZXiR:TaGXZyDZ7IbjVazOwB7nZSR
                                  MD5:2D58B179EC133F1016A2496A96C5DA20
                                  SHA1:F5B59D6C3C382295D5D5FED1AED04342A7AB7F2E
                                  SHA-256:EA9C924BD79E33535B8D6537DA0A320CE89D6700697173397BB0A31341831A1B
                                  SHA-512:486E8248F14D721519BD3701D8DFAF6B8E5AF2BCE02825FAC078402C5AC4A1CEFF72AF2C36EB3A5C3006AAEF0EB00AE8B2289D5A2B8B149E50E7BC7E2BAD5ABC
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exe, Author: Joe Security
                                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exe, Author: Joe Security
                                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exe, Author: ditekSHen
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 92%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....n7g............................>*... ...@....@.. ....................................@..................................)..K....@.......................`....................................................... ............... ..H............text...D.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................ *......H........b..........&.....................................................(....*.r...p*. E/..*..(....*.r...p*. .O..*.s.........s.........s.........s.........*.rO..p*.r...p*. O...*.r...p*. .(T.*.r...p*. m.>.*.r/..p*. .5.*..((...*.r5..p*. S...*.rm..p*. S.v.*.(+...-.(,...,.+.(-...,.+.(*...,.+.()...,..(Z...*"(....+.*&(....&+.*.+5sk... .... .'..ol...(,...~....-.(_...(Q...~....om...&.-.*.r...p*. *p{.*.r...p*. .8.*.r%..p*. V...*.r]..p*. ...*.r...p*.r...p*. W..*.r...p*. ....*.r=.
                                  Process:C:\Users\user\Desktop\XSLHv0kxy7.exe
                                  File Type:PE32+ executable (console) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):50176
                                  Entropy (8bit):5.853090791523441
                                  Encrypted:false
                                  SSDEEP:768:oaor32HL2sMiOhADu7zMkO18wH+XvlMJEdAz6NMxYPDufZDyc3C:o7r3eL2sMipuHMkA8mEdAz6NMyPDurC
                                  MD5:82389ACF1B04E8442FDAFA7C49C29A97
                                  SHA1:573BBC1861498616A8FE79762DE0FE3441E0AB21
                                  SHA-256:70EF677A281065331F49877743D7674891CCB1E63023FBC17E4D6C2E9F28B27A
                                  SHA-512:4D87D48265510DA16FD22920BBBC4476278E1991B62584C320B020D53DCD7CA9B718D9F10750F63B25DF1A741EF10369DA013E880A3D979EF3FAFF9332FD3EB1
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 11%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................e.....,......,......,......,..................-.....-......a....-.....Rich...........................PE..d....y.f.........."....).p...Z......Po.........@..........................................`.................................................4...,...............P...................p...p...........................0...@............... ............................text...3o.......p.................. ..`.rdata...?.......@...t..............@..@.data...............................@....pdata..P...........................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\WerFault.exe
                                  File Type:MS Windows registry file, NT/2000 or above
                                  Category:dropped
                                  Size (bytes):1835008
                                  Entropy (8bit):4.465625745042789
                                  Encrypted:false
                                  SSDEEP:6144:NIXfpi67eLPU9skLmb0b4vWSPKaJG8nAgejZMMhA2gX4WABl0uN9dwBCswSby:eXD94vWlLZMM6YFH7+y
                                  MD5:AB72C17267E8A6CF851D9F1B5CD76F8D
                                  SHA1:1E5F4690F797208DC426B4D53C2C8BA459E66ECD
                                  SHA-256:A8B1EB254E74D92FBFB14169B807F509FFDA938186A3B8C8B04BB78403ED45F4
                                  SHA-512:D127A4BF16430F8CCAF1818CFB4F5E624BB9B3A29324CA1A2958C454841E892705CA9A72726900EFB38B1D3B7C15B69472419059F9E132D17EC4604C359E2FFD
                                  Malicious:false
                                  Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..M..9................................................................................................................................................................................................................................................................................................................................................Z.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\P00LCUE.exe
                                  File Type:ASCII text, with CRLF line terminators, with escape sequences
                                  Category:dropped
                                  Size (bytes):190
                                  Entropy (8bit):3.5744976680308533
                                  Encrypted:false
                                  SSDEEP:3:rYQPERKiXRMWRElH4WUcQPERKiXRMWRElH4WUAzReOAbduNi2ov:kRKOBEOWUsRKOBEOWUMO4qv
                                  MD5:B102A51C7389F72A2080A67798710034
                                  SHA1:530B93C856901F68730D5EA4138D65A94C02A501
                                  SHA-256:5A65FE4F943C71CF37ADD9FF4EB0997359CA572AD26F270A86B025A5E0FE8CEB
                                  SHA-512:35D80ABB24FEA6CFB9619ED6A10ECAC367355CE4A0ACAD0A449FD3AF518D8FB656AAC1D60F0EC8E6CC91B9742C570463DA05BD29CC763E4C037007B94DBEE3FA
                                  Malicious:false
                                  Preview:.......... .[32mWating Prss Install to 1 - 3 min............ .[32mWating Prss Install to 1 - 3 min..Failed to open process handle...
                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):6.250216485854653
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                  • DOS Executable Generic (2002/1) 0.01%
                                  File name:XSLHv0kxy7.exe
                                  File size:345'600 bytes
                                  MD5:a8bf7d1f42ce4fe13c76e01befe367fa
                                  SHA1:add32173cf45061d651b75f8b7ab33f86fdfbee7
                                  SHA256:310c6e4649169990ced7e39f97fade780c725e8ecac3c7a6fe4a8e3d1b874bc8
                                  SHA512:eba707226d114c4405b25b627ee38ba5b2c24cf353fdafd1d78dd90c0fed5de67a2c8c0846609ad7d554306191836667f00dd896d12215fd769c6f36f0f58e2d
                                  SSDEEP:3072:rXjgxzi3Z80WaXjTa4X+oFM3bUiS75l/NTugUJV21KFpwqEBOrNoq98wSpvbUP:rzgxAZ82a4XrFXSlQqrR98XU
                                  TLSH:A27487B7A2154D43E27023F8D889F399CE5262E8EE7F8216EF713855E5C4B834D2D960
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....7g.....................(.......:... ...@....@.. ....................................@................................
                                  Icon Hash:6ecc6960e50b06c6
                                  Entrypoint:0x413a2e
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x6737F70F [Sat Nov 16 01:36:15 2024 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                  Instruction
                                  jmp dword ptr [00402000h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x139d40x57.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x140000x4259c.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x580000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000x11a340x11c00b4006aa40f931f8708c4265670c49bcfFalse0.9464816241197183data7.90058172087949IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rsrc0x140000x4259c0x42600dd705d9593276a726c713f2503729f5dFalse0.17605711511299435data5.503964324915357IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x580000xc0x200cffa7d7fa67820a1766a8b98be5a86a5False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_ICON0x141300x42028Device independent bitmap graphic, 256 x 512 x 32, image size 2621440.1734251560789419
                                  RT_GROUP_ICON0x561580x14data0.9
                                  RT_VERSION0x5616c0x244data0.47413793103448276
                                  RT_MANIFEST0x563b00x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                  DLLImport
                                  mscoree.dll_CorExeMain
                                  TimestampSource PortDest PortSource IPDest IP
                                  Nov 17, 2024 19:22:12.348366976 CET4973080192.168.2.4208.95.112.1
                                  Nov 17, 2024 19:22:12.353372097 CET8049730208.95.112.1192.168.2.4
                                  Nov 17, 2024 19:22:12.353471041 CET4973080192.168.2.4208.95.112.1
                                  Nov 17, 2024 19:22:12.354667902 CET4973080192.168.2.4208.95.112.1
                                  Nov 17, 2024 19:22:12.359549999 CET8049730208.95.112.1192.168.2.4
                                  Nov 17, 2024 19:22:12.969088078 CET8049730208.95.112.1192.168.2.4
                                  Nov 17, 2024 19:22:13.095652103 CET4973080192.168.2.4208.95.112.1
                                  Nov 17, 2024 19:22:30.310548067 CET4973080192.168.2.4208.95.112.1
                                  TimestampSource PortDest PortSource IPDest IP
                                  Nov 17, 2024 19:22:12.303327084 CET5148553192.168.2.41.1.1.1
                                  Nov 17, 2024 19:22:12.314754009 CET53514851.1.1.1192.168.2.4
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Nov 17, 2024 19:22:12.303327084 CET192.168.2.41.1.1.10xe6dbStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Nov 17, 2024 19:22:12.314754009 CET1.1.1.1192.168.2.40xe6dbNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                  • ip-api.com
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.449730208.95.112.1807576C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exe
                                  TimestampBytes transferredDirectionData
                                  Nov 17, 2024 19:22:12.354667902 CET80OUTGET /line/?fields=hosting HTTP/1.1
                                  Host: ip-api.com
                                  Connection: Keep-Alive
                                  Nov 17, 2024 19:22:12.969088078 CET174INHTTP/1.1 200 OK
                                  Date: Sun, 17 Nov 2024 18:22:12 GMT
                                  Content-Type: text/plain; charset=utf-8
                                  Content-Length: 5
                                  Access-Control-Allow-Origin: *
                                  X-Ttl: 60
                                  X-Rl: 44
                                  Data Raw: 74 72 75 65 0a
                                  Data Ascii: true


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:13:21:57
                                  Start date:17/11/2024
                                  Path:C:\Users\user\Desktop\XSLHv0kxy7.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\Desktop\XSLHv0kxy7.exe"
                                  Imagebase:0xc10000
                                  File size:345'600 bytes
                                  MD5 hash:A8BF7D1F42CE4FE13C76E01BEFE367FA
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.1715918741.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.1715918741.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                  Reputation:low
                                  Has exited:true

                                  Target ID:1
                                  Start time:13:22:00
                                  Start date:17/11/2024
                                  Path:C:\Users\user\AppData\Local\Temp\P00LCUE.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\AppData\Local\Temp\P00LCUE.exe"
                                  Imagebase:0x7ff620370000
                                  File size:50'176 bytes
                                  MD5 hash:82389ACF1B04E8442FDAFA7C49C29A97
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Antivirus matches:
                                  • Detection: 11%, ReversingLabs
                                  Reputation:low
                                  Has exited:true

                                  Target ID:2
                                  Start time:13:22:00
                                  Start date:17/11/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7699e0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:3
                                  Start time:13:22:00
                                  Start date:17/11/2024
                                  Path:C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exe"
                                  Imagebase:0x950000
                                  File size:71'168 bytes
                                  MD5 hash:2D58B179EC133F1016A2496A96C5DA20
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000003.00000000.1713951503.0000000000952000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000003.00000000.1713951503.0000000000952000.00000002.00000001.01000000.00000007.sdmp, Author: ditekSHen
                                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000003.00000002.1998540533.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exe, Author: Joe Security
                                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exe, Author: Joe Security
                                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Local\Temp\BLACKSUPER X.exe, Author: ditekSHen
                                  Antivirus matches:
                                  • Detection: 100%, Avira
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 92%, ReversingLabs
                                  Reputation:low
                                  Has exited:true

                                  Target ID:4
                                  Start time:13:22:00
                                  Start date:17/11/2024
                                  Path:C:\Windows\System32\cmd.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\cmd.exe /c cls
                                  Imagebase:0x7ff680390000
                                  File size:289'792 bytes
                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:5
                                  Start time:13:22:00
                                  Start date:17/11/2024
                                  Path:C:\Windows\System32\cmd.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\cmd.exe /c cls
                                  Imagebase:0x7ff680390000
                                  File size:289'792 bytes
                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:8
                                  Start time:13:22:12
                                  Start date:17/11/2024
                                  Path:C:\Windows\System32\WerFault.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\system32\WerFault.exe -u -p 7576 -s 1684
                                  Imagebase:0x800000
                                  File size:570'736 bytes
                                  MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Reset < >
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1716591201.00007FFD9B780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B780000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ffd9b780000_XSLHv0kxy7.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 99b9dcacd6202acf8897aec52e583d270ffc4c8d944e7e1b6a9c6a287eaa3f29
                                    • Instruction ID: 6bf6da3897f0ae172e2c4d49796985f46ee67a6342a7709ba6ca7c962df5f20b
                                    • Opcode Fuzzy Hash: 99b9dcacd6202acf8897aec52e583d270ffc4c8d944e7e1b6a9c6a287eaa3f29
                                    • Instruction Fuzzy Hash: 78D16330B19A1D4FDBA8EF68D4A8ABA73E1FF54712B114679E41EC71E5CE34A8418740
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1716591201.00007FFD9B780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B780000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ffd9b780000_XSLHv0kxy7.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: U$_Q^
                                    • API String ID: 0-3831296343
                                    • Opcode ID: d6f921ec4948ccdc75a9241b8e82b339d3c48e038be59617f45bf4ed9784943a
                                    • Instruction ID: 9b8d1e0955e6a401e1216dc159fedaa74dd26876b95763f7c5b217a8b260bea5
                                    • Opcode Fuzzy Hash: d6f921ec4948ccdc75a9241b8e82b339d3c48e038be59617f45bf4ed9784943a
                                    • Instruction Fuzzy Hash: FCC10951B1DE894FE7A89F7C48A97A87BD1EF98311F0502BAE04DC36E7DE3468418341
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1716591201.00007FFD9B780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B780000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ffd9b780000_XSLHv0kxy7.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1f923b06fc0b90e2bd6d07e34de9e7ad8c5f4764bf9382789112d8b2ffba3441
                                    • Instruction ID: 60723162f13c8059590566cfb231d66d92e86f70cbc9e7c3622c0c6fd5b5603c
                                    • Opcode Fuzzy Hash: 1f923b06fc0b90e2bd6d07e34de9e7ad8c5f4764bf9382789112d8b2ffba3441
                                    • Instruction Fuzzy Hash: AE413551F0FFC69FE32557B848799697B90BF22B21B0A42BAC0AC470F3CD29A5058351
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1716591201.00007FFD9B780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B780000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ffd9b780000_XSLHv0kxy7.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c720d0ca38ee2deaf5163dc4f6cbea4d8bd5e097309bb7b57e562df567d3e2fc
                                    • Instruction ID: 7c5b8bbf1815370086ccc56e2345c2ee2486345f98368360782501c86fb15a70
                                    • Opcode Fuzzy Hash: c720d0ca38ee2deaf5163dc4f6cbea4d8bd5e097309bb7b57e562df567d3e2fc
                                    • Instruction Fuzzy Hash: 6AA1E821B19E494FE798DF6C48A97B9B7D1EF9C311F050279E04EC32E6DE74A8418341
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1716591201.00007FFD9B780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B780000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ffd9b780000_XSLHv0kxy7.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b31cc9301fca081da36ceeb9cbc168f6fbd6349a5f29e5b126b8c301543d499e
                                    • Instruction ID: bbbed9df2ddcba3ebb072479f8775ca5d068e14ac9514438c53ae6806b263398
                                    • Opcode Fuzzy Hash: b31cc9301fca081da36ceeb9cbc168f6fbd6349a5f29e5b126b8c301543d499e
                                    • Instruction Fuzzy Hash: 12E06502F59C4D0BE794A9AC68E66B863C2DBDC225B51427AD15EC339AEC285C824782
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1716591201.00007FFD9B780000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B780000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ffd9b780000_XSLHv0kxy7.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bc5b7798e31fd065035decac5f210c6d810b174027aeb542add07ad4d3e0fc8f
                                    • Instruction ID: c1a33cd49ad0312530de73dee7a876fdf47052476410a74274e61a1b10e0d713
                                    • Opcode Fuzzy Hash: bc5b7798e31fd065035decac5f210c6d810b174027aeb542add07ad4d3e0fc8f
                                    • Instruction Fuzzy Hash: C1E0CD20B18D1507EB88F51C6461D7D77C1DB84754F440564F80DD32D5DD189B8143C1

                                    Execution Graph

                                    Execution Coverage:15.7%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:8.6%
                                    Total number of Nodes:811
                                    Total number of Limit Nodes:6
                                    execution_graph 2529 7ff620376f02 2530 7ff620377560 GetModuleHandleW 2529->2530 2531 7ff620376f09 2530->2531 2532 7ff620376f0d 2531->2532 2533 7ff620376f48 _exit 2531->2533 2269 7ff620377d80 2270 7ff620377dc8 2269->2270 2271 7ff620377d91 2269->2271 2272 7ff620377dc3 2271->2272 2274 7ff620377dbc _invalid_parameter_noinfo_noreturn 2271->2274 2273 7ff620376cbc collate free 2272->2273 2273->2270 2274->2272 2275 7ff620374a80 2276 7ff620374a99 ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J 2275->2276 2277 7ff620374aa8 2275->2277 2276->2277 2278 7ff620374b29 2277->2278 2279 7ff620374adc memcpy 2277->2279 2280 7ff620374b09 2277->2280 2279->2278 2279->2280 2280->2278 2281 7ff620374b15 fwrite 2280->2281 2281->2278 2282 7ff620377a80 2283 7ff620377aa8 2282->2283 2284 7ff620377a93 ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 2282->2284 2284->2283 2534 7ff620371000 2535 7ff620371029 2534->2535 2536 7ff620375560 7 API calls 2535->2536 2537 7ff6203711cf 2536->2537 2538 7ff620376900 2539 7ff62037690f _Cnd_do_broadcast_at_thread_exit 2538->2539 2540 7ff62037691a 2539->2540 2541 7ff620376927 2539->2541 2542 7ff620376cbc collate free 2540->2542 2542->2541 2543 7ff620377c0c 2544 7ff620376cbc collate free 2543->2544 2545 7ff620377c23 2544->2545 2285 7ff620374790 2286 7ff6203747b3 2285->2286 2287 7ff6203747d1 setvbuf 2286->2287 2288 7ff62037484f 2286->2288 2287->2288 2289 7ff6203747df ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 2287->2289 2291 7ff620376a20 8 API calls 2288->2291 2289->2288 2290 7ff620374801 _get_stream_buffer_pointers 2289->2290 2290->2288 2292 7ff62037487e 2291->2292 2293 7ff620374890 2294 7ff6203748c6 2293->2294 2296 7ff6203748e5 2293->2296 2295 7ff6203758f0 10 API calls 2294->2295 2297 7ff6203748cb 2295->2297 2298 7ff620376a20 8 API calls 2296->2298 2297->2296 2299 7ff6203748cf fsetpos 2297->2299 2300 7ff62037495b 2298->2300 2299->2296 2547 7ff620371910 __std_exception_destroy 2548 7ff620371938 2547->2548 2549 7ff620371945 2547->2549 2550 7ff620376cbc collate free 2548->2550 2550->2549 2302 7ff620377c8e ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA 2303 7ff620373ca0 2304 7ff6203725b0 22 API calls 2303->2304 2305 7ff620373cc9 OpenProcess 2304->2305 2306 7ff620373d29 2305->2306 2307 7ff620373ce1 ReadProcessMemory WriteProcessMemory 2305->2307 2308 7ff620376a20 8 API calls 2306->2308 2307->2306 2309 7ff620373d36 2308->2309 2310 7ff620374ca0 2311 7ff620374cd7 2310->2311 2312 7ff620374d52 fgetc 2311->2312 2313 7ff620374d6e fgetc 2311->2313 2315 7ff620374ce7 2311->2315 2312->2315 2316 7ff620374d9b 2313->2316 2324 7ff620374ea0 2313->2324 2314 7ff620376a20 8 API calls 2317 7ff620374f5b 2314->2317 2315->2314 2318 7ff620374dda ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD 2316->2318 2323 7ff620374e4d memcpy fgetc 2316->2323 2316->2324 2326 7ff620374efe 2316->2326 2327 7ff620376230 2316->2327 2318->2316 2320 7ff620374f48 2322 7ff620376cbc collate free 2320->2322 2321 7ff620374edf _invalid_parameter_noinfo_noreturn 2321->2324 2322->2315 2323->2316 2323->2324 2324->2315 2324->2320 2324->2321 2325 7ff620374f20 ungetc 2325->2324 2325->2326 2326->2324 2326->2325 2328 7ff620376385 2327->2328 2329 7ff62037625f 2327->2329 2347 7ff620371a50 ?_Xlength_error@std@@YAXPEBD 2328->2347 2333 7ff6203762aa 2329->2333 2335 7ff6203762b7 2329->2335 2336 7ff6203762ef 2329->2336 2342 7ff6203762c4 2329->2342 2331 7ff620376a40 std::_Facet_Register 3 API calls 2331->2333 2332 7ff62037638a 2334 7ff6203719b0 Concurrency::cancel_current_task __std_exception_copy 2332->2334 2337 7ff62037634e _invalid_parameter_noinfo_noreturn 2333->2337 2340 7ff62037630b memcpy 2333->2340 2341 7ff620376355 memcpy 2333->2341 2339 7ff620376390 2334->2339 2335->2332 2335->2342 2338 7ff620376a40 std::_Facet_Register 3 API calls 2336->2338 2337->2341 2338->2333 2339->2318 2343 7ff62037632c 2340->2343 2344 7ff620376341 2340->2344 2345 7ff62037634c 2341->2345 2342->2331 2343->2337 2343->2344 2346 7ff620376cbc collate free 2344->2346 2345->2318 2346->2345 2348 7ff6203752a0 2349 7ff6203752ac _unlock_file 2348->2349 2350 7ff6203752b3 2348->2350 2349->2350 2351 7ff6203758b0 ?uncaught_exception@std@ 2352 7ff6203758cd 2351->2352 2353 7ff6203758c3 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 2351->2353 2353->2352 2192 7ff620375fb0 ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 2193 7ff620376930 2203 7ff620373970 2193->2203 2207 7ff6203739a0 2203->2207 2204 7ff620373a29 _Thrd_yield 2204->2207 2205 7ff6203739b0 CreateToolhelp32Snapshot 2206 7ff6203739c9 Process32FirstW 2205->2206 2205->2207 2206->2207 2207->2204 2207->2205 2208 7ff6203739e3 CloseHandle 2207->2208 2209 7ff6203739f0 _wcsicmp 2207->2209 2208->2207 2210 7ff620373a05 Process32NextW 2209->2210 2211 7ff620373a12 CloseHandle 2209->2211 2210->2207 2213 7ff620373550 CreateToolhelp32Snapshot 2211->2213 2214 7ff620373607 2213->2214 2215 7ff6203735a5 Process32FirstW 2213->2215 2216 7ff620376a20 8 API calls 2214->2216 2217 7ff6203735fe CloseHandle 2215->2217 2218 7ff6203735bf 2215->2218 2219 7ff620373616 2216->2219 2217->2214 2220 7ff6203735c0 _wcsicmp 2218->2220 2219->2207 2221 7ff6203735ec Process32NextW 2220->2221 2222 7ff6203735d2 OpenProcess 2220->2222 2221->2217 2221->2220 2222->2221 2223 7ff620373633 7 API calls 2222->2223 2224 7ff620375aa0 24 API calls 2223->2224 2225 7ff620373737 2224->2225 2226 7ff62037373c ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N 2225->2226 2227 7ff620373760 2225->2227 2226->2227 2228 7ff6203737b1 2227->2228 2229 7ff620375dd0 9 API calls 2227->2229 2230 7ff620375dd0 9 API calls 2228->2230 2231 7ff62037377d 2229->2231 2232 7ff6203737cd system MessageBoxW 2230->2232 2233 7ff6203759e0 12 API calls 2231->2233 2234 7ff620373800 ShellExecuteW 2232->2234 2235 7ff620373789 2233->2235 2234->2234 2236 7ff62037382c GetCurrentProcess OpenProcessToken 2234->2236 2235->2228 2237 7ff62037378e ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N 2235->2237 2238 7ff620373849 LookupPrivilegeValueW AdjustTokenPrivileges CloseHandle ExitWindowsEx 2236->2238 2239 7ff6203738af CloseHandle 2236->2239 2237->2228 2238->2239 2240 7ff6203738f5 2239->2240 2241 7ff620373943 ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 2240->2241 2242 7ff6203759e0 12 API calls 2240->2242 2241->2214 2242->2241 2354 7ff6203718b0 __std_exception_copy 2551 7ff620376830 2552 7ff62037683e 2551->2552 2557 7ff620376877 2551->2557 2553 7ff62037689c _invalid_parameter_noinfo_noreturn 2552->2553 2554 7ff62037686f 2552->2554 2552->2557 2556 7ff6203768b8 2553->2556 2555 7ff620376cbc collate free 2554->2555 2555->2557 2558 7ff620377d30 ??1_Lockit@std@@QEAA 2355 7ff620377aae ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA 2559 7ff620376db8 2563 7ff6203775b4 SetUnhandledExceptionFilter 2559->2563 2564 7ff6203775c4 2565 7ff6203775f8 2564->2565 2566 7ff6203775dc 2564->2566 2566->2565 2567 7ff620377870 free 2566->2567 2568 7ff620376cc4 2569 7ff620376cdc 2568->2569 2570 7ff620376ce6 2568->2570 2571 7ff620376cbc collate free 2569->2571 2571->2570 2356 7ff620377a40 2357 7ff620377a53 2356->2357 2358 7ff620377a60 2356->2358 2360 7ff620374590 2357->2360 2361 7ff6203745a1 2360->2361 2365 7ff6203745d2 2360->2365 2362 7ff6203745ca 2361->2362 2363 7ff6203745e5 _invalid_parameter_noinfo_noreturn 2361->2363 2364 7ff620376cbc collate free 2362->2364 2364->2365 2365->2358 2366 7ff620371340 2368 7ff620371368 2366->2368 2380 7ff620375560 2368->2380 2370 7ff620375560 7 API calls 2373 7ff620371623 2370->2373 2371 7ff620375560 7 API calls 2372 7ff6203717ae 2371->2372 2374 7ff620375560 7 API calls 2372->2374 2373->2371 2373->2373 2375 7ff62037181f 2374->2375 2376 7ff620375560 7 API calls 2375->2376 2377 7ff620371858 2376->2377 2399 7ff620371b50 2377->2399 2379 7ff620371871 2381 7ff620375590 2380->2381 2381->2381 2382 7ff6203755ac 2381->2382 2383 7ff620375672 2381->2383 2384 7ff6203755b2 memcpy 2382->2384 2389 7ff6203755cf 2382->2389 2432 7ff620371a50 ?_Xlength_error@std@@YAXPEBD 2383->2432 2386 7ff620371540 2384->2386 2386->2370 2387 7ff6203755db 2392 7ff620376a40 std::_Facet_Register 3 API calls 2387->2392 2388 7ff620375677 2393 7ff6203719b0 Concurrency::cancel_current_task __std_exception_copy 2388->2393 2389->2387 2389->2388 2390 7ff62037563f memcpy 2389->2390 2391 7ff620375637 2389->2391 2390->2386 2394 7ff620376a40 std::_Facet_Register 3 API calls 2391->2394 2395 7ff6203755f1 2392->2395 2396 7ff62037567d 2393->2396 2397 7ff6203755f6 2394->2397 2395->2397 2398 7ff620375630 _invalid_parameter_noinfo_noreturn 2395->2398 2397->2390 2398->2391 2433 7ff620375680 2399->2433 2401 7ff620371bb9 2402 7ff620375680 22 API calls 2401->2402 2403 7ff620371bc9 2402->2403 2404 7ff620375680 22 API calls 2403->2404 2405 7ff620371bd9 2404->2405 2406 7ff620375680 22 API calls 2405->2406 2407 7ff620371be9 2406->2407 2408 7ff620375680 22 API calls 2407->2408 2410 7ff620371bf9 2408->2410 2409 7ff620371c87 2414 7ff620371cd1 2409->2414 2415 7ff620371dde _invalid_parameter_noinfo_noreturn 2409->2415 2418 7ff620371cc9 2409->2418 2410->2409 2411 7ff620371c7f 2410->2411 2412 7ff620371dd7 _invalid_parameter_noinfo_noreturn 2410->2412 2413 7ff620376cbc collate free 2411->2413 2412->2415 2413->2409 2417 7ff620371d1a 2414->2417 2420 7ff620371d12 2414->2420 2422 7ff620371de5 _invalid_parameter_noinfo_noreturn 2414->2422 2415->2422 2416 7ff620371d63 2424 7ff620371da9 2416->2424 2427 7ff620371da1 2416->2427 2430 7ff620371df3 _invalid_parameter_noinfo_noreturn 2416->2430 2417->2416 2423 7ff620371d5b 2417->2423 2425 7ff620371dec _invalid_parameter_noinfo_noreturn 2417->2425 2419 7ff620376cbc collate free 2418->2419 2419->2414 2421 7ff620376cbc collate free 2420->2421 2421->2417 2422->2425 2426 7ff620376cbc collate free 2423->2426 2428 7ff620376a20 8 API calls 2424->2428 2425->2430 2426->2416 2431 7ff620376cbc collate free 2427->2431 2429 7ff620371dc8 2428->2429 2429->2379 2431->2424 2434 7ff6203756a9 2433->2434 2435 7ff620375786 2434->2435 2439 7ff6203756c3 2434->2439 2454 7ff620371a50 ?_Xlength_error@std@@YAXPEBD 2435->2454 2437 7ff6203756c9 2437->2401 2438 7ff6203756f8 2442 7ff620376a40 std::_Facet_Register 3 API calls 2438->2442 2439->2437 2439->2438 2440 7ff62037575c memcpy 2439->2440 2441 7ff62037578b 2439->2441 2443 7ff620375757 2439->2443 2440->2401 2444 7ff6203719b0 Concurrency::cancel_current_task __std_exception_copy 2441->2444 2446 7ff62037570e 2442->2446 2447 7ff620376a40 std::_Facet_Register 3 API calls 2443->2447 2445 7ff620375791 2444->2445 2455 7ff620372df0 2445->2455 2449 7ff620375716 2446->2449 2450 7ff620375750 _invalid_parameter_noinfo_noreturn 2446->2450 2447->2440 2449->2440 2450->2443 2456 7ff620372e46 2455->2456 2457 7ff620372e83 ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 2456->2457 2458 7ff6203759e0 12 API calls 2456->2458 2458->2457 2459 7ff620374740 2460 7ff620374753 2459->2460 2461 7ff620374780 2459->2461 2460->2461 2462 7ff620374763 fflush 2460->2462 2572 7ff6203752c0 2573 7ff6203752cc _lock_file 2572->2573 2574 7ff6203752d3 2572->2574 2573->2574 2463 7ff620375f3f 2464 7ff620375f4d ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 2463->2464 2465 7ff620375f6d ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 2464->2465 2466 7ff620375f77 2464->2466 2465->2466 1801 7ff620376dd4 1802 7ff620376ded 1801->1802 1803 7ff620376f2b 1802->1803 1804 7ff620376df5 __scrt_acquire_startup_lock 1802->1804 1854 7ff62037740c IsProcessorFeaturePresent 1803->1854 1806 7ff620376f35 1804->1806 1811 7ff620376e13 __scrt_release_startup_lock 1804->1811 1807 7ff62037740c 9 API calls 1806->1807 1808 7ff620376f40 1807->1808 1810 7ff620376f48 _exit 1808->1810 1809 7ff620376e38 1811->1809 1812 7ff620376ebe _get_initial_narrow_environment __p___argv __p___argc 1811->1812 1815 7ff620376eb6 _register_thread_local_exe_atexit_callback 1811->1815 1821 7ff6203741c0 19 API calls 1812->1821 1815->1812 1818 7ff620376eeb 1819 7ff620376ef0 _cexit 1818->1819 1820 7ff620376ef5 1818->1820 1819->1820 1820->1809 1860 7ff6203763c0 1821->1860 1826 7ff6203743c4 _beginthreadex 1827 7ff620374402 1826->1827 1828 7ff6203744e3 ?_Throw_Cpp_error@std@@YAXH 1826->1828 1832 7ff62037440c _Thrd_detach 1827->1832 1833 7ff6203744d7 ?_Throw_Cpp_error@std@@YAXH 1827->1833 1831 7ff620374511 1828->1831 1844 7ff620374560 1828->1844 1829 7ff6203763c0 10 API calls 1830 7ff6203743ab memcpy 1829->1830 1830->1826 1834 7ff62037452f 1831->1834 1837 7ff620374573 terminate 1831->1837 1832->1833 1835 7ff620374427 1832->1835 1833->1828 1839 7ff62037457a _invalid_parameter_noinfo_noreturn 1834->1839 1840 7ff620374558 1834->1840 1836 7ff620376a40 std::_Facet_Register 3 API calls 1835->1836 1838 7ff620374439 _beginthreadex 1836->1838 1837->1839 1842 7ff620374476 1838->1842 1843 7ff6203744c7 ?_Throw_Cpp_error@std@@YAXH 1838->1843 1971 7ff620376cbc 1840->1971 1845 7ff62037447c _Thrd_detach 1842->1845 1846 7ff6203744bb ?_Throw_Cpp_error@std@@YAXH 1842->1846 1843->1833 1852 7ff620377560 GetModuleHandleW 1844->1852 1845->1846 1847 7ff620374493 1845->1847 1846->1843 1883 7ff620373d50 system 1847->1883 1853 7ff620376ee7 1852->1853 1853->1808 1853->1818 1855 7ff620377432 1854->1855 1856 7ff620377440 memset RtlCaptureContext RtlLookupFunctionEntry 1855->1856 1857 7ff62037747a RtlVirtualUnwind 1856->1857 1858 7ff6203774b6 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 1856->1858 1857->1858 1859 7ff620377536 1858->1859 1859->1806 1861 7ff6203763d8 1860->1861 1862 7ff620376443 1860->1862 1864 7ff620376448 1861->1864 1865 7ff620376422 1861->1865 1866 7ff620376400 1861->1866 1872 7ff620374355 memcpy 1861->1872 1974 7ff620376450 ?_Xlength_error@std@@YAXPEBD 1862->1974 2008 7ff6203719b0 1864->2008 1867 7ff620376a40 std::_Facet_Register 3 API calls 1865->1867 1869 7ff620376a40 std::_Facet_Register 3 API calls 1866->1869 1867->1872 1871 7ff620376405 1869->1871 1870 7ff62037644e 1871->1872 1873 7ff62037641b _invalid_parameter_noinfo_noreturn 1871->1873 1874 7ff620376a40 1872->1874 1873->1865 1875 7ff620376a5a malloc 1874->1875 1876 7ff620376a4b 1875->1876 1877 7ff62037437e 1875->1877 1876->1875 1878 7ff620376a6a 1876->1878 1877->1826 1877->1829 1879 7ff620376a75 1878->1879 2011 7ff620377104 1878->2011 1881 7ff6203719b0 Concurrency::cancel_current_task __std_exception_copy 1879->1881 1882 7ff620376a7b 1881->1882 2015 7ff620372af0 memset 1883->2015 1885 7ff620373df9 1886 7ff620373e7f 1885->1886 1887 7ff620373e7a 1885->1887 1889 7ff620373e73 _invalid_parameter_noinfo_noreturn 1885->1889 1891 7ff620376a40 std::_Facet_Register 3 API calls 1886->1891 1921 7ff620373f4e 1886->1921 1890 7ff620376cbc collate free 1887->1890 1889->1887 1890->1886 1894 7ff620373ea0 _beginthreadex 1891->1894 1892 7ff620376cbc collate free 1892->1885 1893 7ff620374073 Beep 1896 7ff620374129 1893->1896 1910 7ff62037408e 1893->1910 1897 7ff620373edd 1894->1897 1898 7ff620373fe7 ?_Throw_Cpp_error@std@@YAXH 1894->1898 1895 7ff620376a40 std::_Facet_Register 3 API calls 1901 7ff620373f8d _beginthreadex 1895->1901 2047 7ff620376a20 1896->2047 1903 7ff620373ee3 ?_Throw_Cpp_error@std@@YAXH 1897->1903 1904 7ff620373eef _Thrd_id 1897->1904 1898->1921 1899 7ff62037403a _Thrd_id 1906 7ff620374049 _Thrd_join 1899->1906 1907 7ff620374105 ?_Throw_Cpp_error@std@@YAXH 1899->1907 1900 7ff620374111 ?_Throw_Cpp_error@std@@YAXH 1905 7ff62037411d terminate 1900->1905 1908 7ff6203740e9 ?_Throw_Cpp_error@std@@YAXH 1901->1908 1901->1921 1903->1904 1912 7ff620373efa ?_Throw_Cpp_error@std@@YAXH 1904->1912 1913 7ff620373f06 _Thrd_join 1904->1913 1911 7ff620374124 1905->1911 1916 7ff6203740f9 ?_Throw_Cpp_error@std@@YAXH 1906->1916 1917 7ff62037401c 1906->1917 1907->1900 1908->1916 1910->1905 1910->1911 1919 7ff6203740db _invalid_parameter_noinfo_noreturn 1910->1919 1918 7ff620376cbc collate free 1911->1918 1912->1913 1914 7ff620373f2b Beep 1913->1914 1915 7ff620373f1f ?_Throw_Cpp_error@std@@YAXH 1913->1915 1920 7ff620373f47 terminate 1914->1920 1914->1921 1915->1914 1916->1907 1917->1893 1917->1899 1917->1900 1918->1896 1922 7ff6203740e2 terminate 1919->1922 1920->1921 1921->1895 1921->1917 1921->1922 1922->1908 1923 7ff620372eb0 1924 7ff620372af0 55 API calls 1923->1924 1926 7ff620372f11 1924->1926 1925 7ff620372f9b 1927 7ff620372fa4 1925->1927 1928 7ff620373121 1925->1928 1926->1925 1929 7ff620372f96 1926->1929 1933 7ff620372f8f _invalid_parameter_noinfo_noreturn 1926->1933 2128 7ff6203725b0 CreateToolhelp32Snapshot Process32FirstW 1927->2128 1930 7ff620375dd0 9 API calls 1928->1930 1931 7ff620376cbc collate free 1929->1931 1934 7ff620373134 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 1930->1934 1931->1925 1933->1929 1936 7ff62037314c 1934->1936 1937 7ff62037319b 1934->1937 1945 7ff620375dd0 9 API calls 1936->1945 1941 7ff620373255 1937->1941 1949 7ff6203725b0 22 API calls 1937->1949 1938 7ff620372fc5 2139 7ff620372340 GetSystemInfo 1938->2139 1939 7ff620373231 1942 7ff620375dd0 9 API calls 1939->1942 1944 7ff620373294 1941->1944 1946 7ff620373289 1941->1946 1951 7ff620373282 _invalid_parameter_noinfo_noreturn 1941->1951 1943 7ff620373244 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 1942->1943 1943->1941 1948 7ff620376a20 8 API calls 1944->1948 1947 7ff620373166 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 1945->1947 1952 7ff620376cbc collate free 1946->1952 1947->1936 1947->1937 1953 7ff6203732a0 Beep exit 1948->1953 1955 7ff6203731c8 OpenProcess 1949->1955 1950 7ff620373089 2155 7ff6203727b0 memset ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 1950->2155 1951->1946 1952->1944 1953->1846 1955->1939 1959 7ff6203731e0 ReadProcessMemory WriteProcessMemory CloseHandle 1955->1959 1956 7ff62037301e 1956->1950 1957 7ff620373084 1956->1957 1960 7ff62037307d _invalid_parameter_noinfo_noreturn 1956->1960 1961 7ff620376cbc collate free 1957->1961 1959->1937 1963 7ff62037322f 1959->1963 1960->1957 1961->1950 1963->1941 1964 7ff620376cbc collate free 1964->1956 1965 7ff620375dd0 9 API calls 1966 7ff6203730ae ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 1965->1966 1967 7ff62037311b 1966->1967 1968 7ff6203730ce 1966->1968 1967->1937 1969 7ff620375dd0 9 API calls 1968->1969 1970 7ff6203730e6 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 1969->1970 1970->1967 1970->1968 1972 7ff620377620 free 1971->1972 1978 7ff620376470 1974->1978 1975 7ff62037666a 1977 7ff620376450 4 API calls 1975->1977 1976 7ff62037666f 1979 7ff6203719b0 Concurrency::cancel_current_task __std_exception_copy 1976->1979 1977->1976 1978->1975 1978->1976 1980 7ff6203764ff 1978->1980 1982 7ff62037650c 1978->1982 1983 7ff620376535 1978->1983 1981 7ff620376675 1979->1981 1989 7ff620376628 1980->1989 1991 7ff620376663 _invalid_parameter_noinfo_noreturn 1980->1991 1992 7ff6203765f7 1980->1992 1996 7ff62037665c terminate 1980->1996 1985 7ff620376804 1981->1985 1988 7ff620376809 1981->1988 1994 7ff62037674c 1981->1994 1995 7ff620376723 1981->1995 2002 7ff620376716 1981->2002 1982->1976 1987 7ff620376a40 std::_Facet_Register 3 API calls 1982->1987 1984 7ff620376a40 std::_Facet_Register 3 API calls 1983->1984 1984->1980 1986 7ff620376450 4 API calls 1985->1986 1986->1988 1987->1980 1990 7ff6203719b0 Concurrency::cancel_current_task __std_exception_copy 1988->1990 1989->1864 1993 7ff62037680f 1990->1993 1991->1975 1992->1991 1997 7ff620376620 1992->1997 1993->1864 1999 7ff620376a40 std::_Facet_Register 3 API calls 1994->1999 1995->1988 2000 7ff620376a40 std::_Facet_Register 3 API calls 1995->2000 1996->1991 1998 7ff620376cbc collate free 1997->1998 1998->1989 1999->2002 2000->2002 2001 7ff62037678f memcpy 2003 7ff62037679c 2001->2003 2004 7ff6203767cd 2001->2004 2002->2001 2006 7ff6203767fd _invalid_parameter_noinfo_noreturn 2002->2006 2005 7ff6203767c5 2003->2005 2003->2006 2004->1864 2007 7ff620376cbc collate free 2005->2007 2006->1985 2007->2004 2009 7ff6203719be Concurrency::cancel_current_task 2008->2009 2010 7ff6203719cf __std_exception_copy 2009->2010 2010->1870 2014 7ff6203770e4 2011->2014 2013 7ff620377112 _CxxThrowException 2014->2013 2056 7ff6203745f0 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 2015->2056 2018 7ff620372b67 2061 7ff620375dd0 2018->2061 2019 7ff620372c70 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEA_K ??Bios_base@std@ 2020 7ff620372ca4 2019->2020 2021 7ff620372cfe 2019->2021 2026 7ff620372cca ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEA_K ??Bios_base@std@ 2020->2026 2023 7ff6203759e0 12 API calls 2021->2023 2027 7ff620372d08 2023->2027 2025 7ff620375dd0 9 API calls 2028 7ff620372b8d 2025->2028 2026->2020 2026->2021 2029 7ff620372d2c 2027->2029 2030 7ff620372d0d ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N 2027->2030 2031 7ff620375dd0 9 API calls 2028->2031 2033 7ff620372da3 ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA 2029->2033 2036 7ff6203759e0 12 API calls 2029->2036 2030->2029 2032 7ff620372ba0 2031->2032 2035 7ff620375dd0 9 API calls 2032->2035 2034 7ff620372daf ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 2033->2034 2037 7ff620376a20 8 API calls 2034->2037 2038 7ff620372bb3 2035->2038 2036->2033 2039 7ff620372dd4 2037->2039 2040 7ff620375dd0 9 API calls 2038->2040 2039->1885 2039->1889 2039->1892 2041 7ff620372bc6 2040->2041 2042 7ff620375dd0 9 API calls 2041->2042 2043 7ff620372bd9 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 2042->2043 2044 7ff620372c27 2043->2044 2045 7ff620372c5f ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA 2044->2045 2075 7ff6203759e0 2044->2075 2045->2034 2048 7ff620376a29 2047->2048 2049 7ff620374135 2048->2049 2050 7ff620376f9c IsProcessorFeaturePresent 2048->2050 2049->1923 2051 7ff620376fb4 2050->2051 2123 7ff620377070 RtlCaptureContext 2051->2123 2081 7ff620375aa0 2056->2081 2059 7ff6203746c5 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N 2060 7ff620372b5c 2059->2060 2060->2018 2060->2019 2064 7ff620375e00 ?good@ios_base@std@ 2061->2064 2063 7ff620375e53 2067 7ff620375e69 ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 ?good@ios_base@std@ 2063->2067 2068 7ff620375e81 2063->2068 2064->2063 2064->2068 2066 7ff620375edd ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 2071 7ff620375efa 2066->2071 2072 7ff620375e8b ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 2066->2072 2067->2068 2068->2066 2068->2072 2073 7ff620375eb5 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 2068->2073 2069 7ff620375f6d ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 2070 7ff620372b7a 2069->2070 2070->2025 2071->2072 2074 7ff620375f05 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 2071->2074 2072->2069 2072->2070 2073->2068 2073->2072 2074->2071 2074->2072 2076 7ff6203759f7 2075->2076 2077 7ff620375a55 2075->2077 2111 7ff6203758f0 2076->2111 2078 7ff620375a57 ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 2077->2078 2078->2045 2080 7ff620375a31 fclose 2080->2078 2082 7ff620375b8a 2081->2082 2083 7ff620375ace ?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH 2081->2083 2085 7ff620376a20 8 API calls 2082->2085 2083->2082 2084 7ff620375aec ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ _get_stream_buffer_pointers ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2 2083->2084 2090 7ff620375ff0 ??0_Lockit@std@@QEAA@H ??Bid@locale@std@ 2084->2090 2088 7ff6203746c0 2085->2088 2088->2059 2088->2060 2089 7ff620375b90 ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 2089->2082 2091 7ff620376052 2090->2091 2092 7ff6203760c7 ??1_Lockit@std@@QEAA 2091->2092 2094 7ff620376069 ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12 2091->2094 2096 7ff620376075 2091->2096 2093 7ff620376a20 8 API calls 2092->2093 2095 7ff620375b7a ?always_noconv@codecvt_base@std@ 2093->2095 2094->2096 2095->2082 2095->2089 2096->2092 2097 7ff62037608c ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@ 2096->2097 2098 7ff6203760f7 2097->2098 2099 7ff6203760a0 2097->2099 2107 7ff620371aa0 2098->2107 2104 7ff6203769cc 2099->2104 2102 7ff6203760fc 2105 7ff620376a40 std::_Facet_Register 3 API calls 2104->2105 2106 7ff6203760b2 2105->2106 2106->2092 2110 7ff620371a70 2107->2110 2109 7ff620371aae _CxxThrowException __std_exception_copy 2109->2102 2110->2109 2112 7ff6203759c3 2111->2112 2113 7ff620375913 2111->2113 2114 7ff620376a20 8 API calls 2112->2114 2113->2112 2115 7ff62037591d 2113->2115 2116 7ff6203759d2 2114->2116 2117 7ff620375936 ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD 2115->2117 2118 7ff620375961 2115->2118 2116->2080 2119 7ff62037595c 2117->2119 2120 7ff620376a20 8 API calls 2118->2120 2119->2118 2122 7ff620375997 fwrite 2119->2122 2121 7ff62037597e 2120->2121 2121->2080 2122->2118 2124 7ff62037708a RtlLookupFunctionEntry 2123->2124 2125 7ff620376fc7 2124->2125 2126 7ff6203770a0 RtlVirtualUnwind 2124->2126 2127 7ff620376f68 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 2125->2127 2126->2124 2126->2125 2129 7ff62037260d 2128->2129 2130 7ff620372716 CloseHandle 2128->2130 2135 7ff620372795 CloseHandle 2129->2135 2136 7ff620372703 Process32NextW 2129->2136 2137 7ff62037278e _invalid_parameter_noinfo_noreturn 2129->2137 2138 7ff620376cbc collate free 2129->2138 2174 7ff620376100 2129->2174 2131 7ff620372721 2130->2131 2132 7ff620376a20 8 API calls 2131->2132 2133 7ff620372731 OpenProcess 2132->2133 2133->1938 2133->1939 2135->2131 2136->2129 2136->2130 2137->2135 2138->2129 2140 7ff620372573 2139->2140 2154 7ff6203723b6 2139->2154 2141 7ff620376a20 8 API calls 2140->2141 2143 7ff620372582 2141->2143 2142 7ff6203723c0 VirtualQueryEx 2142->2154 2143->1956 2143->1960 2143->1964 2144 7ff6203725a4 2146 7ff620376450 9 API calls 2144->2146 2145 7ff620372485 ReadProcessMemory 2145->2154 2147 7ff6203725a9 2146->2147 2149 7ff6203719b0 Concurrency::cancel_current_task __std_exception_copy 2147->2149 2148 7ff620376a40 __std_exception_copy malloc _CxxThrowException std::_Facet_Register 2148->2154 2150 7ff6203725af 2149->2150 2151 7ff62037245e memset 2151->2145 2152 7ff62037259d _invalid_parameter_noinfo_noreturn 2152->2144 2153 7ff620376cbc collate free 2153->2154 2154->2140 2154->2142 2154->2144 2154->2145 2154->2147 2154->2148 2154->2151 2154->2152 2154->2153 2156 7ff620375aa0 24 API calls 2155->2156 2157 7ff6203728ab 2156->2157 2158 7ff6203728d0 2157->2158 2159 7ff6203728b0 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N 2157->2159 2160 7ff6203728fc 2158->2160 2161 7ff6203728d7 2158->2161 2159->2158 2163 7ff62037294a 2160->2163 2165 7ff620372910 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 2160->2165 2162 7ff620375dd0 9 API calls 2161->2162 2164 7ff6203728ea ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 2162->2164 2166 7ff6203759e0 12 API calls 2163->2166 2167 7ff620372979 2164->2167 2165->2163 2165->2165 2168 7ff620372954 2166->2168 2170 7ff6203729df ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 2167->2170 2171 7ff6203759e0 12 API calls 2167->2171 2168->2167 2169 7ff620372959 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N 2168->2169 2169->2167 2172 7ff620376a20 8 API calls 2170->2172 2171->2170 2173 7ff620372a0c CloseHandle 2172->2173 2173->1965 2175 7ff620376126 2174->2175 2176 7ff620376222 2174->2176 2178 7ff620376131 memcpy 2175->2178 2179 7ff62037615f 2175->2179 2191 7ff620371a50 ?_Xlength_error@std@@YAXPEBD 2176->2191 2178->2129 2180 7ff620376227 2179->2180 2181 7ff6203761e5 2179->2181 2183 7ff6203761a4 memcpy 2179->2183 2184 7ff620376197 2179->2184 2182 7ff6203719b0 Concurrency::cancel_current_task __std_exception_copy 2180->2182 2187 7ff620376a40 std::_Facet_Register 3 API calls 2181->2187 2185 7ff62037622d 2182->2185 2183->2129 2188 7ff620376a40 std::_Facet_Register 3 API calls 2184->2188 2187->2183 2189 7ff62037619f 2188->2189 2189->2183 2190 7ff6203761de _invalid_parameter_noinfo_noreturn 2189->2190 2190->2181 2243 7ff6203768d0 2248 7ff620373a40 2243->2248 2244 7ff6203768db _Cnd_do_broadcast_at_thread_exit 2245 7ff620376cbc collate free 2244->2245 2246 7ff6203768ee 2245->2246 2249 7ff6203725b0 22 API calls 2248->2249 2250 7ff620373a5e OpenProcess 2249->2250 2251 7ff620373aa7 2250->2251 2252 7ff620373a73 MessageBoxA 2250->2252 2253 7ff620372340 22 API calls 2251->2253 2254 7ff620376a20 8 API calls 2252->2254 2257 7ff620373ad3 2253->2257 2255 7ff620373a9f 2254->2255 2255->2244 2256 7ff620373b24 2258 7ff620373ba4 2256->2258 2260 7ff620373b9f 2256->2260 2263 7ff620373b98 _invalid_parameter_noinfo_noreturn 2256->2263 2257->2256 2257->2263 2264 7ff620376cbc collate free 2257->2264 2259 7ff6203727b0 51 API calls 2258->2259 2262 7ff620373bac _wcsdup CreateProcessW 2259->2262 2261 7ff620376cbc collate free 2260->2261 2261->2258 2265 7ff620373c65 2262->2265 2266 7ff620373c3f WaitForSingleObject CloseHandle CloseHandle 2262->2266 2263->2260 2264->2256 2267 7ff620376a20 8 API calls 2265->2267 2266->2265 2268 7ff620373c8d 2267->2268 2268->2244 2467 7ff620375350 2469 7ff620375361 2467->2469 2472 7ff62037538e 2467->2472 2468 7ff620375386 2471 7ff620376cbc collate free 2468->2471 2469->2468 2470 7ff6203753a1 _invalid_parameter_noinfo_noreturn 2469->2470 2471->2472 2473 7ff620374b50 2474 7ff620374b67 2473->2474 2475 7ff620374b72 2473->2475 2476 7ff620374b88 2475->2476 2477 7ff620374b79 ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J 2475->2477 2478 7ff620374bad memcpy 2476->2478 2480 7ff620374be2 2476->2480 2477->2476 2478->2480 2479 7ff620374c7e 2480->2479 2481 7ff620374c5e 2480->2481 2482 7ff620374c30 fread 2480->2482 2481->2479 2483 7ff620374c63 fread 2481->2483 2482->2479 2482->2480 2483->2479 2484 7ff620376f50 2487 7ff620377628 2484->2487 2488 7ff62037764b GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 2487->2488 2489 7ff620376f59 2487->2489 2488->2489 2575 7ff6203732d0 2576 7ff6203732da terminate 2575->2576 2577 7ff6203732e1 2575->2577 2576->2577 2490 7ff620377d62 _seh_filter_exe 2492 7ff620374160 2493 7ff620374170 GetAsyncKeyState 2492->2493 2493->2493 2494 7ff620374180 ShowWindow Sleep 2493->2494 2494->2493 2491 7ff620371960 __std_exception_destroy 2589 7ff6203711e0 2590 7ff620375560 7 API calls 2589->2590 2591 7ff620371238 2590->2591 2596 7ff6203750e0 2597 7ff620375106 2596->2597 2599 7ff62037510d 2596->2599 2598 7ff620376a20 8 API calls 2597->2598 2600 7ff620375286 2598->2600 2599->2597 2601 7ff6203751b5 ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD 2599->2601 2602 7ff620375193 fputc 2599->2602 2603 7ff6203751fa 2601->2603 2604 7ff620375224 2601->2604 2602->2597 2603->2604 2605 7ff6203751ff 2603->2605 2604->2597 2606 7ff620375233 fwrite 2604->2606 2605->2597 2607 7ff620375204 fputc 2605->2607 2606->2597 2607->2597 2578 7ff620377ae0 2579 7ff620377af3 2578->2579 2580 7ff620377b00 2578->2580 2581 7ff620374590 2 API calls 2579->2581 2581->2580 2582 7ff6203757e0 2583 7ff620375803 2582->2583 2584 7ff62037583e ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA 2583->2584 2585 7ff6203759e0 12 API calls 2583->2585 2586 7ff62037585b 2584->2586 2587 7ff62037584e 2584->2587 2585->2584 2588 7ff620376cbc collate free 2587->2588 2588->2586 2592 7ff6203752e0 2593 7ff6203752fd 2592->2593 2594 7ff62037533a ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA 2593->2594 2595 7ff6203759e0 12 API calls 2593->2595 2595->2594 2608 7ff620377ce8 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N 2609 7ff6203778f4 2610 7ff62037792c __GSHandlerCheckCommon 2609->2610 2611 7ff620377958 2610->2611 2612 7ff620377947 __CxxFrameHandler4 2610->2612 2612->2611 2502 7ff620374970 2503 7ff6203749a3 2502->2503 2504 7ff6203758f0 10 API calls 2503->2504 2510 7ff620374a01 2503->2510 2505 7ff6203749c6 2504->2505 2508 7ff6203749d4 _fseeki64 2505->2508 2509 7ff6203749eb fgetpos 2505->2509 2505->2510 2506 7ff620376a20 8 API calls 2507 7ff620374a6b 2506->2507 2508->2509 2508->2510 2509->2510 2510->2506 2511 7ff620375870 2516 7ff620372a30 2511->2516 2517 7ff620372a86 2516->2517 2518 7ff620372ac3 ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 2517->2518 2519 7ff6203759e0 12 API calls 2517->2519 2519->2518 2520 7ff620377e70 2521 7ff620377e80 2520->2521 2525 7ff620377eb4 2520->2525 2522 7ff620377eac 2521->2522 2523 7ff620377ecf _invalid_parameter_noinfo_noreturn 2521->2523 2524 7ff620376cbc collate free 2522->2524 2527 7ff620377ee0 2523->2527 2524->2525 2526 7ff620377f2d 2527->2526 2528 7ff620376cbc collate free 2527->2528 2528->2527 2613 7ff6203746f0 2614 7ff620375ff0 18 API calls 2613->2614 2615 7ff620374705 ?always_noconv@codecvt_base@std@ 2614->2615 2616 7ff620374728 ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 2615->2616 2617 7ff620374715 2615->2617 2618 7ff620374ff0 2620 7ff62037500b 2618->2620 2619 7ff620375021 2620->2619 2621 7ff62037505b ungetc 2620->2621 2621->2619 2622 7ff620376cf0 2623 7ff620376d00 2622->2623 2635 7ff620376af4 2623->2635 2625 7ff62037740c 9 API calls 2626 7ff620376da5 2625->2626 2627 7ff620376d24 _RTC_Initialize 2632 7ff620376d87 2627->2632 2643 7ff6203776dc InitializeSListHead 2627->2643 2632->2625 2634 7ff620376d95 2632->2634 2636 7ff620376b05 2635->2636 2641 7ff620376b37 2635->2641 2637 7ff620376b0a __scrt_release_startup_lock 2636->2637 2638 7ff620376b74 2636->2638 2637->2641 2642 7ff620376b27 _initialize_onexit_table 2637->2642 2639 7ff62037740c 9 API calls 2638->2639 2640 7ff620376b7e 2639->2640 2641->2627 2642->2641 2650 7ff6203732f0 2651 7ff62037330a 2650->2651 2656 7ff62037333e 2650->2656 2654 7ff620373546 _invalid_parameter_noinfo_noreturn 2651->2654 2655 7ff620376cbc collate free 2651->2655 2652 7ff62037339a 2670 7ff620371f60 2652->2670 2655->2656 2656->2652 2656->2654 2657 7ff620376cbc collate free 2656->2657 2657->2652 2659 7ff620376cbc collate free 2661 7ff620373400 2659->2661 2660 7ff6203734e6 2660->2654 2665 7ff62037352c 2660->2665 2668 7ff620373524 2660->2668 2661->2654 2662 7ff620376cbc collate free 2661->2662 2663 7ff620373454 2661->2663 2662->2663 2663->2654 2664 7ff620376cbc collate free 2663->2664 2666 7ff62037349f 2663->2666 2664->2666 2666->2654 2666->2660 2667 7ff620376cbc collate free 2666->2667 2667->2660 2669 7ff620376cbc collate free 2668->2669 2669->2665 2671 7ff620371f7a 2670->2671 2672 7ff620371fae 2670->2672 2674 7ff62037232a _invalid_parameter_noinfo_noreturn 2671->2674 2675 7ff620376cbc collate free 2671->2675 2700 7ff620375be0 2672->2700 2675->2672 2676 7ff620371fd5 2709 7ff6203753b0 2676->2709 2678 7ff620371fe1 2678->2674 2679 7ff620376cbc collate free 2678->2679 2680 7ff620372022 2678->2680 2679->2680 2680->2674 2681 7ff620376cbc collate free 2680->2681 2683 7ff62037207c 2680->2683 2681->2683 2682 7ff62037218a 2682->2674 2690 7ff620376cbc collate free 2682->2690 2691 7ff6203721e4 2682->2691 2683->2674 2684 7ff620376cbc collate free 2683->2684 2686 7ff6203720d6 2683->2686 2684->2686 2685 7ff620376cbc collate free 2687 7ff620372130 2685->2687 2686->2674 2686->2685 2686->2687 2687->2674 2687->2682 2688 7ff620376cbc collate free 2687->2688 2688->2682 2689 7ff620372238 2689->2674 2695 7ff620376cbc collate free 2689->2695 2697 7ff620372283 2689->2697 2690->2691 2691->2674 2691->2689 2692 7ff620376cbc collate free 2691->2692 2692->2689 2693 7ff6203722ca 2693->2674 2694 7ff620372310 2693->2694 2696 7ff620372308 2693->2696 2694->2654 2694->2659 2694->2661 2695->2697 2699 7ff620376cbc collate free 2696->2699 2697->2674 2697->2693 2698 7ff620376cbc collate free 2697->2698 2698->2693 2699->2694 2701 7ff620375d64 2700->2701 2707 7ff620375bf7 2700->2707 2701->2676 2702 7ff620375d0e 2703 7ff620375d59 2702->2703 2704 7ff620375d8b _invalid_parameter_noinfo_noreturn 2702->2704 2705 7ff620376cbc collate free 2703->2705 2706 7ff620375db8 2704->2706 2705->2701 2706->2676 2707->2702 2707->2704 2708 7ff620376cbc free collate 2707->2708 2708->2707 2714 7ff6203754c8 2709->2714 2721 7ff6203753c7 2709->2721 2710 7ff620375494 2711 7ff6203754c0 2710->2711 2712 7ff6203754ef _invalid_parameter_noinfo_noreturn 2710->2712 2713 7ff620376cbc collate free 2711->2713 2715 7ff620375513 2712->2715 2716 7ff62037553f 2712->2716 2713->2714 2714->2678 2718 7ff620375537 2715->2718 2719 7ff620375558 _invalid_parameter_noinfo_noreturn 2715->2719 2716->2678 2717 7ff620376cbc free collate 2717->2721 2720 7ff620376cbc collate free 2718->2720 2720->2716 2721->2710 2721->2712 2721->2717

                                    Control-flow Graph

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1837029429.00007FF620371000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF620370000, based on PE: true
                                    • Associated: 00000001.00000002.1837006022.00007FF620370000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837142925.00007FF62037D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff620370000_P00LCUE.jbxd
                                    Similarity
                                    • API ID: remove$ConsoleWindow$Cpp_error@std@@Throw_$CurrentFontLongThrd_detach_beginthreadexmemcpy$BeepConcurrency::cancel_current_taskHandleShowTitle_invalid_parameter_noinfo_noreturnexitmallocsystemterminatewcscpy_s
                                    • String ID: Bat Aimbot Head* | c05974$C:\ProgramData\5555.json$C:\ProgramData\back.json$C:\ProgramData\counter1.json$C:\ProgramData\counter2.json$C:\ProgramData\front.json$C:\ProgramData\frontvar.json$C:\ProgramData\left.json$C:\ProgramData\right.json$Lucida Console$cls
                                    • API String ID: 116377887-3169833497
                                    • Opcode ID: 4b4673ac1a6a2a8122306d394406ef5521440b307d1b85bdbff05972462019b6
                                    • Instruction ID: 78ea0034cf1ec9a4b1d2c79f9dfda3be2ff1bc6f59044430755790fa174fd428
                                    • Opcode Fuzzy Hash: 4b4673ac1a6a2a8122306d394406ef5521440b307d1b85bdbff05972462019b6
                                    • Instruction Fuzzy Hash: 78B12931A48B43E6EF009B65EC942B933A1FB44B59F504139DA4D9ABB4DF3CE459C342

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 38 7ff620373d50-7ff620373da4 system call 7ff620372af0 41 7ff620373daa-7ff620373db4 38->41 42 7ff620373e36-7ff620373e3d 38->42 45 7ff620373e0b-7ff620373e32 41->45 46 7ff620373db6-7ff620373dd3 41->46 43 7ff620373e7f-7ff620373e90 42->43 44 7ff620373e3f-7ff620373e5c 42->44 49 7ff620373f5c-7ff620373f6b 43->49 50 7ff620373e96-7ff620373ed7 call 7ff620376a40 _beginthreadex 43->50 47 7ff620373e7a call 7ff620376cbc 44->47 48 7ff620373e5e-7ff620373e71 44->48 45->42 51 7ff620373dd5-7ff620373de8 46->51 52 7ff620373df1-7ff620373e04 call 7ff620376cbc 46->52 47->43 48->47 53 7ff620373e73-7ff620373e79 _invalid_parameter_noinfo_noreturn 48->53 54 7ff62037401c-7ff620374027 49->54 55 7ff620373f71-7ff620373f78 49->55 69 7ff620373edd-7ff620373ee1 50->69 70 7ff620373fe7-7ff620373ff6 ?_Throw_Cpp_error@std@@YAXH@Z 50->70 51->53 58 7ff620373dee 51->58 52->45 53->47 60 7ff620374029 54->60 61 7ff620374073-7ff620374088 Beep 54->61 62 7ff620373f80-7ff620373fc1 call 7ff620376a40 _beginthreadex 55->62 58->52 65 7ff620374030-7ff620374034 60->65 67 7ff620374129-7ff620374151 call 7ff620376a20 61->67 68 7ff62037408e-7ff620374098 61->68 83 7ff6203740e9-7ff6203740f8 ?_Throw_Cpp_error@std@@YAXH@Z 62->83 84 7ff620373fc7-7ff620373fcf 62->84 71 7ff62037403a-7ff620374043 _Thrd_id 65->71 72 7ff620374111-7ff62037411c ?_Throw_Cpp_error@std@@YAXH@Z 65->72 75 7ff62037409a 68->75 76 7ff6203740af-7ff6203740c4 68->76 77 7ff620373ee3-7ff620373eee ?_Throw_Cpp_error@std@@YAXH@Z 69->77 78 7ff620373eef-7ff620373ef8 _Thrd_id 69->78 79 7ff620373ff7-7ff620374004 call 7ff620376470 70->79 81 7ff620374049-7ff62037405e _Thrd_join 71->81 82 7ff620374105-7ff620374110 ?_Throw_Cpp_error@std@@YAXH@Z 71->82 80 7ff62037411d-7ff620374123 terminate 72->80 86 7ff6203740a0-7ff6203740a4 75->86 87 7ff6203740c6-7ff6203740d9 76->87 88 7ff620374124 call 7ff620376cbc 76->88 77->78 90 7ff620373efa-7ff620373f05 ?_Throw_Cpp_error@std@@YAXH@Z 78->90 91 7ff620373f06-7ff620373f1d _Thrd_join 78->91 103 7ff620374005-7ff620374009 79->103 80->88 94 7ff6203740f9-7ff620374104 ?_Throw_Cpp_error@std@@YAXH@Z 81->94 95 7ff620374064-7ff620374071 81->95 82->72 83->94 84->79 97 7ff620373fd1-7ff620373fe5 84->97 86->80 98 7ff6203740a6-7ff6203740ad 86->98 87->88 99 7ff6203740db-7ff6203740e1 _invalid_parameter_noinfo_noreturn 87->99 88->67 90->91 92 7ff620373f2b-7ff620373f45 Beep 91->92 93 7ff620373f1f-7ff620373f2a ?_Throw_Cpp_error@std@@YAXH@Z 91->93 101 7ff620373f47-7ff620373f4d terminate 92->101 102 7ff620373f4e-7ff620373f55 92->102 93->92 94->82 95->61 95->65 97->103 98->76 98->86 104 7ff6203740e2-7ff6203740e8 terminate 99->104 101->102 102->49 103->104 105 7ff62037400f-7ff620374016 103->105 104->83 105->54 105->62
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1837029429.00007FF620371000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF620370000, based on PE: true
                                    • Associated: 00000001.00000002.1837006022.00007FF620370000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837142925.00007FF62037D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff620370000_P00LCUE.jbxd
                                    Similarity
                                    • API ID: Cpp_error@std@@Throw_$D@std@@@std@@U?$char_traits@$terminate$BeepThrd_idThrd_joinV01@_beginthreadex_invalid_parameter_noinfo_noreturn$??1?$basic_ios@??1?$basic_istream@??1?$basic_streambuf@??6?$basic_ostream@V01@@memsetsystem
                                    • String ID: cls
                                    • API String ID: 2572847691-3046418502
                                    • Opcode ID: fb89758caaaf456a37bb13b8334d2eb496e7ea3377e6fdc09af4e1c5fcdc1fc0
                                    • Instruction ID: 1a80bc908520462539cd3e1b4ff6e2c83bb223360c5c0dd86db950090901dace
                                    • Opcode Fuzzy Hash: fb89758caaaf456a37bb13b8334d2eb496e7ea3377e6fdc09af4e1c5fcdc1fc0
                                    • Instruction Fuzzy Hash: 85B17B32E58A43E6FF408F64DC942B833A1FB44799F444639DA4D9ABA4DF3CA594C342

                                    Control-flow Graph

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1837029429.00007FF620371000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF620370000, based on PE: true
                                    • Associated: 00000001.00000002.1837006022.00007FF620370000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837142925.00007FF62037D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff620370000_P00LCUE.jbxd
                                    Similarity
                                    • API ID: CloseHandle$CreateProcessProcess32$FirstMessageNextObjectOpenSingleSnapshotToolhelp32Wait_invalid_parameter_noinfo_noreturn_wcsdup
                                    • String ID: Error$Failed to open process.$attrib +h +s C:\ProgramData\counter1.json$h
                                    • API String ID: 1658151911-3760130278
                                    • Opcode ID: 79edc0471b3ca79d2d22e00f766fcc51eb3aa554bc22d94dde445eb4fc966af8
                                    • Instruction ID: 7726db74b61301c0ea461a5ba0ab2a23e20e71a0961291605dc61662d905825a
                                    • Opcode Fuzzy Hash: 79edc0471b3ca79d2d22e00f766fcc51eb3aa554bc22d94dde445eb4fc966af8
                                    • Instruction Fuzzy Hash: 52516122A58B83D1EE60CB10EC803B9B360FF85794F104239DAAD8ABB4DF7CD0848701

                                    Control-flow Graph

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1837029429.00007FF620371000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF620370000, based on PE: true
                                    • Associated: 00000001.00000002.1837006022.00007FF620370000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837142925.00007FF62037D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff620370000_P00LCUE.jbxd
                                    Similarity
                                    • API ID: CloseHandleProcess32$CreateFirstNextSnapshotToolhelp32_invalid_parameter_noinfo_noreturn
                                    • String ID: GTAProcess
                                    • API String ID: 881181425-2175359186
                                    • Opcode ID: 2613e9da877990280d98a101d821d8fc77633f6dbc7195a9aa21fb461fbd9bf8
                                    • Instruction ID: 28304a7f9bad0b88cade59f20bcf85427114b861a23469334689c2e498bbdb8b
                                    • Opcode Fuzzy Hash: 2613e9da877990280d98a101d821d8fc77633f6dbc7195a9aa21fb461fbd9bf8
                                    • Instruction Fuzzy Hash: 6841A432B18A83E1EE508F25D88427A63A0FB45BA0F544331EAAD9BBE4DF7CD544C701

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 106 7ff620372eb0-7ff620372f1e call 7ff620372af0 109 7ff620372f4a-7ff620372f4e 106->109 110 7ff620372f20-7ff620372f48 106->110 111 7ff620372f52-7ff620372f59 109->111 110->111 112 7ff620372f9b-7ff620372f9e 111->112 113 7ff620372f5b-7ff620372f78 111->113 114 7ff620372fa4 call 7ff6203725b0 112->114 115 7ff620373121-7ff62037314a call 7ff620375dd0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 112->115 116 7ff620372f7a-7ff620372f8d 113->116 117 7ff620372f96 call 7ff620376cbc 113->117 123 7ff620372fa9-7ff620372fbf OpenProcess 114->123 124 7ff62037314c 115->124 125 7ff62037319b-7ff6203731b5 115->125 116->117 121 7ff620372f8f-7ff620372f95 _invalid_parameter_noinfo_noreturn 116->121 117->112 121->117 126 7ff620372fc5-7ff620372fdf call 7ff620372340 123->126 127 7ff620373231-7ff620373254 call 7ff620375dd0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 123->127 128 7ff620373150-7ff620373199 call 7ff620375dd0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 124->128 130 7ff6203731bb 125->130 131 7ff620373255-7ff620373258 125->131 143 7ff620373040-7ff620373047 126->143 144 7ff620372fe1-7ff620372fe4 126->144 127->131 128->125 138 7ff6203731c0-7ff6203731de call 7ff6203725b0 OpenProcess 130->138 134 7ff62037325a-7ff62037326b 131->134 135 7ff620373294-7ff6203732c0 call 7ff620376a20 131->135 139 7ff62037326d-7ff620373280 134->139 140 7ff620373289-7ff62037328f call 7ff620376cbc 134->140 138->127 159 7ff6203731e0-7ff62037322d ReadProcessMemory WriteProcessMemory CloseHandle 138->159 139->140 148 7ff620373282-7ff620373288 _invalid_parameter_noinfo_noreturn 139->148 140->135 146 7ff620373089-7ff6203730cc call 7ff6203727b0 CloseHandle call 7ff620375dd0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 143->146 147 7ff620373049-7ff620373066 143->147 151 7ff620372fe6-7ff620372ffc 144->151 152 7ff62037301e-7ff62037303c 144->152 168 7ff62037311b-7ff62037311f 146->168 169 7ff6203730ce 146->169 154 7ff620373068-7ff62037307b 147->154 155 7ff620373084 call 7ff620376cbc 147->155 148->140 157 7ff620373016-7ff620373019 call 7ff620376cbc 151->157 158 7ff620372ffe-7ff620373011 151->158 152->143 154->155 160 7ff62037307d-7ff620373083 _invalid_parameter_noinfo_noreturn 154->160 155->146 157->152 158->160 163 7ff620373013 158->163 159->138 164 7ff62037322f 159->164 160->155 163->157 164->131 168->125 170 7ff6203730d0-7ff620373119 call 7ff620375dd0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 169->170 170->168
                                    APIs
                                      • Part of subcall function 00007FF620372AF0: memset.VCRUNTIME140 ref: 00007FF620372B4D
                                      • Part of subcall function 00007FF620372AF0: ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF620372BE3
                                      • Part of subcall function 00007FF620372AF0: ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF620372C64
                                      • Part of subcall function 00007FF620372AF0: ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF620372DB4
                                      • Part of subcall function 00007FF620372AF0: ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF620372DBE
                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF620372F8F
                                    • OpenProcess.KERNEL32 ref: 00007FF620372FB3
                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF62037307D
                                    • CloseHandle.KERNEL32 ref: 00007FF620373095
                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF6203730F0
                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z.MSVCP140 ref: 00007FF6203730FC
                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF62037310C
                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6203730B8
                                      • Part of subcall function 00007FF620375DD0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF620375E49
                                      • Part of subcall function 00007FF620375DD0: ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF620375E69
                                      • Part of subcall function 00007FF620375DD0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF620375E79
                                      • Part of subcall function 00007FF620375DD0: ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF620375F5C
                                      • Part of subcall function 00007FF620375DD0: ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF620375F63
                                      • Part of subcall function 00007FF620375DD0: ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF620375F70
                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF62037313E
                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF620373170
                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z.MSVCP140 ref: 00007FF62037317C
                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF62037318C
                                    • OpenProcess.KERNEL32 ref: 00007FF6203731D2
                                    • ReadProcessMemory.KERNEL32 ref: 00007FF6203731FC
                                    • WriteProcessMemory.KERNEL32 ref: 00007FF620373217
                                    • CloseHandle.KERNEL32 ref: 00007FF620373220
                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF620373282
                                      • Part of subcall function 00007FF620375DD0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF620375EC6
                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF62037324E
                                      • Part of subcall function 00007FF620375DD0: ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140 ref: 00007FF620375EEF
                                      • Part of subcall function 00007FF620375DD0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF620375F16
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1837029429.00007FF620371000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF620370000, based on PE: true
                                    • Associated: 00000001.00000002.1837006022.00007FF620370000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837142925.00007FF62037D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff620370000_P00LCUE.jbxd
                                    Similarity
                                    • API ID: D@std@@@std@@U?$char_traits@$V01@$??6?$basic_ostream@$V01@@$Process$_invalid_parameter_noinfo_noreturn$?good@ios_base@std@@?sputc@?$basic_streambuf@CloseHandleMemoryOpenV01@_V21@@Vios_base@1@$??1?$basic_ios@??1?$basic_istream@??1?$basic_streambuf@?flush@?$basic_ostream@?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@ReadV12@Writememset
                                    • String ID: Address: 0x$Failed to open process handle.$Found addresses from file:$Found addresses:
                                    • API String ID: 2046513103-2894768898
                                    • Opcode ID: 87eaca3f77154e0081f26dac1b9232eaf099f9805513264289fb7d816287bec3
                                    • Instruction ID: c6c605f99ada2574892c185717c43882f75c9b03f71df09edbc4b4a2c0e89700
                                    • Opcode Fuzzy Hash: 87eaca3f77154e0081f26dac1b9232eaf099f9805513264289fb7d816287bec3
                                    • Instruction Fuzzy Hash: 8FB17A22B59A43E5EE049B25EC842B96360FF48B98F404235DE5D9BBB9DF7CE445C302

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 203 7ff620372af0-7ff620372b61 memset call 7ff6203745f0 206 7ff620372b67-7ff620372c25 call 7ff620375dd0 * 6 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 203->206 207 7ff620372c70-7ff620372ca2 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEA_K@Z ??Bios_base@std@@QEBA_NXZ 203->207 239 7ff620372c27-7ff620372c33 206->239 240 7ff620372c4f-7ff620372c53 206->240 208 7ff620372ca4-7ff620372cac 207->208 209 7ff620372cfe-7ff620372d0b call 7ff6203759e0 207->209 211 7ff620372cbd-7ff620372cc5 call 7ff620376680 208->211 212 7ff620372cae-7ff620372cbb 208->212 220 7ff620372d2c-7ff620372d69 209->220 221 7ff620372d0d-7ff620372d26 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z 209->221 216 7ff620372cca-7ff620372cfc ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEA_K@Z ??Bios_base@std@@QEBA_NXZ 211->216 212->216 216->208 216->209 223 7ff620372d6b-7ff620372d77 220->223 224 7ff620372d93-7ff620372d97 220->224 221->220 223->224 226 7ff620372d79-7ff620372d91 223->226 227 7ff620372d99-7ff620372d9e call 7ff6203759e0 224->227 228 7ff620372da3-7ff620372dae ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ 224->228 226->224 227->228 229 7ff620372daf-7ff620372de8 ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff620376a20 228->229 239->240 241 7ff620372c35-7ff620372c4d 239->241 242 7ff620372c55-7ff620372c5a call 7ff6203759e0 240->242 243 7ff620372c5f-7ff620372c6b ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ 240->243 241->240 242->243 243->229
                                    APIs
                                    • memset.VCRUNTIME140 ref: 00007FF620372B4D
                                      • Part of subcall function 00007FF6203745F0: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF620372B5C), ref: 00007FF62037461B
                                      • Part of subcall function 00007FF6203745F0: ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140(?,?,?,?,?,?,00000000,00007FF620372B5C), ref: 00007FF62037463A
                                      • Part of subcall function 00007FF6203745F0: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF620372B5C), ref: 00007FF62037466C
                                      • Part of subcall function 00007FF6203745F0: ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF620372B5C), ref: 00007FF620374687
                                      • Part of subcall function 00007FF6203745F0: ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,?,00000000,00007FF620372B5C), ref: 00007FF6203746D7
                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF620372BE3
                                    • ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF620372C64
                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF620372C7C
                                    • ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEA_K@Z.MSVCP140 ref: 00007FF620372C8A
                                    • ??Bios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF620372C9A
                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF620372CD6
                                    • ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEA_K@Z.MSVCP140 ref: 00007FF620372CE4
                                    • ??Bios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF620372CF4
                                    • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF620372D26
                                    • ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF620372DA8
                                    • ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF620372DB4
                                    • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF620372DBE
                                      • Part of subcall function 00007FF620375DD0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF620375E49
                                      • Part of subcall function 00007FF620375DD0: ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF620375E69
                                      • Part of subcall function 00007FF620375DD0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF620375E79
                                      • Part of subcall function 00007FF620375DD0: ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF620375F5C
                                      • Part of subcall function 00007FF620375DD0: ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF620375F63
                                      • Part of subcall function 00007FF620375DD0: ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF620375F70
                                      • Part of subcall function 00007FF620375DD0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF620375EC6
                                      • Part of subcall function 00007FF620375DD0: ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140 ref: 00007FF620375EEF
                                      • Part of subcall function 00007FF620375DD0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF620375F16
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1837029429.00007FF620371000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF620370000, based on PE: true
                                    • Associated: 00000001.00000002.1837006022.00007FF620370000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837142925.00007FF62037D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff620370000_P00LCUE.jbxd
                                    Similarity
                                    • API ID: U?$char_traits@$D@std@@@std@@$V01@$??6?$basic_ostream@?setstate@?$basic_ios@$??1?$basic_streambuf@??5?$basic_istream@?good@ios_base@std@@?sputc@?$basic_streambuf@Bios_base@std@@V21@@Vios_base@1@$??0?$basic_ios@??0?$basic_istream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_istream@?flush@?$basic_ostream@?sputn@?$basic_streambuf@?uncaught_exception@std@@D@std@@@1@_Init@?$basic_streambuf@Osfx@?$basic_ostream@V01@@V12@V?$basic_streambuf@memset
                                    • String ID:
                                    • API String ID: 4050549558-0
                                    • Opcode ID: 4ce6b16d2f45b11d3bcd15cb2600135273e922c64144069f1dbd649bf3c5001c
                                    • Instruction ID: 3dda0918c68ce57c12cd21761a240868273dc58bd73f0bbe7d898dfaad487884
                                    • Opcode Fuzzy Hash: 4ce6b16d2f45b11d3bcd15cb2600135273e922c64144069f1dbd649bf3c5001c
                                    • Instruction Fuzzy Hash: A991C232A58B86E5EF00DF25E8942B963A5FB84B84F904432DA4D8BB79DF7CE445C701

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 245 7ff620375dd0-7ff620375df9 246 7ff620375e00-7ff620375e07 245->246 246->246 247 7ff620375e09-7ff620375e18 246->247 248 7ff620375e1a-7ff620375e1d 247->248 249 7ff620375e24 247->249 248->249 250 7ff620375e1f-7ff620375e22 248->250 251 7ff620375e26-7ff620375e36 249->251 250->251 252 7ff620375e38-7ff620375e3e 251->252 253 7ff620375e3f-7ff620375e51 ?good@ios_base@std@@QEBA_NXZ 251->253 252->253 254 7ff620375e83-7ff620375e89 253->254 255 7ff620375e53-7ff620375e62 253->255 256 7ff620375e8b-7ff620375e90 254->256 257 7ff620375e95-7ff620375ea8 254->257 259 7ff620375e64-7ff620375e67 255->259 260 7ff620375e81 255->260 261 7ff620375f4d-7ff620375f6b ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 256->261 262 7ff620375edd-7ff620375ef8 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z 257->262 263 7ff620375eaa 257->263 259->260 264 7ff620375e69-7ff620375e7f ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ ?good@ios_base@std@@QEBA_NXZ 259->264 260->254 266 7ff620375f6d-7ff620375f76 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ 261->266 267 7ff620375f77-7ff620375f87 261->267 268 7ff620375efa 262->268 269 7ff620375f26 262->269 265 7ff620375eb0-7ff620375eb3 263->265 264->254 265->262 270 7ff620375eb5-7ff620375ecf ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 265->270 266->267 271 7ff620375f89-7ff620375f8f 267->271 272 7ff620375f90-7ff620375fa4 267->272 273 7ff620375f00-7ff620375f03 268->273 274 7ff620375f29 269->274 275 7ff620375ed8-7ff620375edb 270->275 276 7ff620375ed1-7ff620375ed6 270->276 271->272 277 7ff620375f2d-7ff620375f3d 273->277 278 7ff620375f05-7ff620375f1f ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 273->278 274->277 275->265 276->274 277->261 278->269 280 7ff620375f21-7ff620375f24 278->280 280->273
                                    APIs
                                    • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF620375E49
                                    • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF620375E69
                                    • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF620375E79
                                    • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF620375EC6
                                    • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140 ref: 00007FF620375EEF
                                    • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF620375F16
                                    • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF620375F5C
                                    • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF620375F63
                                    • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF620375F70
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1837029429.00007FF620371000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF620370000, based on PE: true
                                    • Associated: 00000001.00000002.1837006022.00007FF620370000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837142925.00007FF62037D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff620370000_P00LCUE.jbxd
                                    Similarity
                                    • API ID: D@std@@@std@@U?$char_traits@$?good@ios_base@std@@?sputc@?$basic_streambuf@$?flush@?$basic_ostream@?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@V12@
                                    • String ID:
                                    • API String ID: 3274656010-0
                                    • Opcode ID: afb8fbe5ce7b71b20396a5981d8b937dd4107457127f4705f9ed6d6a91a5f01e
                                    • Instruction ID: 4808d7b8084c46c647a8256f4f885edab2566dd0346390db158a2a693c58d58e
                                    • Opcode Fuzzy Hash: afb8fbe5ce7b71b20396a5981d8b937dd4107457127f4705f9ed6d6a91a5f01e
                                    • Instruction Fuzzy Hash: 69512C33A08A42D2EF648F19E9D0278A7A0FB85F95B55C531CA5E8BBB1CF79D542C301

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1837029429.00007FF620371000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF620370000, based on PE: true
                                    • Associated: 00000001.00000002.1837006022.00007FF620370000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837142925.00007FF62037D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff620370000_P00LCUE.jbxd
                                    Similarity
                                    • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
                                    • String ID:
                                    • API String ID: 1133592946-0
                                    • Opcode ID: ebbe28923bcede08e3a27573fb81dd6f09e7c3854d746f6ade6dea353e5aff33
                                    • Instruction ID: acad750eda8fe3b36d121c5cf28e39bfffb8a9b2bc37cf09f8e87cf29d332616
                                    • Opcode Fuzzy Hash: ebbe28923bcede08e3a27573fb81dd6f09e7c3854d746f6ade6dea353e5aff33
                                    • Instruction Fuzzy Hash: 7D312921A08243E2FE14AB25EDE63B92291AF45784F444439EA4DCF7F7DE2DA844C753

                                    Control-flow Graph

                                    APIs
                                    • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF620372B5C), ref: 00007FF62037461B
                                    • ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140(?,?,?,?,?,?,00000000,00007FF620372B5C), ref: 00007FF62037463A
                                    • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF620372B5C), ref: 00007FF62037466C
                                    • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF620372B5C), ref: 00007FF620374687
                                      • Part of subcall function 00007FF620375AA0: ?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z.MSVCP140 ref: 00007FF620375ADA
                                      • Part of subcall function 00007FF620375AA0: ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF620375AF7
                                      • Part of subcall function 00007FF620375AA0: _get_stream_buffer_pointers.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF620375B20
                                      • Part of subcall function 00007FF620375AA0: ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ.MSVCP140 ref: 00007FF620375B6B
                                      • Part of subcall function 00007FF620375AA0: ?always_noconv@codecvt_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF620375B80
                                    • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,?,00000000,00007FF620372B5C), ref: 00007FF6203746D7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1837029429.00007FF620371000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF620370000, based on PE: true
                                    • Associated: 00000001.00000002.1837006022.00007FF620370000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837142925.00007FF62037D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff620370000_P00LCUE.jbxd
                                    Similarity
                                    • API ID: U?$char_traits@$D@std@@@std@@$Init@?$basic_streambuf@$??0?$basic_ios@??0?$basic_istream@??0?$basic_streambuf@?always_noconv@codecvt_base@std@@?getloc@?$basic_streambuf@?setstate@?$basic_ios@D@std@@@1@_Fiopen@std@@U_iobuf@@V?$basic_streambuf@Vlocale@2@_get_stream_buffer_pointers
                                    • String ID: C:\ProgramData\counter1.json
                                    • API String ID: 2682282330-3068170251
                                    • Opcode ID: 84097462706aecc32e92586af653c514ba0a8dae16f96084b84ad6512679cc66
                                    • Instruction ID: dfa75de56c05dfb87477543fe15fcac310eaf25e7bfef686c4d795bd4c3e57d9
                                    • Opcode Fuzzy Hash: 84097462706aecc32e92586af653c514ba0a8dae16f96084b84ad6512679cc66
                                    • Instruction Fuzzy Hash: 41213632649B82D6EF108F25E99433977A0FB49B88F448135CA4D8BB24DF3CD115C742

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1837029429.00007FF620371000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF620370000, based on PE: true
                                    • Associated: 00000001.00000002.1837006022.00007FF620370000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837142925.00007FF62037D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff620370000_P00LCUE.jbxd
                                    Similarity
                                    • API ID: CloseCreateFirstHandleProcess32SnapshotThrd_yieldToolhelp32
                                    • String ID:
                                    • API String ID: 1362082536-0
                                    • Opcode ID: 625f585ef028860581f62ffb7b0b91156ed2cf808ef8618880c22a740702cc3c
                                    • Instruction ID: 8da103755f4c7d36761a84502c86e9e76fc6739520c229bbda6dbb023eda774b
                                    • Opcode Fuzzy Hash: 625f585ef028860581f62ffb7b0b91156ed2cf808ef8618880c22a740702cc3c
                                    • Instruction Fuzzy Hash: 3D114F21A4DA43E1EE509B15ECC823A6760FF85B90F044230DA5E9B7B4EF7CE414C702

                                    Control-flow Graph

                                    APIs
                                    • ?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z.MSVCP140 ref: 00007FF620375ADA
                                    • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF620375AF7
                                    • _get_stream_buffer_pointers.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF620375B20
                                    • ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ.MSVCP140 ref: 00007FF620375B6B
                                      • Part of subcall function 00007FF620375FF0: ??0_Lockit@std@@QEAA@H@Z.MSVCP140(?,?,?,?,?,?,00000000,00007FF620375B7A), ref: 00007FF62037601D
                                      • Part of subcall function 00007FF620375FF0: ??Bid@locale@std@@QEAA_KXZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF620375B7A), ref: 00007FF620376037
                                      • Part of subcall function 00007FF620375FF0: ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF620375B7A), ref: 00007FF620376069
                                      • Part of subcall function 00007FF620375FF0: ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z.MSVCP140(?,?,?,?,?,?,00000000,00007FF620375B7A), ref: 00007FF620376094
                                      • Part of subcall function 00007FF620375FF0: std::_Facet_Register.LIBCPMT ref: 00007FF6203760AD
                                      • Part of subcall function 00007FF620375FF0: ??1_Lockit@std@@QEAA@XZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF620375B7A), ref: 00007FF6203760CC
                                    • ?always_noconv@codecvt_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF620375B80
                                    • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF620375B97
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1837029429.00007FF620371000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF620370000, based on PE: true
                                    • Associated: 00000001.00000002.1837006022.00007FF620370000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837142925.00007FF62037D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff620370000_P00LCUE.jbxd
                                    Similarity
                                    • API ID: D@std@@@std@@U?$char_traits@$Init@?$basic_streambuf@Lockit@std@@$??0_??1_?always_noconv@codecvt_base@std@@?getloc@?$basic_streambuf@Bid@locale@std@@Facet_Fiopen@std@@Getcat@?$codecvt@Getgloballocale@locale@std@@Locimp@12@Mbstatet@@@std@@RegisterU_iobuf@@V42@@Vfacet@locale@2@Vlocale@2@_get_stream_buffer_pointersstd::_
                                    • String ID:
                                    • API String ID: 3911317180-0
                                    • Opcode ID: b0123849ad09c8c6dbac2d140cba4555ea28f13a8cf9db0f0653b14ca7bc48ab
                                    • Instruction ID: 9aee9aa585f6b2f29b304574c25787fc8202f9d3ee8c5aab779fb230522f8cba
                                    • Opcode Fuzzy Hash: b0123849ad09c8c6dbac2d140cba4555ea28f13a8cf9db0f0653b14ca7bc48ab
                                    • Instruction Fuzzy Hash: ED314832619B82D2EF548F25A88436977E4FB89F88F040039DA8E8BB68DF7CD445C740

                                    Control-flow Graph

                                    APIs
                                    • ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z.MSVCP140 ref: 00007FF620375FC5
                                    • ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z.MSVCP140 ref: 00007FF620375FD1
                                    • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF620375FDA
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1837029429.00007FF620371000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF620370000, based on PE: true
                                    • Associated: 00000001.00000002.1837006022.00007FF620370000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837142925.00007FF62037D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff620370000_P00LCUE.jbxd
                                    Similarity
                                    • API ID: D@std@@@std@@U?$char_traits@$V12@$?flush@?$basic_ostream@?put@?$basic_ostream@?widen@?$basic_ios@
                                    • String ID:
                                    • API String ID: 1875450691-0
                                    • Opcode ID: 5fed25aae8678ad7777d30a029329420ffdded569f7e1ba7fe0ec57107941d23
                                    • Instruction ID: 80f0002480af22185ac7b4b40c1a4a597cf6c8c121c748c2f1fdcdb155d3d1df
                                    • Opcode Fuzzy Hash: 5fed25aae8678ad7777d30a029329420ffdded569f7e1ba7fe0ec57107941d23
                                    • Instruction Fuzzy Hash: 23D01721A84A07D2DE089F26BC940381320EF89F56B4CA430CE0F8A721CE3CD09A8210

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1837029429.00007FF620371000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF620370000, based on PE: true
                                    • Associated: 00000001.00000002.1837006022.00007FF620370000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837142925.00007FF62037D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff620370000_P00LCUE.jbxd
                                    Similarity
                                    • API ID: Cnd_do_broadcast_at_thread_exit_invalid_parameter_noinfo_noreturn
                                    • String ID:
                                    • API String ID: 2838785208-0
                                    • Opcode ID: adf200b88600350f25c596a182a744d6149bedc3daa09ed477a05bf7a5c0cc35
                                    • Instruction ID: 7cb1dd0054ac81609eaa7a1f903b97073dd30a2cd6395297374755e5e0a244b0
                                    • Opcode Fuzzy Hash: adf200b88600350f25c596a182a744d6149bedc3daa09ed477a05bf7a5c0cc35
                                    • Instruction Fuzzy Hash: 43019E22712687E4EE188F7598A837D6390EF05B54F144934C66D8A7A8DE3DD4908302

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1837029429.00007FF620371000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF620370000, based on PE: true
                                    • Associated: 00000001.00000002.1837006022.00007FF620370000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837142925.00007FF62037D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff620370000_P00LCUE.jbxd
                                    Similarity
                                    • API ID: Cnd_do_broadcast_at_thread_exit
                                    • String ID:
                                    • API String ID: 2632783013-0
                                    • Opcode ID: be2e5a1da491452cc0dcb22902c40c40ca7b71c38e8e308543c73ad22f2639d6
                                    • Instruction ID: 13f01669eece89f1b1cf2542da4459e435a60d239cf75baa1a6e865421e213aa
                                    • Opcode Fuzzy Hash: be2e5a1da491452cc0dcb22902c40c40ca7b71c38e8e308543c73ad22f2639d6
                                    • Instruction Fuzzy Hash: B8C08C00BA0203C2EF2527B2AC8917A13509F49B11F585034C94A8DB61CD3E84DE4B01

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 418 7ff620373550-7ff6203735a3 CreateToolhelp32Snapshot 419 7ff620373607-7ff620373632 call 7ff620376a20 418->419 420 7ff6203735a5-7ff6203735bd Process32FirstW 418->420 422 7ff6203735fe-7ff620373601 CloseHandle 420->422 423 7ff6203735bf 420->423 422->419 425 7ff6203735c0-7ff6203735d0 _wcsicmp 423->425 426 7ff6203735ec-7ff6203735fc Process32NextW 425->426 427 7ff6203735d2-7ff6203735ea OpenProcess 425->427 426->422 426->425 427->426 428 7ff620373633-7ff62037373a TerminateProcess CloseHandle memset ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ call 7ff620375aa0 427->428 431 7ff62037373c-7ff62037375f ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z 428->431 432 7ff620373760-7ff620373768 428->432 431->432 433 7ff6203737ba 432->433 434 7ff62037376a-7ff62037378c call 7ff620375dd0 call 7ff6203759e0 432->434 435 7ff6203737c1-7ff6203737fb call 7ff620375dd0 system MessageBoxW 433->435 444 7ff6203737b1-7ff6203737b8 434->444 445 7ff62037378e-7ff6203737ab ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z 434->445 441 7ff620373800-7ff62037382a ShellExecuteW 435->441 441->441 443 7ff62037382c-7ff620373847 GetCurrentProcess OpenProcessToken 441->443 446 7ff620373849-7ff6203738a9 LookupPrivilegeValueW AdjustTokenPrivileges CloseHandle ExitWindowsEx 443->446 447 7ff6203738af-7ff6203738f3 CloseHandle 443->447 444->435 445->444 446->447 448 7ff6203738f5-7ff620373906 447->448 449 7ff62037392e-7ff620373935 447->449 448->449 450 7ff620373908-7ff62037392c 448->450 451 7ff620373937-7ff62037393e call 7ff6203759e0 449->451 452 7ff620373943-7ff62037396b ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ 449->452 450->449 451->452 452->419
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1837029429.00007FF620371000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF620370000, based on PE: true
                                    • Associated: 00000001.00000002.1837006022.00007FF620370000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837142925.00007FF62037D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff620370000_P00LCUE.jbxd
                                    Similarity
                                    • API ID: U?$char_traits@$D@std@@@std@@$CloseHandleProcess$?setstate@?$basic_ios@OpenProcess32Token$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_ostream@??1?$basic_streambuf@AdjustCreateCurrentD@std@@@1@_ExecuteExitFirstInit@?$basic_streambuf@LookupMessageNextPrivilegePrivilegesShellSnapshotTerminateToolhelp32V?$basic_streambuf@ValueWindows_wcsicmpmemsetsystem
                                    • String ID: ?????????????????.file$Anti Write Mode Kuy Hee$Error$Idon Crack Ver111##$Not Open 'Database.in' Write ib add$SeShutdownPrivilege$You are trying to meet the memory settings of a program that does not allow it.$cmd.exe$open$start ?????????????????.file
                                    • API String ID: 2034507644-1961621723
                                    • Opcode ID: 52edc22afd46788e29417d68eb1b82b2a9841e377f9e23009e01537d21e54e6f
                                    • Instruction ID: d488d32cf31ef6625ed95e004752cdc6baed22c3e4da1261ab13d2f46229ba64
                                    • Opcode Fuzzy Hash: 52edc22afd46788e29417d68eb1b82b2a9841e377f9e23009e01537d21e54e6f
                                    • Instruction Fuzzy Hash: FFB1E832649A83E9EB608F25EC947F923A0FB49758F804035CA4D9AB64DF7CD649C702
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1837029429.00007FF620371000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF620370000, based on PE: true
                                    • Associated: 00000001.00000002.1837006022.00007FF620370000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837142925.00007FF62037D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff620370000_P00LCUE.jbxd
                                    Similarity
                                    • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                    • String ID:
                                    • API String ID: 313767242-0
                                    • Opcode ID: b1236c11b624461f0c7ef87be3439e1f9dea54182dfbcaef34f954c2ef3bfa8f
                                    • Instruction ID: 7b4fca6256d7478b71c86d17fcd982eaf87db5b7ca40b72bda801b039d71c0ab
                                    • Opcode Fuzzy Hash: b1236c11b624461f0c7ef87be3439e1f9dea54182dfbcaef34f954c2ef3bfa8f
                                    • Instruction Fuzzy Hash: F5311E72608A82E6EF609F61E8803F97364FB84744F44403ADA4E9BBA5DF38D548C711
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1837029429.00007FF620371000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF620370000, based on PE: true
                                    • Associated: 00000001.00000002.1837006022.00007FF620370000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837142925.00007FF62037D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff620370000_P00LCUE.jbxd
                                    Similarity
                                    • API ID: Concurrency::cancel_current_taskInfoMemoryProcessQueryReadSystemVirtual_invalid_parameter_noinfo_noreturnmallocmemset
                                    • String ID:
                                    • API String ID: 3069732781-0
                                    • Opcode ID: cb34571c44fe5942e95410ce4f1a72a963c569907e173b8487e5bc1318d1aaf7
                                    • Instruction ID: 1c4993a6c3df36d2a83b9e7375d9b959ebb12ec43983de95daae2e9f127cbdaf
                                    • Opcode Fuzzy Hash: cb34571c44fe5942e95410ce4f1a72a963c569907e173b8487e5bc1318d1aaf7
                                    • Instruction Fuzzy Hash: 1061B422B08A42E9FF10CB66D8943AD6360BB05BB8F544731DE6D9BBD8DE38D456C301
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1837029429.00007FF620371000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF620370000, based on PE: true
                                    • Associated: 00000001.00000002.1837006022.00007FF620370000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837142925.00007FF62037D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff620370000_P00LCUE.jbxd
                                    Similarity
                                    • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                    • String ID:
                                    • API String ID: 2933794660-0
                                    • Opcode ID: 98ebc63e8e7b838f8adabee2691fecba1f914038a318751ce9f9c68791e0bd0c
                                    • Instruction ID: 092f8449767d1722b72c15f0c640929460aeac533b30a18cf7f9cc7ee4b2d00d
                                    • Opcode Fuzzy Hash: 98ebc63e8e7b838f8adabee2691fecba1f914038a318751ce9f9c68791e0bd0c
                                    • Instruction Fuzzy Hash: 05111822B54F02DAEF008B64EC942B933A4FB19758F441A35DA6D8ABA4DF78D1588381
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1837029429.00007FF620371000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF620370000, based on PE: true
                                    • Associated: 00000001.00000002.1837006022.00007FF620370000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837142925.00007FF62037D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff620370000_P00LCUE.jbxd
                                    Similarity
                                    • API ID: AsyncShowSleepStateWindow
                                    • String ID:
                                    • API String ID: 163047062-0
                                    • Opcode ID: a1253da33624f0a2a870d5b60592e09a46fb21d2b74818bdfb0dc3164c7be4c2
                                    • Instruction ID: 733f0a759aa0fa04d6cff3e134e77f925a3ef9193a6439d6ca1e1b2a2c03c155
                                    • Opcode Fuzzy Hash: a1253da33624f0a2a870d5b60592e09a46fb21d2b74818bdfb0dc3164c7be4c2
                                    • Instruction Fuzzy Hash: D1E0E525E1C683E2FF296B70AC847752B61AFA5751F484479C44A8E7B1CF2CB8898353
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1837029429.00007FF620371000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF620370000, based on PE: true
                                    • Associated: 00000001.00000002.1837006022.00007FF620370000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837142925.00007FF62037D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff620370000_P00LCUE.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3fba25a1d03ca5eddeea96f8393d94adc68f531d0f073cb6f3ca71fd16ae7a5c
                                    • Instruction ID: 095f5a16d03af5e024e29c62f8b3bdb57217e3e5e7bbc7bd7f57190a27f4bdcd
                                    • Opcode Fuzzy Hash: 3fba25a1d03ca5eddeea96f8393d94adc68f531d0f073cb6f3ca71fd16ae7a5c
                                    • Instruction Fuzzy Hash: 0CA0022194CC03F4EE048B00EDD05312B71EB51314B4104B1C00ED96B09F3CA54CC313
                                    APIs
                                    • memset.VCRUNTIME140 ref: 00007FF6203727F4
                                    • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF620372809
                                    • ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF620372828
                                    • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF62037285C
                                    • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF62037287B
                                      • Part of subcall function 00007FF620375AA0: ?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z.MSVCP140 ref: 00007FF620375ADA
                                      • Part of subcall function 00007FF620375AA0: ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF620375AF7
                                      • Part of subcall function 00007FF620375AA0: _get_stream_buffer_pointers.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF620375B20
                                      • Part of subcall function 00007FF620375AA0: ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ.MSVCP140 ref: 00007FF620375B6B
                                      • Part of subcall function 00007FF620375AA0: ?always_noconv@codecvt_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF620375B80
                                    • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF6203728C9
                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6203728F4
                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF62037291F
                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z.MSVCP140 ref: 00007FF62037292B
                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF62037293B
                                    • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF620372972
                                    • ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6203729E4
                                    • ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6203729F0
                                    • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6203729FA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1837029429.00007FF620371000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF620370000, based on PE: true
                                    • Associated: 00000001.00000002.1837006022.00007FF620370000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837142925.00007FF62037D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff620370000_P00LCUE.jbxd
                                    Similarity
                                    • API ID: U?$char_traits@$D@std@@@std@@$V01@$??6?$basic_ostream@$?setstate@?$basic_ios@Init@?$basic_streambuf@V01@@$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_ostream@??1?$basic_streambuf@?always_noconv@codecvt_base@std@@?getloc@?$basic_streambuf@D@std@@@1@_Fiopen@std@@U_iobuf@@V01@_V21@@V?$basic_streambuf@Vios_base@1@Vlocale@2@_get_stream_buffer_pointersmemset
                                    • String ID: C:\ProgramData\counter1.json$Waiting for write
                                    • API String ID: 375129124-28146409
                                    • Opcode ID: 41d7566dca92f02f6cdac18ab6ccbb847dcd6e63207f2140d33552f548b17bd3
                                    • Instruction ID: d9dc36a3d18be2f3a6672d3947068148a0815b131a786c9d718179083d7db0f5
                                    • Opcode Fuzzy Hash: 41d7566dca92f02f6cdac18ab6ccbb847dcd6e63207f2140d33552f548b17bd3
                                    • Instruction Fuzzy Hash: ED715D32A28A82E5EF50CB25E8902B97760FB84B94F455036EA4E97B78DF3CD545CB01
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1837029429.00007FF620371000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF620370000, based on PE: true
                                    • Associated: 00000001.00000002.1837006022.00007FF620370000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837142925.00007FF62037D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff620370000_P00LCUE.jbxd
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn$Xlength_error@std@@memcpyterminate
                                    • String ID: vector too long
                                    • API String ID: 4149089811-2873823879
                                    • Opcode ID: ea958d05045275d7f9a7e3a9ac66b69cf396e81ccf1322296ab9389c8f4e2d36
                                    • Instruction ID: a9ca39e320789f5244ffc16f0b320e9717bfa0de8c3c6097da85a4dfca738207
                                    • Opcode Fuzzy Hash: ea958d05045275d7f9a7e3a9ac66b69cf396e81ccf1322296ab9389c8f4e2d36
                                    • Instruction Fuzzy Hash: 59A1C362B09B87E1EE14CB25D9A42BC2360EB45BE4F548635DA6D8B7E5DF3CE091C301
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1837029429.00007FF620371000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF620370000, based on PE: true
                                    • Associated: 00000001.00000002.1837006022.00007FF620370000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837142925.00007FF62037D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff620370000_P00LCUE.jbxd
                                    Similarity
                                    • API ID: fgetc
                                    • String ID:
                                    • API String ID: 2807381905-0
                                    • Opcode ID: b991bf56b97f00b424a1ba7ed4f6701bd83b5968137fa14062c07bccba4cd40c
                                    • Instruction ID: 477937aecda5995f403d1e6de31006792638ade09cd0fafa524355393b52f063
                                    • Opcode Fuzzy Hash: b991bf56b97f00b424a1ba7ed4f6701bd83b5968137fa14062c07bccba4cd40c
                                    • Instruction Fuzzy Hash: 90815D32F18A42EAEF108F65D8802AC37B0F748768F545636DA5D9BBA4DF38E594C311
                                    APIs
                                    • ??0_Lockit@std@@QEAA@H@Z.MSVCP140(?,?,?,?,?,?,00000000,00007FF620375B7A), ref: 00007FF62037601D
                                    • ??Bid@locale@std@@QEAA_KXZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF620375B7A), ref: 00007FF620376037
                                    • ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF620375B7A), ref: 00007FF620376069
                                    • ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z.MSVCP140(?,?,?,?,?,?,00000000,00007FF620375B7A), ref: 00007FF620376094
                                    • std::_Facet_Register.LIBCPMT ref: 00007FF6203760AD
                                    • ??1_Lockit@std@@QEAA@XZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF620375B7A), ref: 00007FF6203760CC
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6203760F7
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1837029429.00007FF620371000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF620370000, based on PE: true
                                    • Associated: 00000001.00000002.1837006022.00007FF620370000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837142925.00007FF62037D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff620370000_P00LCUE.jbxd
                                    Similarity
                                    • API ID: Lockit@std@@$??0_??1_Bid@locale@std@@Concurrency::cancel_current_taskFacet_Getcat@?$codecvt@Getgloballocale@locale@std@@Locimp@12@Mbstatet@@@std@@RegisterV42@@Vfacet@locale@2@std::_
                                    • String ID:
                                    • API String ID: 762505753-0
                                    • Opcode ID: 7e5fc6697babf7da2c82fe3681f4ae3e1530b5e3d67986b7d103e55dcf608f15
                                    • Instruction ID: c24cda61a07b129363bafd35c06c7f9c94739386b3b199d138a56b5f3db961e0
                                    • Opcode Fuzzy Hash: 7e5fc6697babf7da2c82fe3681f4ae3e1530b5e3d67986b7d103e55dcf608f15
                                    • Instruction Fuzzy Hash: 60316D32A08B46D1EE548F15E8901697760FB88B94F480635DB9E8BBB5DF3CE455C701
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1837029429.00007FF620371000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF620370000, based on PE: true
                                    • Associated: 00000001.00000002.1837006022.00007FF620370000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837142925.00007FF62037D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff620370000_P00LCUE.jbxd
                                    Similarity
                                    • API ID: memcpy$Concurrency::cancel_current_task
                                    • String ID: GTAProcess
                                    • API String ID: 326894585-2175359186
                                    • Opcode ID: 236114548b2a61902ae2430156873bb5ba21e44a7c0d7f108fad327db99beb6c
                                    • Instruction ID: 5ac87a96df7f4cc14e645f0f56edef5ea272d69e0e83b365040cc3b5d4da3f28
                                    • Opcode Fuzzy Hash: 236114548b2a61902ae2430156873bb5ba21e44a7c0d7f108fad327db99beb6c
                                    • Instruction Fuzzy Hash: B631E222B0A743E5EE249B51AC902BD2650AB057F4F980B30DE7D9B7E6DE3CE1918301
                                    APIs
                                      • Part of subcall function 00007FF620375680: memcpy.VCRUNTIME140(?,?,?,?,?,?,?,00007FF6203711CF), ref: 00007FF620375771
                                      • Part of subcall function 00007FF620375680: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00007FF6203711CF), ref: 00007FF620375750
                                      • Part of subcall function 00007FF620375680: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF62037578C
                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00000000,00000000,00000000,00000000,00007FF620371871), ref: 00007FF620371DD7
                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00000000,00000000,00000000,00000000,00007FF620371871), ref: 00007FF620371DDE
                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00000000,00000000,00000000,00000000,00007FF620371871), ref: 00007FF620371DE5
                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00000000,00000000,00000000,00000000,00007FF620371871), ref: 00007FF620371DEC
                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00000000,00000000,00000000,00000000,00007FF620371871), ref: 00007FF620371DF3
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1837029429.00007FF620371000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF620370000, based on PE: true
                                    • Associated: 00000001.00000002.1837006022.00007FF620370000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837142925.00007FF62037D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff620370000_P00LCUE.jbxd
                                    Similarity
                                    • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskmemcpy
                                    • String ID:
                                    • API String ID: 2318677668-0
                                    • Opcode ID: 0f0df8395a7d051127279f21b89d5d0c5fcc752cf051496201ef76c8aa64d1a6
                                    • Instruction ID: 3c57d979918c6c23e961ee7c7b67c4a2b9470a79cfccea97abac134f21e74314
                                    • Opcode Fuzzy Hash: 0f0df8395a7d051127279f21b89d5d0c5fcc752cf051496201ef76c8aa64d1a6
                                    • Instruction Fuzzy Hash: F2717A62A18A87E4FE11DB19ECD83793361EB01B84F514039DA8D8BB6ADF7DE490C341
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1837029429.00007FF620371000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF620370000, based on PE: true
                                    • Associated: 00000001.00000002.1837006022.00007FF620370000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837142925.00007FF62037D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff620370000_P00LCUE.jbxd
                                    Similarity
                                    • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                    • String ID:
                                    • API String ID: 1775671525-0
                                    • Opcode ID: 24eb0d0bfc739fd0560a49163c489c9a1d7702e14198e5e5682604173dba1149
                                    • Instruction ID: 2017cabc5f285a62225c8c569b942e4929f350dde022305dc77fc196e3fc5057
                                    • Opcode Fuzzy Hash: 24eb0d0bfc739fd0560a49163c489c9a1d7702e14198e5e5682604173dba1149
                                    • Instruction Fuzzy Hash: E6411222B09683E4EE109F26D9943AD6252AB04BD4F544635DA6D4BBEADF7CE051C302
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1837029429.00007FF620371000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF620370000, based on PE: true
                                    • Associated: 00000001.00000002.1837006022.00007FF620370000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837142925.00007FF62037D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff620370000_P00LCUE.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d939e6395f353c4ea1df2c66ca6111bff599e46454ea5fa47db64c4fff99d848
                                    • Instruction ID: 036973729bfdf357c6583af2e3fd54be48e6e337ac7123e73a796c2dceb9dba9
                                    • Opcode Fuzzy Hash: d939e6395f353c4ea1df2c66ca6111bff599e46454ea5fa47db64c4fff99d848
                                    • Instruction Fuzzy Hash: 00515E32609A82D6DF148F69E89036D73A0FB84BA4F544636DA9D8B7B8DF7CC444C741
                                    APIs
                                    • memcpy.VCRUNTIME140(?,?,?,00007FF6203711CF), ref: 00007FF6203755C1
                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6203711CF), ref: 00007FF620375630
                                      • Part of subcall function 00007FF620376A40: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF62037575C,?,?,?,?,?,?,?,00007FF6203711CF), ref: 00007FF620376A5A
                                    • memcpy.VCRUNTIME140(?,?,?,00007FF6203711CF), ref: 00007FF620375653
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF620375678
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1837029429.00007FF620371000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF620370000, based on PE: true
                                    • Associated: 00000001.00000002.1837006022.00007FF620370000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837068376.00007FF620378000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837112806.00007FF62037C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.1837142925.00007FF62037D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff620370000_P00LCUE.jbxd
                                    Similarity
                                    • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                    • String ID:
                                    • API String ID: 1155477157-0
                                    • Opcode ID: 3b52f562bfd545fd0f8adf20f526fa586fa18b333cc07292c2b5d6ba1187337a
                                    • Instruction ID: a69d9c5a01feb39a703de5f3311c4a9d5f114be638af1a35fa63f4cdd002e052
                                    • Opcode Fuzzy Hash: 3b52f562bfd545fd0f8adf20f526fa586fa18b333cc07292c2b5d6ba1187337a
                                    • Instruction Fuzzy Hash: 9C31A423A09787E5EE185B55A8803A92250EB15BB4F580735DB7D4F7E2DFBCE092C342

                                    Execution Graph

                                    Execution Coverage:15.4%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:100%
                                    Total number of Nodes:3
                                    Total number of Limit Nodes:0
                                    execution_graph 2777 7ffd9b797a81 2778 7ffd9b797ace CheckRemoteDebuggerPresent 2777->2778 2780 7ffd9b797b3f 2778->2780

                                    Control-flow Graph

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.2000161235.00007FFD9B790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B790000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_7ffd9b790000_BLACKSUPER X.jbxd
                                    Similarity
                                    • API ID: CheckDebuggerPresentRemote
                                    • String ID: UAWA
                                    • API String ID: 3662101638-1492024814
                                    • Opcode ID: dc4dfbd9108a5a9cfae0e0fe0f1b08087d7271ef2b64d03d957a4ef5af6c6b24
                                    • Instruction ID: a99ba92eeb59db362a29b6597984acb0833be0438c2e5cab80470460f3b8ddf1
                                    • Opcode Fuzzy Hash: dc4dfbd9108a5a9cfae0e0fe0f1b08087d7271ef2b64d03d957a4ef5af6c6b24
                                    • Instruction Fuzzy Hash: E731E33190875C8FCB58DF58C88A7E97BE0FF65311F05426AD489D7292DB34A846CB91