Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exe

Overview

General Information

Sample name:SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exe
Analysis ID:1417537
MD5:aea72794061e7055003524c90109b369
SHA1:2e21dd9cee8985d0d82cfc2a527d6ce6f830d971
SHA256:3bac7343a0a848b51baf15fd2c7e9140a8d8f297a50e33fd204929be52617d3b
Tags:exe
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Tries to load missing DLLs
Uses 32bit PE files

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exeReversingLabs: Detection: 13%
Source: SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exeVirustotal: Detection: 9%Perma Link
Source: SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\sZeD\source\repos\bsd\Debug\walczy.pdb,, source: SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exe
Source: Binary string: C:\Users\sZeD\source\repos\bsd\Debug\walczy.pdb source: SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exe
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exeSection loaded: msvcp140d.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exeSection loaded: vcruntime140d.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exeSection loaded: ucrtbased.dllJump to behavior
Source: SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal48.winEXE@2/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3500:120:WilError_03
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exeReversingLabs: Detection: 13%
Source: SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exeVirustotal: Detection: 9%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exe "C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\sZeD\source\repos\bsd\Debug\walczy.pdb,, source: SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exe
Source: Binary string: C:\Users\sZeD\source\repos\bsd\Debug\walczy.pdb source: SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exe
Source: SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exeStatic PE information: section name: .textbss
Source: SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exeStatic PE information: section name: .msvcjmc
Source: SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exeStatic PE information: section name: .00cfg
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exeCode function: 0_2_00B6D1D0 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00B6D1D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exeCode function: 0_2_00B617CB GetProcessHeap,0_2_00B617CB
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exeCode function: 0_2_00B6D1D0 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00B6D1D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exeCode function: 0_2_00B61271 SetUnhandledExceptionFilter,0_2_00B61271
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exeCode function: 0_2_00B6D480 SetUnhandledExceptionFilter,0_2_00B6D480
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exeCode function: 0_2_00B6DEA0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00B6DEA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exeCode function: 0_2_00B61393 GetSystemTimeAsFileTime,0_2_00B61393
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Process Injection
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory2
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager2
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exe13%ReversingLabs
SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exe10%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1417537
Start date and time:2024-03-29 15:25:10 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 39s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:16
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exe
Detection:MAL
Classification:mal48.winEXE@2/0@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 15
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exe, PID 4548 because there are no executed function
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (console) Intel 80386, for MS Windows
Entropy (8bit):5.4602723130301305
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exe
File size:165'888 bytes
MD5:aea72794061e7055003524c90109b369
SHA1:2e21dd9cee8985d0d82cfc2a527d6ce6f830d971
SHA256:3bac7343a0a848b51baf15fd2c7e9140a8d8f297a50e33fd204929be52617d3b
SHA512:dde9a6caf031d93122bae70c0bba0a08f0e51c8e77a2b0fdf1135019a4477efbc7503b2913c4ceb89c80db89e80b5ffe4dc94896013f9eb250939cd8a8862f41
SSDEEP:3072:SH8WDQIATG3dSN6ShjbIPYTZ5uEDFhBnH/nyRbC3:SH8fFIAlbIPYt5uEDFhxvyRm3
TLSH:6FF33A717E4BC877FA93017B4EF888EA1A58D95087D514D3618836ED86663E12F3324F
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K....x...x...x.......x.......x.......x..T....x...x..yx.......x....H..x...x ..x.......x..Rich.x..........PE..L...Zm._...........
Icon Hash:0fc69a89a2b20b2b
Entrypoint:0x411767
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x5F8C6D5A [Sun Oct 18 16:29:14 2020 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:dde35834c0080e8293305a230903e455
Instruction
jmp 00007FC30C825389h
jmp 00007FC30C8243C4h
jmp 00007FC30C8279CEh
jmp 00007FC30C82794Bh
jmp 00007FC30C8279D0h
jmp 00007FC30C822380h
jmp 00007FC30C825B1Bh
jmp 00007FC30C81DB56h
jmp 00007FC30C820311h
jmp 00007FC30C8278F1h
jmp 00007FC30C8278B0h
jmp 00007FC30C8277D9h
jmp 00007FC30C81F27Dh
jmp 00007FC30C8252E8h
jmp 00007FC30C827818h
jmp 00007FC30C81CD7Eh
jmp 00007FC30C81E749h
jmp 00007FC30C81F5A4h
jmp 00007FC30C825AFFh
jmp 00007FC30C824257h
jmp 00007FC30C82796Eh
jmp 00007FC30C826C20h
jmp 00007FC30C8244CBh
jmp 00007FC30C8244D6h
jmp 00007FC30C81F6F1h
jmp 00007FC30C8272BCh
jmp 00007FC30C8269A7h
jmp 00007FC30C82779Bh
jmp 00007FC30C82059Dh
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x2b3040x78.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x2f0000xe0b0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x3e0000xad8.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x26e440x38.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x26e800x40.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x2b0000x304.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.textbss0x10000x100000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.text0x110000x1303b0x13200e0c98f65456ef0266e18f1e6397a29b4False0.2261029411764706data4.321248844005625IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x250000x40de0x4200149a7b6eac171fde3dad7382aaaa97fdFalse0.1436434659090909data2.1378142425729187IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x2a0000x7580x400fb3e8ad50a4b150b5d4328bcb479e967False0.10546875data1.0465158531636134IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata0x2b0000x15000x1600c3d790a286563ab60bee62eaa0b4311bFalse0.32173295454545453data4.73050558824712IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.msvcjmc0x2d0000x1520x20029473316e9a03fc3fca8712fbb8539d5False0.033203125Targa image data - Map (257-257) 257 x 257 x 1 +257 +257 - 1-bit alpha "\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001"0.5703645563524087IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.00cfg0x2e0000x1090x2006c7c036177ff0cac8633ce58f9e14da6False0.03515625data0.11055713125913882IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x2f0000xe0b00xe200471219bf07be6fbc07814ccc84e589ddFalse0.6580475663716814data6.469591996122458IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x3e0000xe3d0x100085b2b32db8c4a636b4faa792c4c5602fFalse0.582763671875GLS_BINARY_LSB_FIRST5.281617383792299IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0x2f3000x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.7898936170212766
RT_ICON0x2f7680x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States0.6491803278688525
RT_ICON0x300f00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.5189962476547842
RT_ICON0x311980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.38682572614107885
RT_ICON0x337400x71d8PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9965001372495196
RT_GROUP_ICON0x3a9180x4cdataEnglishUnited States0.7763157894736842
RT_MANIFEST0x3a9680x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
DLLImport
KERNEL32.dllCloseHandle, Sleep, OpenProcess, ReadProcessMemory, WriteProcessMemory, SetConsoleTitleA, GetConsoleWindow, CreateToolhelp32Snapshot, Module32FirstW, Module32NextW, FreeLibrary, VirtualQuery, GetProcessHeap, HeapFree, HeapAlloc, GetLastError, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentProcessId, QueryPerformanceCounter, TerminateProcess, GetCurrentProcess, WideCharToMultiByte, MultiByteToWideChar, RaiseException, GetModuleHandleW, GetStartupInfoW, SetUnhandledExceptionFilter, UnhandledExceptionFilter, IsDebuggerPresent, IsProcessorFeaturePresent, GetCurrentThreadId, GetProcAddress
USER32.dllGetWindowRect, FindWindowA, GetWindowThreadProcessId, MoveWindow
MSVCP140D.dll??5?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV01@AAH@Z, _Cnd_do_broadcast_at_thread_exit, ?_Throw_Cpp_error@std@@YAXH@Z, ?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@D@Z, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDD@Z, ?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDXZ, ??0_Lockit@std@@QAE@H@Z, ??1_Lockit@std@@QAE@XZ, ?_Xlength_error@std@@YAXPBD@Z, ?uncaught_exception@std@@YA_NXZ, ?good@ios_base@std@@QBE_NXZ, ?flags@ios_base@std@@QBEHXZ, ?width@ios_base@std@@QBE_JXZ, ?width@ios_base@std@@QAE_J_J@Z, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z, ?tie@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEPAV?$basic_ostream@DU?$char_traits@D@std@@@2@XZ, ?rdbuf@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEPAV?$basic_streambuf@DU?$char_traits@D@std@@@2@XZ, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z
VCRUNTIME140D.dll__std_exception_copy, memcpy, __std_exception_destroy, _CxxThrowException, __CxxFrameHandler3, memset, __current_exception, __current_exception_context, _except_handler4_common, __std_type_info_destroy_list, __vcrt_GetModuleFileNameW, __vcrt_GetModuleHandleW, __vcrt_LoadLibraryExW, memmove
ucrtbased.dll_initterm, _initterm_e, exit, _exit, _set_fmode, __p___argc, __p___argv, _c_exit, _register_thread_local_exe_atexit_callback, _configthreadlocale, _set_new_mode, __p__commode, _beginthreadex, strcpy_s, strcat_s, __stdio_common_vsprintf_s, _controlfp_s, _wmakepath_s, _wsplitpath_s, wcscpy_s, strlen, _wcsicmp, system, _CrtDbgReport, _invalid_parameter, _get_initial_narrow_environment, _set_app_type, _seh_filter_exe, _CrtDbgReportW, _cexit, _crt_at_quick_exit, _crt_atexit, _execute_onexit_table, _register_onexit_function, _initialize_onexit_table, _initialize_narrow_environment, _configure_narrow_argv, _seh_filter_dll, malloc, _free_dbg, _callnewh, __setusermatherr, terminate
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:15:25:57
Start date:29/03/2024
Path:C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Swrort.25034.19636.exe"
Imagebase:0xb50000
File size:165'888 bytes
MD5 hash:AEA72794061E7055003524C90109B369
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Target ID:1
Start time:15:25:57
Start date:29/03/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff75da10000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

Reset < >
    APIs
    • SetUnhandledExceptionFilter.KERNEL32(00B612CB), ref: 00B6D488
    Memory Dump Source
    • Source File: 00000000.00000002.2441016965.0000000000B63000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B50000, based on PE: true
    • Associated: 00000000.00000002.2440974274.0000000000B50000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441016965.0000000000B61000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441293127.0000000000B75000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441342459.0000000000B7A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441388968.0000000000B7C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441433761.0000000000B7F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441433761.0000000000B8E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b50000_SecuriteInfo.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: 29cbf1d9c95adc890816edf05a41a95e120a95d3447003db09fa7a6e3c387867
    • Instruction ID: 018ce93b218bdf3e69d44b50f5cf29a107e30ad1c65f5dcaa5858d020696d879
    • Opcode Fuzzy Hash: 29cbf1d9c95adc890816edf05a41a95e120a95d3447003db09fa7a6e3c387867
    • Instruction Fuzzy Hash: ABA0223008030CE3000033EABC0AC02BBECE002AA83008080F20E820320FA2200808F2
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.2441016965.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B50000, based on PE: true
    • Associated: 00000000.00000002.2440974274.0000000000B50000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441016965.0000000000B63000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441293127.0000000000B75000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441342459.0000000000B7A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441388968.0000000000B7C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441433761.0000000000B7F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441433761.0000000000B8E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b50000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: f1cc2e3b89f0295a71f4c2f5d98978df9b476ed5ceffc35e5f9f5ecd2d0d18f7
    • Instruction ID: bf7cd9bd5b828e1ae2049935ff0ba1f35c54f8063d48d9d9fc834b128392b51f
    • Opcode Fuzzy Hash: f1cc2e3b89f0295a71f4c2f5d98978df9b476ed5ceffc35e5f9f5ecd2d0d18f7
    • Instruction Fuzzy Hash:
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.2441016965.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B50000, based on PE: true
    • Associated: 00000000.00000002.2440974274.0000000000B50000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441016965.0000000000B63000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441293127.0000000000B75000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441342459.0000000000B7A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441388968.0000000000B7C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441433761.0000000000B7F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441433761.0000000000B8E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b50000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: bc89a0a16724be94a9b078e43fc4ca10ba7c085f3852a4c1833e20735b780f8c
    • Instruction ID: 9ba79d89e76b79da720045f1354ff178bc30a71f87294d1568aa73023c4c4ad5
    • Opcode Fuzzy Hash: bc89a0a16724be94a9b078e43fc4ca10ba7c085f3852a4c1833e20735b780f8c
    • Instruction Fuzzy Hash:
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.2441016965.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B50000, based on PE: true
    • Associated: 00000000.00000002.2440974274.0000000000B50000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441016965.0000000000B63000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441293127.0000000000B75000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441342459.0000000000B7A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441388968.0000000000B7C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441433761.0000000000B7F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441433761.0000000000B8E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b50000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 57142260cce0b422768084dd5dbdefd015e5529017eeaf91892156b1eea33197
    • Instruction ID: b53746f7afc3a3c98fadd95ffad61a3825ecf13b6b4972f34227b5ef3fb76fa5
    • Opcode Fuzzy Hash: 57142260cce0b422768084dd5dbdefd015e5529017eeaf91892156b1eea33197
    • Instruction Fuzzy Hash:
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetConsoleWindow.KERNEL32 ref: 00B6AC84
    • GetWindowRect.USER32(?,?), ref: 00B6AC9E
    • MoveWindow.USER32(?,?,?,000003E8,000001F4,00000001), ref: 00B6ACC5
    • SetConsoleTitleA.KERNEL32(00B75ECC), ref: 00B6ACE6
    • Sleep.KERNEL32(00000064), ref: 00B6ACF7
    • SetConsoleTitleA.KERNEL32(00B7608C), ref: 00B6AD0B
    • Sleep.KERNEL32(00000064), ref: 00B6AD1C
    • SetConsoleTitleA.KERNEL32(CREA), ref: 00B6AD30
    • Sleep.KERNEL32(000000C8), ref: 00B6AD44
    • SetConsoleTitleA.KERNEL32(CREAT), ref: 00B6AD58
    • Sleep.KERNEL32(00000064), ref: 00B6AD69
    • SetConsoleTitleA.KERNEL32(CREATED), ref: 00B6AD7D
    • Sleep.KERNEL32(00000096), ref: 00B6AD91
    • SetConsoleTitleA.KERNEL32(CREATED B), ref: 00B6ADA5
    • Sleep.KERNEL32(00000096), ref: 00B6ADB9
    • SetConsoleTitleA.KERNEL32(CREATED BY), ref: 00B6ADCD
    • Sleep.KERNEL32(00000096), ref: 00B6ADE1
    • SetConsoleTitleA.KERNEL32(CREATED BY W), ref: 00B6ADF5
    • Sleep.KERNEL32(00000096), ref: 00B6AE09
    • SetConsoleTitleA.KERNEL32(CREATED BY WA), ref: 00B6AE1D
    • Sleep.KERNEL32(00000096), ref: 00B6AE31
    • SetConsoleTitleA.KERNEL32(CREATED BY WAL), ref: 00B6AE45
    • Sleep.KERNEL32(00000096), ref: 00B6AE59
    • SetConsoleTitleA.KERNEL32(CREATED BY WALC), ref: 00B6AE6D
    • Sleep.KERNEL32(00000064), ref: 00B6AE7E
    • SetConsoleTitleA.KERNEL32(CREATED BY WALCZ), ref: 00B6AE92
    • Sleep.KERNEL32(00000064), ref: 00B6AEA3
    • SetConsoleTitleA.KERNEL32(CREATED BY WALCZY), ref: 00B6AEB7
    • Sleep.KERNEL32(00000BB8), ref: 00B6AECB
    • SetConsoleTitleA.KERNEL32(Among-Us Cheat), ref: 00B6AEDF
    • Sleep.KERNEL32(00000FA0), ref: 00B6AEF3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2441016965.0000000000B63000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B50000, based on PE: true
    • Associated: 00000000.00000002.2440974274.0000000000B50000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441016965.0000000000B61000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441293127.0000000000B75000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441342459.0000000000B7A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441388968.0000000000B7C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441433761.0000000000B7F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441433761.0000000000B8E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b50000_SecuriteInfo.jbxd
    Similarity
    • API ID: Console$SleepTitle$Window$MoveRect
    • String ID: Among-Us Cheat$CREA$CREAT$CREATED$CREATED B$CREATED BY$CREATED BY W$CREATED BY WA$CREATED BY WAL$CREATED BY WALC$CREATED BY WALCZ$CREATED BY WALCZY
    • API String ID: 2512251847-3335021109
    • Opcode ID: 884d422c5d8c8ac2247942751792347ed22bd7b61b60c62ab99e5ffedc508eaa
    • Instruction ID: 7e16f3a487572e1f1c32f380050f0fc81e71cdc68b79d53d9afc4fcf0d32498d
    • Opcode Fuzzy Hash: 884d422c5d8c8ac2247942751792347ed22bd7b61b60c62ab99e5ffedc508eaa
    • Instruction Fuzzy Hash: 43515432900524BBC57037AAE94BB4D7AE69F01365F8A4AC1F96D772A5CF5A0C804FD3
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV01@AAH@Z.MSVCP140D(?), ref: 00B6B4EA
    • Sleep.KERNEL32(000003E8), ref: 00B6B5AE
    • system.UCRTBASED(cls), ref: 00B6B5C2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2441016965.0000000000B63000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B50000, based on PE: true
    • Associated: 00000000.00000002.2440974274.0000000000B50000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441016965.0000000000B61000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441293127.0000000000B75000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441342459.0000000000B7A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441388968.0000000000B7C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441433761.0000000000B7F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441433761.0000000000B8E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b50000_SecuriteInfo.jbxd
    Similarity
    • API ID: ??5?$basic_istream@D@std@@@std@@SleepU?$char_traits@V01@system
    • String ID: $ $ $ $$$($($($,$1-CREW 2-IMPOSTER 3-GHOST:$1-Speed Hack 2-Full Vision 3-Change Role (You Can Be Imposter or Ghost Or Crew Also You Will Be Able To See The Real Imposter in Crew)!4:Instant SkipEnter Number : $4$4$4$Crew Role Activated$GHOST Role Activated$H$Imposter Role Activated$Invalid Number$Speed Hack Activated$\$\ 4($\ 4($\ 4($cls$<D
    • API String ID: 1856734369-1046371
    • Opcode ID: bedf38de4b9fa47260a2fdb17ee9673a661d95a63f233adf3e1bd86da2a5d9c0
    • Instruction ID: b838b4c1ef491a0edda5b7a00f1b7057563108f269ad60b61d982bf3705e8072
    • Opcode Fuzzy Hash: bedf38de4b9fa47260a2fdb17ee9673a661d95a63f233adf3e1bd86da2a5d9c0
    • Instruction Fuzzy Hash: 4ED17F72D00214AFDB20EB58DC8AFDEB7F8AB44304F0445D9E51EA7291DB795E848F92
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • ?width@ios_base@std@@QBE_JXZ.MSVCP140D ref: 00B63F08
    • ?width@ios_base@std@@QBE_JXZ.MSVCP140D ref: 00B63F44
    • ?width@ios_base@std@@QBE_JXZ.MSVCP140D ref: 00B63F82
    • ?flags@ios_base@std@@QBEHXZ.MSVCP140D(?), ref: 00B64003
    • ?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDXZ.MSVCP140D ref: 00B64063
    • ?rdbuf@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEPAV?$basic_streambuf@DU?$char_traits@D@std@@@2@XZ.MSVCP140D ref: 00B64085
    • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z.MSVCP140D(?), ref: 00B640A8
    • ?rdbuf@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEPAV?$basic_streambuf@DU?$char_traits@D@std@@@2@XZ.MSVCP140D ref: 00B64114
    • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z.MSVCP140D(?,?,?), ref: 00B6413B
    • ?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDXZ.MSVCP140D ref: 00B641B6
    • ?rdbuf@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEPAV?$basic_streambuf@DU?$char_traits@D@std@@@2@XZ.MSVCP140D ref: 00B641D8
    • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z.MSVCP140D(?), ref: 00B641FB
    • ?width@ios_base@std@@QAE_J_J@Z.MSVCP140D(00000000,00000000), ref: 00B64265
    • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z.MSVCP140D(00000000,00000000), ref: 00B642BD
    Memory Dump Source
    • Source File: 00000000.00000002.2441016965.0000000000B63000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B50000, based on PE: true
    • Associated: 00000000.00000002.2440974274.0000000000B50000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441016965.0000000000B61000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441293127.0000000000B75000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441342459.0000000000B7A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441388968.0000000000B7C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441433761.0000000000B7F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441433761.0000000000B8E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b50000_SecuriteInfo.jbxd
    Similarity
    • API ID: U?$char_traits@$D@std@@@std@@$?width@ios_base@std@@$?rdbuf@?$basic_ios@D@std@@@2@V?$basic_streambuf@$?fill@?$basic_ios@?sputc@?$basic_streambuf@$?flags@ios_base@std@@?setstate@?$basic_ios@?sputn@?$basic_streambuf@
    • String ID:
    • API String ID: 4125389999-0
    • Opcode ID: 4a9f832e9cc5a458d52cf96dc74c64c7623b47704579e3d6b379914dce846e6e
    • Instruction ID: 132d4468b74461e96f15fd56a7e892a7f13adf8639b3366ab0160f0d0baeb694
    • Opcode Fuzzy Hash: 4a9f832e9cc5a458d52cf96dc74c64c7623b47704579e3d6b379914dce846e6e
    • Instruction Fuzzy Hash: 4AD1E375D00618DFCB14DF58D895BEDBBF1AF88305F148599E91AAB351CB39AE808F80
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • _CrtDbgReport.UCRTBASED(00000002,C:\Program Files (x86)\Microsoft Visual Studio\2019\Enterprise\VC\Tools\MSVC\14.27.29110\include\xmemory,0000007B,00000000,00B75CA8,invalid argument), ref: 00B687C2
    • _invalid_parameter.UCRTBASED("invalid argument",std::_Adjust_manually_vector_aligned,C:\Program Files (x86)\Microsoft Visual Studio\2019\Enterprise\VC\Tools\MSVC\14.27.29110\include\xmemory,0000007B,00000000), ref: 00B687F4
    • _CrtDbgReport.UCRTBASED(00000002,C:\Program Files (x86)\Microsoft Visual Studio\2019\Enterprise\VC\Tools\MSVC\14.27.29110\include\xmemory,00000071,00000000,00B75CA8,invalid argument), ref: 00B6884A
    • _invalid_parameter.UCRTBASED("invalid argument",std::_Adjust_manually_vector_aligned,C:\Program Files (x86)\Microsoft Visual Studio\2019\Enterprise\VC\Tools\MSVC\14.27.29110\include\xmemory,00000071,00000000), ref: 00B6887C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2441016965.0000000000B63000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B50000, based on PE: true
    • Associated: 00000000.00000002.2440974274.0000000000B50000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441016965.0000000000B61000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441293127.0000000000B75000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441342459.0000000000B7A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441388968.0000000000B7C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441433761.0000000000B7F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441433761.0000000000B8E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b50000_SecuriteInfo.jbxd
    Similarity
    • API ID: Report_invalid_parameter
    • String ID: "invalid argument"$'$C:\Program Files (x86)\Microsoft Visual Studio\2019\Enterprise\VC\Tools\MSVC\14.27.29110\include\xmemory$C:\Program Files (x86)\Microsoft Visual Studio\2019\Enterprise\VC\Tools\MSVC\14.27.29110\include\xmemory$invalid argument$std::_Adjust_manually_vector_aligned
    • API String ID: 4134963321-75597745
    • Opcode ID: 40d5e7931015afb73bad07e163175ebf147581e4b08a74bba7a02be18fe822f2
    • Instruction ID: d7f5d70e93f87d30ff82b0661d9eb39009e7605c5f9a95d8b6911fc4e2693573
    • Opcode Fuzzy Hash: 40d5e7931015afb73bad07e163175ebf147581e4b08a74bba7a02be18fe822f2
    • Instruction Fuzzy Hash: E741A070A40204AFDB30AB6CDC56F6D77E4FF00714F4086D5E919AB3A2DAB59D808BD6
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • failwithmessage.LIBCMTD ref: 00B6D73D
      • Part of subcall function 00B6DA20: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00B6D7D2,000000FF,00000000,00000000,?), ref: 00B6DA81
      • Part of subcall function 00B6DA20: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00B6D7D2,000000FF,?,00000000), ref: 00B6DAA0
      • Part of subcall function 00B6DA20: DebuggerProbe.LIBCMTD ref: 00B6DABA
      • Part of subcall function 00B6DA20: DebuggerRuntime.LIBCMTD ref: 00B6DAD6
      • Part of subcall function 00B6DA20: IsDebuggerPresent.KERNEL32 ref: 00B6DAFF
    • _getMemBlockDataString.LIBCMTD ref: 00B6D769
    • failwithmessage.LIBCMTD ref: 00B6D7CD
    Strings
    • Allocation number within this function: , xrefs: 00B6D78E
    • Address: 0x, xrefs: 00B6D79A
    • Data: <, xrefs: 00B6D783
    • Stack area around _alloca memory reserved by this function is corrupted, xrefs: 00B6D79F
    • Size: , xrefs: 00B6D794
    • Stack area around _alloca memory reserved by this function is corrupted, xrefs: 00B6D734
    • %s%s%p%s%zd%s%d%s%s%s%s%s, xrefs: 00B6D7A4
    Memory Dump Source
    • Source File: 00000000.00000002.2441016965.0000000000B63000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B50000, based on PE: true
    • Associated: 00000000.00000002.2440974274.0000000000B50000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441016965.0000000000B61000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441293127.0000000000B75000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441342459.0000000000B7A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441388968.0000000000B7C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441433761.0000000000B7F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441433761.0000000000B8E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b50000_SecuriteInfo.jbxd
    Similarity
    • API ID: Debugger$ByteCharMultiWidefailwithmessage$BlockDataPresentProbeRuntimeString_get
    • String ID: Address: 0x$Allocation number within this function: $Data: <$Size: $%s%s%p%s%zd%s%d%s%s%s%s%s$Stack area around _alloca memory reserved by this function is corrupted$Stack area around _alloca memory reserved by this function is corrupted
    • API String ID: 4067135985-3301296223
    • Opcode ID: 7bf0c85c4b9b87af3b5ec1c3534ecb83a0d2d2f5ea1467b6859f204b3e1dc5cf
    • Instruction ID: e2ae53c6be968ec78d1015ab1f026c801bf59b3596cc3217cd9fbc3c2c91743c
    • Opcode Fuzzy Hash: 7bf0c85c4b9b87af3b5ec1c3534ecb83a0d2d2f5ea1467b6859f204b3e1dc5cf
    • Instruction Fuzzy Hash: 32215072A40208BBCB10DEA9DC82DEEB7ECEB48710F0485E5FA1DB7191DA749A448B50
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • VirtualQuery.KERNEL32(?,?,0000001C), ref: 00B6ECA5
    • GetPdbDll.LIBCMTD ref: 00B6ED49
    • GetProcAddress.KERNEL32(00000000,PDBOpenValidate5), ref: 00B6ED6F
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00B6EECC
    • HeapFree.KERNEL32(00000000), ref: 00B6EED3
    • GetProcessHeap.KERNEL32 ref: 00B6EF44
    • HeapAlloc.KERNEL32(00000000,00000000,?), ref: 00B6EF4E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2441016965.0000000000B63000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B50000, based on PE: true
    • Associated: 00000000.00000002.2440974274.0000000000B50000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441016965.0000000000B61000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441293127.0000000000B75000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441342459.0000000000B7A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441388968.0000000000B7C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441433761.0000000000B7F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441433761.0000000000B8E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b50000_SecuriteInfo.jbxd
    Similarity
    • API ID: Heap$Process$AddressAllocFreeProcQueryVirtual
    • String ID: PDBOpenValidate5
    • API String ID: 1898765391-413491164
    • Opcode ID: 09c29896e16ca802290e0bdd421bf920b547eeba2c3076b757fd2b51b8c5db3d
    • Instruction ID: 42a235f9cd7d4eab2f463d5068fb2a4c9154f7f604d7671d2a60455dccb40946
    • Opcode Fuzzy Hash: 09c29896e16ca802290e0bdd421bf920b547eeba2c3076b757fd2b51b8c5db3d
    • Instruction Fuzzy Hash: 56B17C39A002199FDF10DF64C854BAEBBB6FF48714F180099E925AB390DB75ED42CB91
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • _CrtDbgReport.UCRTBASED(00000002,C:\Program Files (x86)\Microsoft Visual Studio\2019\Enterprise\VC\Tools\MSVC\14.27.29110\include\xmemory,00000079,00000000,00B75CA8,invalid argument), ref: 00B6456C
    • _invalid_parameter.UCRTBASED("invalid argument",std::_Allocate_manually_vector_aligned,C:\Program Files (x86)\Microsoft Visual Studio\2019\Enterprise\VC\Tools\MSVC\14.27.29110\include\xmemory,00000079,00000000), ref: 00B64597
    Strings
    • C:\Program Files (x86)\Microsoft Visual Studio\2019\Enterprise\VC\Tools\MSVC\14.27.29110\include\xmemory, xrefs: 00B64565
    • C:\Program Files (x86)\Microsoft Visual Studio\2019\Enterprise\VC\Tools\MSVC\14.27.29110\include\xmemory, xrefs: 00B64588
    • "invalid argument", xrefs: 00B64592
    • invalid argument, xrefs: 00B64557
    • std::_Allocate_manually_vector_aligned, xrefs: 00B6458D
    Memory Dump Source
    • Source File: 00000000.00000002.2441016965.0000000000B63000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B50000, based on PE: true
    • Associated: 00000000.00000002.2440974274.0000000000B50000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441016965.0000000000B61000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441293127.0000000000B75000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441342459.0000000000B7A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441388968.0000000000B7C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441433761.0000000000B7F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441433761.0000000000B8E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b50000_SecuriteInfo.jbxd
    Similarity
    • API ID: Report_invalid_parameter
    • String ID: "invalid argument"$C:\Program Files (x86)\Microsoft Visual Studio\2019\Enterprise\VC\Tools\MSVC\14.27.29110\include\xmemory$C:\Program Files (x86)\Microsoft Visual Studio\2019\Enterprise\VC\Tools\MSVC\14.27.29110\include\xmemory$invalid argument$std::_Allocate_manually_vector_aligned
    • API String ID: 4134963321-2438732324
    • Opcode ID: 8a954d66e8b5ffc64f446679b137a8c432d128ed9245124e3af3f70fa6e9defd
    • Instruction ID: ea9a0d42f3e94dc82a15ccaf56f6429ed976f296f7a5a4a1d61e420787c046ce
    • Opcode Fuzzy Hash: 8a954d66e8b5ffc64f446679b137a8c432d128ed9245124e3af3f70fa6e9defd
    • Instruction Fuzzy Hash: 2121C871E00618ABDB20ABACDC47B9D76F4EF04304F1445A5F619BB391D7799D408B92
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • _CrtDbgReport.UCRTBASED(00000002,C:\Program Files (x86)\Microsoft Visual Studio\2019\Enterprise\VC\Tools\MSVC\14.27.29110\include\vector,000005DD,00000000,00B75CA8,vector subscript out of range,DD221F19), ref: 00B67FF2
    • _invalid_parameter.UCRTBASED("vector subscript out of range",std::vector<unsigned int,class std::allocator<unsigned int> >::operator [],C:\Program Files (x86)\Microsoft Visual Studio\2019\Enterprise\VC\Tools\MSVC\14.27.29110\include\vector,000005DD,00000000), ref: 00B68020
    Strings
    • C:\Program Files (x86)\Microsoft Visual Studio\2019\Enterprise\VC\Tools\MSVC\14.27.29110\include\vector, xrefs: 00B68011
    • C:\Program Files (x86)\Microsoft Visual Studio\2019\Enterprise\VC\Tools\MSVC\14.27.29110\include\vector, xrefs: 00B67FEB
    • "vector subscript out of range", xrefs: 00B6801B
    • vector subscript out of range, xrefs: 00B67FDA
    • std::vector<unsigned int,class std::allocator<unsigned int> >::operator [], xrefs: 00B68016
    Memory Dump Source
    • Source File: 00000000.00000002.2441016965.0000000000B63000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B50000, based on PE: true
    • Associated: 00000000.00000002.2440974274.0000000000B50000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441016965.0000000000B61000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441293127.0000000000B75000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441342459.0000000000B7A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441388968.0000000000B7C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441433761.0000000000B7F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441433761.0000000000B8E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b50000_SecuriteInfo.jbxd
    Similarity
    • API ID: Report_invalid_parameter
    • String ID: "vector subscript out of range"$C:\Program Files (x86)\Microsoft Visual Studio\2019\Enterprise\VC\Tools\MSVC\14.27.29110\include\vector$C:\Program Files (x86)\Microsoft Visual Studio\2019\Enterprise\VC\Tools\MSVC\14.27.29110\include\vector$std::vector<unsigned int,class std::allocator<unsigned int> >::operator []$vector subscript out of range
    • API String ID: 4134963321-2269947116
    • Opcode ID: 778b76dfd4716759a5a8a75d2682ac490ec18ebe44c5c0d9653816b3b07842d5
    • Instruction ID: 004d9e2272e14ae89499b1591205536de643a7e07b142cc80c4fbd286c1272a8
    • Opcode Fuzzy Hash: 778b76dfd4716759a5a8a75d2682ac490ec18ebe44c5c0d9653816b3b07842d5
    • Instruction Fuzzy Hash: 8F212831A84644ABCB20DB5CCC42F9EB7F4EB04714F1086ABF919B7791DE3999048AA1
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • FindWindowA.USER32(00000000,Among Us), ref: 00B6B07A
    • GetWindowThreadProcessId.USER32(?,?), ref: 00B6B094
    • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00B6B0C2
    • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00B6B120
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2441016965.0000000000B63000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B50000, based on PE: true
    • Associated: 00000000.00000002.2440974274.0000000000B50000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441016965.0000000000B61000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441293127.0000000000B75000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441342459.0000000000B7A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441388968.0000000000B7C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441433761.0000000000B7F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441433761.0000000000B8E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b50000_SecuriteInfo.jbxd
    Similarity
    • API ID: Process$Window$FindMemoryOpenThreadWrite
    • String ID: Among Us$GameAssembly.dll
    • API String ID: 1529833687-2060409246
    • Opcode ID: 4ab4554cb8fd7f9577bda08afec19f64d446d2e28b696801c2fdfccee4ed07ec
    • Instruction ID: 8b3aa4a2a67e429a86f5f14c121b5769501de879e19d1a745e5b0e19ce6e822a
    • Opcode Fuzzy Hash: 4ab4554cb8fd7f9577bda08afec19f64d446d2e28b696801c2fdfccee4ed07ec
    • Instruction Fuzzy Hash: E4415F72D00208AFCB10EBA8D852BDEB7F8EF48310F544699F519A7291DB395A408F91
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • FindWindowA.USER32(00000000,Among Us), ref: 00B6B24A
    • GetWindowThreadProcessId.USER32(?,?), ref: 00B6B264
    • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00B6B292
    • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00B6B2F0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2441016965.0000000000B63000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B50000, based on PE: true
    • Associated: 00000000.00000002.2440974274.0000000000B50000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441016965.0000000000B61000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441293127.0000000000B75000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441342459.0000000000B7A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441388968.0000000000B7C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441433761.0000000000B7F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441433761.0000000000B8E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b50000_SecuriteInfo.jbxd
    Similarity
    • API ID: Process$Window$FindMemoryOpenThreadWrite
    • String ID: Among Us$GameAssembly.dll
    • API String ID: 1529833687-2060409246
    • Opcode ID: 23af19e2d3f8c4240e7add44cadcce89a53b40b209e498aa3c4db0b13709c9d3
    • Instruction ID: a79e1f7434f2425acb736631981720bb5d507ed04eea5451aed7f0d20a2d0b3c
    • Opcode Fuzzy Hash: 23af19e2d3f8c4240e7add44cadcce89a53b40b209e498aa3c4db0b13709c9d3
    • Instruction Fuzzy Hash: D9415F72E00208AFCB10EBA8D852BDEB7F8EF48710F544699F519A7391DB395A408B91
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • ?good@ios_base@std@@QBE_NXZ.MSVCP140D(?,DD221F19), ref: 00B6743E
    • ?tie@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEPAV?$basic_ostream@DU?$char_traits@D@std@@@2@XZ.MSVCP140D ref: 00B6746A
    Memory Dump Source
    • Source File: 00000000.00000002.2441016965.0000000000B63000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B50000, based on PE: true
    • Associated: 00000000.00000002.2440974274.0000000000B50000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441016965.0000000000B61000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441293127.0000000000B75000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441342459.0000000000B7A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441388968.0000000000B7C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441433761.0000000000B7F000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2441433761.0000000000B8E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_b50000_SecuriteInfo.jbxd
    Similarity
    • API ID: U?$char_traits@$?good@ios_base@std@@?tie@?$basic_ios@D@std@@@2@D@std@@@std@@V?$basic_ostream@
    • String ID:
    • API String ID: 136917557-0
    • Opcode ID: 334dc96423a073f84e823e9b9183032801b102189d43cb8bb78d3a717c93c5e0
    • Instruction ID: 1d09d4167012fd7358873556d59aeea61dc55a0c34c4f492dbcbec09f410cdfb
    • Opcode Fuzzy Hash: 334dc96423a073f84e823e9b9183032801b102189d43cb8bb78d3a717c93c5e0
    • Instruction Fuzzy Hash: 6A318D35A04208EFCB10DF58D485BADBBF5EF48314F148699E819AB391CF39AD41CBA1
    Uniqueness

    Uniqueness Score: -1.00%