Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
6GUgc6JYS1.exe

Overview

General Information

Sample name:6GUgc6JYS1.exe
renamed because original name is a hash value
Original sample name:cf580830ecedcd498730091d01b92c1fde220d95f1fa677ce88f1a17f236b6b8.exe
Analysis ID:1542745
MD5:789bf0a8714e77d0d524ba22d8efbd7e
SHA1:61c56b19c55020494fa19faa3d1b7a2f070259df
SHA256:cf580830ecedcd498730091d01b92c1fde220d95f1fa677ce88f1a17f236b6b8
Tags:20-25-126-96exeuser-JAMESWT_MHT
Infos:

Detection

CobaltStrike, Metasploit
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected CobaltStrike
Yara detected Metasploit Payload
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found direct / indirect Syscall (likely to bypass EDR)
AV process strings found (often used to terminate AV products)
Contains functionality to call native functions
Found inlined nop instructions (likely shell or obfuscated code)
Internet Provider seen in connection with other malware
One or more processes crash
PE file contains more sections than normal
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 6GUgc6JYS1.exe (PID: 6608 cmdline: "C:\Users\user\Desktop\6GUgc6JYS1.exe" MD5: 789BF0A8714E77D0D524BA22D8EFBD7E)
    • WerFault.exe (PID: 7088 cmdline: C:\Windows\system32\WerFault.exe -u -p 6608 -s 1228 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Cobalt Strike, CobaltStrikeCobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable.
  • APT 29
  • APT32
  • APT41
  • AQUATIC PANDA
  • Anunak
  • Cobalt
  • Codoso
  • CopyKittens
  • DarkHydrus
  • Earth Baxia
  • FIN6
  • FIN7
  • Leviathan
  • Mustang Panda
  • Shell Crew
  • Stone Panda
  • TianWu
  • UNC1878
  • UNC2452
  • Winnti Umbrella
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike
{"C2Server": "http://20.25.126.96:443/bDDs", "User Agent": "User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; InfoPath.2; .NET CLR 2.0.50727)\r\n"}
{"Headers": "User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; InfoPath.2; .NET CLR 2.0.50727)\r\n", "Type": "Metasploit Download", "URL": "http://20.25.126.96/bDDs"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8DF6.tmp.dmpWindows_Trojan_Metasploit_7bc0f998Identifies the API address lookup function leverage by metasploit shellcodeunknown
  • 0x213bf:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8DF6.tmp.dmpWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
  • 0x2142b:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
SourceRuleDescriptionAuthorStrings
00000001.00000002.2742178189.000002598BC10000.00000020.10000000.00040000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
    00000001.00000002.2742178189.000002598BC10000.00000020.10000000.00040000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
      00000001.00000002.2742178189.000002598BC10000.00000020.10000000.00040000.00000000.sdmpWindows_Trojan_Metasploit_7bc0f998Identifies the API address lookup function leverage by metasploit shellcodeunknown
      • 0x11:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
      00000001.00000002.2742178189.000002598BC10000.00000020.10000000.00040000.00000000.sdmpWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
      • 0x7d:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-26T09:11:36.563533+020020287653Unknown Traffic192.168.2.124971020.25.126.96443TCP
      2024-10-26T09:11:38.792427+020020287653Unknown Traffic192.168.2.124971320.25.126.96443TCP
      2024-10-26T09:11:40.928461+020020287653Unknown Traffic192.168.2.124971620.25.126.96443TCP
      2024-10-26T09:11:43.046909+020020287653Unknown Traffic192.168.2.124971920.25.126.96443TCP
      2024-10-26T09:11:45.159166+020020287653Unknown Traffic192.168.2.124972220.25.126.96443TCP
      2024-10-26T09:11:47.312952+020020287653Unknown Traffic192.168.2.124972520.25.126.96443TCP
      2024-10-26T09:11:49.412285+020020287653Unknown Traffic192.168.2.124972820.25.126.96443TCP
      2024-10-26T09:11:51.549927+020020287653Unknown Traffic192.168.2.124973220.25.126.96443TCP
      2024-10-26T09:11:53.653075+020020287653Unknown Traffic192.168.2.124974020.25.126.96443TCP
      2024-10-26T09:11:55.932749+020020287653Unknown Traffic192.168.2.124974420.25.126.96443TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 00000001.00000002.2742178189.000002598BC10000.00000020.10000000.00040000.00000000.sdmpMalware Configuration Extractor: CobaltStrike {"C2Server": "http://20.25.126.96:443/bDDs", "User Agent": "User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; InfoPath.2; .NET CLR 2.0.50727)\r\n"}
      Source: 00000001.00000002.2742178189.000002598BC10000.00000020.10000000.00040000.00000000.sdmpMalware Configuration Extractor: Metasploit {"Headers": "User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; InfoPath.2; .NET CLR 2.0.50727)\r\n", "Type": "Metasploit Download", "URL": "http://20.25.126.96/bDDs"}
      Source: 6GUgc6JYS1.exeReversingLabs: Detection: 52%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: 6GUgc6JYS1.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeCode function: 4x nop then sub rsp, 58h1_2_00007FF78FD22C20

      Networking

      barindex
      Source: Malware configuration extractorURLs: http://20.25.126.96:443/bDDs
      Source: Malware configuration extractorURLs: http://20.25.126.96/bDDs
      Source: Joe Sandbox ViewASN Name: MICROSOFT-CORP-MSN-AS-BLOCKUS MICROSOFT-CORP-MSN-AS-BLOCKUS
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.12:49725 -> 20.25.126.96:443
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.12:49728 -> 20.25.126.96:443
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.12:49744 -> 20.25.126.96:443
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.12:49719 -> 20.25.126.96:443
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.12:49710 -> 20.25.126.96:443
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.12:49732 -> 20.25.126.96:443
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.12:49716 -> 20.25.126.96:443
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.12:49722 -> 20.25.126.96:443
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.12:49740 -> 20.25.126.96:443
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.12:49713 -> 20.25.126.96:443
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: Amcache.hve.7.drString found in binary or memory: http://upx.sf.net
      Source: 6GUgc6JYS1.exe, 00000001.00000002.2742214638.000002598BCD2000.00000004.00000020.00020000.00000000.sdmp, 6GUgc6JYS1.exe, 00000001.00000003.2572448652.000002598BCD2000.00000004.00000020.00020000.00000000.sdmp, 6GUgc6JYS1.exe, 00000001.00000003.2667657249.000002598BCD2000.00000004.00000020.00020000.00000000.sdmp, 6GUgc6JYS1.exe, 00000001.00000002.2742214638.000002598BC9C000.00000004.00000020.00020000.00000000.sdmp, 6GUgc6JYS1.exe, 00000001.00000003.2561670111.000002598BCD2000.00000004.00000020.00020000.00000000.sdmp, 6GUgc6JYS1.exe, 00000001.00000003.2551113364.000002598BCD2000.00000004.00000020.00020000.00000000.sdmp, 6GUgc6JYS1.exe, 00000001.00000002.2742214638.000002598BC73000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/
      Source: 6GUgc6JYS1.exe, 00000001.00000002.2742214638.000002598BCA6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/%
      Source: 6GUgc6JYS1.exe, 00000001.00000003.2583324428.000002598BCD2000.00000004.00000020.00020000.00000000.sdmp, 6GUgc6JYS1.exe, 00000001.00000002.2742214638.000002598BCD2000.00000004.00000020.00020000.00000000.sdmp, 6GUgc6JYS1.exe, 00000001.00000003.2572448652.000002598BCD2000.00000004.00000020.00020000.00000000.sdmp, 6GUgc6JYS1.exe, 00000001.00000003.2667657249.000002598BCD2000.00000004.00000020.00020000.00000000.sdmp, 6GUgc6JYS1.exe, 00000001.00000003.2561670111.000002598BCD2000.00000004.00000020.00020000.00000000.sdmp, 6GUgc6JYS1.exe, 00000001.00000003.2551113364.000002598BCD2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/.i$x
      Source: 6GUgc6JYS1.exe, 00000001.00000002.2742214638.000002598BCA6000.00000004.00000020.00020000.00000000.sdmp, 6GUgc6JYS1.exe, 00000001.00000002.2742214638.000002598BC9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/2
      Source: 6GUgc6JYS1.exe, 00000001.00000002.2742214638.000002598BCD2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/DDs
      Source: 6GUgc6JYS1.exe, 00000001.00000003.2667657249.000002598BCD2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/Y
      Source: 6GUgc6JYS1.exe, 00000001.00000003.2551113364.000002598BCD2000.00000004.00000020.00020000.00000000.sdmp, 6GUgc6JYS1.exe, 00000001.00000002.2742214638.000002598BC73000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/bDDs
      Source: 6GUgc6JYS1.exe, 00000001.00000002.2742214638.000002598BCD2000.00000004.00000020.00020000.00000000.sdmp, 6GUgc6JYS1.exe, 00000001.00000003.2667657249.000002598BCD2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/bDDs2i
      Source: 6GUgc6JYS1.exe, 00000001.00000002.2742214638.000002598BCA6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/bDDsF
      Source: 6GUgc6JYS1.exe, 00000001.00000002.2742214638.000002598BC73000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/bDDsH:px6
      Source: 6GUgc6JYS1.exe, 00000001.00000003.2561670111.000002598BCD2000.00000004.00000020.00020000.00000000.sdmp, 6GUgc6JYS1.exe, 00000001.00000003.2551113364.000002598BCD2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/l
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
      Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
      Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
      Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
      Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
      Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
      Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
      Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
      Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
      Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
      Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745

      System Summary

      barindex
      Source: 00000001.00000002.2742178189.000002598BC10000.00000020.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
      Source: 00000001.00000002.2742178189.000002598BC10000.00000020.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
      Source: C:\ProgramData\Microsoft\Windows\WER\Temp\WER8DF6.tmp.dmp, type: DROPPEDMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
      Source: C:\ProgramData\Microsoft\Windows\WER\Temp\WER8DF6.tmp.dmp, type: DROPPEDMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeCode function: 1_2_00007FF78FD219FB NtAccessCheckAndAuditAlarm,1_2_00007FF78FD219FB
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeCode function: 1_2_00007FF78FD21485 GetCurrentProcess,GetCurrentProcess,NtAlpcCreatePortSection,GetCurrentProcess,NtQueryInformationEnlistment,1_2_00007FF78FD21485
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeCode function: 1_2_00007FF78FD21A47 GetCurrentProcess,NtSetTimer,1_2_00007FF78FD21A47
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6608 -s 1228
      Source: 6GUgc6JYS1.exeStatic PE information: Number of sections : 11 > 10
      Source: 6GUgc6JYS1.exe, 00000001.00000002.2742645005.00007FF78FD2E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameEXPLORER.EXEj% vs 6GUgc6JYS1.exe
      Source: 6GUgc6JYS1.exeBinary or memory string: OriginalFilenameEXPLORER.EXEj% vs 6GUgc6JYS1.exe
      Source: 00000001.00000002.2742178189.000002598BC10000.00000020.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
      Source: 00000001.00000002.2742178189.000002598BC10000.00000020.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
      Source: C:\ProgramData\Microsoft\Windows\WER\Temp\WER8DF6.tmp.dmp, type: DROPPEDMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
      Source: C:\ProgramData\Microsoft\Windows\WER\Temp\WER8DF6.tmp.dmp, type: DROPPEDMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
      Source: classification engineClassification label: mal92.troj.evad.winEXE@2/5@0/1
      Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6608
      Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\d1df4113-672f-494d-ae55-1bc242b60e66Jump to behavior
      Source: 6GUgc6JYS1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: 6GUgc6JYS1.exeReversingLabs: Detection: 52%
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeFile read: C:\Users\user\Desktop\6GUgc6JYS1.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\6GUgc6JYS1.exe "C:\Users\user\Desktop\6GUgc6JYS1.exe"
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6608 -s 1228
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
      Source: 6GUgc6JYS1.exeStatic PE information: Image base 0x140000000 > 0x60000000
      Source: 6GUgc6JYS1.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
      Source: 6GUgc6JYS1.exeStatic PE information: section name: .xdata
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeCode function: 1_2_000002598BC1010C push esp; retf 1_2_000002598BC101C4
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeCode function: 1_2_000002598BC1012B push eax; ret 1_2_000002598BC10387
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeCode function: 1_2_000002598BC10310 push eax; ret 1_2_000002598BC10387
      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: Amcache.hve.7.drBinary or memory string: VMware
      Source: Amcache.hve.7.drBinary or memory string: VMware Virtual USB Mouse
      Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin
      Source: Amcache.hve.7.drBinary or memory string: VMware, Inc.
      Source: Amcache.hve.7.drBinary or memory string: VMware20,1hbin@
      Source: Amcache.hve.7.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
      Source: Amcache.hve.7.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
      Source: Amcache.hve.7.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
      Source: 6GUgc6JYS1.exe, 00000001.00000002.2742214638.000002598BC73000.00000004.00000020.00020000.00000000.sdmp, 6GUgc6JYS1.exe, 00000001.00000002.2742214638.000002598BCC2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: Amcache.hve.7.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
      Source: Amcache.hve.7.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
      Source: Amcache.hve.7.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
      Source: Amcache.hve.7.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
      Source: Amcache.hve.7.drBinary or memory string: vmci.sys
      Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin`
      Source: Amcache.hve.7.drBinary or memory string: \driver\vmci,\driver\pci
      Source: Amcache.hve.7.drBinary or memory string: VMware-42 27 6e d0 59 6b 97 52-b4 9a 7f 42 1f 0e 66 9c
      Source: Amcache.hve.7.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
      Source: Amcache.hve.7.drBinary or memory string: VMware20,1
      Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Generation Counter
      Source: Amcache.hve.7.drBinary or memory string: NECVMWar VMware SATA CD00
      Source: Amcache.hve.7.drBinary or memory string: VMware Virtual disk SCSI Disk Device
      Source: Amcache.hve.7.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
      Source: Amcache.hve.7.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
      Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
      Source: Amcache.hve.7.drBinary or memory string: VMware PCI VMCI Bus Device
      Source: Amcache.hve.7.drBinary or memory string: VMware VMCI Bus Device
      Source: Amcache.hve.7.drBinary or memory string: VMware Virtual RAM
      Source: Amcache.hve.7.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
      Source: Amcache.hve.7.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeCode function: 1_2_00007FF78FD21180 Sleep,Sleep,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_initterm,1_2_00007FF78FD21180

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeNtMapViewOfSection: Indirect: 0x7FF78FD21AB4Jump to behavior
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeNtCreateThreadEx: Indirect: 0x7FF78FD21562Jump to behavior
      Source: C:\Users\user\Desktop\6GUgc6JYS1.exeNtProtectVirtualMemory: Indirect: 0x7FF78FD21519Jump to behavior
      Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
      Source: Amcache.hve.7.drBinary or memory string: msmpeng.exe
      Source: Amcache.hve.7.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
      Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
      Source: Amcache.hve.7.drBinary or memory string: MsMpEng.exe

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000001.00000002.2742178189.000002598BC10000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000001.00000002.2742178189.000002598BC10000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
      DLL Side-Loading
      1
      Process Injection
      1
      Process Injection
      OS Credential Dumping11
      Security Software Discovery
      Remote ServicesData from Local System2
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      Abuse Elevation Control Mechanism
      1
      Abuse Elevation Control Mechanism
      LSASS Memory1
      System Information Discovery
      Remote Desktop ProtocolData from Removable Media11
      Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      DLL Side-Loading
      1
      DLL Side-Loading
      Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
      Obfuscated Files or Information
      NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      6GUgc6JYS1.exe53%ReversingLabsWin64.Trojan.CobaltStrike
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://upx.sf.net0%URL Reputationsafe
      No contacted domains info
      NameMaliciousAntivirus DetectionReputation
      http://20.25.126.96/bDDstrue
        unknown
        http://20.25.126.96:443/bDDstrue
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://20.25.126.96/Y6GUgc6JYS1.exe, 00000001.00000003.2667657249.000002598BCD2000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            https://20.25.126.96/bDDs2i6GUgc6JYS1.exe, 00000001.00000002.2742214638.000002598BCD2000.00000004.00000020.00020000.00000000.sdmp, 6GUgc6JYS1.exe, 00000001.00000003.2667657249.000002598BCD2000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              https://20.25.126.96/bDDs6GUgc6JYS1.exe, 00000001.00000003.2551113364.000002598BCD2000.00000004.00000020.00020000.00000000.sdmp, 6GUgc6JYS1.exe, 00000001.00000002.2742214638.000002598BC73000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                https://20.25.126.96/bDDsH:px66GUgc6JYS1.exe, 00000001.00000002.2742214638.000002598BC73000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  https://20.25.126.96/26GUgc6JYS1.exe, 00000001.00000002.2742214638.000002598BCA6000.00000004.00000020.00020000.00000000.sdmp, 6GUgc6JYS1.exe, 00000001.00000002.2742214638.000002598BC9C000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://20.25.126.96/6GUgc6JYS1.exe, 00000001.00000002.2742214638.000002598BCD2000.00000004.00000020.00020000.00000000.sdmp, 6GUgc6JYS1.exe, 00000001.00000003.2572448652.000002598BCD2000.00000004.00000020.00020000.00000000.sdmp, 6GUgc6JYS1.exe, 00000001.00000003.2667657249.000002598BCD2000.00000004.00000020.00020000.00000000.sdmp, 6GUgc6JYS1.exe, 00000001.00000002.2742214638.000002598BC9C000.00000004.00000020.00020000.00000000.sdmp, 6GUgc6JYS1.exe, 00000001.00000003.2561670111.000002598BCD2000.00000004.00000020.00020000.00000000.sdmp, 6GUgc6JYS1.exe, 00000001.00000003.2551113364.000002598BCD2000.00000004.00000020.00020000.00000000.sdmp, 6GUgc6JYS1.exe, 00000001.00000002.2742214638.000002598BC73000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      https://20.25.126.96/bDDsF6GUgc6JYS1.exe, 00000001.00000002.2742214638.000002598BCA6000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        https://20.25.126.96/DDs6GUgc6JYS1.exe, 00000001.00000002.2742214638.000002598BCD2000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://upx.sf.netAmcache.hve.7.drfalse
                          • URL Reputation: safe
                          unknown
                          https://20.25.126.96/.i$x6GUgc6JYS1.exe, 00000001.00000003.2583324428.000002598BCD2000.00000004.00000020.00020000.00000000.sdmp, 6GUgc6JYS1.exe, 00000001.00000002.2742214638.000002598BCD2000.00000004.00000020.00020000.00000000.sdmp, 6GUgc6JYS1.exe, 00000001.00000003.2572448652.000002598BCD2000.00000004.00000020.00020000.00000000.sdmp, 6GUgc6JYS1.exe, 00000001.00000003.2667657249.000002598BCD2000.00000004.00000020.00020000.00000000.sdmp, 6GUgc6JYS1.exe, 00000001.00000003.2561670111.000002598BCD2000.00000004.00000020.00020000.00000000.sdmp, 6GUgc6JYS1.exe, 00000001.00000003.2551113364.000002598BCD2000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            https://20.25.126.96/l6GUgc6JYS1.exe, 00000001.00000003.2561670111.000002598BCD2000.00000004.00000020.00020000.00000000.sdmp, 6GUgc6JYS1.exe, 00000001.00000003.2551113364.000002598BCD2000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              https://20.25.126.96/%6GUgc6JYS1.exe, 00000001.00000002.2742214638.000002598BCA6000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                20.25.126.96
                                unknownUnited States
                                8075MICROSOFT-CORP-MSN-AS-BLOCKUStrue
                                Joe Sandbox version:41.0.0 Charoite
                                Analysis ID:1542745
                                Start date and time:2024-10-26 09:10:18 +02:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 4m 34s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:10
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:6GUgc6JYS1.exe
                                renamed because original name is a hash value
                                Original Sample Name:cf580830ecedcd498730091d01b92c1fde220d95f1fa677ce88f1a17f236b6b8.exe
                                Detection:MAL
                                Classification:mal92.troj.evad.winEXE@2/5@0/1
                                EGA Information:
                                • Successful, ratio: 100%
                                HCA Information:
                                • Successful, ratio: 89%
                                • Number of executed functions: 8
                                • Number of non-executed functions: 9
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                • Excluded IPs from analysis (whitelisted): 20.42.65.92
                                • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • VT rate limit hit for: 6GUgc6JYS1.exe
                                TimeTypeDescription
                                03:12:01API Interceptor1x Sleep call for process: WerFault.exe modified
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                20.25.126.96Ljrfk7uRvO.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                                  No context
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  MICROSOFT-CORP-MSN-AS-BLOCKUSLjrfk7uRvO.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                                  • 20.25.126.96
                                  https://www.google.co.uk/url?q=38pQvvq6xRyj7Y00xDjnlx9kIHOSozurMOiaAkImPuQJnOIWtJjqJLi6stjtDz3yh&rct=tTPSrMOiaAkImPuQJnOIWtJjqJLi6stjtFX08pQvvq6xRyj7Y00xDjnlx9kIjusucT&sa=t&url=amp/taxigiarebienhoa.vn/nini/ybmex/captcha/Z3VsYW1yYXN1bC5jaGVwdXdhbGFAY2V2YWxvZ2lzdGljcy5jb20Get hashmaliciousHTMLPhisher, Mamba2FABrowse
                                  • 13.107.246.60
                                  https://load.aberegg-immobilien.ch/Get hashmaliciousHTMLPhisherBrowse
                                  • 40.126.31.73
                                  la.bot.arm.elfGet hashmaliciousUnknownBrowse
                                  • 22.252.12.135
                                  la.bot.m68k.elfGet hashmaliciousUnknownBrowse
                                  • 20.57.78.10
                                  la.bot.sh4.elfGet hashmaliciousUnknownBrowse
                                  • 21.238.75.88
                                  la.bot.sh4.elfGet hashmaliciousUnknownBrowse
                                  • 40.99.246.89
                                  la.bot.mipsel.elfGet hashmaliciousUnknownBrowse
                                  • 22.36.15.81
                                  la.bot.powerpc.elfGet hashmaliciousUnknownBrowse
                                  • 22.23.166.67
                                  la.bot.mips.elfGet hashmaliciousUnknownBrowse
                                  • 20.189.202.203
                                  No context
                                  No context
                                  Process:C:\Windows\System32\WerFault.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):65536
                                  Entropy (8bit):0.8902174182806722
                                  Encrypted:false
                                  SSDEEP:96:iLFQfuv3+/sa2Coh7JfTQXIDcQWc6zcEZcw37n+HbHg/5jgOg0dl/phsv5o1OyWW:MLvu/v0I3DEjZ7yzuiFCZ24lO8Te
                                  MD5:7E020017FA17FA6F8252756296A3FE3B
                                  SHA1:8A5131A2820BCAA053C4DBF87E16CF77CDBD4F5E
                                  SHA-256:115ECCEC8F395FDEC41C5D04EF94666935B31CC36468A519DF492746169029FF
                                  SHA-512:21F3E4E21EAAA07C2425CB59E989D5C279BC516D2CE2BC71894727A1AF9513696192C19E8968A99345AAE23B685F93AF0C9C10EE130140D7690D39E3074FBEF6
                                  Malicious:true
                                  Reputation:low
                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.4.0.0.3.1.6.5.9.7.2.8.4.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.4.0.0.3.1.6.9.7.2.2.8.0.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.b.2.8.6.9.2.8.-.5.b.7.4.-.4.1.0.5.-.9.1.9.5.-.d.9.9.0.9.6.4.f.e.4.a.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.d.a.2.6.4.5.7.-.5.c.b.d.-.4.b.a.7.-.b.b.8.d.-.b.c.3.c.e.f.8.3.9.5.a.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.6.G.U.g.c.6.J.Y.S.1...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.d.0.-.0.0.0.1.-.0.0.1.4.-.6.8.2.3.-.1.c.4.a.7.6.2.7.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.1.a.b.c.1.c.9.6.5.d.8.5.7.3.1.9.e.f.a.7.0.1.d.3.1.8.e.c.e.b.f.5.0.0.0.0.0.9.0.4.!.0.0.0.0.6.1.c.5.6.b.1.9.c.5.5.0.2.0.4.9.4.f.a.1.9.f.a.a.3.d.1.b.7.a.2.f.0.7.0.2.5.9.d.f.!.6.G.U.g.c.6.J.Y.S.1...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.0././.2.3.
                                  Process:C:\Windows\System32\WerFault.exe
                                  File Type:Mini DuMP crash report, 14 streams, Sat Oct 26 07:11:56 2024, 0x1205a4 type
                                  Category:dropped
                                  Size (bytes):159734
                                  Entropy (8bit):1.3021244577485591
                                  Encrypted:false
                                  SSDEEP:384:nyCEX5vNwAOK3DR/62N5t3akw74uM1KjE5qdQt58:nL85FwAOcVSG5t3akw74VL5QQw
                                  MD5:C0AC191691F22EC7492F8AD8B057D770
                                  SHA1:93E287CFDD352E094CED28B76D04456F6111ECA5
                                  SHA-256:C1A12A4F64F2BBAFE6D45871DFAF5C8B13CBCAC8D28234C5285AECACB932873D
                                  SHA-512:BDE0DF232B2A7D0EC2381B47CD5FCB6DE791AF485A1B555CD426D38A27C320FF743FE2CD5F0DE219A1DA636E0601DCDDC0CCCB47C77ADE8CE40E4114C2016439
                                  Malicious:false
                                  Yara Hits:
                                  • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: C:\ProgramData\Microsoft\Windows\WER\Temp\WER8DF6.tmp.dmp, Author: unknown
                                  • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: C:\ProgramData\Microsoft\Windows\WER\Temp\WER8DF6.tmp.dmp, Author: unknown
                                  Reputation:low
                                  Preview:MDMP..a..... .......<..g.........................................Z..........T.......8...........T...............VA......................................................................................................eJ..............Lw......................T...........&..g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\WerFault.exe
                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):8812
                                  Entropy (8bit):3.7110211166131153
                                  Encrypted:false
                                  SSDEEP:192:R6l7wVeJOHEP6Y+izpgmfWYoJpDa89b3ddfadm:R6lXJuE6YbzpgmfWYof3nfJ
                                  MD5:28E3487898A8A9F6333A7027C90429D4
                                  SHA1:2982EDF69F8DD684D51AEB01E281452528A09DE8
                                  SHA-256:469D29D5DA9682EF0095AB303836CFCE7ECBD79B87AC3E154037E27EB7BB454D
                                  SHA-512:23DB188CBFFC64DA234A5176955752A23BB801078D7AD1A83F96F93ABBED04907D32A6E63384F3AF2B4AB3DEFA0E7F16FE3496A2851AD990D01FF28956874E33
                                  Malicious:false
                                  Reputation:low
                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.6.0.8.<./.P.i.
                                  Process:C:\Windows\System32\WerFault.exe
                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):4701
                                  Entropy (8bit):4.505379579987411
                                  Encrypted:false
                                  SSDEEP:48:cvIwWl8zsI/Jg771I9N/OWpW8VYJYm8M4JOlFOKFAyq85j+QONKi/LE4gzTfd:uIjfSI7yv7VFJOvEyDOfzErTfd
                                  MD5:602D680BABEC94E2A1A7CA542049B7E6
                                  SHA1:88B4AF2E6A1C22EA9EE9C649B6B93092A8079367
                                  SHA-256:0B29A01BE9BA79774B54DBD2B26B7818B3341683FB2B43DFA801FEA87911D3ED
                                  SHA-512:4C844227400D5DCFB43405D0C9EE08E2D09F790ED99C07C54FAAEE33EA6B300797568A54D49DF8EC6E68428AC01733297216096E8F576E8E62E2D5455A932A51
                                  Malicious:false
                                  Reputation:low
                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="560054" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                  Process:C:\Windows\System32\WerFault.exe
                                  File Type:MS Windows registry file, NT/2000 or above
                                  Category:dropped
                                  Size (bytes):1835008
                                  Entropy (8bit):4.569187439173982
                                  Encrypted:false
                                  SSDEEP:6144:ooPefZnQMa3tfLXbn90foomgsattlbSldrUHT7hSgkSNv0juQJYchUJvTGAGBsLq:lPPAooVJHnsg/d1TsqGn
                                  MD5:36260AE22F8B73E4B96085F9356E8DE8
                                  SHA1:B2C9C092DA18315AE9117B0EEBB74C3713D8D0FD
                                  SHA-256:9BA9EEA9C99AF22C809FF8354BB68806657F9ADDD8A94D8A4C050218D10F3012
                                  SHA-512:E3A71076684C4D0022A9B9A5FE6C21C4D81649587FB25FAAAB5857619D079A57D54D2D7E1AEA2D2AD621C77F66D23820A4E541EC344B9114FA73F663706DCBC0
                                  Malicious:false
                                  Reputation:low
                                  Preview:regfJ...J....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.8.Wv'..............................................................................................................................................................................................................................................................................................................................................~.c........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                  Entropy (8bit):5.361963209685598
                                  TrID:
                                  • Win64 Executable (generic) (12005/4) 74.95%
                                  • Generic Win/DOS Executable (2004/3) 12.51%
                                  • DOS Executable Generic (2002/1) 12.50%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                                  File name:6GUgc6JYS1.exe
                                  File size:23'040 bytes
                                  MD5:789bf0a8714e77d0d524ba22d8efbd7e
                                  SHA1:61c56b19c55020494fa19faa3d1b7a2f070259df
                                  SHA256:cf580830ecedcd498730091d01b92c1fde220d95f1fa677ce88f1a17f236b6b8
                                  SHA512:70cfde0ebc2dec25bf28873269543351cc8a218e6a0d5d7b6f3d3c87673aa81ad0187ed6990ed82875455b621ec49a02f875760c6bf6c7359971658d05af933b
                                  SSDEEP:384:Y021unhcOSuFUKrxzk+kzekzLko0nN7WIeW:Yt0GOHF5lk+kKkzLz0nJ
                                  TLSH:E7A2084FFB9258ECC21ED03985EA9B31AD71B86044905B2FE778ED711F20961AF39352
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......g...............+.,...V...".............@..........................................`... ............................
                                  Icon Hash:00928e8e8686b000
                                  Entrypoint:0x1400013d0
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x140000000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                                  Time Stamp:0x6718BD08 [Wed Oct 23 09:08:24 2024 UTC]
                                  TLS Callbacks:0x40002890, 0x1, 0x40002860, 0x1
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:a3f3b74a6140351f8e7200ddf88e2e48
                                  Instruction
                                  dec eax
                                  sub esp, 28h
                                  dec eax
                                  mov eax, dword ptr [00004015h]
                                  mov dword ptr [eax], 00000001h
                                  call 00007FD86C7D8C4Fh
                                  nop
                                  nop
                                  dec eax
                                  add esp, 28h
                                  ret
                                  nop dword ptr [eax]
                                  dec eax
                                  sub esp, 28h
                                  dec eax
                                  mov eax, dword ptr [00003FF5h]
                                  mov dword ptr [eax], 00000000h
                                  call 00007FD86C7D8C2Fh
                                  nop
                                  nop
                                  dec eax
                                  add esp, 28h
                                  ret
                                  nop dword ptr [eax]
                                  dec eax
                                  sub esp, 28h
                                  call 00007FD86C7DB3ACh
                                  dec eax
                                  cmp eax, 01h
                                  sbb eax, eax
                                  dec eax
                                  add esp, 28h
                                  ret
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  dec eax
                                  lea ecx, dword ptr [00000009h]
                                  jmp 00007FD86C7D8E89h
                                  nop dword ptr [eax+00h]
                                  ret
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  dec eax
                                  jmp ecx
                                  dec eax
                                  arpl word ptr [00002BB6h], ax
                                  test eax, eax
                                  jle 00007FD86C7D8ED8h
                                  cmp dword ptr [00002BAFh], 00000000h
                                  jle 00007FD86C7D8ECFh
                                  dec eax
                                  mov edx, dword ptr [00009D8Ah]
                                  dec eax
                                  mov dword ptr [ecx+eax], edx
                                  dec eax
                                  mov edx, dword ptr [00009D87h]
                                  dec eax
                                  arpl word ptr [00002B94h], ax
                                  dec eax
                                  mov dword ptr [ecx+eax], edx
                                  ret
                                  push ebp
                                  push edi
                                  push esi
                                  push ebx
                                  dec eax
                                  sub esp, 00000088h
                                  dec eax
                                  arpl dx, ax
                                  dec eax
                                  mov edi, ecx
                                  xor ecx, ecx
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xb0000x6e4.idata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000x3e8.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x60000x3fc.pdata
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xf0000x7c.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x50400x28.rdata
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0xb1d00x190.idata
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000x2aa80x2c0088650f3b39c64c8fc929476a25b66439False0.5095880681818182data6.038952498895535IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .data0x40000x4b00x60022b93c3335383d8ae590e670f7bd6e68False0.6725260416666666data5.983486071991815IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .rdata0x50000x9500xa003549a44efb7dacab789f7957db19e9bfFalse0.23046875data3.974332583159687IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .pdata0x60000x3fc0x400af3a5fc9405581543e9fe642c8b3cfe4False0.50390625data4.1070762649908765IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .xdata0x70000x2c40x400f9f84d96f7d46b6459820b4f8305922dFalse0.2861328125data2.896667181484537IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .bss0x80000x21200x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .idata0xb0000x6e40x80040bc1346723ef460d9e793bf7985fe91False0.3212890625data3.5144818216706186IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .CRT0xc0000x600x2005ef26311a99fa82b8c36b2288f406e7dFalse0.068359375data0.28655982431271465IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .tls0xd0000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .rsrc0xe0000x3e80x4005d241ef7651954dadb8e43a444c74261False0.4482421875data3.325221446899578IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0xf0000x7c0x200e9430c9e167f4b5795a489747c577ff7False0.2421875data1.4308862585029796IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_VERSION0xe0580x38cPGP symmetric key encrypted data - Plaintext or unencrypted dataEnglishUnited States0.46365638766519823
                                  DLLImport
                                  KERNEL32.dllDeleteCriticalSection, EnterCriticalSection, GetCurrentProcess, GetLastError, GetModuleFileNameA, GetModuleHandleA, GetProcAddress, InitializeCriticalSection, LeaveCriticalSection, SetUnhandledExceptionFilter, Sleep, TlsGetValue, VirtualProtect, VirtualQuery, WaitForSingleObject
                                  msvcrt.dll__C_specific_handler, __getmainargs, __initenv, __iob_func, __set_app_type, __setusermatherr, _amsg_exit, _cexit, _commode, _fmode, _initterm, _onexit, abort, calloc, exit, fclose, fopen, fprintf, fread, free, fsetpos, fwrite, malloc, mbstowcs, memcmp, memcpy, rand, signal, strlen, strncmp, vfprintf, wcsncat, wcsncpy
                                  Language of compilation systemCountry where language is spokenMap
                                  EnglishUnited States
                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                  2024-10-26T09:11:36.563533+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.124971020.25.126.96443TCP
                                  2024-10-26T09:11:38.792427+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.124971320.25.126.96443TCP
                                  2024-10-26T09:11:40.928461+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.124971620.25.126.96443TCP
                                  2024-10-26T09:11:43.046909+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.124971920.25.126.96443TCP
                                  2024-10-26T09:11:45.159166+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.124972220.25.126.96443TCP
                                  2024-10-26T09:11:47.312952+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.124972520.25.126.96443TCP
                                  2024-10-26T09:11:49.412285+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.124972820.25.126.96443TCP
                                  2024-10-26T09:11:51.549927+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.124973220.25.126.96443TCP
                                  2024-10-26T09:11:53.653075+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.124974020.25.126.96443TCP
                                  2024-10-26T09:11:55.932749+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.124974420.25.126.96443TCP
                                  TimestampSource PortDest PortSource IPDest IP
                                  Oct 26, 2024 09:11:35.497083902 CEST49710443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:35.497133017 CEST4434971020.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:35.497252941 CEST49710443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:35.507602930 CEST49710443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:35.507632971 CEST4434971020.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:36.563286066 CEST4434971020.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:36.563533068 CEST49710443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:36.594609022 CEST49710443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:36.594636917 CEST4434971020.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:36.655646086 CEST49711443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:36.655700922 CEST4434971120.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:36.655776024 CEST49711443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:36.656140089 CEST49711443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:36.656155109 CEST4434971120.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:37.734308004 CEST4434971120.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:37.734417915 CEST49711443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:37.734534979 CEST49711443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:37.734555006 CEST4434971120.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:37.735335112 CEST49712443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:37.735435963 CEST4434971220.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:37.735536098 CEST49712443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:37.735646009 CEST49712443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:37.735692024 CEST4434971220.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:37.735747099 CEST49712443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:37.736633062 CEST49713443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:37.736676931 CEST4434971320.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:37.736740112 CEST49713443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:37.737027884 CEST49713443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:37.737044096 CEST4434971320.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:38.792326927 CEST4434971320.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:38.792427063 CEST49713443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:38.792519093 CEST49713443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:38.792538881 CEST4434971320.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:38.793190002 CEST49714443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:38.793253899 CEST4434971420.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:38.793339014 CEST49714443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:38.793833017 CEST49714443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:38.793862104 CEST4434971420.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:39.854671955 CEST4434971420.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:39.854752064 CEST49714443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:39.854854107 CEST49714443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:39.854877949 CEST4434971420.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:39.855705023 CEST49715443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:39.855742931 CEST4434971520.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:39.855827093 CEST49715443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:39.855952024 CEST49715443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:39.855988979 CEST4434971520.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:39.856055021 CEST49715443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:39.856913090 CEST49716443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:39.856961012 CEST4434971620.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:39.857018948 CEST49716443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:39.857420921 CEST49716443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:39.857438087 CEST4434971620.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:40.928323030 CEST4434971620.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:40.928461075 CEST49716443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:40.928617954 CEST49716443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:40.928632975 CEST4434971620.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:40.929383039 CEST49717443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:40.929425955 CEST4434971720.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:40.929507017 CEST49717443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:40.929742098 CEST49717443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:40.929757118 CEST4434971720.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:41.991852045 CEST4434971720.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:41.991959095 CEST49717443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:41.992046118 CEST49717443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:41.992065907 CEST4434971720.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:41.992644072 CEST49718443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:41.992691994 CEST4434971820.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:41.992748022 CEST49718443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:41.992820978 CEST49718443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:41.992889881 CEST4434971820.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:41.992938995 CEST49718443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:41.997992992 CEST49719443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:41.998011112 CEST4434971920.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:41.998070002 CEST49719443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:41.999449015 CEST49719443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:41.999465942 CEST4434971920.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:43.046785116 CEST4434971920.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:43.046909094 CEST49719443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:43.047147036 CEST49719443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:43.047166109 CEST4434971920.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:43.051527977 CEST49720443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:43.051567078 CEST4434972020.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:43.051639080 CEST49720443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:43.052032948 CEST49720443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:43.052047968 CEST4434972020.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:44.101308107 CEST4434972020.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:44.101404905 CEST49720443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:44.104733944 CEST49720443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:44.104770899 CEST4434972020.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:44.106872082 CEST49721443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:44.106909990 CEST4434972120.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:44.106972933 CEST49721443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:44.107078075 CEST49721443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:44.107129097 CEST4434972120.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:44.107182026 CEST49721443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:44.108058929 CEST49722443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:44.108088970 CEST4434972220.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:44.108151913 CEST49722443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:44.108406067 CEST49722443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:44.108419895 CEST4434972220.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:45.158934116 CEST4434972220.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:45.159166098 CEST49722443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:45.182763100 CEST49722443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:45.182796001 CEST4434972220.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:45.211158037 CEST49723443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:45.211193085 CEST4434972320.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:45.211338043 CEST49723443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:45.211730957 CEST49723443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:45.211746931 CEST4434972320.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:46.269875050 CEST4434972320.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:46.270025015 CEST49723443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:46.270090103 CEST49723443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:46.270116091 CEST4434972320.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:46.272933960 CEST49724443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:46.272993088 CEST4434972420.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:46.273072958 CEST49724443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:46.273168087 CEST49724443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:46.273240089 CEST4434972420.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:46.273294926 CEST49724443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:46.274260044 CEST49725443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:46.274296999 CEST4434972520.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:46.274360895 CEST49725443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:46.274652004 CEST49725443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:46.274667978 CEST4434972520.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:47.312789917 CEST4434972520.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:47.312952042 CEST49725443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:47.313077927 CEST49725443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:47.313095093 CEST4434972520.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:47.314095020 CEST49726443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:47.314160109 CEST4434972620.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:47.314248085 CEST49726443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:47.314583063 CEST49726443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:47.314599991 CEST4434972620.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:48.350248098 CEST4434972620.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:48.350409031 CEST49726443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:48.350702047 CEST49726443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:48.350730896 CEST4434972620.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:48.352202892 CEST49727443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:48.352242947 CEST4434972720.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:48.352375984 CEST49727443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:48.352601051 CEST49727443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:48.352636099 CEST4434972720.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:48.352722883 CEST49727443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:48.360393047 CEST49728443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:48.360411882 CEST4434972820.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:48.360546112 CEST49728443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:48.361232996 CEST49728443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:48.361244917 CEST4434972820.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:49.412168026 CEST4434972820.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:49.412285089 CEST49728443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:49.412368059 CEST49728443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:49.412389040 CEST4434972820.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:49.413283110 CEST49729443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:49.413341045 CEST4434972920.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:49.413429976 CEST49729443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:49.413737059 CEST49729443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:49.413755894 CEST4434972920.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:50.484500885 CEST4434972920.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:50.484582901 CEST49729443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:50.484668970 CEST49729443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:50.484692097 CEST4434972920.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:50.485275030 CEST49731443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:50.485307932 CEST4434973120.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:50.485372066 CEST49731443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:50.485428095 CEST49731443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:50.485460043 CEST4434973120.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:50.485501051 CEST49731443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:50.486453056 CEST49732443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:50.486483097 CEST4434973220.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:50.486547947 CEST49732443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:50.486913919 CEST49732443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:50.486924887 CEST4434973220.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:51.549854040 CEST4434973220.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:51.549926996 CEST49732443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:51.550039053 CEST49732443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:51.550050020 CEST4434973220.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:51.551340103 CEST49736443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:51.551415920 CEST4434973620.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:51.551872969 CEST49736443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:51.552227020 CEST49736443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:51.552252054 CEST4434973620.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:52.607800961 CEST4434973620.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:52.607954025 CEST49736443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:52.608061075 CEST49736443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:52.608083963 CEST4434973620.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:52.608664989 CEST49739443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:52.608716011 CEST4434973920.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:52.608798027 CEST49739443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:52.608906984 CEST49739443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:52.608937979 CEST4434973920.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:52.608994007 CEST49739443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:52.610008001 CEST49740443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:52.610060930 CEST4434974020.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:52.610137939 CEST49740443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:52.610428095 CEST49740443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:52.610445976 CEST4434974020.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:53.653008938 CEST4434974020.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:53.653074980 CEST49740443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:53.653165102 CEST49740443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:53.653179884 CEST4434974020.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:53.653816938 CEST49742443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:53.653841019 CEST4434974220.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:53.653995037 CEST49742443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:53.654305935 CEST49742443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:53.654314995 CEST4434974220.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:54.703380108 CEST4434974220.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:54.703479052 CEST49742443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:54.703562975 CEST49742443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:54.703578949 CEST4434974220.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:54.706656933 CEST49743443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:54.706770897 CEST4434974320.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:54.706906080 CEST49743443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:54.706998110 CEST49743443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:54.707025051 CEST4434974320.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:54.707077026 CEST49743443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:54.710196972 CEST49744443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:54.710258007 CEST4434974420.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:54.710361958 CEST49744443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:54.710763931 CEST49744443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:54.710788965 CEST4434974420.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:55.932692051 CEST4434974420.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:55.932749033 CEST49744443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:55.932858944 CEST49744443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:55.932887077 CEST4434974420.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:55.933635950 CEST49745443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:55.933687925 CEST4434974520.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:55.933748007 CEST49745443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:55.934338093 CEST49745443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:55.934350014 CEST4434974520.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:56.974122047 CEST4434974520.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:56.974323034 CEST49745443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:56.974427938 CEST49745443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:56.974445105 CEST4434974520.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:56.975295067 CEST49746443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:56.975368023 CEST4434974620.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:56.975455999 CEST49746443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:56.975595951 CEST49746443192.168.2.1220.25.126.96
                                  Oct 26, 2024 09:11:56.975636959 CEST4434974620.25.126.96192.168.2.12
                                  Oct 26, 2024 09:11:56.975688934 CEST49746443192.168.2.1220.25.126.96

                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:1
                                  Start time:03:11:34
                                  Start date:26/10/2024
                                  Path:C:\Users\user\Desktop\6GUgc6JYS1.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\Desktop\6GUgc6JYS1.exe"
                                  Imagebase:0x7ff78fd20000
                                  File size:23'040 bytes
                                  MD5 hash:789BF0A8714E77D0D524BA22D8EFBD7E
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000001.00000002.2742178189.000002598BC10000.00000020.10000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000001.00000002.2742178189.000002598BC10000.00000020.10000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000001.00000002.2742178189.000002598BC10000.00000020.10000000.00040000.00000000.sdmp, Author: unknown
                                  • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000001.00000002.2742178189.000002598BC10000.00000020.10000000.00040000.00000000.sdmp, Author: unknown
                                  Reputation:low
                                  Has exited:true

                                  Target ID:7
                                  Start time:03:11:56
                                  Start date:26/10/2024
                                  Path:C:\Windows\System32\WerFault.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\WerFault.exe -u -p 6608 -s 1228
                                  Imagebase:0x7ff603290000
                                  File size:570'736 bytes
                                  MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:11%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:12.2%
                                    Total number of Nodes:196
                                    Total number of Limit Nodes:2
                                    execution_graph 1248 7ff78fd21bb7 1249 7ff78fd21c38 1248->1249 1250 7ff78fd22310 4 API calls 1249->1250 1251 7ff78fd21ca8 1250->1251 1138 7ff78fd231fb 1139 7ff78fd23220 1138->1139 1140 7ff78fd23216 1138->1140 1139->1140 1141 7ff78fd23237 EnterCriticalSection LeaveCriticalSection 1139->1141 1141->1140 1145 7ff78fd23480 strlen 1146 7ff78fd234fe 1145->1146 1147 7ff78fd23495 1145->1147 1147->1146 1148 7ff78fd234e9 strncmp 1147->1148 1148->1146 1148->1147 978 2598bc1010c InternetConnectA 979 2598bc101a4 978->979 982 2598bc1012b HttpOpenRequestA 979->982 983 2598bc10152 982->983 984 7ff78fd213d0 987 7ff78fd21180 984->987 986 7ff78fd213e6 988 7ff78fd211b0 987->988 989 7ff78fd211b9 Sleep 988->989 992 7ff78fd211cd 988->992 989->988 990 7ff78fd2134c _initterm 991 7ff78fd21200 990->991 1002 7ff78fd22c20 991->1002 992->990 992->991 1001 7ff78fd212ee 992->1001 994 7ff78fd21228 SetUnhandledExceptionFilter 995 7ff78fd2124b 994->995 996 7ff78fd21250 malloc 995->996 997 7ff78fd2127a 996->997 996->1001 998 7ff78fd21280 strlen malloc memcpy 997->998 998->998 999 7ff78fd212b2 998->999 1019 7ff78fd23a40 999->1019 1001->986 1010 7ff78fd22c58 1002->1010 1018 7ff78fd22c41 1002->1018 1003 7ff78fd22f30 1004 7ff78fd22f39 1003->1004 1003->1018 1008 7ff78fd22f5d 1004->1008 1048 7ff78fd22ab0 1004->1048 1006 7ff78fd22f70 1007 7ff78fd22a40 8 API calls 1006->1007 1009 7ff78fd22f7c 1007->1009 1014 7ff78fd22a40 8 API calls 1008->1014 1009->994 1010->1003 1010->1006 1010->1008 1012 7ff78fd22d3e 1010->1012 1015 7ff78fd22e30 1010->1015 1010->1018 1012->1010 1013 7ff78fd22e2a 1012->1013 1016 7ff78fd22ab0 8 API calls 1012->1016 1024 7ff78fd22a40 1012->1024 1013->1015 1014->1006 1017 7ff78fd22e62 VirtualProtect 1015->1017 1015->1018 1016->1012 1017->1015 1018->994 1020 7ff78fd23a4b 1019->1020 1072 7ff78fd226b0 malloc GetModuleFileNameA 1020->1072 1031 7ff78fd22a6c 1024->1031 1025 7ff78fd22b7e 1025->1012 1026 7ff78fd22c02 1027 7ff78fd22a40 4 API calls 1026->1027 1036 7ff78fd22c11 1027->1036 1028 7ff78fd22b3d VirtualQuery 1029 7ff78fd22be7 1028->1029 1028->1031 1029->1026 1030 7ff78fd22a40 4 API calls 1029->1030 1030->1026 1031->1025 1031->1026 1031->1028 1032 7ff78fd22b90 VirtualProtect 1031->1032 1032->1025 1033 7ff78fd22bc8 GetLastError 1032->1033 1034 7ff78fd22a40 4 API calls 1033->1034 1034->1031 1035 7ff78fd22ab0 4 API calls 1038 7ff78fd22f30 1035->1038 1037 7ff78fd22f70 1036->1037 1036->1038 1040 7ff78fd22f5d 1036->1040 1041 7ff78fd22a40 4 API calls 1036->1041 1044 7ff78fd22ab0 VirtualQuery VirtualProtect GetLastError VirtualProtect 1036->1044 1045 7ff78fd22e2a 1036->1045 1047 7ff78fd22c41 1036->1047 1039 7ff78fd22a40 4 API calls 1037->1039 1038->1035 1038->1040 1038->1047 1043 7ff78fd22f7c 1039->1043 1042 7ff78fd22a40 4 API calls 1040->1042 1041->1036 1042->1037 1043->1012 1044->1036 1046 7ff78fd22e62 VirtualProtect 1045->1046 1045->1047 1046->1045 1047->1012 1054 7ff78fd22ac9 1048->1054 1049 7ff78fd22b7e 1049->1004 1050 7ff78fd22c02 1051 7ff78fd22a40 4 API calls 1050->1051 1067 7ff78fd22c11 1051->1067 1052 7ff78fd22b3d VirtualQuery 1053 7ff78fd22be7 1052->1053 1052->1054 1053->1050 1055 7ff78fd22a40 4 API calls 1053->1055 1054->1049 1054->1050 1054->1052 1056 7ff78fd22b90 VirtualProtect 1054->1056 1055->1050 1056->1049 1057 7ff78fd22bc8 GetLastError 1056->1057 1058 7ff78fd22a40 4 API calls 1057->1058 1058->1054 1059 7ff78fd22f30 1060 7ff78fd22ab0 4 API calls 1059->1060 1063 7ff78fd22f5d 1059->1063 1071 7ff78fd22c41 1059->1071 1060->1059 1061 7ff78fd22f70 1062 7ff78fd22a40 4 API calls 1061->1062 1064 7ff78fd22f7c 1062->1064 1066 7ff78fd22a40 4 API calls 1063->1066 1064->1004 1065 7ff78fd22a40 4 API calls 1065->1067 1066->1061 1067->1059 1067->1061 1067->1063 1067->1065 1068 7ff78fd22ab0 VirtualQuery VirtualProtect GetLastError VirtualProtect 1067->1068 1069 7ff78fd22e2a 1067->1069 1067->1071 1068->1067 1070 7ff78fd22e62 VirtualProtect 1069->1070 1069->1071 1070->1069 1071->1004 1073 7ff78fd226eb 1072->1073 1074 7ff78fd2270b malloc 1073->1074 1075 7ff78fd22734 1074->1075 1078 7ff78fd21485 1075->1078 1077 7ff78fd22761 1090 7ff78fd219fb 1078->1090 1084 7ff78fd214c9 1085 7ff78fd214ee GetCurrentProcess 1084->1085 1086 7ff78fd2216c memcmp memcmp memcmp rand 1085->1086 1087 7ff78fd21519 GetCurrentProcess 1086->1087 1088 7ff78fd220c4 memcmp memcmp memcmp rand 1087->1088 1089 7ff78fd21562 1088->1089 1089->1077 1101 7ff78fd2255c 1090->1101 1092 7ff78fd214b1 1093 7ff78fd21a47 GetCurrentProcess 1092->1093 1123 7ff78fd225b0 1093->1123 1095 7ff78fd214bc 1096 7ff78fd222bc 1095->1096 1097 7ff78fd2206a 4 API calls 1096->1097 1098 7ff78fd222df 1097->1098 1099 7ff78fd21fd6 3 API calls 1098->1099 1100 7ff78fd222ee 1099->1100 1106 7ff78fd2206a 1101->1106 1114 7ff78fd21dd8 1106->1114 1108 7ff78fd22078 1109 7ff78fd220ac 1108->1109 1110 7ff78fd220a1 rand 1108->1110 1111 7ff78fd21fd6 1109->1111 1110->1108 1112 7ff78fd21dd8 3 API calls 1111->1112 1113 7ff78fd21fe2 1112->1113 1115 7ff78fd21df1 1114->1115 1116 7ff78fd21dfb 1114->1116 1115->1108 1116->1115 1118 7ff78fd21d48 memcmp 1116->1118 1119 7ff78fd21d7e 1118->1119 1120 7ff78fd21dc4 1118->1120 1119->1120 1121 7ff78fd21d86 memcmp 1119->1121 1120->1116 1121->1120 1122 7ff78fd21da2 memcmp 1121->1122 1122->1119 1122->1120 1124 7ff78fd2206a 4 API calls 1123->1124 1125 7ff78fd225d3 1124->1125 1126 7ff78fd21fd6 3 API calls 1125->1126 1127 7ff78fd225e2 1126->1127 1159 7ff78fd21010 1160 7ff78fd2104b 1159->1160 1161 7ff78fd2106d __set_app_type 1160->1161 1162 7ff78fd21077 1160->1162 1161->1162 1166 7ff78fd22890 1167 7ff78fd228a2 1166->1167 1168 7ff78fd228b2 1167->1168 1171 7ff78fd23300 1167->1171 1170 7ff78fd22905 1172 7ff78fd2330e 1171->1172 1173 7ff78fd233c0 1171->1173 1174 7ff78fd23314 1172->1174 1176 7ff78fd23322 1172->1176 1178 7ff78fd23360 1172->1178 1173->1170 1175 7ff78fd233e0 InitializeCriticalSection 1174->1175 1174->1176 1175->1176 1176->1170 1177 7ff78fd23399 DeleteCriticalSection 1177->1176 1178->1176 1178->1177 1179 7ff78fd23388 free 1178->1179 1179->1177 1179->1179 1180 7ff78fd22014 1181 7ff78fd21dd8 3 API calls 1180->1181 1182 7ff78fd22020 1181->1182 1183 7ff78fd22116 1184 7ff78fd2206a 4 API calls 1183->1184 1185 7ff78fd2213b 1184->1185 1186 7ff78fd21fd6 3 API calls 1185->1186 1187 7ff78fd2214a 1186->1187 1199 7ff78fd22860 1200 7ff78fd22869 1199->1200 1201 7ff78fd2286d 1200->1201 1202 7ff78fd23300 3 API calls 1200->1202 1203 7ff78fd22885 1202->1203 1272 7ff78fd23020 signal 1273 7ff78fd23174 signal 1272->1273 1274 7ff78fd23036 1272->1274 1273->1274 1219 7ff78fd213f0 1220 7ff78fd21180 28 API calls 1219->1220 1221 7ff78fd21406 1220->1221 1222 7ff78fd23270 1223 7ff78fd23290 EnterCriticalSection 1222->1223 1224 7ff78fd23282 1222->1224 1225 7ff78fd232d3 LeaveCriticalSection 1223->1225 1226 7ff78fd232ac 1223->1226 1226->1225 1227 7ff78fd232ce free 1226->1227 1227->1225 1275 7ff78fd22930 1276 7ff78fd2294f 1275->1276 1277 7ff78fd2298d fprintf 1276->1277 1278 7ff78fd2162f 1279 7ff78fd216c5 1278->1279 1282 7ff78fd221c0 1279->1282 1283 7ff78fd2206a 4 API calls 1282->1283 1284 7ff78fd221e3 1283->1284 1285 7ff78fd21fd6 3 API calls 1284->1285 1286 7ff78fd221f2 1285->1286 1238 7ff78fd21873 1243 7ff78fd22508 1238->1243 1244 7ff78fd2206a 4 API calls 1243->1244 1245 7ff78fd2252b 1244->1245 1246 7ff78fd21fd6 3 API calls 1245->1246 1247 7ff78fd2253a 1246->1247

                                    Callgraph

                                    • Executed
                                    • Not Executed
                                    • Opacity -> Relevance
                                    • Disassembly available
                                    callgraph 0 Function_000002598BC102FD 1 Function_00007FF78FD219FB 70 Function_00007FF78FD2255C 1->70 2 Function_00007FF78FD231FB 3 Function_000002598BC10000 4 Function_00007FF78FD23800 5 Function_00007FF78FD23300 101 Function_00007FF78FD22A30 5->101 6 Function_00007FF78FD22A00 56 Function_00007FF78FD238B0 6->56 7 Function_00007FF78FD23400 8 Function_00007FF78FD22602 46 Function_00007FF78FD21FD6 8->46 79 Function_00007FF78FD2206A 8->79 9 Function_00007FF78FD22506 10 Function_00007FF78FD22508 10->46 10->79 11 Function_000002598BC1010C 28 Function_000002598BC1012B 11->28 12 Function_00007FF78FD2240A 12->46 12->79 13 Function_000002598BC10310 14 Function_00007FF78FD2230E 15 Function_00007FF78FD21010 62 Function_00007FF78FD23880 15->62 83 Function_00007FF78FD23870 15->83 92 Function_00007FF78FD22850 15->92 16 Function_00007FF78FD21410 17 Function_00007FF78FD22310 17->46 17->79 18 Function_00007FF78FD22A10 18->56 19 Function_00007FF78FD22212 20 Function_00007FF78FD22214 20->46 20->79 21 Function_00007FF78FD22014 23 Function_00007FF78FD21DD8 21->23 22 Function_00007FF78FD22116 22->46 22->79 90 Function_00007FF78FD21D48 23->90 98 Function_00007FF78FD21D20 23->98 24 Function_00007FF78FD2B1D8 25 Function_00007FF78FD229E0 25->56 26 Function_00007FF78FD230E0 27 Function_00007FF78FD235E0 29 Function_00007FF78FD2B1E8 30 Function_00007FF78FD229F0 30->56 31 Function_00007FF78FD213F0 61 Function_00007FF78FD21180 31->61 32 Function_00007FF78FD2B1F0 33 Function_00007FF78FD238F1 34 Function_00007FF78FD218F3 34->20 35 Function_00007FF78FD21BB7 35->17 84 Function_00007FF78FD21570 35->84 36 Function_00007FF78FD222BA 37 Function_00007FF78FD222BC 37->46 37->79 38 Function_00007FF78FD21CBE 68 Function_00007FF78FD22658 38->68 39 Function_00007FF78FD221BE 40 Function_00007FF78FD221C0 40->46 40->79 41 Function_00007FF78FD220C4 41->46 41->79 42 Function_00007FF78FD21AC6 75 Function_00007FF78FD22364 42->75 42->84 43 Function_00007FF78FD229D0 43->56 44 Function_00007FF78FD213D0 44->61 45 Function_000002598BC101D1 46->23 47 Function_00007FF78FD23198 48 Function_000002598BC101DF 49 Function_00007FF78FD236A0 50 Function_00007FF78FD238A0 51 Function_00007FF78FD235A0 52 Function_00007FF78FD226AA 53 Function_00007FF78FD225AE 54 Function_00007FF78FD225B0 54->46 54->79 55 Function_00007FF78FD22AB0 55->4 55->51 55->55 72 Function_00007FF78FD23660 55->72 88 Function_00007FF78FD22A40 55->88 97 Function_00007FF78FD23520 55->97 57 Function_00007FF78FD226B0 65 Function_00007FF78FD21485 57->65 58 Function_00007FF78FD224B2 58->46 58->79 59 Function_00007FF78FD223B6 59->46 59->79 60 Function_00007FF78FD21977 77 Function_00007FF78FD22268 60->77 61->50 87 Function_00007FF78FD23A40 61->87 96 Function_00007FF78FD22C20 61->96 61->101 102 Function_00007FF78FD22830 61->102 63 Function_00007FF78FD22780 64 Function_00007FF78FD23480 65->1 65->37 65->41 81 Function_00007FF78FD2216C 65->81 91 Function_00007FF78FD21A47 65->91 93 Function_00007FF78FD21453 65->93 66 Function_00007FF78FD22890 66->5 67 Function_00007FF78FD23890 68->46 68->79 69 Function_00007FF78FD2255A 70->46 70->79 71 Function_00007FF78FD2245E 71->46 71->79 73 Function_00007FF78FD22860 73->5 74 Function_00007FF78FD22362 75->46 75->79 76 Function_00007FF78FD22266 77->46 77->79 78 Function_00007FF78FD22968 78->56 79->23 80 Function_00007FF78FD2216A 81->46 81->79 82 Function_00007FF78FD2176C 82->17 82->84 89 Function_00007FF78FD23840 84->89 85 Function_00007FF78FD23270 86 Function_00007FF78FD21873 86->10 87->57 87->102 88->4 88->51 88->55 88->56 88->72 88->88 88->97 91->54 94 Function_00007FF78FD22656 95 Function_00007FF78FD21618 96->4 96->51 96->55 96->88 99 Function_00007FF78FD22920 100 Function_00007FF78FD23020 100->101 103 Function_00007FF78FD21130 104 Function_00007FF78FD21430 105 Function_00007FF78FD22930 105->56 106 Function_00007FF78FD23430 107 Function_00007FF78FD23730 108 Function_00007FF78FD2162F 108->40 108->84

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2742517974.00007FF78FD21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78FD20000, based on PE: true
                                    • Associated: 00000001.00000002.2742498055.00007FF78FD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742542111.00007FF78FD24000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742564946.00007FF78FD25000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742591932.00007FF78FD28000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742591932.00007FF78FD2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742645005.00007FF78FD2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff78fd20000_6GUgc6JYS1.jbxd
                                    Similarity
                                    • API ID: malloc$ExceptionFilterSleepUnhandledmemcpystrlen
                                    • String ID:
                                    • API String ID: 3806033187-0
                                    • Opcode ID: 74e2acfbdd2222695438d7060340a825c6e38bbb22b53d49880a21e2da7959d6
                                    • Instruction ID: 466b4b5599ec479f8a41c0d4ccfa430ecf365b1fb75b736f13643241be4aeda6
                                    • Opcode Fuzzy Hash: 74e2acfbdd2222695438d7060340a825c6e38bbb22b53d49880a21e2da7959d6
                                    • Instruction Fuzzy Hash: 01512536E0968285F610BB15ADA16B9E2A1BF85B85FE49035DB0E47395CE3CF441C3F0

                                    Control-flow Graph

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2742517974.00007FF78FD21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78FD20000, based on PE: true
                                    • Associated: 00000001.00000002.2742498055.00007FF78FD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742542111.00007FF78FD24000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742564946.00007FF78FD25000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742591932.00007FF78FD28000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742591932.00007FF78FD2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742645005.00007FF78FD2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff78fd20000_6GUgc6JYS1.jbxd
                                    Similarity
                                    • API ID: CurrentProcess
                                    • String ID: @
                                    • API String ID: 2050909247-2766056989
                                    • Opcode ID: 261fdf325cd2908af581aa48cf2c5f8fee024366996ec8c160c08fbd857218c0
                                    • Instruction ID: fc4c60db067469c10cb6dd9e72d78bdd0ccfb091196182f433dbcec55dd2fcfe
                                    • Opcode Fuzzy Hash: 261fdf325cd2908af581aa48cf2c5f8fee024366996ec8c160c08fbd857218c0
                                    • Instruction Fuzzy Hash: ACF0E832A18B8186D7509B54F45428BBBA5F784784F604139EBCD83B18EF3DD154CB90

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 00007FF78FD21A47: GetCurrentProcess.KERNEL32 ref: 00007FF78FD21A64
                                    • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000800,00007FF78FD24000), ref: 00007FF78FD214F5
                                    • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000800,00007FF78FD24000), ref: 00007FF78FD2151E
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2742517974.00007FF78FD21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78FD20000, based on PE: true
                                    • Associated: 00000001.00000002.2742498055.00007FF78FD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742542111.00007FF78FD24000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742564946.00007FF78FD25000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742591932.00007FF78FD28000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742591932.00007FF78FD2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742645005.00007FF78FD2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff78fd20000_6GUgc6JYS1.jbxd
                                    Similarity
                                    • API ID: CurrentProcess
                                    • String ID:
                                    • API String ID: 2050909247-0
                                    • Opcode ID: 509bbad2a067a9b033a74ceefe0ee967bd978527f9389b8c7367eb6b0545064b
                                    • Instruction ID: 46cbf44ed44267b9d9f17ddfb34008e7466c2a4cca09fd90c9546453f1a222fb
                                    • Opcode Fuzzy Hash: 509bbad2a067a9b033a74ceefe0ee967bd978527f9389b8c7367eb6b0545064b
                                    • Instruction Fuzzy Hash: 9C21B732609B8185E610AB65B8512AAA7D4FB897C4F648135EBCE43B55EE3CE002C7A0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 103 7ff78fd219fb-7ff78fd21a3b call 7ff78fd2255c 106 7ff78fd21a3d 103->106 107 7ff78fd21a42-7ff78fd21a46 103->107 106->107
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2742517974.00007FF78FD21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78FD20000, based on PE: true
                                    • Associated: 00000001.00000002.2742498055.00007FF78FD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742542111.00007FF78FD24000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742564946.00007FF78FD25000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742591932.00007FF78FD28000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742591932.00007FF78FD2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742645005.00007FF78FD2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff78fd20000_6GUgc6JYS1.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: @
                                    • API String ID: 0-2766056989
                                    • Opcode ID: 18499add16e78753605d273a7ff3c60a1e52f63b3d8e7b04dec0ca4303b45796
                                    • Instruction ID: c580500518b6eaa927a7d2be818aedccc2a1f709d8842f4735812f06ce784849
                                    • Opcode Fuzzy Hash: 18499add16e78753605d273a7ff3c60a1e52f63b3d8e7b04dec0ca4303b45796
                                    • Instruction Fuzzy Hash: 98E03972A28A8083D311EF18E41024BBAB2F7C1304FB08036E78C42A19DA3ED5158F54

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2742517974.00007FF78FD21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78FD20000, based on PE: true
                                    • Associated: 00000001.00000002.2742498055.00007FF78FD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742542111.00007FF78FD24000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742564946.00007FF78FD25000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742591932.00007FF78FD28000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742591932.00007FF78FD2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742645005.00007FF78FD2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff78fd20000_6GUgc6JYS1.jbxd
                                    Similarity
                                    • API ID: malloc$FileModuleName
                                    • String ID:
                                    • API String ID: 3634825322-0
                                    • Opcode ID: 7b8a38cfa6b20737cab9834afacbda3d58fe46a6f13e8b9e5d4355efd212f70a
                                    • Instruction ID: acef1f5c5ba0ea73b5e05810b6bdaa783b2b6278be1a256cbf9a9211514b098d
                                    • Opcode Fuzzy Hash: 7b8a38cfa6b20737cab9834afacbda3d58fe46a6f13e8b9e5d4355efd212f70a
                                    • Instruction Fuzzy Hash: 07117F22A0D2C294EA10BB126D615F9A650BB4ABD4FE44030EE8F1B74ADD3CF541C7F0

                                    Control-flow Graph

                                    APIs
                                    • HttpOpenRequestA.WININET(00000000,00000000,84C03200,00000000), ref: 000002598BC10146
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2742178189.000002598BC10000.00000020.10000000.00040000.00000000.sdmp, Offset: 000002598BC10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2598bc10000_6GUgc6JYS1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: HttpOpenRequest
                                    • String ID: U.;
                                    • API String ID: 1984915467-4213443877
                                    • Opcode ID: 384db265c013720a470dfad14405f5eea7b7aafc50a111f5be8b2763f8998fcb
                                    • Instruction ID: 4f9bf8e4f7b99e64d8f3b51298df5a59bdd4bc75bbc049c58a0849504194dbeb
                                    • Opcode Fuzzy Hash: 384db265c013720a470dfad14405f5eea7b7aafc50a111f5be8b2763f8998fcb
                                    • Instruction Fuzzy Hash: A9119D6034890D1BF62C819E7C5A73A21CBE3C9766F28812FB50ED33D6DC68CC82401E

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 00007FF78FD226B0: malloc.MSVCRT ref: 00007FF78FD226C2
                                      • Part of subcall function 00007FF78FD226B0: GetModuleFileNameA.KERNEL32 ref: 00007FF78FD226D6
                                      • Part of subcall function 00007FF78FD226B0: malloc.MSVCRT ref: 00007FF78FD22717
                                    • GetCurrentProcess.KERNEL32(?,?,-00000008,00000001,00007FF78FD212EE,?,?,?,00007FF78FD213E6), ref: 00007FF78FD23A60
                                    • WaitForSingleObject.KERNEL32(?,?,-00000008,00000001,00007FF78FD212EE,?,?,?,00007FF78FD213E6), ref: 00007FF78FD23A6A
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2742517974.00007FF78FD21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78FD20000, based on PE: true
                                    • Associated: 00000001.00000002.2742498055.00007FF78FD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742542111.00007FF78FD24000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742564946.00007FF78FD25000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742591932.00007FF78FD28000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742591932.00007FF78FD2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742645005.00007FF78FD2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff78fd20000_6GUgc6JYS1.jbxd
                                    Similarity
                                    • API ID: malloc$CurrentFileModuleNameObjectProcessSingleWait
                                    • String ID:
                                    • API String ID: 343681413-0
                                    • Opcode ID: 0d4f65f921a0c99844056602b24f84f8fb58204a15ad64bfb35a6985993a2c3f
                                    • Instruction ID: 34d6b31573877d7201d93c4d4d6cf66ebfd890ca7e1f48fee2816c147f7d2d5f
                                    • Opcode Fuzzy Hash: 0d4f65f921a0c99844056602b24f84f8fb58204a15ad64bfb35a6985993a2c3f
                                    • Instruction Fuzzy Hash: 67D09221E2929A80F914B726AC260EA96107F44781FA80436EE1F13392CD3CF552C2F0

                                    Control-flow Graph

                                    APIs
                                    • InternetConnectA.WININET(00000003,00000003,00000002,00000001), ref: 000002598BC10127
                                      • Part of subcall function 000002598BC1012B: HttpOpenRequestA.WININET(00000000,00000000,84C03200,00000000), ref: 000002598BC10146
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2742178189.000002598BC10000.00000020.10000000.00040000.00000000.sdmp, Offset: 000002598BC10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_2598bc10000_6GUgc6JYS1.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ConnectHttpInternetOpenRequest
                                    • String ID:
                                    • API String ID: 1341064763-0
                                    • Opcode ID: adf542c86c05be09c357181a1fd7fba9b155f5a54da9dc2df37151438df54562
                                    • Instruction ID: 60bec0bb32942330544e93a1e273d8111f6cc2b65c28bca7b70ff234f9228bcd
                                    • Opcode Fuzzy Hash: adf542c86c05be09c357181a1fd7fba9b155f5a54da9dc2df37151438df54562
                                    • Instruction Fuzzy Hash: 91E0D11227C6C15DE11D522C5D4F736699DDB43309F38077DE0C7D1293D99458024577

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 226 7ff78fd22c20-7ff78fd22c3f 227 7ff78fd22c58-7ff78fd22caf call 7ff78fd235a0 call 7ff78fd23800 226->227 228 7ff78fd22c41-7ff78fd22c51 226->228 227->228 233 7ff78fd22cb1-7ff78fd22cb7 227->233 234 7ff78fd22cbd-7ff78fd22cc1 233->234 235 7ff78fd22dc0-7ff78fd22dc2 233->235 236 7ff78fd22cc7 234->236 237 7ff78fd22f30-7ff78fd22f33 234->237 235->237 238 7ff78fd22dc8-7ff78fd22dd0 235->238 239 7ff78fd22cca-7ff78fd22ccc 236->239 237->228 241 7ff78fd22f39 237->241 238->239 240 7ff78fd22dd6 238->240 239->237 243 7ff78fd22cd2-7ff78fd22cd8 239->243 244 7ff78fd22de0-7ff78fd22dec 240->244 242 7ff78fd22f40-7ff78fd22f5b call 7ff78fd22ab0 241->242 256 7ff78fd22f5d 242->256 246 7ff78fd22cde-7ff78fd22ce5 243->246 247 7ff78fd22f70-7ff78fd22f92 call 7ff78fd22a40 243->247 248 7ff78fd22f18-7ff78fd22f20 244->248 249 7ff78fd22df2-7ff78fd22e01 244->249 246->228 251 7ff78fd22ceb-7ff78fd22cf8 246->251 264 7ff78fd22fb9-7ff78fd22fbd 247->264 265 7ff78fd22f94-7ff78fd22fb8 247->265 253 7ff78fd22e03-7ff78fd22e0a 248->253 254 7ff78fd22f26 248->254 249->253 255 7ff78fd22e12-7ff78fd22e24 call 7ff78fd22ab0 249->255 257 7ff78fd22d5f-7ff78fd22d76 251->257 259 7ff78fd22e0c-7ff78fd22e10 253->259 260 7ff78fd22da3-7ff78fd22db9 call 7ff78fd22a40 253->260 254->255 255->257 275 7ff78fd22e2a 255->275 269 7ff78fd22f62-7ff78fd22f6b call 7ff78fd22a40 256->269 262 7ff78fd22e88-7ff78fd22e92 257->262 263 7ff78fd22d7c 257->263 259->255 259->260 260->235 266 7ff78fd22f08-7ff78fd22f10 262->266 267 7ff78fd22e94-7ff78fd22ea9 262->267 270 7ff78fd22d7e-7ff78fd22d81 263->270 271 7ff78fd22d00-7ff78fd22d03 263->271 265->264 274 7ff78fd22eab-7ff78fd22eae 266->274 280 7ff78fd22f12 266->280 273 7ff78fd22ec7-7ff78fd22ecf call 7ff78fd22ab0 267->273 267->274 269->247 270->269 277 7ff78fd22d87-7ff78fd22d98 270->277 271->244 278 7ff78fd22d09-7ff78fd22d0c 271->278 286 7ff78fd22ee0-7ff78fd22eeb call 7ff78fd22ab0 273->286 274->260 282 7ff78fd22eb4-7ff78fd22ec1 274->282 284 7ff78fd22e30-7ff78fd22e38 275->284 285 7ff78fd22d9e-7ff78fd22da1 277->285 277->286 278->269 287 7ff78fd22d12-7ff78fd22d1e 278->287 280->273 282->260 282->273 284->228 290 7ff78fd22e3e-7ff78fd22e4b 284->290 285->260 291 7ff78fd22d52-7ff78fd22d59 285->291 286->291 292 7ff78fd22ef0-7ff78fd22ef8 287->292 293 7ff78fd22d24-7ff78fd22d33 287->293 297 7ff78fd22e50-7ff78fd22e60 290->297 291->257 291->284 295 7ff78fd22d35-7ff78fd22d3c 292->295 298 7ff78fd22efe 292->298 294 7ff78fd22d47-7ff78fd22d4f call 7ff78fd22ab0 293->294 293->295 294->291 295->260 299 7ff78fd22d3e-7ff78fd22d45 295->299 301 7ff78fd22e6f-7ff78fd22e7e 297->301 302 7ff78fd22e62-7ff78fd22e6d VirtualProtect 297->302 298->294 299->260 299->294 301->297 304 7ff78fd22e80 301->304 302->301 304->228
                                    Strings
                                    • %d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p., xrefs: 00007FF78FD22DAD
                                    • Unknown pseudo relocation protocol version %d., xrefs: 00007FF78FD22F70
                                    • Unknown pseudo relocation bit size %d., xrefs: 00007FF78FD22F64
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2742517974.00007FF78FD21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78FD20000, based on PE: true
                                    • Associated: 00000001.00000002.2742498055.00007FF78FD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742542111.00007FF78FD24000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742564946.00007FF78FD25000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742591932.00007FF78FD28000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742591932.00007FF78FD2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742645005.00007FF78FD2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff78fd20000_6GUgc6JYS1.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.$%d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p.
                                    • API String ID: 0-1286557213
                                    • Opcode ID: 9b607ef5e1d39ac516e2ca217b0ec8142e152364ff69139389c8b96fc812699c
                                    • Instruction ID: fa3f2ea5c81d345f344fb33e14850dbb201c87410632ee01f5c0d53d95ada4b7
                                    • Opcode Fuzzy Hash: 9b607ef5e1d39ac516e2ca217b0ec8142e152364ff69139389c8b96fc812699c
                                    • Instruction Fuzzy Hash: 1B91A032E1958282FA106B108C607F9A261BF54765FA48235EB7E177D8DE3CF802D2F0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 111 7ff78fd22a40-7ff78fd22ac3 call 7ff78fd238b0 call 7ff78fd23960 call 7ff78fd238b0 call 7ff78fd239a8 call 7ff78fd23918 123 7ff78fd22ac9-7ff78fd22ad7 111->123 124 7ff78fd22be0-7ff78fd22be2 111->124 125 7ff78fd22ae0-7ff78fd22ae6 123->125 126 7ff78fd22b08-7ff78fd22b16 call 7ff78fd23520 124->126 127 7ff78fd22ae8-7ff78fd22af5 125->127 128 7ff78fd22afb-7ff78fd22b06 125->128 132 7ff78fd22b1c-7ff78fd22b64 call 7ff78fd23660 VirtualQuery 126->132 133 7ff78fd22c02-7ff78fd22c3f call 7ff78fd22a40 126->133 127->128 130 7ff78fd22b85-7ff78fd22b8c 127->130 128->125 128->126 139 7ff78fd22be7-7ff78fd22bf8 132->139 140 7ff78fd22b6a-7ff78fd22b74 132->140 142 7ff78fd22c58-7ff78fd22caf call 7ff78fd235a0 call 7ff78fd23800 133->142 143 7ff78fd22c41-7ff78fd22c51 133->143 139->133 141 7ff78fd22bfd call 7ff78fd22a40 139->141 144 7ff78fd22b7e 140->144 145 7ff78fd22b76-7ff78fd22b7c 140->145 141->133 142->143 154 7ff78fd22cb1-7ff78fd22cb7 142->154 144->130 145->144 147 7ff78fd22b90-7ff78fd22bc6 VirtualProtect 145->147 147->144 149 7ff78fd22bc8-7ff78fd22bdc GetLastError call 7ff78fd22a40 147->149 149->124 155 7ff78fd22cbd-7ff78fd22cc1 154->155 156 7ff78fd22dc0-7ff78fd22dc2 154->156 157 7ff78fd22cc7 155->157 158 7ff78fd22f30-7ff78fd22f33 155->158 156->158 159 7ff78fd22dc8-7ff78fd22dd0 156->159 160 7ff78fd22cca-7ff78fd22ccc 157->160 158->143 162 7ff78fd22f39 158->162 159->160 161 7ff78fd22dd6 159->161 160->158 164 7ff78fd22cd2-7ff78fd22cd8 160->164 165 7ff78fd22de0-7ff78fd22dec 161->165 163 7ff78fd22f40-7ff78fd22f5b call 7ff78fd22ab0 162->163 177 7ff78fd22f5d 163->177 167 7ff78fd22cde-7ff78fd22ce5 164->167 168 7ff78fd22f70-7ff78fd22f92 call 7ff78fd22a40 164->168 169 7ff78fd22f18-7ff78fd22f20 165->169 170 7ff78fd22df2-7ff78fd22e01 165->170 167->143 172 7ff78fd22ceb-7ff78fd22cf8 167->172 185 7ff78fd22fb9-7ff78fd22fbd 168->185 186 7ff78fd22f94-7ff78fd22fb8 168->186 174 7ff78fd22e03-7ff78fd22e0a 169->174 175 7ff78fd22f26 169->175 170->174 176 7ff78fd22e12-7ff78fd22e24 call 7ff78fd22ab0 170->176 178 7ff78fd22d5f-7ff78fd22d76 172->178 180 7ff78fd22e0c-7ff78fd22e10 174->180 181 7ff78fd22da3-7ff78fd22db9 call 7ff78fd22a40 174->181 175->176 176->178 196 7ff78fd22e2a 176->196 190 7ff78fd22f62-7ff78fd22f6b call 7ff78fd22a40 177->190 183 7ff78fd22e88-7ff78fd22e92 178->183 184 7ff78fd22d7c 178->184 180->176 180->181 181->156 187 7ff78fd22f08-7ff78fd22f10 183->187 188 7ff78fd22e94-7ff78fd22ea9 183->188 191 7ff78fd22d7e-7ff78fd22d81 184->191 192 7ff78fd22d00-7ff78fd22d03 184->192 186->185 195 7ff78fd22eab-7ff78fd22eae 187->195 201 7ff78fd22f12 187->201 194 7ff78fd22ec7-7ff78fd22ecf call 7ff78fd22ab0 188->194 188->195 190->168 191->190 198 7ff78fd22d87-7ff78fd22d98 191->198 192->165 199 7ff78fd22d09-7ff78fd22d0c 192->199 207 7ff78fd22ee0-7ff78fd22eeb call 7ff78fd22ab0 194->207 195->181 203 7ff78fd22eb4-7ff78fd22ec1 195->203 205 7ff78fd22e30-7ff78fd22e38 196->205 206 7ff78fd22d9e-7ff78fd22da1 198->206 198->207 199->190 208 7ff78fd22d12-7ff78fd22d1e 199->208 201->194 203->181 203->194 205->143 211 7ff78fd22e3e-7ff78fd22e4b 205->211 206->181 212 7ff78fd22d52-7ff78fd22d59 206->212 207->212 213 7ff78fd22ef0-7ff78fd22ef8 208->213 214 7ff78fd22d24-7ff78fd22d33 208->214 218 7ff78fd22e50-7ff78fd22e60 211->218 212->178 212->205 216 7ff78fd22d35-7ff78fd22d3c 213->216 219 7ff78fd22efe 213->219 215 7ff78fd22d47-7ff78fd22d4f call 7ff78fd22ab0 214->215 214->216 215->212 216->181 220 7ff78fd22d3e-7ff78fd22d45 216->220 222 7ff78fd22e6f-7ff78fd22e7e 218->222 223 7ff78fd22e62-7ff78fd22e6d VirtualProtect 218->223 219->215 220->181 220->215 222->218 225 7ff78fd22e80 222->225 223->222 225->143
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2742517974.00007FF78FD21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78FD20000, based on PE: true
                                    • Associated: 00000001.00000002.2742498055.00007FF78FD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742542111.00007FF78FD24000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742564946.00007FF78FD25000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742591932.00007FF78FD28000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742591932.00007FF78FD2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742645005.00007FF78FD2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff78fd20000_6GUgc6JYS1.jbxd
                                    Similarity
                                    • API ID: QueryVirtual
                                    • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
                                    • API String ID: 1804819252-1534286854
                                    • Opcode ID: 8ece0e5689c32bf06535397255939f5c85717967dc5866581f01381cb6bfe8d1
                                    • Instruction ID: 92707a5b5d8f66def7a4aca31801c3186e81e8568dffe852626879ac9f49cc79
                                    • Opcode Fuzzy Hash: 8ece0e5689c32bf06535397255939f5c85717967dc5866581f01381cb6bfe8d1
                                    • Instruction Fuzzy Hash: 97518F72A09A8681EA10AB11EC606E9A760FB84B95FE44130EF5E07798DF3CF545C7F0

                                    Control-flow Graph

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2742517974.00007FF78FD21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78FD20000, based on PE: true
                                    • Associated: 00000001.00000002.2742498055.00007FF78FD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742542111.00007FF78FD24000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742564946.00007FF78FD25000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742591932.00007FF78FD28000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742591932.00007FF78FD2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742645005.00007FF78FD2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff78fd20000_6GUgc6JYS1.jbxd
                                    Similarity
                                    • API ID: fprintf
                                    • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
                                    • API String ID: 383729395-3474627141
                                    • Opcode ID: 86f86d6f1fd49047498ccaa3b45f8d951f61e92dc91ddb43cd8bd9df1df07beb
                                    • Instruction ID: bed94dbf20b748c4125c5275f3009d9bf1ab5001304976c5ae958c037ea0d990
                                    • Opcode Fuzzy Hash: 86f86d6f1fd49047498ccaa3b45f8d951f61e92dc91ddb43cd8bd9df1df07beb
                                    • Instruction Fuzzy Hash: A3015E63D08EC582E6029F1898001BAB321FB5A759F659335EB8D26515DF39E582C7A0
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2742517974.00007FF78FD21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78FD20000, based on PE: true
                                    • Associated: 00000001.00000002.2742498055.00007FF78FD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742542111.00007FF78FD24000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742564946.00007FF78FD25000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742591932.00007FF78FD28000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742591932.00007FF78FD2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742645005.00007FF78FD2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff78fd20000_6GUgc6JYS1.jbxd
                                    Similarity
                                    • API ID: fprintf
                                    • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                    • API String ID: 383729395-2187435201
                                    • Opcode ID: b3d9e429b27ba28e2e026a2c9b98eac1c535cf286a48dd262e2791c23a66e309
                                    • Instruction ID: 73dc40a56b989dca42f147a3d37da5420a988cc0eadd1567f107ff819586b4bd
                                    • Opcode Fuzzy Hash: b3d9e429b27ba28e2e026a2c9b98eac1c535cf286a48dd262e2791c23a66e309
                                    • Instruction Fuzzy Hash: C1F04463C08E8581D2029F1C98101FBB360FB5D758F645335EB8E2A155DF28E582C7A0
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2742517974.00007FF78FD21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78FD20000, based on PE: true
                                    • Associated: 00000001.00000002.2742498055.00007FF78FD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742542111.00007FF78FD24000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742564946.00007FF78FD25000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742591932.00007FF78FD28000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742591932.00007FF78FD2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742645005.00007FF78FD2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff78fd20000_6GUgc6JYS1.jbxd
                                    Similarity
                                    • API ID: fprintf
                                    • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                    • API String ID: 383729395-4273532761
                                    • Opcode ID: ddb799f098da87b00ec340744236e459e3aea45df4fe3f2b56e8a1eed7c5b458
                                    • Instruction ID: ffe26b53e70295f687884b8e174413a31c376b06bee75721651869ddc95a3811
                                    • Opcode Fuzzy Hash: ddb799f098da87b00ec340744236e459e3aea45df4fe3f2b56e8a1eed7c5b458
                                    • Instruction Fuzzy Hash: B0F04463C08E8581D2029F1C98001FBB320FB5D758F645335EF8E26515DF28F582C7A0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 315 7ff78fd229e0-7ff78fd229e7 call 7ff78fd238b0 fprintf
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2742517974.00007FF78FD21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78FD20000, based on PE: true
                                    • Associated: 00000001.00000002.2742498055.00007FF78FD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742542111.00007FF78FD24000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742564946.00007FF78FD25000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742591932.00007FF78FD28000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742591932.00007FF78FD2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742645005.00007FF78FD2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff78fd20000_6GUgc6JYS1.jbxd
                                    Similarity
                                    • API ID: fprintf
                                    • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                    • API String ID: 383729395-4283191376
                                    • Opcode ID: 16dd505da357011cff4d5dc29124268b26f012e1e5dc482f658140d9308e8692
                                    • Instruction ID: ca9982b095a02ac86b967b5e491a7362137901d3b4388748ec8c1ff09a15c554
                                    • Opcode Fuzzy Hash: 16dd505da357011cff4d5dc29124268b26f012e1e5dc482f658140d9308e8692
                                    • Instruction Fuzzy Hash: 87F04463C08E8581D2029F1C98101FBB320FB5D798F645335EF8E26155DF28E582C7A0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 319 7ff78fd229f0-7ff78fd229f7 call 7ff78fd238b0 fprintf
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2742517974.00007FF78FD21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78FD20000, based on PE: true
                                    • Associated: 00000001.00000002.2742498055.00007FF78FD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742542111.00007FF78FD24000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742564946.00007FF78FD25000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742591932.00007FF78FD28000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742591932.00007FF78FD2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742645005.00007FF78FD2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff78fd20000_6GUgc6JYS1.jbxd
                                    Similarity
                                    • API ID: fprintf
                                    • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                    • API String ID: 383729395-4064033741
                                    • Opcode ID: 0a8ae8f4033385862a0396cdc020b2c4273462e3d6cfb5660cf053897133f514
                                    • Instruction ID: ff265ef99b31df54eb4b0bd668483d8a0aea49247a3be6e30bd6a264d80a49a6
                                    • Opcode Fuzzy Hash: 0a8ae8f4033385862a0396cdc020b2c4273462e3d6cfb5660cf053897133f514
                                    • Instruction Fuzzy Hash: FFF04463C08E8581D2029F1C98101FBB320FB5E759F645335EB8E26155DF28E582D7A0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 311 7ff78fd229d0-7ff78fd229d7 call 7ff78fd238b0 fprintf
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2742517974.00007FF78FD21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78FD20000, based on PE: true
                                    • Associated: 00000001.00000002.2742498055.00007FF78FD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742542111.00007FF78FD24000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742564946.00007FF78FD25000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742591932.00007FF78FD28000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742591932.00007FF78FD2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742645005.00007FF78FD2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff78fd20000_6GUgc6JYS1.jbxd
                                    Similarity
                                    • API ID: fprintf
                                    • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                    • API String ID: 383729395-2713391170
                                    • Opcode ID: b3d029248fb215c580629142f9baa88a6281556b66857b9c865bccdc7984895a
                                    • Instruction ID: 065cc3e01fc3a1b65bb8d7a207ac568e56f35f33130cba9545f4d088fb10f552
                                    • Opcode Fuzzy Hash: b3d029248fb215c580629142f9baa88a6281556b66857b9c865bccdc7984895a
                                    • Instruction Fuzzy Hash: FBF04463C08E8581D2029F1C98101FBB320FB5D758F645335EB8E26155DF28E582C7A0
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2742517974.00007FF78FD21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78FD20000, based on PE: true
                                    • Associated: 00000001.00000002.2742498055.00007FF78FD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742542111.00007FF78FD24000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742564946.00007FF78FD25000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742591932.00007FF78FD28000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742591932.00007FF78FD2B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.2742645005.00007FF78FD2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_7ff78fd20000_6GUgc6JYS1.jbxd
                                    Similarity
                                    • API ID: fprintf
                                    • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                    • API String ID: 383729395-2468659920
                                    • Opcode ID: c02743551f4fe489137f2efd61f1df1c261d2c0ea91ffeb14e0dc1eb3f61af91
                                    • Instruction ID: 1b16f62071a991b61d3b11ac4af73d0a6b60b196dfcb04ea06c0e0cc437cbe7b
                                    • Opcode Fuzzy Hash: c02743551f4fe489137f2efd61f1df1c261d2c0ea91ffeb14e0dc1eb3f61af91
                                    • Instruction Fuzzy Hash: 0BF01863D08E8581D2029F1C98001A7B321FB5E759F645335DF8D2A515DF29E582C790