Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
artifact.exe

Overview

General Information

Sample name:artifact.exe
Analysis ID:1429039
MD5:a7fcd0b15a080167c4c2f05063802a6e
SHA1:c761d68786ff15b6e991770a8c9aee778dd011e9
SHA256:9f6ae95b5540d0d6c60e942fa68dee44b2781c58da3f21321f18b8384ab41084
Tags:exe
Infos:

Detection

CobaltStrike, Metasploit
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected CobaltStrike
Yara detected Metasploit Payload
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Sigma detected: Suspicious Program Names
Contains functionality to dynamically determine API calls
Detected potential crypto function
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Program does not show much activity (idle)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • artifact.exe (PID: 6652 cmdline: "C:\Users\user\Desktop\artifact.exe" MD5: A7FCD0B15A080167C4C2F05063802A6E)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Cobalt Strike, CobaltStrikeCobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable.
  • APT 29
  • APT32
  • APT41
  • AQUATIC PANDA
  • Anunak
  • Cobalt
  • Codoso
  • CopyKittens
  • DarkHydrus
  • FIN6
  • FIN7
  • Leviathan
  • Mustang Panda
  • Shell Crew
  • Stone Panda
  • TianWu
  • UNC1878
  • UNC2452
  • Winnti Umbrella
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike
{"C2Server": "http://101.78.63.44:None/UphQey", "User Agent": "User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; Win64; x64; Trident/6.0; Touch)\r\n"}
{"Headers": "User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; Win64; x64; Trident/6.0; Touch)\r\n", "Type": "Metasploit Download", "URL": "http://101.78.63.44/UphQey"}
SourceRuleDescriptionAuthorStrings
artifact.exeJoeSecurity_CobaltStrike_4Yara detected CobaltStrikeJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1704733475.00000000001F0000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
      00000000.00000002.1704733475.00000000001F0000.00000020.00001000.00020000.00000000.sdmpWindows_Shellcode_Generic_8c487e57unknownunknown
      • 0x0:$a: FC E8 89 00 00 00 60 89 E5 31 D2 64 8B 52 30 8B 52 0C 8B 52 14 8B 72 28 0F B7 4A 26 31 FF 31 C0
      00000000.00000002.1704733475.00000000001F0000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_38b8ceecIdentifies the API address lookup function used by metasploit. Also used by other tools (like beacon).unknown
      • 0x7:$a1: 89 E5 31 D2 64 8B 52 30 8B 52 0C 8B 52 14 8B 72 28 0F B7 4A 26 31 FF 31 C0 AC 3C 61
      00000000.00000002.1704733475.00000000001F0000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_24338919Identifies metasploit wininet reverse shellcode. Also used by other tools (like beacon).unknown
      • 0x90:$a1: 68 6E 65 74 00 68 77 69 6E 69 54 68 4C 77 26 07
      SourceRuleDescriptionAuthorStrings
      0.0.artifact.exe.400000.0.unpackJoeSecurity_CobaltStrike_4Yara detected CobaltStrikeJoe Security
        0.2.artifact.exe.400000.0.unpackJoeSecurity_CobaltStrike_4Yara detected CobaltStrikeJoe Security

          System Summary

          barindex
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\artifact.exe", CommandLine: "C:\Users\user\Desktop\artifact.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\artifact.exe, NewProcessName: C:\Users\user\Desktop\artifact.exe, OriginalFileName: C:\Users\user\Desktop\artifact.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Users\user\Desktop\artifact.exe", ProcessId: 6652, ProcessName: artifact.exe
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: artifact.exeAvira: detected
          Source: 00000000.00000002.1704733475.00000000001F0000.00000020.00001000.00020000.00000000.sdmpMalware Configuration Extractor: CobaltStrike {"C2Server": "http://101.78.63.44:None/UphQey", "User Agent": "User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; Win64; x64; Trident/6.0; Touch)\r\n"}
          Source: 00000000.00000002.1704733475.00000000001F0000.00000020.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Metasploit {"Headers": "User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; Win64; x64; Trident/6.0; Touch)\r\n", "Type": "Metasploit Download", "URL": "http://101.78.63.44/UphQey"}
          Source: artifact.exeReversingLabs: Detection: 91%
          Source: artifact.exeVirustotal: Detection: 81%Perma Link
          Source: artifact.exeJoe Sandbox ML: detected
          Source: artifact.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED

          Networking

          barindex
          Source: Malware configuration extractorURLs: http://101.78.63.44:None/UphQey
          Source: Malware configuration extractorURLs: http://101.78.63.44/UphQey
          Source: Joe Sandbox ViewASN Name: CHINATELECOM-CTCLOUDCloudComputingCorporationCN CHINATELECOM-CTCLOUDCloudComputingCorporationCN
          Source: global trafficTCP traffic: 192.168.2.4:49730 -> 101.78.63.44:80
          Source: unknownTCP traffic detected without corresponding DNS query: 101.78.63.44
          Source: unknownTCP traffic detected without corresponding DNS query: 101.78.63.44
          Source: unknownTCP traffic detected without corresponding DNS query: 101.78.63.44
          Source: artifact.exe, 00000000.00000002.1705027660.00000000007F6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://101.78.63.44/
          Source: artifact.exe, 00000000.00000002.1705027660.00000000007F6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://101.78.63.44/2
          Source: artifact.exe, 00000000.00000002.1705027660.00000000007D7000.00000004.00000020.00020000.00000000.sdmp, artifact.exe, 00000000.00000002.1705027660.00000000007AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://101.78.63.44/UphQey
          Source: artifact.exe, 00000000.00000002.1705027660.00000000007AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://101.78.63.44/UphQeya
          Source: artifact.exe, 00000000.00000002.1705027660.00000000007AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://101.78.63.44/UphQeyp

          System Summary

          barindex
          Source: 00000000.00000002.1704733475.00000000001F0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Shellcode_Generic_8c487e57 Author: unknown
          Source: 00000000.00000002.1704733475.00000000001F0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon). Author: unknown
          Source: 00000000.00000002.1704733475.00000000001F0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies metasploit wininet reverse shellcode. Also used by other tools (like beacon). Author: unknown
          Source: C:\Users\user\Desktop\artifact.exeCode function: 0_2_001F00B50_2_001F00B5
          Source: artifact.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
          Source: 00000000.00000002.1704733475.00000000001F0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Shellcode_Generic_8c487e57 os = windows, severity = x86, creation_date = 2022-05-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Shellcode.Generic, fingerprint = 834caf96192a513aa93ac48fb8d2f3326bf9f08acaf7a27659f688b26e3e57e4, id = 8c487e57-4b8c-488e-a1d9-786ff935fd2c, last_modified = 2022-07-18
          Source: 00000000.00000002.1704733475.00000000001F0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_38b8ceec os = windows, severity = x86, description = Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon)., creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 44b9022d87c409210b1d0807f5a4337d73f19559941660267d63cd2e4f2ff342, id = 38b8ceec-601c-4117-b7a0-74720e26bf38, last_modified = 2021-08-23
          Source: 00000000.00000002.1704733475.00000000001F0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_24338919 os = windows, severity = x86, description = Identifies metasploit wininet reverse shellcode. Also used by other tools (like beacon)., creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = ac76190a84c4bdbb6927c5ad84a40e2145ca9e76369a25ac2ffd727eefef4804, id = 24338919-8efe-4cf2-a23a-a3f22095b42d, last_modified = 2021-08-23
          Source: classification engineClassification label: mal100.troj.winEXE@1/0@0/1
          Source: artifact.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\artifact.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: artifact.exeReversingLabs: Detection: 91%
          Source: artifact.exeVirustotal: Detection: 81%
          Source: C:\Users\user\Desktop\artifact.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\artifact.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\artifact.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\artifact.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\artifact.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\artifact.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\artifact.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\artifact.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\artifact.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\artifact.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\artifact.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\artifact.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\artifact.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\artifact.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\artifact.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\artifact.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\artifact.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
          Source: C:\Users\user\Desktop\artifact.exeCode function: 0_2_00401949 _winmajor,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,0_2_00401949
          Source: C:\Users\user\Desktop\artifact.exe TID: 6624Thread sleep count: 35 > 30Jump to behavior
          Source: C:\Users\user\Desktop\artifact.exe TID: 6624Thread sleep time: -350000s >= -30000sJump to behavior
          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
          Source: artifact.exe, 00000000.00000002.1705027660.00000000007D7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWx
          Source: artifact.exe, 00000000.00000002.1705027660.0000000000805000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: C:\Users\user\Desktop\artifact.exeCode function: 0_2_00401949 _winmajor,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,0_2_00401949
          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
          Source: C:\Users\user\Desktop\artifact.exeCode function: 0_2_00401180 Sleep,Sleep,SetUnhandledExceptionFilter,GetProcAddress,_acmdln,malloc,strlen,malloc,memcpy,__initenv,_cexit,_amsg_exit,_initterm,GetStartupInfoA,_initterm,exit,0_2_00401180
          Source: C:\Users\user\Desktop\artifact.exeCode function: 0_2_004028E0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort,0_2_004028E0
          Source: C:\Users\user\Desktop\artifact.exeCode function: 0_2_00401648 CreateNamedPipeA,ConnectNamedPipe,WriteFile,CloseHandle,0_2_00401648
          Source: C:\Users\user\Desktop\artifact.exeCode function: 0_2_00402810 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00402810

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: artifact.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.artifact.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.artifact.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.1704733475.00000000001F0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Native API
          1
          DLL Side-Loading
          1
          Process Injection
          1
          Virtualization/Sandbox Evasion
          OS Credential Dumping1
          System Time Discovery
          Remote Services1
          Archive Collected Data
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          DLL Side-Loading
          1
          Process Injection
          LSASS Memory1
          Security Software Discovery
          Remote Desktop ProtocolData from Removable Media1
          Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
          DLL Side-Loading
          Security Account Manager1
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS2
          System Information Discovery
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          artifact.exe92%ReversingLabsWin32.Backdoor.CobaltStrike
          artifact.exe82%VirustotalBrowse
          artifact.exe100%AviraTR/Crypt.XPACK.Gen7
          artifact.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://101.78.63.44/UphQey0%VirustotalBrowse
          http://101.78.63.44/0%VirustotalBrowse
          No contacted domains info
          NameMaliciousAntivirus DetectionReputation
          http://101.78.63.44:None/UphQeytrue
            low
            http://101.78.63.44/UphQeytrueunknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://101.78.63.44/artifact.exe, 00000000.00000002.1705027660.00000000007F6000.00000004.00000020.00020000.00000000.sdmptrueunknown
            http://101.78.63.44/UphQeypartifact.exe, 00000000.00000002.1705027660.00000000007AE000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              http://101.78.63.44/UphQeyaartifact.exe, 00000000.00000002.1705027660.00000000007AE000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                http://101.78.63.44/2artifact.exe, 00000000.00000002.1705027660.00000000007F6000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  101.78.63.44
                  unknownChina
                  58519CHINATELECOM-CTCLOUDCloudComputingCorporationCNtrue
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1429039
                  Start date and time:2024-04-20 10:12:13 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 1m 58s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:1
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:artifact.exe
                  Detection:MAL
                  Classification:mal100.troj.winEXE@1/0@0/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 90%
                  • Number of executed functions: 11
                  • Number of non-executed functions: 9
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Stop behavior analysis, all processes terminated
                  TimeTypeDescription
                  10:13:02API Interceptor37x Sleep call for process: artifact.exe modified
                  No context
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  CHINATELECOM-CTCLOUDCloudComputingCorporationCNBzmhHwFpCV.elfGet hashmaliciousMiraiBrowse
                  • 101.216.51.220
                  MY69DoYgp5.elfGet hashmaliciousMiraiBrowse
                  • 101.131.11.151
                  iZYqP2K1UC.elfGet hashmaliciousMiraiBrowse
                  • 101.208.246.4
                  tL98mBWW8p.elfGet hashmaliciousMiraiBrowse
                  • 36.114.86.96
                  D3qL35jbpG.elfGet hashmaliciousMiraiBrowse
                  • 101.193.228.102
                  994LJMbRxE.elfGet hashmaliciousMiraiBrowse
                  • 101.213.138.43
                  KX3376Hojb.elfGet hashmaliciousMiraiBrowse
                  • 101.196.46.16
                  BNuwexy0tz.elfGet hashmaliciousMiraiBrowse
                  • 182.42.196.27
                  arm7.elfGet hashmaliciousMiraiBrowse
                  • 101.195.207.86
                  VkiGKeyI3L.elfGet hashmaliciousMiraiBrowse
                  • 101.210.94.140
                  No context
                  No context
                  No created / dropped files found
                  File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                  Entropy (8bit):5.451445020356485
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • VXD Driver (31/22) 0.00%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:artifact.exe
                  File size:14'336 bytes
                  MD5:a7fcd0b15a080167c4c2f05063802a6e
                  SHA1:c761d68786ff15b6e991770a8c9aee778dd011e9
                  SHA256:9f6ae95b5540d0d6c60e942fa68dee44b2781c58da3f21321f18b8384ab41084
                  SHA512:64644039b3c20b861a3186e320e3a0a14119e65c5e37e0aa108515b13e833ef227379d757bb3d7cbf5cb2e37731b37cb846264677f464e5152621b25a71045c3
                  SSDEEP:192:AaH+DgGK83SxHn2OQ/dmBI4KBfTgir+xzPDbqUqV/Qjo7AGa:A2+kGKqbOCdWIVBff+xzPnfCXAn
                  TLSH:03522A75EA4378F2FD2A897414EBBAFF9FB7E2234C105C86CF94DC4458234A6880664D
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......^.....................4...............0....@.................................!......... ............................
                  Icon Hash:90cececece8e8eb0
                  Entrypoint:0x4014b0
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                  DLL Characteristics:
                  Time Stamp:0x5EDED50B [Tue Jun 9 00:17:15 2020 UTC]
                  TLS Callbacks:0x401950, 0x401900
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:dc25ee78e2ef4d36faa0badf1e7461c9
                  Instruction
                  sub esp, 0Ch
                  mov dword ptr [00405040h], 00000001h
                  call 00007FD7546BF383h
                  add esp, 0Ch
                  jmp 00007FD7546BDCEBh
                  lea esi, dword ptr [esi+00000000h]
                  sub esp, 0Ch
                  mov dword ptr [00405040h], 00000000h
                  call 00007FD7546BF363h
                  add esp, 0Ch
                  jmp 00007FD7546BDCCBh
                  nop
                  nop
                  nop
                  nop
                  nop
                  nop
                  push ebp
                  mov ebp, esp
                  sub esp, 18h
                  mov eax, dword ptr [00403420h]
                  test eax, eax
                  je 00007FD7546BE06Eh
                  mov dword ptr [esp], 00404020h
                  call dword ptr [00406168h]
                  mov edx, 00000000h
                  sub esp, 04h
                  test eax, eax
                  je 00007FD7546BE048h
                  mov dword ptr [esp+04h], 0040402Eh
                  mov dword ptr [esp], eax
                  call dword ptr [0040616Ch]
                  sub esp, 08h
                  mov edx, eax
                  test edx, edx
                  je 00007FD7546BE03Bh
                  mov dword ptr [esp], 00403420h
                  call edx
                  leave
                  ret
                  lea esi, dword ptr [esi+00h]
                  push ebp
                  mov ebp, esp
                  pop ebp
                  ret
                  nop
                  nop
                  nop
                  nop
                  nop
                  nop
                  nop
                  nop
                  nop
                  nop
                  nop
                  push ebp
                  mov ebp, esp
                  mov eax, dword ptr [ebp+08h]
                  pop ebp
                  jmp eax
                  push ebp
                  mov ebp, esp
                  sub esp, 10h
                  mov edx, dword ptr [0040300Ch]
                  mov eax, dword ptr [ebp+08h]
                  test edx, edx
                  jle 00007FD7546BE052h
                  cmp dword ptr [00403010h], 00000000h
                  jle 00007FD7546BE049h
                  mov ecx, dword ptr [00000068h]
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x60000x6ec.idata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x80000x18.tls
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x61380xfc.idata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x1d440x1e007cb51d8c80820cb459af5e2ae8fd85b6False0.5514322916666666data5.870338373030558IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .data0x30000x4240x600bb8565cc97daf6f651bb651c348c768bFalse0.578125data5.4498317577935715IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rdata0x40000x2f40x400a40946782f5af553dfb4e92f5f8b97c5False0.4658203125data4.36563919678268IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                  .bss0x50000x45c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .idata0x60000x6ec0x8001fa811f6451d1b5dbef8208d24ba67abFalse0.37451171875data4.201011654172533IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .CRT0x70000x340x2009de5f1d116d44b01311bad1a72865561False0.06640625Matlab v4 mat-file (little endian) \340\032@, numeric, rows 4198416, columns 00.2491299020576082IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .tls0x80000x200x200fbb2f655a2d41a7ed1460a18df87b605False0.05078125data0.22482003450968063IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  DLLImport
                  KERNEL32.dllCloseHandle, ConnectNamedPipe, CreateFileA, CreateNamedPipeA, CreateThread, DeleteCriticalSection, EnterCriticalSection, FreeLibrary, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetLastError, GetModuleHandleA, GetProcAddress, GetStartupInfoA, GetSystemTimeAsFileTime, GetTickCount, InitializeCriticalSection, LeaveCriticalSection, LoadLibraryA, LoadLibraryW, QueryPerformanceCounter, ReadFile, SetUnhandledExceptionFilter, Sleep, TerminateProcess, TlsGetValue, UnhandledExceptionFilter, VirtualAlloc, VirtualProtect, VirtualQuery, WriteFile
                  msvcrt.dll__dllonexit, __getmainargs, __initenv, __lconv_init, __set_app_type, __setusermatherr, _acmdln, _amsg_exit, _cexit, _fmode, _initterm, _iob, _lock, _onexit, _unlock, _winmajor, abort, calloc, exit, fprintf, free, fwrite, malloc, memcpy, signal, sprintf, strlen, strncmp, vfprintf
                  TimestampSource PortDest PortSource IPDest IP
                  Apr 20, 2024 10:13:04.132730961 CEST4973080192.168.2.4101.78.63.44
                  Apr 20, 2024 10:13:05.133074999 CEST4973080192.168.2.4101.78.63.44
                  Apr 20, 2024 10:13:07.133078098 CEST4973080192.168.2.4101.78.63.44

                  Click to jump to process

                  Click to jump to process

                  Target ID:0
                  Start time:10:13:01
                  Start date:20/04/2024
                  Path:C:\Users\user\Desktop\artifact.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\artifact.exe"
                  Imagebase:0x400000
                  File size:14'336 bytes
                  MD5 hash:A7FCD0B15A080167C4C2F05063802A6E
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.1704733475.00000000001F0000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Shellcode_Generic_8c487e57, Description: unknown, Source: 00000000.00000002.1704733475.00000000001F0000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
                  • Rule: Windows_Trojan_Metasploit_38b8ceec, Description: Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon)., Source: 00000000.00000002.1704733475.00000000001F0000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
                  • Rule: Windows_Trojan_Metasploit_24338919, Description: Identifies metasploit wininet reverse shellcode. Also used by other tools (like beacon)., Source: 00000000.00000002.1704733475.00000000001F0000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
                  Reputation:low
                  Has exited:true

                  Reset < >

                    Execution Graph

                    Execution Coverage:12.1%
                    Dynamic/Decrypted Code Coverage:2.1%
                    Signature Coverage:15.7%
                    Total number of Nodes:338
                    Total number of Limit Nodes:5
                    execution_graph 1099 401180 1100 40119e 1099->1100 1101 401473 GetStartupInfoA 1100->1101 1103 4011ee 1100->1103 1102 401484 _initterm 1101->1102 1105 4014a7 exit 1102->1105 1104 401233 1103->1104 1106 401208 Sleep 1103->1106 1107 401433 _amsg_exit 1104->1107 1108 401243 1104->1108 1106->1103 1110 40144d 1107->1110 1113 401268 1107->1113 1108->1102 1109 401250 1108->1109 1111 401450 _initterm 1109->1111 1109->1113 1110->1111 1112 4020f0 25 API calls 1114 40129d SetUnhandledExceptionFilter 1112->1114 1113->1112 1115 4026a0 2 API calls 1114->1115 1116 4012b7 GetProcAddress 1115->1116 1117 4012cf 1116->1117 1118 401344 malloc 1117->1118 1119 40136e 1118->1119 1123 4013a7 1118->1123 1120 401370 strlen malloc memcpy 1119->1120 1120->1120 1120->1123 1121 4027f0 4 API calls 1122 4013be 1121->1122 1124 402cd0 12 API calls 1122->1124 1123->1121 1125 4013ea 1124->1125 1125->1105 1126 4013fd 1125->1126 1127 401411 1126->1127 1128 401407 _cexit 1126->1128 1128->1127 1129 401900 1130 40190b 1129->1130 1131 401910 1130->1131 1134 402b10 1130->1134 1133 401938 1135 402b60 1134->1135 1136 402b1c 1134->1136 1137 402b90 InitializeCriticalSection 1135->1137 1141 402b1e 1135->1141 1138 402b30 1136->1138 1136->1141 1137->1141 1140 402970 4 API calls 1138->1140 1142 402b39 1138->1142 1139 402b43 DeleteCriticalSection 1144 402b23 1139->1144 1140->1142 1141->1133 1141->1144 1145 402970 EnterCriticalSection 1141->1145 1142->1139 1142->1144 1144->1133 1146 4029c5 LeaveCriticalSection 1145->1146 1148 402991 1145->1148 1146->1144 1147 4029a0 TlsGetValue GetLastError 1147->1148 1148->1146 1148->1147 1149 401002 __getmainargs 1150 401949 1151 401994 LoadLibraryA 1150->1151 1155 401963 1150->1155 1152 401a63 1151->1152 1153 4019bb GetProcAddress GetProcAddress 1151->1153 1153->1152 1154 4019fe 1153->1154 1156 401a43 FreeLibrary 1154->1156 1157 401a0c 1154->1157 1158 402b10 6 API calls 1155->1158 1159 401988 1155->1159 1156->1152 1158->1159 1160 40108e 1161 4010f0 __set_app_type 1160->1161 1162 4010a6 __set_app_type 1160->1162 1163 4010b2 1161->1163 1162->1163 1164 4010e3 1163->1164 1167 401dd0 1163->1167 1168 402c90 __setusermatherr 1167->1168 1169 4014d0 1172 402810 1169->1172 1173 402860 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 1172->1173 1174 4014e2 1172->1174 1173->1174 1175 402d10 1180 4014f0 1175->1180 1178 401bd0 4 API calls 1179 402d27 1178->1179 1181 40152e 1180->1181 1182 4014ff GetModuleHandleA 1180->1182 1181->1178 1182->1181 1183 401518 GetProcAddress 1182->1183 1183->1181 1184 402411 1185 402420 strlen 1184->1185 1187 40243a 1185->1187 1188 402493 1185->1188 1186 40247b strncmp 1186->1187 1186->1188 1187->1186 1187->1188 1189 401118 1190 401098 1189->1190 1191 4010f0 __set_app_type 1190->1191 1192 4010a6 __set_app_type 1190->1192 1193 4010b2 1191->1193 1192->1193 1194 4010e3 1193->1194 1195 401dd0 __setusermatherr 1193->1195 1196 40115c 1195->1196 932 401419 933 401420 932->933 934 401243 933->934 935 401433 _amsg_exit 933->935 936 401250 934->936 937 401484 _initterm 934->937 938 40144d 935->938 942 401268 935->942 939 401450 _initterm 936->939 936->942 940 4014a7 exit 937->940 938->939 959 4020f0 942->959 946 401344 malloc 947 4013aa 946->947 948 40136e 946->948 984 4027f0 947->984 950 401370 strlen malloc memcpy 948->950 949 4012cf 949->946 950->950 953 4013a7 950->953 952 4013be 989 402cd0 952->989 953->947 960 40129d SetUnhandledExceptionFilter 959->960 961 402110 959->961 978 4026a0 960->978 961->960 962 40217c 961->962 969 402265 961->969 962->960 963 40218c 962->963 968 4021b5 963->968 996 401eb0 963->996 964 402385 966 401e50 23 API calls 964->966 967 402395 966->967 968->960 973 4021ef VirtualQuery 968->973 969->960 969->964 969->968 970 4022a3 969->970 970->969 971 401eb0 23 API calls 970->971 974 401eb0 23 API calls 970->974 1033 401e50 fwrite vfprintf abort 970->1033 971->969 975 402211 VirtualProtect 973->975 976 402362 973->976 974->970 975->968 977 401e50 23 API calls 976->977 977->964 979 4012b7 GetProcAddress 978->979 981 4026b2 978->981 979->949 980 402740 LoadLibraryW 980->979 981->980 982 402724 GetModuleHandleA 981->982 982->979 983 40273d 982->983 983->980 985 4027fa 984->985 987 4027a0 984->987 985->952 1070 401bd0 987->1070 990 402cda 989->990 991 4027f0 4 API calls 990->991 992 402ce7 991->992 1081 401840 GetTickCount sprintf CreateThread 992->1081 994 402cf3 995 402cf9 Sleep 994->995 995->995 997 402092 996->997 1004 401ecd 996->1004 997->963 998 401f6f VirtualQuery 1000 401f96 998->1000 1001 4020c9 998->1001 1002 401f9f memcpy 1000->1002 1008 401fcd VirtualProtect memcpy 1000->1008 1003 401e50 13 API calls 1001->1003 1007 401fb3 1002->1007 1020 4020e1 1003->1020 1004->998 1005 4020b9 1004->1005 1010 401f25 VirtualQuery 1004->1010 1006 401e50 13 API calls 1005->1006 1006->1001 1007->963 1008->1007 1009 402014 1008->1009 1009->1007 1012 402019 VirtualProtect 1009->1012 1013 401f62 1010->1013 1014 402099 1010->1014 1011 402102 1011->963 1012->963 1013->998 1016 40204a VirtualProtect 1013->1016 1015 401e50 13 API calls 1014->1015 1015->1005 1016->998 1017 40207c GetLastError 1016->1017 1018 401e50 13 API calls 1017->1018 1018->997 1019 40217c 1019->1011 1022 401eb0 13 API calls 1019->1022 1025 4021b5 1019->1025 1020->1011 1020->1019 1028 402265 1020->1028 1021 402385 1023 401e50 13 API calls 1021->1023 1022->1019 1024 402395 1023->1024 1025->1011 1029 4021ef VirtualQuery 1025->1029 1026 401eb0 13 API calls 1026->1028 1027 401e50 13 API calls 1027->1028 1028->1011 1028->1021 1028->1025 1028->1026 1028->1027 1030 402211 VirtualProtect 1029->1030 1031 402362 1029->1031 1030->1025 1032 401e50 13 API calls 1031->1032 1032->1021 1039 401eb0 1033->1039 1034 402092 1034->969 1035 401f6f VirtualQuery 1037 401f96 1035->1037 1038 4020c9 1035->1038 1040 401f9f memcpy 1037->1040 1045 401fcd VirtualProtect memcpy 1037->1045 1041 401e50 10 API calls 1038->1041 1039->1034 1039->1035 1042 4020b9 1039->1042 1047 401f25 VirtualQuery 1039->1047 1044 401fb3 1040->1044 1056 4020e1 1041->1056 1043 401e50 10 API calls 1042->1043 1043->1038 1044->969 1045->1044 1046 402014 1045->1046 1046->1044 1049 402019 VirtualProtect 1046->1049 1050 401f62 1047->1050 1051 402099 1047->1051 1048 402102 1048->969 1049->969 1050->1035 1053 40204a VirtualProtect 1050->1053 1052 401e50 10 API calls 1051->1052 1052->1042 1053->1035 1054 40207c GetLastError 1053->1054 1055 401e50 10 API calls 1054->1055 1055->1034 1056->1048 1060 40217c 1056->1060 1062 402265 1056->1062 1057 402385 1059 401e50 10 API calls 1057->1059 1058 401eb0 10 API calls 1058->1060 1061 402395 1059->1061 1060->1048 1060->1058 1066 4021b5 1060->1066 1062->1048 1062->1057 1063 401e50 10 API calls 1062->1063 1065 401eb0 10 API calls 1062->1065 1062->1066 1063->1062 1064 4021ef VirtualQuery 1067 402211 VirtualProtect 1064->1067 1068 402362 1064->1068 1065->1062 1066->1048 1066->1064 1067->1066 1069 401e50 10 API calls 1068->1069 1069->1057 1073 401b10 1070->1073 1072 401bdf 1072->952 1074 401b25 1073->1074 1075 401bb0 _onexit 1074->1075 1076 401b32 _lock 1074->1076 1075->1072 1077 401b4b 1076->1077 1078 401b5c __dllonexit 1077->1078 1079 401b86 1078->1079 1080 401b97 _unlock 1079->1080 1080->1072 1082 401713 1081->1082 1085 401648 CreateNamedPipeA 1082->1085 1086 4016b0 ConnectNamedPipe 1085->1086 1087 4016ca 1085->1087 1086->1087 1088 4016f6 1086->1088 1089 401701 CloseHandle 1088->1089 1090 4016cc WriteFile 1088->1090 1089->1087 1090->1088 1090->1089 1197 402cda 1198 4027f0 4 API calls 1197->1198 1199 402ce7 1198->1199 1203 401840 GetTickCount sprintf CreateThread 1199->1203 1204 401713 4 API calls 1203->1204 1205 40191c 1206 401920 1205->1206 1207 402b10 6 API calls 1206->1207 1208 401938 1207->1208 1209 40279c 1211 4027a0 1209->1211 1210 401bd0 4 API calls 1212 4027ce 1210->1212 1211->1210 1213 4028e0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess abort 1214 401de0 1215 401df6 1214->1215 1216 401dfd fprintf 1214->1216 1215->1216 1217 4029e0 1218 402a04 calloc 1217->1218 1219 4029f6 1217->1219 1218->1219 1220 402a1e EnterCriticalSection LeaveCriticalSection 1218->1220 916 4017e2 malloc 917 4017ff Sleep 916->917 923 401732 CreateFileA 917->923 920 40181e 928 40158e VirtualAlloc 920->928 922 401837 924 401794 923->924 925 4017c0 923->925 924->917 924->920 926 401796 ReadFile 925->926 927 4017cb FindCloseChangeNotification 925->927 926->925 926->927 927->924 929 4015c4 928->929 930 4015ea VirtualProtect CreateThread 929->930 930->922 931 401550 930->931 1221 4010e9 1222 4010f0 __set_app_type 1221->1222 1223 4010b2 1222->1223 1224 4010e3 1223->1224 1225 401dd0 __setusermatherr 1223->1225 1226 40115c 1225->1226 1091 1f00b5 InternetConnectA 1092 1f013e 1091->1092 1095 1f00ce HttpOpenRequestA 1092->1095 1097 1f00e9 1095->1097 1096 1f02c3 ExitProcess 1097->1096 1098 1f0143 1097->1098 1227 1f02b5 ExitProcess 1228 402b2c 1229 402b30 1228->1229 1230 402b39 1229->1230 1233 402970 4 API calls 1229->1233 1231 402b23 1230->1231 1232 402b43 DeleteCriticalSection 1230->1232 1232->1231 1233->1230 1234 401bf0 1235 401c04 1234->1235 1237 401c10 signal 1235->1237 1238 401c82 signal 1235->1238 1243 401c2d 1235->1243 1236 401cc0 signal 1241 401d15 signal 1236->1241 1236->1243 1240 401d40 signal 1237->1240 1237->1243 1239 401cf7 signal 1238->1239 1238->1243 1242 401c31 1239->1242 1240->1242 1241->1242 1243->1236 1243->1238 1243->1242 1244 402a70 1245 402a81 1244->1245 1246 402a88 EnterCriticalSection 1244->1246 1247 402aa2 1246->1247 1248 402abf LeaveCriticalSection 1246->1248 1247->1248 1249 402aa8 free LeaveCriticalSection 1247->1249 1250 402acf 1248->1250 1249->1250 1252 4014b0 1253 402810 5 API calls 1252->1253 1254 4014c2 1253->1254 1255 402b7c 1256 402b80 1255->1256 1257 402b23 1256->1257 1258 402970 4 API calls 1256->1258 1258->1257 1263 401cbc 1264 401cc0 signal 1263->1264 1265 401d15 signal 1264->1265 1266 401c5c 1264->1266 1267 401c3f 1265->1267 1266->1264 1266->1267 1268 401c82 signal 1266->1268 1268->1266 1269 401cf7 signal 1268->1269 1269->1267 1270 401fbc 1271 401f76 VirtualQuery 1270->1271 1273 401f96 1271->1273 1274 4020c9 1271->1274 1275 401f9f memcpy 1273->1275 1278 401fcd VirtualProtect memcpy 1273->1278 1276 401e50 23 API calls 1274->1276 1277 401fb3 1275->1277 1282 4020e1 1276->1282 1278->1277 1279 402014 1278->1279 1279->1277 1281 402019 VirtualProtect 1279->1281 1280 402102 1282->1280 1283 402265 1282->1283 1287 40217c 1282->1287 1283->1280 1284 402385 1283->1284 1289 4021b5 1283->1289 1290 401eb0 23 API calls 1283->1290 1291 401e50 23 API calls 1283->1291 1286 401e50 23 API calls 1284->1286 1285 401eb0 23 API calls 1285->1287 1288 402395 1286->1288 1287->1280 1287->1285 1287->1289 1289->1280 1292 4021ef VirtualQuery 1289->1292 1290->1283 1291->1283 1293 402211 VirtualProtect 1292->1293 1294 402362 1292->1294 1293->1289 1295 401e50 23 API calls 1294->1295 1295->1284

                    Callgraph

                    • Executed
                    • Not Executed
                    • Opacity -> Relevance
                    • Disassembly available
                    callgraph 0 Function_00401E40 1 Function_00401540 2 Function_00401840 62 Function_00401713 2->62 3 Function_00401BC2 4 Function_004023C7 5 Function_00401648 6 Function_00401949 58 Function_00402B10 6->58 7 Function_00401AC9 8 Function_00401DCC 9 Function_004014D0 54 Function_00402810 9->54 10 Function_00402CD0 10->2 39 Function_004027F0 10->39 11 Function_00401DD0 12 Function_00401E50 12->12 33 Function_004024F0 12->33 59 Function_00402590 12->59 73 Function_00401EB0 12->73 75 Function_00402BB0 12->75 76 Function_004024B0 12->76 13 Function_00401550 14 Function_004023D0 15 Function_00401BD0 55 Function_00401B10 15->55 16 Function_00402659 17 Function_00401559 18 Function_00402CDA 18->2 18->39 19 Function_001F0000 20 Function_00402760 21 Function_004028E0 22 Function_00401AE0 23 Function_00401DE0 24 Function_004029E0 25 Function_00402BE0 26 Function_004017E2 52 Function_0040158E 26->52 78 Function_00401732 26->78 27 Function_004010E9 27->0 27->11 45 Function_00401B00 27->45 28 Function_004027E9 29 Function_001F00B5 60 Function_001F00CE 29->60 30 Function_001F02B5 31 Function_004020F0 31->12 31->33 31->73 31->75 32 Function_00401BF0 32->20 69 Function_004023A0 33->69 34 Function_00402970 35 Function_00402770 36 Function_00402A70 37 Function_004014F0 38 Function_00401AF0 39->15 40 Function_00401AF5 41 Function_001F02A7 42 Function_00402B7C 42->34 43 Function_004027FC 43->15 44 Function_00401180 44->10 44->20 44->31 44->39 46 Function_00402C00 44->46 70 Function_004026A0 44->70 44->75 47 Function_00401900 47->58 48 Function_00401D80 49 Function_00402B02 50 Function_00401002 51 Function_0040260C 52->13 52->17 53 Function_0040108E 53->0 53->11 53->45 55->38 55->45 56 Function_00402D10 56->15 56->37 57 Function_00402610 57->14 57->69 58->34 59->69 61 Function_00402411 61->69 62->5 63 Function_00402517 63->69 64 Function_00401118 64->0 64->11 64->45 65 Function_00401419 65->10 65->20 65->31 65->39 65->70 66 Function_0040191C 66->58 67 Function_0040269C 68 Function_0040279C 68->15 70->57 71 Function_00402B2C 71->34 72 Function_004024AC 73->12 73->33 73->59 73->73 73->75 73->76 74 Function_004014B0 74->54 76->14 76->69 77 Function_004025B1 77->14 77->69 79 Function_00401CBC 80 Function_00401FBC 80->12 80->33 80->73 80->75

                    Control-flow Graph

                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1704834734.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1704745349.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704858808.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704883438.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704907716.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_artifact.jbxd
                    Similarity
                    • API ID: malloc$AddressExceptionFilterInfoProcSleepStartupUnhandled_cexitmemcpystrlen
                    • String ID:
                    • API String ID: 2757201259-0
                    • Opcode ID: 0896d371e4306826ea3b516f5471f02d2ee70c75e097cf85678b9c61fcbc2401
                    • Instruction ID: caf7f87113209765f89ec29b7d99b9664cb1a8752d2cc1e2126da42f9d288e33
                    • Opcode Fuzzy Hash: 0896d371e4306826ea3b516f5471f02d2ee70c75e097cf85678b9c61fcbc2401
                    • Instruction Fuzzy Hash: A9814CB09086008FD710EF69DA8475E7BE0FB45308F41853EE984BB3A2D77998448F9A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 61 401648-4016ae CreateNamedPipeA 62 4016b0-4016c8 ConnectNamedPipe 61->62 63 40170b-401712 61->63 64 4016ca 62->64 65 4016fd-4016ff 62->65 64->63 66 401701-40170a CloseHandle 65->66 67 4016cc-4016f4 WriteFile 65->67 66->63 67->66 68 4016f6-4016fb 67->68 68->65
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1704834734.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1704745349.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704858808.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704883438.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704907716.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_artifact.jbxd
                    Similarity
                    • API ID: NamedPipe$CloseConnectCreateHandle
                    • String ID:
                    • API String ID: 2614152119-0
                    • Opcode ID: 7211f97730a076d644bb01eb69bcf7beb0e4917fcdd1c76a291498aa5cb8fa3e
                    • Instruction ID: c2fb21887016c7fc5506753a325a02489ab236c223c86ee3073f682f81f730fa
                    • Opcode Fuzzy Hash: 7211f97730a076d644bb01eb69bcf7beb0e4917fcdd1c76a291498aa5cb8fa3e
                    • Instruction Fuzzy Hash: 2E2147B18043019FD7009F69C94879FBBF4EF80354F01C92EE895AB291D3B995488F96
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 101 1f00b5-1f013e InternetConnectA call 1f00ce 104 1f0143-1f0145 101->104 105 1f01af 104->105 106 1f0147-1f0166 104->106 108 1f0212-1f0215 105->108 109 1f01b1 105->109 112 1f0168-1f018a 106->112 113 1f01c1-1f01c4 106->113 114 1f0216-1f021b 108->114 110 1f021c-1f0224 109->110 111 1f01b3-1f01c0 109->111 117 1f01d5-1f01d6 110->117 111->113 121 1f019d-1f01a1 112->121 122 1f018c-1f0195 112->122 115 1f01c5-1f01c8 113->115 114->110 118 1f023d-1f02b4 115->118 119 1f01ca-1f01d2 115->119 120 1f01d8-1f01da 117->120 119->117 120->108 123 1f01dc-1f01e5 120->123 125 1f020c-1f0211 121->125 126 1f01a3-1f01ac 121->126 122->115 124 1f0198-1f019c 122->124 123->114 128 1f01e7-1f020b 123->128 124->120 124->121 125->108 126->105 128->125
                    APIs
                    • InternetConnectA.WININET(C69F8957,00000000,001F030C,00000050,00000000,00000000,00000003,00000000,00000000,?,696E6977,0074656E), ref: 001F00CA
                      • Part of subcall function 001F00CE: HttpOpenRequestA.WININET(3B2E55EB,00000000,00000000,001F0143,00000000,00000000,00000000,84400200,00000000,?,696E6977,0074656E), ref: 001F00E2
                    Memory Dump Source
                    • Source File: 00000000.00000002.1704733475.00000000001F0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f0000_artifact.jbxd
                    Yara matches
                    Similarity
                    • API ID: ConnectHttpInternetOpenRequest
                    • String ID:
                    • API String ID: 1341064763-0
                    • Opcode ID: 87ff5076aafd84f36198dfb525d5f7a4556b83a43a4f2e81485eac528133ddf0
                    • Instruction ID: 30e61125b6b33b8d9044e018759a3f09982c32566553e52c8fd65703d5537c9b
                    • Opcode Fuzzy Hash: 87ff5076aafd84f36198dfb525d5f7a4556b83a43a4f2e81485eac528133ddf0
                    • Instruction Fuzzy Hash: B141AB6511E3E969DB1B8B7889AD5FABF50AE07300B2C05CCD0C10F4A3D7C0D566C3AA
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 401840-4018f4 GetTickCount sprintf CreateThread
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1704834734.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1704745349.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704858808.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704883438.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704907716.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_artifact.jbxd
                    Similarity
                    • API ID: CountCreateThreadTicksprintf
                    • String ID: .$D@@$\$\$\$\$e$i$p$p
                    • API String ID: 1367138260-2424406903
                    • Opcode ID: ff8628f5b1a4ddc711573d3f95a49cca88853ba2bddca83b23de660047b0d17b
                    • Instruction ID: fe91bf6ba0e5a58d40950432c0aa4372ad4abb89053ee6ec7080849c8075752a
                    • Opcode Fuzzy Hash: ff8628f5b1a4ddc711573d3f95a49cca88853ba2bddca83b23de660047b0d17b
                    • Instruction Fuzzy Hash: 41017EB4408741DFE300DF15D54C70BBEE5AB84749F108A1DE5992B291C7FE86588F9B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 55 40158e-4015c2 VirtualAlloc 56 4015de-4015e0 55->56 57 4015e2-401644 call 401559 VirtualProtect CreateThread 56->57 58 4015c4-4015dd 56->58 58->56
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1704834734.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1704745349.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704858808.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704883438.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704907716.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_artifact.jbxd
                    Similarity
                    • API ID: Virtual$AllocCreateProtectThread
                    • String ID:
                    • API String ID: 3039780055-3916222277
                    • Opcode ID: 8c9b4925f2c38331d7960091a977156a5f2d224e9d77caf502326824ff6bd4f4
                    • Instruction ID: ab7ecbb8b4d0cfa2b4e35fa7a7a6139784d06835c8a712c6c1e4e78079e308d8
                    • Opcode Fuzzy Hash: 8c9b4925f2c38331d7960091a977156a5f2d224e9d77caf502326824ff6bd4f4
                    • Instruction Fuzzy Hash: 51114CB0409344AFD700AF69C55835EFFF4FF84714F41882EE89A9B251D37894158F96
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 69 401732-401792 CreateFileA 70 401794 69->70 71 4017c7-4017c9 69->71 74 4017da-4017e1 70->74 72 401796-4017be ReadFile 71->72 73 4017cb-4017d9 FindCloseChangeNotification 71->73 72->73 75 4017c0-4017c5 72->75 73->74 75->71
                    APIs
                    • CreateFileA.KERNELBASE ref: 0040177F
                    • FindCloseChangeNotification.KERNELBASE ref: 004017CE
                    Memory Dump Source
                    • Source File: 00000000.00000002.1704834734.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1704745349.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704858808.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704883438.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704907716.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_artifact.jbxd
                    Similarity
                    • API ID: ChangeCloseCreateFileFindNotification
                    • String ID:
                    • API String ID: 727422849-0
                    • Opcode ID: e28018d6bba379c47652cf01ac0f52033d30b3a841358745df5ed769183f4fb6
                    • Instruction ID: be2562d6f34abf3596d3625e9fdd9efa4af1695c40b9771668e845dcbdfb8629
                    • Opcode Fuzzy Hash: e28018d6bba379c47652cf01ac0f52033d30b3a841358745df5ed769183f4fb6
                    • Instruction Fuzzy Hash: 07116AB08043059BD700AF69C48879FBBF4FB84364F00C92EE8A567391D3B885098FD6
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 76 1f00ce-1f00e6 HttpOpenRequestA 77 1f00e9-1f00fa 76->77 79 1f02c3-1f02c8 ExitProcess 77->79 80 1f0100-1f0104 77->80 81 1f010a-1f0111 80->81 82 1f0106-1f0108 80->82 83 1f0113-1f0130 81->83 82->83 83->77 87 1f0132-1f02e8 83->87 90 1f02ea-1f02fb 87->90 90->79 92 1f02fd-1f0303 90->92 92->90 93 1f0305-1f0306 92->93
                    APIs
                    • HttpOpenRequestA.WININET(3B2E55EB,00000000,00000000,001F0143,00000000,00000000,00000000,84400200,00000000,?,696E6977,0074656E), ref: 001F00E2
                    • ExitProcess.KERNEL32(56A2B5F0,?,696E6977,0074656E), ref: 001F02C8
                    Memory Dump Source
                    • Source File: 00000000.00000002.1704733475.00000000001F0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f0000_artifact.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExitHttpOpenProcessRequest
                    • String ID:
                    • API String ID: 4217525295-0
                    • Opcode ID: c825f18c99f9df7cf564f541a7d8b5394c2efc7e3cb1da508c9495459e7d8d3c
                    • Instruction ID: c8273e1c552f8a5bcb3a5f847a0879837e992a95eb542fe01d2ff5ba3e34752c
                    • Opcode Fuzzy Hash: c825f18c99f9df7cf564f541a7d8b5394c2efc7e3cb1da508c9495459e7d8d3c
                    • Instruction Fuzzy Hash: 310128A178524D3AF73501B79C9AF3B695DCBC9FE4F268128B608921C1EE50DC008038
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 94 4017e2-4017fd malloc 95 4017ff-40181c Sleep call 401732 94->95 98 40181e-401832 call 40158e 95->98 100 401837-40183f 98->100
                    APIs
                    • malloc.MSVCRT ref: 004017F2
                    • Sleep.KERNELBASE ref: 00401806
                      • Part of subcall function 00401732: CreateFileA.KERNELBASE ref: 0040177F
                    Memory Dump Source
                    • Source File: 00000000.00000002.1704834734.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1704745349.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704858808.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704883438.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704907716.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_artifact.jbxd
                    Similarity
                    • API ID: CreateFileSleepmalloc
                    • String ID:
                    • API String ID: 1916127908-0
                    • Opcode ID: c8d9fe3cdf8be18cd1aebcc6d5cf113ad35aad66be6e8e6627d307ecd541ead5
                    • Instruction ID: 23489b1e7db7791da7ad07f796b6cb5a3409a33c5bdae94927da59e9009fe16f
                    • Opcode Fuzzy Hash: c8d9fe3cdf8be18cd1aebcc6d5cf113ad35aad66be6e8e6627d307ecd541ead5
                    • Instruction Fuzzy Hash: 63F0FEB05093049BD700BF6ADA8541ABFE8EB48359F41483EEA88E7355D734A9408F5A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 129 1f02b5-1f02c8 ExitProcess
                    APIs
                    • ExitProcess.KERNEL32(56A2B5F0,?,696E6977,0074656E), ref: 001F02C8
                    Memory Dump Source
                    • Source File: 00000000.00000002.1704733475.00000000001F0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f0000_artifact.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExitProcess
                    • String ID:
                    • API String ID: 621844428-0
                    • Opcode ID: 2b286968ddc1a49ec0ddd2bc3c89754808bb0da514edcfefc3e388cd992a2a8e
                    • Instruction ID: dff2dc9fca5b5713ed5cc4f1b95d88c0a30b93362796b45392ce308c3a8f9244
                    • Opcode Fuzzy Hash: 2b286968ddc1a49ec0ddd2bc3c89754808bb0da514edcfefc3e388cd992a2a8e
                    • Instruction Fuzzy Hash: DEB0921558B6A99D86035731592FAEBBF440C0321038E888FC0446F897D316C1A542EA
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 130 402cd0-402cf3 call 4027f0 call 401840 136 402cf9-402d03 Sleep 130->136 136->136
                    APIs
                      • Part of subcall function 00401840: GetTickCount.KERNEL32 ref: 00401846
                      • Part of subcall function 00401840: sprintf.MSVCRT ref: 004018B0
                      • Part of subcall function 00401840: CreateThread.KERNELBASE ref: 004018E4
                    • Sleep.KERNELBASE(00000000), ref: 00402D00
                    Memory Dump Source
                    • Source File: 00000000.00000002.1704834734.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1704745349.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704858808.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704883438.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704907716.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_artifact.jbxd
                    Similarity
                    • API ID: CountCreateSleepThreadTicksprintf
                    • String ID:
                    • API String ID: 2384577035-0
                    • Opcode ID: bd8f3d9e59f49267480f3634579cdc376b1d03b417cd4c0d905da31a9f0f6df8
                    • Instruction ID: cf4a89c8a94c25b0ee02edaa7cc70f75c59475cb57c0e2ce054420fc0d344a57
                    • Opcode Fuzzy Hash: bd8f3d9e59f49267480f3634579cdc376b1d03b417cd4c0d905da31a9f0f6df8
                    • Instruction Fuzzy Hash: ECD05B7040C2047BD6407F55CD45A2A7B58FB05354F00092CF995162D6DA791850667B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 137 402cda-402cf3 call 4027f0 call 401840 142 402cf9-402d03 Sleep 137->142 142->142
                    APIs
                      • Part of subcall function 00401840: GetTickCount.KERNEL32 ref: 00401846
                      • Part of subcall function 00401840: sprintf.MSVCRT ref: 004018B0
                      • Part of subcall function 00401840: CreateThread.KERNELBASE ref: 004018E4
                    • Sleep.KERNELBASE(00000000), ref: 00402D00
                    Memory Dump Source
                    • Source File: 00000000.00000002.1704834734.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1704745349.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704858808.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704883438.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704907716.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_artifact.jbxd
                    Similarity
                    • API ID: CountCreateSleepThreadTicksprintf
                    • String ID:
                    • API String ID: 2384577035-0
                    • Opcode ID: beed4f5e477bc4de7a76f8f993676898df3c6d29b118f36d5a26f91d1cf54b3c
                    • Instruction ID: 5efa37f52187eedb4945f577d34cabbe14a236f11a9762c65c4e008d846ef068
                    • Opcode Fuzzy Hash: beed4f5e477bc4de7a76f8f993676898df3c6d29b118f36d5a26f91d1cf54b3c
                    • Instruction Fuzzy Hash: 92D012B040C2046BE6407F69C945A2B7A9CFB04388F01083DED85162C7CABD185066BB
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 237 401949-401961 238 401963-40196a 237->238 239 401994-4019b5 LoadLibraryA 237->239 242 401976-401979 238->242 243 40196c 238->243 240 401ab3-401ac7 239->240 241 4019bb-4019f8 GetProcAddress * 2 239->241 246 401a63-401a80 240->246 241->240 247 4019fe-401a06 241->247 244 401a83-401a8e 242->244 245 40197f-401982 242->245 243->242 249 401988-401991 244->249 252 401a94-401a98 244->252 248 401a22-401a3e call 402b10 245->248 245->249 250 401a43-401a60 FreeLibrary 247->250 251 401a08-401a0a 247->251 248->249 250->246 251->250 253 401a0c-401a1f 251->253 255 401a9a 252->255 256 401a9c-401aa5 252->256 255->256 256->252 257 401aa7-401ab0 256->257
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1704834734.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1704745349.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704858808.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704883438.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704907716.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_artifact.jbxd
                    Similarity
                    • API ID: AddressLibraryProc$FreeLoad
                    • String ID: 0p@$0p@$0p@$u@@
                    • API String ID: 2256533930-709996013
                    • Opcode ID: 4ca651e4fae0634099a83d279d20d672a55cd66a2c119adacc1e932fecc0e34e
                    • Instruction ID: 34d6fccde5c68b87c573635ca5f6feadaf6b8f8ab0358a6d14f9fcf661f388c2
                    • Opcode Fuzzy Hash: 4ca651e4fae0634099a83d279d20d672a55cd66a2c119adacc1e932fecc0e34e
                    • Instruction Fuzzy Hash: 463141B16066008BD7109F68DAC875B7BE4FB80305F44853EE844BB3B1D37A9994CF8A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • GetSystemTimeAsFileTime.KERNEL32 ref: 00402867
                    • GetCurrentProcessId.KERNEL32 ref: 0040287C
                    • GetCurrentThreadId.KERNEL32 ref: 00402884
                    • GetTickCount.KERNEL32 ref: 0040288C
                    • QueryPerformanceCounter.KERNEL32 ref: 0040289B
                    Memory Dump Source
                    • Source File: 00000000.00000002.1704834734.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1704745349.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704858808.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704883438.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704907716.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_artifact.jbxd
                    Similarity
                    • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                    • String ID:
                    • API String ID: 1445889803-0
                    • Opcode ID: 22833428e81146e0a5c52e8d77171e58052e69936402a7b322efee44ae5d86d5
                    • Instruction ID: cc31347c17379e6945de62dc4fed4c1f87cf7c797c04cbb890476670299d8cea
                    • Opcode Fuzzy Hash: 22833428e81146e0a5c52e8d77171e58052e69936402a7b322efee44ae5d86d5
                    • Instruction Fuzzy Hash: 0B110AB58083088FC300EF69D64811ABBF0BB88344F454A3DE985AB351EB75DA54CF8A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • SetUnhandledExceptionFilter.KERNEL32 ref: 0040292F
                    • UnhandledExceptionFilter.KERNEL32 ref: 0040293F
                    • GetCurrentProcess.KERNEL32 ref: 00402948
                    • TerminateProcess.KERNEL32 ref: 00402959
                    • abort.MSVCRT ref: 00402962
                    Memory Dump Source
                    • Source File: 00000000.00000002.1704834734.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1704745349.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704858808.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704883438.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704907716.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_artifact.jbxd
                    Similarity
                    • API ID: ExceptionFilterProcessUnhandled$CurrentTerminateabort
                    • String ID:
                    • API String ID: 520269711-0
                    • Opcode ID: a7ce449f81dac3b55e41422608254bfeb6744166700c5fa2a1b601d02114f5bc
                    • Instruction ID: c81f2c63a292368498da3dfc2163c21b224d5074d04612caf218b5d2161d737d
                    • Opcode Fuzzy Hash: a7ce449f81dac3b55e41422608254bfeb6744166700c5fa2a1b601d02114f5bc
                    • Instruction Fuzzy Hash: 180192B4804604DFD700EFB9EA4924A7BF0FB49305F018539E989AB325E7B49954CF9A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 146 401e50-401ec7 fwrite vfprintf abort 148 402092-402094 146->148 149 401ecd-401ed2 146->149 150 401ed4-401ed9 149->150 151 401ee9-401ef1 150->151 152 401edb-401ee3 150->152 151->150 154 401ef3-401eff call 4024b0 151->154 152->151 153 401fc0-401fc6 152->153 155 401f76-401f90 VirtualQuery 153->155 163 401f05-401f5c call 402590 VirtualQuery 154->163 164 4020b9-4020c4 call 401e50 154->164 157 401f96-401f9d 155->157 158 4020c9-402100 call 401e50 155->158 160 401fc8-401fcb 157->160 161 401f9f-401fae memcpy 157->161 173 402110-402156 call 4024f0 call 402bb0 158->173 174 402102-402109 158->174 160->161 168 401fcd-402012 VirtualProtect memcpy 160->168 166 401fb3-401fba 161->166 176 401f62-401f69 163->176 177 402099-4020b4 call 401e50 163->177 164->158 168->166 171 402014-402017 168->171 171->166 175 402019-402040 VirtualProtect 171->175 173->174 188 402158-402160 173->188 178 402041-402044 176->178 179 401f6f 176->179 177->164 178->179 182 40204a-402076 VirtualProtect 178->182 179->155 182->179 184 40207c-40208d GetLastError call 401e50 182->184 184->148 189 402250-402254 188->189 190 402166-40216d 188->190 191 402180-402186 189->191 192 40225a-40225f 189->192 190->191 193 40216f-402176 190->193 191->174 197 40218c 191->197 192->191 194 402265-40226b 192->194 195 40223c-402243 193->195 196 40217c 193->196 198 402271-40227a 194->198 199 402385-402395 call 401e50 194->199 195->194 201 402245-40224a 195->201 196->191 200 402191-4021b3 call 401eb0 197->200 198->174 202 402280-402297 198->202 211 4021b5-4021bd 200->211 201->189 205 402299-40229c 202->205 206 4022da-4022e3 202->206 209 402310-40231c 205->209 210 40229e-4022a1 205->210 212 402340-402350 206->212 213 4022e5-4022f5 206->213 214 40231f-402327 call 401eb0 209->214 215 4022a3-4022b5 call 401e50 210->215 216 4022ba-4022c3 210->216 211->174 218 4021c3-4021cd 211->218 217 402353-402360 call 401eb0 212->217 213->217 219 4022f7-4022fa 213->219 226 40232c-402335 214->226 215->216 216->213 223 4022c5-4022d8 216->223 217->226 224 4021e2-4021ed 218->224 219->214 225 4022fc-4022ff 219->225 228 402301-40230e call 401eb0 223->228 229 4021d0-4021dc 224->229 230 4021ef-40220b VirtualQuery 224->230 225->226 225->228 226->202 232 40233b 226->232 228->226 229->174 229->224 233 402211-40223a VirtualProtect 230->233 234 402362-402380 call 401e50 230->234 232->211 233->229 234->199
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1704834734.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1704745349.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704858808.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704883438.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704907716.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_artifact.jbxd
                    Similarity
                    • API ID: QueryVirtual$abortfwritememcpyvfprintf
                    • String ID: @
                    • API String ID: 3828011698-2766056989
                    • Opcode ID: e32a1385863e959df9be4258968a2de80bc7a8fbb60befc8a34616536ed87dbd
                    • Instruction ID: fa2a899f518313baa766925860d0dcfa7db237cf959ac16a6f7a9b8b98f83dad
                    • Opcode Fuzzy Hash: e32a1385863e959df9be4258968a2de80bc7a8fbb60befc8a34616536ed87dbd
                    • Instruction Fuzzy Hash: F071F8B19083019FD710EF69D68451FBBE0FB84344F51892EF989AB391D778E844CB8A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 259 401bf0-401c02 260 401c04-401c09 259->260 261 401c47-401c4c 259->261 262 401c74-401c79 260->262 263 401c0b 260->263 264 401cb5-401cb7 261->264 265 401c4e-401c53 261->265 266 401cc0-401cd7 signal 262->266 267 401c7b-401c80 262->267 268 401c10-401c27 signal 263->268 264->268 269 401c82-401c99 signal 265->269 270 401c55-401c5a 265->270 276 401d15-401d2e signal 266->276 277 401cd9-401cdb 266->277 267->269 271 401c5c-401c63 267->271 274 401d40-401d5b signal 268->274 275 401c2d-401c2f 268->275 272 401cf7-401d10 signal 269->272 273 401c9b-401c9d 269->273 270->263 270->271 283 401d33-401d35 271->283 284 401c69-401c71 271->284 279 401c3f-401c44 272->279 273->271 280 401c9f-401cb2 273->280 278 401d61-401d6e call 402760 274->278 274->279 275->271 281 401c31-401c3a 275->281 276->279 277->271 282 401ce1-401cf4 277->282 278->279 281->279 283->279 284->262
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1704834734.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1704745349.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704858808.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704883438.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704907716.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_artifact.jbxd
                    Similarity
                    • API ID: signal
                    • String ID:
                    • API String ID: 1946981877-0
                    • Opcode ID: 40efb0478bb03fd93f9cf4e433f08c71c49adf31f8cd8fa26b6b64571fd07455
                    • Instruction ID: 31fda9add73c80aaf962d61d05ad18905034e614423a930bd2037992e55a8d12
                    • Opcode Fuzzy Hash: 40efb0478bb03fd93f9cf4e433f08c71c49adf31f8cd8fa26b6b64571fd07455
                    • Instruction Fuzzy Hash: F8312CB054C2014BF7206B69858435F76D0AB45328F154B2FE8A5EB3E0C7BDC8C5979B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1704834734.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1704745349.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704858808.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704883438.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704907716.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_artifact.jbxd
                    Similarity
                    • API ID: __dllonexit_lock_onexit_unlock
                    • String ID:
                    • API String ID: 209411981-0
                    • Opcode ID: 270069bba0798b0e4740df1d318cefa85a4af748aac3f4e2a22aa8cb5c6bf12c
                    • Instruction ID: 2465752408bea5ed21686405082ad7dcec20a190ed2a55635f154f6b09a614bc
                    • Opcode Fuzzy Hash: 270069bba0798b0e4740df1d318cefa85a4af748aac3f4e2a22aa8cb5c6bf12c
                    • Instruction Fuzzy Hash: 471172B49097018BC700EF79D9C965EBBE0BB48349F41493EF484A73A2E77894949F86
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1704834734.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1704745349.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704858808.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704883438.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704907716.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_artifact.jbxd
                    Similarity
                    • API ID: AddressHandleModuleProc
                    • String ID: .@@
                    • API String ID: 1646373207-1261943917
                    • Opcode ID: 170f8e7740f22e88c8547e62771cf9cf30410d308f47294af9cecec8ea975b23
                    • Instruction ID: 138d2ec15cf2da010f499937370b7f1ecb1461c5101d83193fee8c8a9e689fae
                    • Opcode Fuzzy Hash: 170f8e7740f22e88c8547e62771cf9cf30410d308f47294af9cecec8ea975b23
                    • Instruction Fuzzy Hash: D1E0EDB560430157D7107F78AA0921B7EE4AB81305F858439D982BB295EB78C815875A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1704834734.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1704745349.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704858808.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704883438.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704907716.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_artifact.jbxd
                    Similarity
                    • API ID: CriticalSection$EnterLeavefree
                    • String ID:
                    • API String ID: 4020351045-0
                    • Opcode ID: 828cd1b5d21274585a5f27dbdf47b48eac2805e8dff15c491d88dfeef477ea7b
                    • Instruction ID: 207df5b4a7935bfb9233df31f262c1f56ca4f736ffdf13fbfb9fc7f0f1967052
                    • Opcode Fuzzy Hash: 828cd1b5d21274585a5f27dbdf47b48eac2805e8dff15c491d88dfeef477ea7b
                    • Instruction Fuzzy Hash: 4D0161707142018FC710BF68DA8841B7BF1FB44341B64457AD846EB3C1EBB89854CF4A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1704834734.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1704745349.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704858808.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704883438.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1704907716.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_artifact.jbxd
                    Similarity
                    • API ID: CriticalSection$EnterErrorLastLeaveValue
                    • String ID:
                    • API String ID: 682475483-0
                    • Opcode ID: b7f7ea959ab3ad087e25ec29e2cbc8bd56614734389a7cabe3a8653af3328612
                    • Instruction ID: 2b094d646b23bf8bddbc3419bcc70322d9fd2dac3922e53017257648de6f58a1
                    • Opcode Fuzzy Hash: b7f7ea959ab3ad087e25ec29e2cbc8bd56614734389a7cabe3a8653af3328612
                    • Instruction Fuzzy Hash: A2F0A4B1A007048FCB107F78EA8851B7BB4EB44381F060539DD856F385D774A818CBAA
                    Uniqueness

                    Uniqueness Score: -1.00%