Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RuntimeBroker.exe

Overview

General Information

Sample name:RuntimeBroker.exe
Analysis ID:1574481
MD5:57145c33045ce67e1c1fe7c763438ab1
SHA1:2a83ecef8bbe640577a2cc3f6602bbd8e7d6c847
SHA256:9764bc832bfa8a9f3d7af1ea6747e7376774bd903e9cc545d9998f2657e97fa3
Tags:exeQuasarRATuser-lontze7
Infos:

Detection

Quasar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Schedule system process
Yara detected Quasar RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Drops executables to the windows directory (C:\Windows) and starts them
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: System File Execution Location Anomaly
Sigma detected: Windows Binaries Write Suspicious Extensions
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to detect virtual machines (STR)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • RuntimeBroker.exe (PID: 360 cmdline: "C:\Users\user\Desktop\RuntimeBroker.exe" MD5: 57145C33045CE67E1C1FE7C763438AB1)
    • schtasks.exe (PID: 1008 cmdline: "schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\a7\RuntimeBroker.exe" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • conhost.exe (PID: 6932 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RuntimeBroker.exe (PID: 6384 cmdline: "C:\Windows\system32\a7\RuntimeBroker.exe" MD5: 57145C33045CE67E1C1FE7C763438AB1)
      • schtasks.exe (PID: 7204 cmdline: "schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\a7\RuntimeBroker.exe" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
        • conhost.exe (PID: 7216 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • RuntimeBroker.exe (PID: 3180 cmdline: C:\Windows\system32\a7\RuntimeBroker.exe MD5: 57145C33045CE67E1C1FE7C763438AB1)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
{"Version": "1.4.1", "Host:Port": "qrpn9be.localto.net:2810;", "InstallName": "RuntimeBroker.exe", "MutexName": "fc5edab1-6e8f-4963-98aa-bd077e08750f", "StartupKey": "RuntimeBroker", "Tag": "RuntimeBroker", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
SourceRuleDescriptionAuthorStrings
RuntimeBroker.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
    RuntimeBroker.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      RuntimeBroker.exeMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
      • 0x28ef4c:$x1: Quasar.Common.Messages
      • 0x29f275:$x1: Quasar.Common.Messages
      • 0x2ab80a:$x4: Uninstalling... good bye :-(
      • 0x2acfff:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
      RuntimeBroker.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
      • 0x2aadbc:$f1: FileZilla\recentservers.xml
      • 0x2aadfc:$f2: FileZilla\sitemanager.xml
      • 0x2aae3e:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
      • 0x2ab08a:$b1: Chrome\User Data\
      • 0x2ab0e0:$b1: Chrome\User Data\
      • 0x2ab3b8:$b2: Mozilla\Firefox\Profiles
      • 0x2ab4b4:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2fd438:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2ab60c:$b4: Opera Software\Opera Stable\Login Data
      • 0x2ab6c6:$b5: YandexBrowser\User Data\
      • 0x2ab734:$b5: YandexBrowser\User Data\
      • 0x2ab408:$s4: logins.json
      • 0x2ab13e:$a1: username_value
      • 0x2ab15c:$a2: password_value
      • 0x2ab448:$a3: encryptedUsername
      • 0x2fd37c:$a3: encryptedUsername
      • 0x2ab46c:$a4: encryptedPassword
      • 0x2fd39a:$a4: encryptedPassword
      • 0x2fd318:$a5: httpRealm
      RuntimeBroker.exeMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
      • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
      • 0x2ab8f4:$s3: Process already elevated.
      • 0x28ec4b:$s4: get_PotentiallyVulnerablePasswords
      • 0x278d07:$s5: GetKeyloggerLogsDirectory
      • 0x29e9d4:$s5: GetKeyloggerLogsDirectory
      • 0x28ec6e:$s6: set_PotentiallyVulnerablePasswords
      • 0x2fea66:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
      SourceRuleDescriptionAuthorStrings
      C:\Windows\System32\a7\RuntimeBroker.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
        C:\Windows\System32\a7\RuntimeBroker.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          C:\Windows\System32\a7\RuntimeBroker.exeMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
          • 0x28ef4c:$x1: Quasar.Common.Messages
          • 0x29f275:$x1: Quasar.Common.Messages
          • 0x2ab80a:$x4: Uninstalling... good bye :-(
          • 0x2acfff:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
          C:\Windows\System32\a7\RuntimeBroker.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
          • 0x2aadbc:$f1: FileZilla\recentservers.xml
          • 0x2aadfc:$f2: FileZilla\sitemanager.xml
          • 0x2aae3e:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
          • 0x2ab08a:$b1: Chrome\User Data\
          • 0x2ab0e0:$b1: Chrome\User Data\
          • 0x2ab3b8:$b2: Mozilla\Firefox\Profiles
          • 0x2ab4b4:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
          • 0x2fd438:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
          • 0x2ab60c:$b4: Opera Software\Opera Stable\Login Data
          • 0x2ab6c6:$b5: YandexBrowser\User Data\
          • 0x2ab734:$b5: YandexBrowser\User Data\
          • 0x2ab408:$s4: logins.json
          • 0x2ab13e:$a1: username_value
          • 0x2ab15c:$a2: password_value
          • 0x2ab448:$a3: encryptedUsername
          • 0x2fd37c:$a3: encryptedUsername
          • 0x2ab46c:$a4: encryptedPassword
          • 0x2fd39a:$a4: encryptedPassword
          • 0x2fd318:$a5: httpRealm
          C:\Windows\System32\a7\RuntimeBroker.exeMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
          • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
          • 0x2ab8f4:$s3: Process already elevated.
          • 0x28ec4b:$s4: get_PotentiallyVulnerablePasswords
          • 0x278d07:$s5: GetKeyloggerLogsDirectory
          • 0x29e9d4:$s5: GetKeyloggerLogsDirectory
          • 0x28ec6e:$s6: set_PotentiallyVulnerablePasswords
          • 0x2fea66:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
          SourceRuleDescriptionAuthorStrings
          00000000.00000000.1253737439.00000000001E2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
            Process Memory Space: RuntimeBroker.exe PID: 360JoeSecurity_QuasarYara detected Quasar RATJoe Security
              Process Memory Space: RuntimeBroker.exe PID: 6384JoeSecurity_QuasarYara detected Quasar RATJoe Security
                SourceRuleDescriptionAuthorStrings
                0.0.RuntimeBroker.exe.1e0000.0.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
                  0.0.RuntimeBroker.exe.1e0000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                    0.0.RuntimeBroker.exe.1e0000.0.unpackMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
                    • 0x28ef4c:$x1: Quasar.Common.Messages
                    • 0x29f275:$x1: Quasar.Common.Messages
                    • 0x2ab80a:$x4: Uninstalling... good bye :-(
                    • 0x2acfff:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
                    0.0.RuntimeBroker.exe.1e0000.0.unpackINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
                    • 0x2aadbc:$f1: FileZilla\recentservers.xml
                    • 0x2aadfc:$f2: FileZilla\sitemanager.xml
                    • 0x2aae3e:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
                    • 0x2ab08a:$b1: Chrome\User Data\
                    • 0x2ab0e0:$b1: Chrome\User Data\
                    • 0x2ab3b8:$b2: Mozilla\Firefox\Profiles
                    • 0x2ab4b4:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                    • 0x2fd438:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                    • 0x2ab60c:$b4: Opera Software\Opera Stable\Login Data
                    • 0x2ab6c6:$b5: YandexBrowser\User Data\
                    • 0x2ab734:$b5: YandexBrowser\User Data\
                    • 0x2ab408:$s4: logins.json
                    • 0x2ab13e:$a1: username_value
                    • 0x2ab15c:$a2: password_value
                    • 0x2ab448:$a3: encryptedUsername
                    • 0x2fd37c:$a3: encryptedUsername
                    • 0x2ab46c:$a4: encryptedPassword
                    • 0x2fd39a:$a4: encryptedPassword
                    • 0x2fd318:$a5: httpRealm
                    0.0.RuntimeBroker.exe.1e0000.0.unpackMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
                    • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
                    • 0x2ab8f4:$s3: Process already elevated.
                    • 0x28ec4b:$s4: get_PotentiallyVulnerablePasswords
                    • 0x278d07:$s5: GetKeyloggerLogsDirectory
                    • 0x29e9d4:$s5: GetKeyloggerLogsDirectory
                    • 0x28ec6e:$s6: set_PotentiallyVulnerablePasswords
                    • 0x2fea66:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>

                    System Summary

                    barindex
                    Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\Desktop\RuntimeBroker.exe, ProcessId: 360, TargetFilename: C:\Windows\system32\a7\RuntimeBroker.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: "C:\Users\user\Desktop\RuntimeBroker.exe", CommandLine: "C:\Users\user\Desktop\RuntimeBroker.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\RuntimeBroker.exe, NewProcessName: C:\Users\user\Desktop\RuntimeBroker.exe, OriginalFileName: C:\Users\user\Desktop\RuntimeBroker.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: "C:\Users\user\Desktop\RuntimeBroker.exe", ProcessId: 360, ProcessName: RuntimeBroker.exe
                    Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\Desktop\RuntimeBroker.exe, ProcessId: 360, TargetFilename: C:\Windows\system32\a7\RuntimeBroker.exe

                    Persistence and Installation Behavior

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: "schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\a7\RuntimeBroker.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\a7\RuntimeBroker.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\RuntimeBroker.exe", ParentImage: C:\Users\user\Desktop\RuntimeBroker.exe, ParentProcessId: 360, ParentProcessName: RuntimeBroker.exe, ProcessCommandLine: "schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\a7\RuntimeBroker.exe" /rl HIGHEST /f, ProcessId: 1008, ProcessName: schtasks.exe
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: RuntimeBroker.exeAvira: detected
                    Source: qrpn9be.localto.netAvira URL Cloud: Label: malware
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeAvira: detection malicious, Label: HEUR/AGEN.1307453
                    Source: RuntimeBroker.exeMalware Configuration Extractor: Quasar {"Version": "1.4.1", "Host:Port": "qrpn9be.localto.net:2810;", "InstallName": "RuntimeBroker.exe", "MutexName": "fc5edab1-6e8f-4963-98aa-bd077e08750f", "StartupKey": "RuntimeBroker", "Tag": "RuntimeBroker", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "MIIE9DCCAtygAwIBAgIQAJKyZhVo23+clMB02PDTKzANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTI0MTEyODEyNTQzMloYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAwYv1YHO81nj7Tx+B0CNWo6sTWe7WpuY0EXxOAIwQYbwhKU00tP5p8tQCR7AKMAQO/zUcDAflQW1LXeWTC3+xXCOh3BNQonYswiCk4awXO4eEhUJe8u47m0ZrZLCFU74ylGY7wnxu/f3ZLb3yFrSoEK+gFtfdTAdnsAha7hV039I5VSOfdL0VeOfYpEhA2AYQPD5KALOSoHM/N089As7ZoBcdl6uWe6df9KAi3HTxLnufNAS6+z3WnlWVr2sw5ZpGuQ7ANPjBoX+AcrEwqhpiwgwEFQdNGzyHq9YyZvsrGs1L1DO5iVn4Z3kYnCANBMVq1BLl5XPB09JeGMViyLaMURHo4oDhQAJ9fvOEMKbbD30ONCEcCe8QwXtpF/+6jRprGeMuCmf37jvZ9YiqqeADNiM7Had/KxH+ZK3fTEiHhmEcdnWGwPNP80NCd/bowscxrSBFVBNkwwmZysPf+bcuHDS/XA2Fo5eC0H1EtcogDukkAgUKcaVyCBIF38fDUxS11W00g4V1vESTrIKdPrhS+csvh6Up6himkXmQ8P+s1BFcs7U3iyJe5joQCKnctxjSoyve8ZxDZqkkhNvDUnXuuaaDgn4OemO97e9kFBseB+ZEv6doDf+Ufbjf+j7HaGqcJnDcTKIGdNGGCQFypASLyapcFiAngH8EQu6+auw3NNkCAwEAAaMyMDAwHQYDVR0OBBYEFCCdc41yCILIrqaOw0KYSWILWMalMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQENBQADggIBAGhdLGVHp4sOTlUQGUGRkFTlnQ7zoR/p+gzsNS6UtbERshMXJbcu4s/4/l+3gGgkKL7UV/lygnaL5yknWVYlsPMU//PWGZbJwLWaxvWWCpzFM8N8Tpe4+asglMSdOc9N+Jt8EeNtWo0JS4GJLjeeUwR9wSj/a0hK9dhzTc7sCtHY2C6LNrL2wdmThE0Tzj6tIKzjbE80n0USzgTDJOO54ckFQNah4P7DXOeSM8y30F9O5Gii93M6JdtbREDufiphv2hRO6+YGLGRTo9NBsFuFHJs5kPNR40XNtDW1VYsoKCnLAgwP8C8pGof2dyPjXSgiEnUJHDnJvHUqzYbZIvRSdCWbMjg3LVqVrjmNcCyWb6c/6F/GmZ0NNFsDK/rjXhQ7t+ssPkxkM63RRK2LadsMi2j8w3knXsxFQjc8YTOYThgfbExIxQvX96ld3wpupuej6cvrLc9UmhZCbu/x6hipnHLf6Pl19/T8rlcQISb5BvbB6NewJTjnP2643c8DybHaa87W1e2DVTxS8f0EKaJ4CXYNXpRZwtLeWCJe/q8z2XqQftFJMy1QkPXaOtvlAIaT30RWmFHFM9kUmT41fvgnfAPDp0nn1VnbWtusIksHi/KX3eXlLPdFJ0J0FTtoD/Kw6iwLgFPjH5bzhte9Hx/e+VCvcuVKgL77L3R+F178gdD"}
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeReversingLabs: Detection: 78%
                    Source: RuntimeBroker.exeReversingLabs: Detection: 78%
                    Source: Yara matchFile source: RuntimeBroker.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.RuntimeBroker.exe.1e0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.1253737439.00000000001E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: RuntimeBroker.exe PID: 360, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RuntimeBroker.exe PID: 6384, type: MEMORYSTR
                    Source: Yara matchFile source: C:\Windows\System32\a7\RuntimeBroker.exe, type: DROPPED
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeJoe Sandbox ML: detected
                    Source: RuntimeBroker.exeJoe Sandbox ML: detected
                    Source: RuntimeBroker.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: RuntimeBroker.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Networking

                    barindex
                    Source: Malware configuration extractorURLs: qrpn9be.localto.net
                    Source: Yara matchFile source: RuntimeBroker.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.RuntimeBroker.exe.1e0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: C:\Windows\System32\a7\RuntimeBroker.exe, type: DROPPED
                    Source: global trafficTCP traffic: 192.168.2.7:49699 -> 116.203.56.216:2810
                    Source: Joe Sandbox ViewASN Name: HETZNER-ASDE HETZNER-ASDE
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficDNS traffic detected: DNS query: qrpn9be.localto.net
                    Source: RuntimeBroker.exe, 00000000.00000002.1281888976.00000000028C1000.00000004.00000800.00020000.00000000.sdmp, RuntimeBroker.exe, 00000008.00000002.2502388807.0000000002ED9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: RuntimeBroker.exe, RuntimeBroker.exe.0.drString found in binary or memory: https://api.ipify.org/
                    Source: RuntimeBroker.exe, RuntimeBroker.exe.0.drString found in binary or memory: https://ipwho.is/
                    Source: RuntimeBroker.exe, RuntimeBroker.exe.0.drString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                    Source: RuntimeBroker.exe, RuntimeBroker.exe.0.drString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                    Source: RuntimeBroker.exe, RuntimeBroker.exe.0.drString found in binary or memory: https://stackoverflow.com/q/2152978/23354sCannot

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeWindows user hook set: 0 keyboard low level C:\Windows\system32\a7\RuntimeBroker.exeJump to behavior

                    E-Banking Fraud

                    barindex
                    Source: Yara matchFile source: RuntimeBroker.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.RuntimeBroker.exe.1e0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.1253737439.00000000001E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: RuntimeBroker.exe PID: 360, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RuntimeBroker.exe PID: 6384, type: MEMORYSTR
                    Source: Yara matchFile source: C:\Windows\System32\a7\RuntimeBroker.exe, type: DROPPED

                    System Summary

                    barindex
                    Source: RuntimeBroker.exe, type: SAMPLEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                    Source: RuntimeBroker.exe, type: SAMPLEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                    Source: RuntimeBroker.exe, type: SAMPLEMatched rule: Detects Quasar infostealer Author: ditekshen
                    Source: 0.0.RuntimeBroker.exe.1e0000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                    Source: 0.0.RuntimeBroker.exe.1e0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                    Source: 0.0.RuntimeBroker.exe.1e0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                    Source: C:\Windows\System32\a7\RuntimeBroker.exe, type: DROPPEDMatched rule: Detects QuasarRAT malware Author: Florian Roth
                    Source: C:\Windows\System32\a7\RuntimeBroker.exe, type: DROPPEDMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                    Source: C:\Windows\System32\a7\RuntimeBroker.exe, type: DROPPEDMatched rule: Detects Quasar infostealer Author: ditekshen
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeFile created: C:\Windows\system32\a7Jump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeFile created: C:\Windows\system32\a7\RuntimeBroker.exeJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeCode function: 8_2_00007FFAAC393C6F8_2_00007FFAAC393C6F
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeCode function: 8_2_00007FFAAC6054E58_2_00007FFAAC6054E5
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeCode function: 8_2_00007FFAAC6092718_2_00007FFAAC609271
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeCode function: 8_2_00007FFAAC60AFDD8_2_00007FFAAC60AFDD
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeCode function: 8_2_00007FFAAC609BD18_2_00007FFAAC609BD1
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeCode function: 8_2_00007FFAAC60621F8_2_00007FFAAC60621F
                    Source: RuntimeBroker.exe, 00000000.00000000.1254084634.0000000000500000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename" vs RuntimeBroker.exe
                    Source: RuntimeBroker.exe, 00000008.00000002.2500829834.0000000000E00000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs RuntimeBroker.exe
                    Source: RuntimeBroker.exeBinary or memory string: OriginalFilename" vs RuntimeBroker.exe
                    Source: RuntimeBroker.exe.0.drBinary or memory string: OriginalFilename" vs RuntimeBroker.exe
                    Source: RuntimeBroker.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: RuntimeBroker.exe, type: SAMPLEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                    Source: RuntimeBroker.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                    Source: RuntimeBroker.exe, type: SAMPLEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                    Source: 0.0.RuntimeBroker.exe.1e0000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                    Source: 0.0.RuntimeBroker.exe.1e0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                    Source: 0.0.RuntimeBroker.exe.1e0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                    Source: C:\Windows\System32\a7\RuntimeBroker.exe, type: DROPPEDMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                    Source: C:\Windows\System32\a7\RuntimeBroker.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                    Source: C:\Windows\System32\a7\RuntimeBroker.exe, type: DROPPEDMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@10/2@1/1
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\RuntimeBroker.exe.logJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeMutant created: NULL
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeMutant created: \Sessions\1\BaseNamedObjects\Local\fc5edab1-6e8f-4963-98aa-bd077e08750f
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6932:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7216:120:WilError_03
                    Source: RuntimeBroker.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: RuntimeBroker.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: RuntimeBroker.exeReversingLabs: Detection: 78%
                    Source: RuntimeBroker.exeString found in binary or memory: HasSubValue3Conflicting item/add type
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeFile read: C:\Users\user\Desktop\RuntimeBroker.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\RuntimeBroker.exe "C:\Users\user\Desktop\RuntimeBroker.exe"
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\a7\RuntimeBroker.exe" /rl HIGHEST /f
                    Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess created: C:\Windows\System32\a7\RuntimeBroker.exe "C:\Windows\system32\a7\RuntimeBroker.exe"
                    Source: unknownProcess created: C:\Windows\System32\a7\RuntimeBroker.exe C:\Windows\system32\a7\RuntimeBroker.exe
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\a7\RuntimeBroker.exe" /rl HIGHEST /f
                    Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\a7\RuntimeBroker.exe" /rl HIGHEST /fJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess created: C:\Windows\System32\a7\RuntimeBroker.exe "C:\Windows\system32\a7\RuntimeBroker.exe"Jump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\a7\RuntimeBroker.exe" /rl HIGHEST /fJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                    Source: RuntimeBroker.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: RuntimeBroker.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                    Source: RuntimeBroker.exeStatic file information: File size 3265536 > 1048576
                    Source: RuntimeBroker.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x31c400
                    Source: RuntimeBroker.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeCode function: 8_2_00007FFAAC60336E push eax; ret 8_2_00007FFAAC60340C

                    Persistence and Installation Behavior

                    barindex
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeExecutable created and started: C:\Windows\system32\a7\RuntimeBroker.exeJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeFile created: C:\Windows\System32\a7\RuntimeBroker.exeJump to dropped file
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeFile created: C:\Windows\System32\a7\RuntimeBroker.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\a7\RuntimeBroker.exe" /rl HIGHEST /f

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeFile opened: C:\Users\user\Desktop\RuntimeBroker.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeFile opened: C:\Windows\system32\a7\RuntimeBroker.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeFile opened: C:\Windows\system32\a7\RuntimeBroker.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeMemory allocated: 28C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeMemory allocated: 1A8C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeMemory allocated: 1390000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeMemory allocated: 1AEA0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeMemory allocated: 29B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeMemory allocated: 1A9B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeCode function: 8_2_00007FFAAC39F1F2 str ax8_2_00007FFAAC39F1F2
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeWindow / User API: threadDelayed 2150Jump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeWindow / User API: threadDelayed 7693Jump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exe TID: 6672Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exe TID: 7320Thread sleep count: 32 > 30Jump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exe TID: 7320Thread sleep time: -29514790517935264s >= -30000sJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exe TID: 7336Thread sleep count: 2150 > 30Jump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exe TID: 7336Thread sleep count: 7693 > 30Jump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exe TID: 1008Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: RuntimeBroker.exe, 00000008.00000002.2508354895.000000001BA0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeMemory allocated: page read and write | page guardJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\a7\RuntimeBroker.exe" /rl HIGHEST /fJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess created: C:\Windows\System32\a7\RuntimeBroker.exe "C:\Windows\system32\a7\RuntimeBroker.exe"Jump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\a7\RuntimeBroker.exe" /rl HIGHEST /fJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeQueries volume information: C:\Users\user\Desktop\RuntimeBroker.exe VolumeInformationJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeQueries volume information: C:\Windows\System32\a7\RuntimeBroker.exe VolumeInformationJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\a7\RuntimeBroker.exeQueries volume information: C:\Windows\System32\a7\RuntimeBroker.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\RuntimeBroker.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: RuntimeBroker.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.RuntimeBroker.exe.1e0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.1253737439.00000000001E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: RuntimeBroker.exe PID: 360, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RuntimeBroker.exe PID: 6384, type: MEMORYSTR
                    Source: Yara matchFile source: C:\Windows\System32\a7\RuntimeBroker.exe, type: DROPPED

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: RuntimeBroker.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.RuntimeBroker.exe.1e0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.1253737439.00000000001E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: RuntimeBroker.exe PID: 360, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RuntimeBroker.exe PID: 6384, type: MEMORYSTR
                    Source: Yara matchFile source: C:\Windows\System32\a7\RuntimeBroker.exe, type: DROPPED
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                    Command and Scripting Interpreter
                    1
                    Scheduled Task/Job
                    11
                    Process Injection
                    121
                    Masquerading
                    11
                    Input Capture
                    11
                    Security Software Discovery
                    Remote Services11
                    Input Capture
                    1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Scheduled Task/Job
                    1
                    DLL Side-Loading
                    1
                    Scheduled Task/Job
                    1
                    Disable or Modify Tools
                    LSASS Memory41
                    Virtualization/Sandbox Evasion
                    Remote Desktop Protocol1
                    Archive Collected Data
                    1
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    DLL Side-Loading
                    41
                    Virtualization/Sandbox Evasion
                    Security Account Manager1
                    Application Window Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                    Process Injection
                    NTDS12
                    System Information Discovery
                    Distributed Component Object ModelInput Capture11
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Hidden Files and Directories
                    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Obfuscated Files or Information
                    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    DLL Side-Loading
                    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1574481 Sample: RuntimeBroker.exe Startdate: 13/12/2024 Architecture: WINDOWS Score: 100 31 qrpn9be.localto.net 2->31 43 Found malware configuration 2->43 45 Malicious sample detected (through community Yara rule) 2->45 47 Antivirus detection for URL or domain 2->47 49 11 other signatures 2->49 9 RuntimeBroker.exe 5 2->9         started        13 RuntimeBroker.exe 2 2->13         started        signatures3 process4 file5 27 C:\Windows\System32\a7\RuntimeBroker.exe, PE32 9->27 dropped 29 C:\Users\user\...\RuntimeBroker.exe.log, CSV 9->29 dropped 51 Drops executables to the windows directory (C:\Windows) and starts them 9->51 53 Uses schtasks.exe or at.exe to add and modify task schedules 9->53 55 Hides that the sample has been downloaded from the Internet (zone.identifier) 9->55 15 RuntimeBroker.exe 2 9->15         started        19 schtasks.exe 1 9->19         started        signatures6 process7 dnsIp8 33 qrpn9be.localto.net 116.203.56.216, 2810, 49699, 49706 HETZNER-ASDE Germany 15->33 35 Antivirus detection for dropped file 15->35 37 Multi AV Scanner detection for dropped file 15->37 39 Machine Learning detection for dropped file 15->39 41 2 other signatures 15->41 21 schtasks.exe 1 15->21         started        23 conhost.exe 19->23         started        signatures9 process10 process11 25 conhost.exe 21->25         started       

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    RuntimeBroker.exe79%ReversingLabsByteCode-MSIL.Backdoor.Quasar
                    RuntimeBroker.exe100%AviraHEUR/AGEN.1307453
                    RuntimeBroker.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Windows\System32\a7\RuntimeBroker.exe100%AviraHEUR/AGEN.1307453
                    C:\Windows\System32\a7\RuntimeBroker.exe100%Joe Sandbox ML
                    C:\Windows\System32\a7\RuntimeBroker.exe79%ReversingLabsByteCode-MSIL.Backdoor.Quasar
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    qrpn9be.localto.net100%Avira URL Cloudmalware
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    qrpn9be.localto.net
                    116.203.56.216
                    truetrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      qrpn9be.localto.nettrue
                      • Avira URL Cloud: malware
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://api.ipify.org/RuntimeBroker.exe, RuntimeBroker.exe.0.drfalse
                        high
                        https://stackoverflow.com/q/14436606/23354RuntimeBroker.exe, RuntimeBroker.exe.0.drfalse
                          high
                          https://stackoverflow.com/q/2152978/23354sCannotRuntimeBroker.exe, RuntimeBroker.exe.0.drfalse
                            high
                            https://ipwho.is/RuntimeBroker.exe, RuntimeBroker.exe.0.drfalse
                              high
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRuntimeBroker.exe, 00000000.00000002.1281888976.00000000028C1000.00000004.00000800.00020000.00000000.sdmp, RuntimeBroker.exe, 00000008.00000002.2502388807.0000000002ED9000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://stackoverflow.com/q/11564914/23354;RuntimeBroker.exe, RuntimeBroker.exe.0.drfalse
                                  high
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  116.203.56.216
                                  qrpn9be.localto.netGermany
                                  24940HETZNER-ASDEtrue
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1574481
                                  Start date and time:2024-12-13 11:11:32 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 5m 38s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:18
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:RuntimeBroker.exe
                                  Detection:MAL
                                  Classification:mal100.troj.spyw.evad.winEXE@10/2@1/1
                                  EGA Information:
                                  • Successful, ratio: 66.7%
                                  HCA Information:
                                  • Successful, ratio: 100%
                                  • Number of executed functions: 27
                                  • Number of non-executed functions: 2
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                  • Excluded IPs from analysis (whitelisted): 13.107.246.63, 4.245.163.56
                                  • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                  • Execution Graph export aborted for target RuntimeBroker.exe, PID 3180 because it is empty
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                  • VT rate limit hit for: RuntimeBroker.exe
                                  TimeTypeDescription
                                  05:12:32API Interceptor2704592x Sleep call for process: RuntimeBroker.exe modified
                                  11:12:29Task SchedulerRun new task: RuntimeBroker path: C:\Windows\system32\a7\RuntimeBroker.exe
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  116.203.56.216Fattura (3).jarGet hashmaliciousUnknownBrowse
                                    Fattura (4).jarGet hashmaliciousUnknownBrowse
                                      Fattura (3).jarGet hashmaliciousUnknownBrowse
                                        Fattura (4).jarGet hashmaliciousUnknownBrowse
                                          No context
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          HETZNER-ASDEfmfZgt6Wzl.exeGet hashmaliciousUnknownBrowse
                                          • 188.40.187.174
                                          fmfZgt6Wzl.exeGet hashmaliciousUnknownBrowse
                                          • 188.40.187.174
                                          file.exeGet hashmaliciousAmadey, LummaC Stealer, Stealc, Vidar, XmrigBrowse
                                          • 116.203.10.31
                                          file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, Stealc, Vidar, XmrigBrowse
                                          • 116.203.10.31
                                          jade.arm.elfGet hashmaliciousMiraiBrowse
                                          • 95.217.252.214
                                          file.exeGet hashmaliciousAmadey, LummaC Stealer, Stealc, Vidar, XmrigBrowse
                                          • 116.203.10.31
                                          http://www.pej935.pro/Ume-ZD~Hl_1c0e5b67/C/Get hashmaliciousUnknownBrowse
                                          • 78.46.22.9
                                          file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                          • 116.203.10.31
                                          file.exeGet hashmaliciousUnknownBrowse
                                          • 188.40.187.174
                                          file.exeGet hashmaliciousVidarBrowse
                                          • 116.203.10.31
                                          No context
                                          No context
                                          Process:C:\Users\user\Desktop\RuntimeBroker.exe
                                          File Type:CSV text
                                          Category:dropped
                                          Size (bytes):1281
                                          Entropy (8bit):5.370111951859942
                                          Encrypted:false
                                          SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
                                          MD5:12C61586CD59AA6F2A21DF30501F71BD
                                          SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
                                          SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
                                          SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
                                          Malicious:true
                                          Reputation:high, very likely benign file
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                          Process:C:\Users\user\Desktop\RuntimeBroker.exe
                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Category:dropped
                                          Size (bytes):3265536
                                          Entropy (8bit):6.083531762679813
                                          Encrypted:false
                                          SSDEEP:49152:uvHI22SsaNYfdPBldt698dBcjH/N/9oGduTHHB72eh2NT:uvo22SsaNYfdPBldt6+dBcjH/Nl
                                          MD5:57145C33045CE67E1C1FE7C763438AB1
                                          SHA1:2A83ECEF8BBE640577A2CC3F6602BBD8E7D6C847
                                          SHA-256:9764BC832BFA8A9F3D7AF1EA6747E7376774BD903E9CC545D9998F2657E97FA3
                                          SHA-512:7CE3D6DBD3C3B05FF6FE1AC57888123CF5E01E890C5B5E7204859B361841D15FDB8A460626355236B9C3DF58824CB1979C187F34FA6D7D282517023F3A26A112
                                          Malicious:true
                                          Yara Hits:
                                          • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: C:\Windows\System32\a7\RuntimeBroker.exe, Author: Joe Security
                                          • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Windows\System32\a7\RuntimeBroker.exe, Author: Joe Security
                                          • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: C:\Windows\System32\a7\RuntimeBroker.exe, Author: Florian Roth
                                          • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: C:\Windows\System32\a7\RuntimeBroker.exe, Author: ditekSHen
                                          • Rule: MALWARE_Win_QuasarStealer, Description: Detects Quasar infostealer, Source: C:\Windows\System32\a7\RuntimeBroker.exe, Author: ditekshen
                                          Antivirus:
                                          • Antivirus: Avira, Detection: 100%
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: ReversingLabs, Detection: 79%
                                          Reputation:low
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d..................1...........1.. ........@.. .......................@2...........@...................................1.K.....2.<.................... 2...................................................... ............... ..H............text.....1.. ....1................. ..`.rsrc...<.....2.......1.............@..@.reloc....... 2.......1.............@..B..................1.....H........................k..p............................................0..M....... ....(.....(...........s....(....(...........s....o....(.....(....s....(....*....0..8.......(....(0....s....%.o....%.o....%.o....(....&..&...(.....*........--..........00.......0..@........o....,7(....(0....s....%.o....%.o....%.o....(....&..&...(.....*........-5..........08......f~w...,.~....(....(....*.*v.(.....s....}.....s....}....*r..(......(.....(......(....*....0..L........{....r...po....
                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Entropy (8bit):6.083531762679813
                                          TrID:
                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                          • Win32 Executable (generic) a (10002005/4) 49.75%
                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                          • Windows Screen Saver (13104/52) 0.07%
                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                          File name:RuntimeBroker.exe
                                          File size:3'265'536 bytes
                                          MD5:57145c33045ce67e1c1fe7c763438ab1
                                          SHA1:2a83ecef8bbe640577a2cc3f6602bbd8e7d6c847
                                          SHA256:9764bc832bfa8a9f3d7af1ea6747e7376774bd903e9cc545d9998f2657e97fa3
                                          SHA512:7ce3d6dbd3c3b05ff6fe1ac57888123cf5e01e890c5b5e7204859b361841d15fdb8a460626355236b9c3df58824cb1979c187f34fa6d7d282517023f3a26a112
                                          SSDEEP:49152:uvHI22SsaNYfdPBldt698dBcjH/N/9oGduTHHB72eh2NT:uvo22SsaNYfdPBldt6+dBcjH/Nl
                                          TLSH:30E56A0437F85E76E16BE6B7D5B1501263F0F82AF363EB1B2581A77A1C53B4088426B7
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d..................1...........1.. ........@.. .......................@2...........@................................
                                          Icon Hash:00928e8e8686b000
                                          Entrypoint:0x71e3ee
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x640DFAE7 [Sun Mar 12 16:16:39 2023 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                          Instruction
                                          jmp dword ptr [00402000h]
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x31e3a00x4b.text
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x3200000xa3c.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x3220000xc.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x20000x31c3f40x31c40049668a9fef0a063df3f977c654b3718aunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rsrc0x3200000xa3c0xc00a5935f834a4ded3b46b17b880023c905False0.3505859375data5.260153502397429IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0x3220000xc0x200221440a5d95d2d9aec29428c5700ca78False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_VERSION0x3200a00x2c4data0.4279661016949153
                                          RT_MANIFEST0x3203640x6d7XML 1.0 document, Unicode text, UTF-8 (with BOM) text0.40319817247287265
                                          DLLImport
                                          mscoree.dll_CorExeMain
                                          TimestampSource PortDest PortSource IPDest IP
                                          Dec 13, 2024 11:12:33.166569948 CET496992810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:12:33.286462069 CET281049699116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:12:33.286556959 CET496992810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:12:33.296344995 CET496992810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:12:33.417001009 CET281049699116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:12:35.486979961 CET281049699116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:12:35.487083912 CET496992810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:12:35.504044056 CET496992810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:12:35.624028921 CET281049699116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:12:39.153172970 CET497062810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:12:39.273540020 CET281049706116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:12:39.273786068 CET497062810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:12:39.274085045 CET497062810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:12:39.394032955 CET281049706116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:12:41.488672018 CET281049706116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:12:41.488859892 CET497062810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:12:41.489423990 CET497062810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:12:41.609385967 CET281049706116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:12:45.043689013 CET497242810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:12:45.163528919 CET281049724116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:12:45.163629055 CET497242810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:12:45.164153099 CET497242810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:12:45.287398100 CET281049724116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:12:47.362433910 CET281049724116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:12:47.362519979 CET497242810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:12:47.363009930 CET497242810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:12:47.482867002 CET281049724116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:12:50.826415062 CET497372810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:12:50.947366953 CET281049737116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:12:50.947601080 CET497372810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:12:50.948081970 CET497372810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:12:51.118807077 CET281049737116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:12:53.158554077 CET281049737116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:12:53.158864021 CET497372810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:12:53.166846037 CET497372810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:12:53.286705971 CET281049737116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:12:56.793802023 CET497532810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:12:56.914056063 CET281049753116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:12:56.914513111 CET497532810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:12:56.914743900 CET497532810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:12:57.034558058 CET281049753116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:12:59.110908985 CET281049753116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:12:59.112067938 CET497532810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:12:59.112588882 CET497532810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:12:59.232309103 CET281049753116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:02.856192112 CET497692810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:02.976063013 CET281049769116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:02.976239920 CET497692810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:02.976640940 CET497692810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:03.096579075 CET281049769116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:05.176023960 CET281049769116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:05.176129103 CET497692810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:05.176501989 CET497692810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:05.296329975 CET281049769116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:08.918971062 CET497772810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:09.038880110 CET281049777116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:09.039331913 CET497772810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:09.039638042 CET497772810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:09.159384012 CET281049777116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:11.236416101 CET281049777116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:11.236680031 CET497772810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:11.237070084 CET497772810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:11.356899977 CET281049777116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:14.528367043 CET497922810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:14.649251938 CET281049792116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:14.649471998 CET497922810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:14.649857044 CET497922810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:14.769704103 CET281049792116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:16.895025015 CET281049792116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:16.895548105 CET497922810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:16.896915913 CET497922810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:17.017967939 CET281049792116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:20.497463942 CET498072810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:20.617446899 CET281049807116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:20.617665052 CET498072810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:20.618078947 CET498072810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:20.737998962 CET281049807116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:22.815105915 CET281049807116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:22.815323114 CET498072810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:22.815656900 CET498072810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:22.935384035 CET281049807116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:26.169122934 CET498202810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:26.289225101 CET281049820116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:26.289346933 CET498202810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:26.296330929 CET498202810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:26.416162968 CET281049820116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:28.503297091 CET281049820116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:28.503523111 CET498202810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:28.503874063 CET498202810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:28.623548985 CET281049820116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:32.001368046 CET498362810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:32.121031046 CET281049836116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:32.121148109 CET498362810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:32.121639967 CET498362810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:32.241302013 CET281049836116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:34.313863039 CET281049836116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:34.313955069 CET498362810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:34.314469099 CET498362810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:34.434331894 CET281049836116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:37.411252975 CET498472810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:37.531425953 CET281049847116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:37.531924009 CET498472810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:37.531924963 CET498472810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:37.651866913 CET281049847116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:39.737721920 CET281049847116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:39.737831116 CET498472810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:39.738260984 CET498472810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:39.858295918 CET281049847116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:42.856878042 CET498632810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:42.976830959 CET281049863116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:42.977010012 CET498632810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:42.977406979 CET498632810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:43.097254038 CET281049863116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:45.173264027 CET281049863116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:45.173588037 CET498632810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:45.174223900 CET498632810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:45.294125080 CET281049863116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:47.918979883 CET498742810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:48.038887978 CET281049874116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:48.039062977 CET498742810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:48.039428949 CET498742810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:48.159157038 CET281049874116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:50.286060095 CET281049874116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:50.288091898 CET498742810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:50.288415909 CET498742810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:50.408571959 CET281049874116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:52.700146914 CET498852810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:52.820055962 CET281049885116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:52.822437048 CET498852810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:52.857377052 CET498852810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:52.977619886 CET281049885116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:55.104176998 CET281049885116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:55.104300022 CET498852810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:55.104667902 CET498852810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:55.224381924 CET281049885116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:56.981471062 CET498962810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:57.101255894 CET281049896116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:57.102195024 CET498962810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:57.102519035 CET498962810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:57.222381115 CET281049896116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:59.299657106 CET281049896116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:13:59.299781084 CET498962810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:59.300173998 CET498962810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:13:59.419928074 CET281049896116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:01.185152054 CET499072810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:01.327330112 CET281049907116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:01.327552080 CET499072810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:01.328075886 CET499072810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:01.554662943 CET281049907116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:03.535824060 CET281049907116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:03.536034107 CET499072810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:03.536628962 CET499072810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:03.656352043 CET281049907116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:04.965936899 CET499182810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:05.086970091 CET281049918116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:05.087249041 CET499182810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:05.087529898 CET499182810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:05.207281113 CET281049918116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:07.302803993 CET281049918116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:07.304059982 CET499182810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:07.307334900 CET499182810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:07.427265882 CET281049918116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:08.763326883 CET499272810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:08.883914948 CET281049927116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:08.884085894 CET499272810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:08.921669960 CET499272810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:09.048115969 CET281049927116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:11.083297014 CET281049927116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:11.083511114 CET499272810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:11.083945036 CET499272810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:11.203800917 CET281049927116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:12.278461933 CET499352810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:12.398595095 CET281049935116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:12.398672104 CET499352810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:12.399172068 CET499352810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:12.519607067 CET281049935116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:14.607271910 CET281049935116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:14.607335091 CET499352810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:14.607871056 CET499352810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:14.727550030 CET281049935116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:15.747406960 CET499452810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:15.867872953 CET281049945116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:15.868007898 CET499452810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:15.871409893 CET499452810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:15.991298914 CET281049945116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:18.081826925 CET281049945116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:18.081954956 CET499452810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:18.084103107 CET499452810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:18.203855991 CET281049945116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:18.966212988 CET499522810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:19.085892916 CET281049952116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:19.085999012 CET499522810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:19.087354898 CET499522810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:19.207075119 CET281049952116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:21.284100056 CET281049952116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:21.284219980 CET499522810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:21.285500050 CET499522810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:21.405201912 CET281049952116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:22.123275042 CET499612810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:22.243554115 CET281049961116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:22.244273901 CET499612810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:22.247112989 CET499612810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:22.368947029 CET281049961116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:24.439346075 CET281049961116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:24.439419031 CET499612810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:24.439927101 CET499612810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:24.559712887 CET281049961116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:25.185298920 CET499692810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:25.673399925 CET281049969116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:25.673609018 CET499692810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:25.674145937 CET499692810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:25.802895069 CET281049969116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:27.879395008 CET281049969116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:27.879502058 CET499692810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:27.879934072 CET499692810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:28.000076056 CET281049969116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:28.560199976 CET499762810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:28.681864023 CET281049976116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:28.681952000 CET499762810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:28.682492971 CET499762810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:28.802521944 CET281049976116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:30.879374027 CET281049976116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:30.879446030 CET499762810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:30.879735947 CET499762810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:31.000765085 CET281049976116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:31.451172113 CET499852810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:31.571362019 CET281049985116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:31.571969032 CET499852810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:31.572339058 CET499852810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:31.692013979 CET281049985116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:33.776009083 CET281049985116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:33.776194096 CET499852810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:33.776546001 CET499852810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:33.896600962 CET281049985116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:37.434509993 CET499952810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:37.554363012 CET281049995116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:37.554522991 CET499952810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:37.554862976 CET499952810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:37.674629927 CET281049995116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:39.819024086 CET281049995116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:39.819520950 CET499952810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:39.819674015 CET499952810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:39.939565897 CET281049995116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:43.309624910 CET499962810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:43.429689884 CET281049996116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:43.429903030 CET499962810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:43.430210114 CET499962810192.168.2.7116.203.56.216
                                          Dec 13, 2024 11:14:43.549988985 CET281049996116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:45.638052940 CET281049996116.203.56.216192.168.2.7
                                          Dec 13, 2024 11:14:45.638761997 CET499962810192.168.2.7116.203.56.216
                                          TimestampSource PortDest PortSource IPDest IP
                                          Dec 13, 2024 11:12:32.594563961 CET6148453192.168.2.71.1.1.1
                                          Dec 13, 2024 11:12:33.154680967 CET53614841.1.1.1192.168.2.7
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Dec 13, 2024 11:12:32.594563961 CET192.168.2.71.1.1.10xdaedStandard query (0)qrpn9be.localto.netA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Dec 13, 2024 11:12:33.154680967 CET1.1.1.1192.168.2.70xdaedNo error (0)qrpn9be.localto.net116.203.56.216A (IP address)IN (0x0001)false

                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:05:12:26
                                          Start date:13/12/2024
                                          Path:C:\Users\user\Desktop\RuntimeBroker.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Users\user\Desktop\RuntimeBroker.exe"
                                          Imagebase:0x1e0000
                                          File size:3'265'536 bytes
                                          MD5 hash:57145C33045CE67E1C1FE7C763438AB1
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000000.1253737439.00000000001E2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:true

                                          Target ID:6
                                          Start time:05:12:28
                                          Start date:13/12/2024
                                          Path:C:\Windows\System32\schtasks.exe
                                          Wow64 process (32bit):false
                                          Commandline:"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\a7\RuntimeBroker.exe" /rl HIGHEST /f
                                          Imagebase:0x7ff7c5760000
                                          File size:235'008 bytes
                                          MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:7
                                          Start time:05:12:28
                                          Start date:13/12/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff75da10000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:8
                                          Start time:05:12:28
                                          Start date:13/12/2024
                                          Path:C:\Windows\System32\a7\RuntimeBroker.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Windows\system32\a7\RuntimeBroker.exe"
                                          Imagebase:0x750000
                                          File size:3'265'536 bytes
                                          MD5 hash:57145C33045CE67E1C1FE7C763438AB1
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: C:\Windows\System32\a7\RuntimeBroker.exe, Author: Joe Security
                                          • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Windows\System32\a7\RuntimeBroker.exe, Author: Joe Security
                                          • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: C:\Windows\System32\a7\RuntimeBroker.exe, Author: Florian Roth
                                          • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: C:\Windows\System32\a7\RuntimeBroker.exe, Author: ditekSHen
                                          • Rule: MALWARE_Win_QuasarStealer, Description: Detects Quasar infostealer, Source: C:\Windows\System32\a7\RuntimeBroker.exe, Author: ditekshen
                                          Antivirus matches:
                                          • Detection: 100%, Avira
                                          • Detection: 100%, Joe Sandbox ML
                                          • Detection: 79%, ReversingLabs
                                          Reputation:low
                                          Has exited:false

                                          Target ID:10
                                          Start time:05:12:29
                                          Start date:13/12/2024
                                          Path:C:\Windows\System32\a7\RuntimeBroker.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\a7\RuntimeBroker.exe
                                          Imagebase:0x2d0000
                                          File size:3'265'536 bytes
                                          MD5 hash:57145C33045CE67E1C1FE7C763438AB1
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:low
                                          Has exited:true

                                          Target ID:11
                                          Start time:05:12:30
                                          Start date:13/12/2024
                                          Path:C:\Windows\System32\schtasks.exe
                                          Wow64 process (32bit):false
                                          Commandline:"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\a7\RuntimeBroker.exe" /rl HIGHEST /f
                                          Imagebase:0x7ff7c5760000
                                          File size:235'008 bytes
                                          MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:12
                                          Start time:05:12:30
                                          Start date:13/12/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff75da10000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:15.5%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:13
                                            Total number of Limit Nodes:0
                                            execution_graph 1783 7ffaac393525 1784 7ffaac393531 DeleteFileW 1783->1784 1786 7ffaac393616 1784->1786 1770 7ffaac393569 1771 7ffaac393571 DeleteFileW 1770->1771 1773 7ffaac393616 1771->1773 1774 7ffaac393811 1775 7ffaac39382f 1774->1775 1776 7ffaac3938c4 1775->1776 1779 7ffaac393540 1776->1779 1778 7ffaac3938d1 1780 7ffaac393551 DeleteFileW 1779->1780 1782 7ffaac393616 1780->1782 1782->1778

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1287721255.00007FFAAC390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC390000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ffaac390000_RuntimeBroker.jbxd
                                            Similarity
                                            • API ID: DeleteFile
                                            • String ID:
                                            • API String ID: 4033686569-0
                                            • Opcode ID: e2eb59a61d31b868d913f0eca833f5298ac4f7cb444061390555bd81fb0d6b6d
                                            • Instruction ID: ecc2a9a731e6492122c30882407d18fa1da10c15de07c08310b5c0a5c2e52ef4
                                            • Opcode Fuzzy Hash: e2eb59a61d31b868d913f0eca833f5298ac4f7cb444061390555bd81fb0d6b6d
                                            • Instruction Fuzzy Hash: 2E41F87180DB489FDB59DB6C8855AF9BFF0EF56310F0482AFD049C72A2DA29A805C791

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 66 7ffaac393569-7ffaac3935d8 71 7ffaac3935e2-7ffaac393614 DeleteFileW 66->71 72 7ffaac3935da-7ffaac3935df 66->72 73 7ffaac393616 71->73 74 7ffaac39361c-7ffaac39364a 71->74 72->71 73->74
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1287721255.00007FFAAC390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC390000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ffaac390000_RuntimeBroker.jbxd
                                            Similarity
                                            • API ID: DeleteFile
                                            • String ID:
                                            • API String ID: 4033686569-0
                                            • Opcode ID: 3d840e9e601d49306b6e0382e4e2ab1a092ffd2194f211aa16e68badaeab122d
                                            • Instruction ID: 15a660c009ab78b7a5a6778851eeedbbc71cd98e4d5097041bd19066cadadc0d
                                            • Opcode Fuzzy Hash: 3d840e9e601d49306b6e0382e4e2ab1a092ffd2194f211aa16e68badaeab122d
                                            • Instruction Fuzzy Hash: BC31C37190CB5C8FDB59DB588845AF9BBF0FF66320F04826BD049D3262DB75A805CB91

                                            Execution Graph

                                            Execution Coverage:10.8%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:8
                                            Total number of Limit Nodes:1
                                            execution_graph 12773 7ffaac393569 12774 7ffaac393571 DeleteFileW 12773->12774 12776 7ffaac393616 12774->12776 12768 7ffaac60e709 12770 7ffaac60e71f 12768->12770 12769 7ffaac60e7cb 12770->12769 12771 7ffaac60e8c4 SetWindowsHookExW 12770->12771 12772 7ffaac60e906 12771->12772

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 127 7ffaac609bd1-7ffaac609c19 129 7ffaac609c2a-7ffaac609c3c 127->129 130 7ffaac609c1b-7ffaac609c29 127->130 132 7ffaac609cbf-7ffaac609cc3 129->132 133 7ffaac609c42-7ffaac609c52 129->133 134 7ffaac609cdb-7ffaac609cdf 132->134 135 7ffaac609cc5-7ffaac609cc9 132->135 140 7ffaac609f3b-7ffaac609f8a 133->140 141 7ffaac609c58-7ffaac609ca7 133->141 137 7ffaac609d0e-7ffaac609d12 134->137 138 7ffaac609ce1-7ffaac609d08 134->138 139 7ffaac609cd0-7ffaac609cd4 135->139 142 7ffaac609f2c-7ffaac609f3a 137->142 143 7ffaac609d18-7ffaac609d1d 137->143 138->137 148 7ffaac609f91-7ffaac609fa9 138->148 139->134 140->148 176 7ffaac609cb4-7ffaac609cb8 141->176 177 7ffaac609ca9-7ffaac609cb2 141->177 143->142 146 7ffaac609d23-7ffaac609d2d 143->146 151 7ffaac609d7b-7ffaac609d80 146->151 152 7ffaac609d2f-7ffaac609d41 146->152 162 7ffaac609fab-7ffaac609fb1 148->162 163 7ffaac609fb5 148->163 157 7ffaac609d86-7ffaac609d90 151->157 158 7ffaac609f08-7ffaac609f0d 151->158 152->151 164 7ffaac609d43-7ffaac609d6e 152->164 157->158 167 7ffaac609d96-7ffaac609da8 157->167 158->142 161 7ffaac609f0f-7ffaac609f24 158->161 161->142 175 7ffaac609f26-7ffaac609f29 161->175 168 7ffaac609fb3 162->168 169 7ffaac609fb9-7ffaac60a018 162->169 163->169 170 7ffaac609fb7 163->170 164->151 184 7ffaac609d70-7ffaac609d74 164->184 179 7ffaac609e9e-7ffaac609ea9 167->179 180 7ffaac609dae-7ffaac609df3 167->180 168->163 190 7ffaac60a5be-7ffaac60a5d0 169->190 191 7ffaac60a01e-7ffaac60a030 169->191 170->169 175->142 176->132 177->132 186 7ffaac609eab-7ffaac609f01 179->186 187 7ffaac609e30-7ffaac609e57 179->187 180->179 204 7ffaac609df9-7ffaac609e10 180->204 184->151 186->158 187->179 198 7ffaac609e59-7ffaac609e6d 187->198 191->190 199 7ffaac60a036-7ffaac60a06f 191->199 199->190 210 7ffaac60a075-7ffaac60a0b6 199->210 214 7ffaac60a0bc-7ffaac60a0d4 210->214 215 7ffaac60a168-7ffaac60a17b 210->215 220 7ffaac60a0da-7ffaac60a0fa 214->220 221 7ffaac60a15c-7ffaac60a162 214->221 218 7ffaac60a17d-7ffaac60a19e 215->218 219 7ffaac60a1d0 215->219 227 7ffaac60a1a0-7ffaac60a1c7 218->227 228 7ffaac60a1c9-7ffaac60a1ce 218->228 222 7ffaac60a1d2-7ffaac60a1d7 219->222 220->221 232 7ffaac60a0fc-7ffaac60a10e 220->232 221->214 221->215 225 7ffaac60a21e-7ffaac60a241 222->225 226 7ffaac60a1d9-7ffaac60a1e0 222->226 233 7ffaac60a337-7ffaac60a343 225->233 234 7ffaac60a247-7ffaac60a26f 225->234 229 7ffaac60a1e7-7ffaac60a201 226->229 227->222 228->222 229->225 238 7ffaac60a203-7ffaac60a21c 229->238 232->221 241 7ffaac60a110-7ffaac60a114 232->241 233->190 237 7ffaac60a349-7ffaac60a35e 233->237 246 7ffaac60a32b-7ffaac60a331 234->246 247 7ffaac60a275-7ffaac60a290 234->247 237->190 238->225 243 7ffaac60a11a-7ffaac60a12f 241->243 244 7ffaac60a5d1-7ffaac60a673 241->244 252 7ffaac60a136-7ffaac60a138 243->252 256 7ffaac60a785-7ffaac60a791 244->256 257 7ffaac60a679-7ffaac60a67b 244->257 246->233 246->234 247->246 258 7ffaac60a296-7ffaac60a2a8 247->258 252->221 255 7ffaac60a13a-7ffaac60a158 call 7ffaac6053c0 252->255 255->221 267 7ffaac60a793-7ffaac60a7b8 256->267 268 7ffaac60a7b9 256->268 260 7ffaac60a67d-7ffaac60a68f 257->260 261 7ffaac60a695-7ffaac60a6a3 257->261 258->246 272 7ffaac60a2ae-7ffaac60a2b2 258->272 260->261 275 7ffaac60a7bf-7ffaac60a7f1 260->275 265 7ffaac60a7f8-7ffaac60a82b 261->265 266 7ffaac60a6a9-7ffaac60a6c0 261->266 288 7ffaac60a832-7ffaac60a83e 265->288 285 7ffaac60a6da-7ffaac60a6dd 266->285 286 7ffaac60a6c2-7ffaac60a6d4 266->286 267->268 268->275 272->244 276 7ffaac60a2b8-7ffaac60a2fb 272->276 275->265 276->246 304 7ffaac60a2fd-7ffaac60a328 call 7ffaac6053c0 276->304 289 7ffaac60a6df-7ffaac60a6f6 285->289 290 7ffaac60a706-7ffaac60a722 call 7ffaac607a50 285->290 286->285 286->288 296 7ffaac60a840-7ffaac60a864 288->296 297 7ffaac60a866-7ffaac60a871 288->297 289->290 307 7ffaac60a6f8-7ffaac60a6fc 289->307 308 7ffaac60a753-7ffaac60a757 290->308 309 7ffaac60a724-7ffaac60a752 290->309 296->297 305 7ffaac60a87d 297->305 306 7ffaac60a873-7ffaac60a879 297->306 304->246 313 7ffaac60a881-7ffaac60a8bc 305->313 314 7ffaac60a87f 305->314 312 7ffaac60a87b 306->312 306->313 318 7ffaac60a703-7ffaac60a704 307->318 315 7ffaac60a75e-7ffaac60a784 308->315 312->305 321 7ffaac60a8be-7ffaac60a8e5 313->321 322 7ffaac60a8ff-7ffaac60a932 313->322 314->313 318->290 331 7ffaac60a939-7ffaac60a981 321->331 332 7ffaac60a8e7-7ffaac60a8fe 321->332 322->331 339 7ffaac60a983 331->339 340 7ffaac60a985-7ffaac60a9a7 331->340 339->340 341 7ffaac60a9c5-7ffaac60a9ca 339->341 343 7ffaac60aa8a-7ffaac60aa96 340->343 344 7ffaac60a9ad-7ffaac60a9bf 340->344 347 7ffaac60aabe-7ffaac60aad3 343->347 348 7ffaac60aa98-7ffaac60aabd 343->348 349 7ffaac60a9cb-7ffaac60a9e3 call 7ffaac6040b0 344->349 350 7ffaac60a9c1-7ffaac60a9c4 344->350 354 7ffaac60ab15-7ffaac60ab17 347->354 355 7ffaac60aad5-7ffaac60aaf2 347->355 348->347 360 7ffaac60a9e5-7ffaac60aa16 349->360 361 7ffaac60aa47-7ffaac60aa50 349->361 350->341 359 7ffaac60ab19-7ffaac60ab1b 354->359 355->359 362 7ffaac60aaf4-7ffaac60ab0f 355->362 363 7ffaac60ab2c-7ffaac60ab3c 359->363 364 7ffaac60ab1d-7ffaac60ab2b 359->364 369 7ffaac60aa41-7ffaac60aa45 360->369 370 7ffaac60aa18-7ffaac60aa3f 360->370 362->359 365 7ffaac60ab11-7ffaac60ab12 362->365 365->354 369->360 369->361 370->369 372 7ffaac60aa51-7ffaac60aa89 370->372
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2514517565.00007FFAAC600000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC600000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffaac600000_RuntimeBroker.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: }
                                            • API String ID: 0-3750035705
                                            • Opcode ID: 82dd99b15bd9945fcaffff184ccc4bd4358028f8a483b84c91d5c627a61c5ddc
                                            • Instruction ID: 28da8abaa1aa6507981af58704f194523d051aa2e51800a18d8c51eeb20711b6
                                            • Opcode Fuzzy Hash: 82dd99b15bd9945fcaffff184ccc4bd4358028f8a483b84c91d5c627a61c5ddc
                                            • Instruction Fuzzy Hash: 25922731B1DA098FEB99EB2CD455A7537D1EF99340F0490B9E44ED72A3DE28EC468381
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2514517565.00007FFAAC600000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC600000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffaac600000_RuntimeBroker.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 099a5a5bf7ccce72622002913be2a3889d0349c2177a28697257ee35fc97480d
                                            • Instruction ID: 8470ed537ab4b51bdf5fe391e2192039805280b43a190fe3101c5e5b776429ab
                                            • Opcode Fuzzy Hash: 099a5a5bf7ccce72622002913be2a3889d0349c2177a28697257ee35fc97480d
                                            • Instruction Fuzzy Hash: 49F29E70A18A098FEF99EF18C495BA977E1FF59300F1491B9D44ED7292CA35EC85CB80
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2514517565.00007FFAAC600000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC600000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffaac600000_RuntimeBroker.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f4277a7fc75a093fbf9a582bb8ad1ce2285b6bb40f375042dec560a026960eae
                                            • Instruction ID: e75ef38fd7700cc5653411ac3e7b3085180e7eb16bd0468a48a361a6ad8d4b35
                                            • Opcode Fuzzy Hash: f4277a7fc75a093fbf9a582bb8ad1ce2285b6bb40f375042dec560a026960eae
                                            • Instruction Fuzzy Hash: FA528130A18A098FEB99EB2CC458B6977E1FF99300F1494B9E04DD72A6CE35EC45CB41
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2514517565.00007FFAAC600000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC600000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffaac600000_RuntimeBroker.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8dc0b928e49a91b96689f578cda536cc1cba4020a0349eacad3abc3b09436bfd
                                            • Instruction ID: ca736cf66abd12eb643b19e221a5550c2099ce836568f56f88835a9555bfaf4e
                                            • Opcode Fuzzy Hash: 8dc0b928e49a91b96689f578cda536cc1cba4020a0349eacad3abc3b09436bfd
                                            • Instruction Fuzzy Hash: 26228330A19A098FEB99EB1C8495BB977E2FF99300F14917DD44ED3292CE35EC468781
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2514517565.00007FFAAC600000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC600000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffaac600000_RuntimeBroker.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 45ccdf575cb465b7f76fc6345959d2e31f3d3486663a591562dad73ed4c11a50
                                            • Instruction ID: 9a8c0b095338095b41ffa939b82be110fd3596f9f1cc13fac0869c102073bc65
                                            • Opcode Fuzzy Hash: 45ccdf575cb465b7f76fc6345959d2e31f3d3486663a591562dad73ed4c11a50
                                            • Instruction Fuzzy Hash: 52025E74A18A1A8FEB98EF18C4457B9B3E1FF59301F14D5B9D44EE3291CA34F8858B80

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2514517565.00007FFAAC600000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC600000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffaac600000_RuntimeBroker.jbxd
                                            Similarity
                                            • API ID: HookWindows
                                            • String ID:
                                            • API String ID: 2559412058-0
                                            • Opcode ID: da2b8db31c99b1337be53e5d033ef2c14ed0673ca5cc70358ff4b0d6dc02af13
                                            • Instruction ID: 8c7f3e81040e438eb2438ea1e7302dc075d387ff923382185699545824161048
                                            • Opcode Fuzzy Hash: da2b8db31c99b1337be53e5d033ef2c14ed0673ca5cc70358ff4b0d6dc02af13
                                            • Instruction Fuzzy Hash: 4C715971A1CB598FE759EB6C94565B97BE0FF5A310B0081BED04EC3293DE24E84687C1

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1010 7ffaac393525-7ffaac39352f 1011 7ffaac393571-7ffaac3935d8 1010->1011 1012 7ffaac393531-7ffaac393546 1010->1012 1017 7ffaac3935e2-7ffaac393614 DeleteFileW 1011->1017 1018 7ffaac3935da-7ffaac3935df 1011->1018 1012->1011 1019 7ffaac393616 1017->1019 1020 7ffaac39361c-7ffaac39364a 1017->1020 1018->1017 1019->1020
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2511129555.00007FFAAC390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC390000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffaac390000_RuntimeBroker.jbxd
                                            Similarity
                                            • API ID: DeleteFile
                                            • String ID:
                                            • API String ID: 4033686569-0
                                            • Opcode ID: 5bfeb822d19c2ec588612cdd7c14209fcb594044053b47d3645c03e4795b9216
                                            • Instruction ID: 1da21c87b91a99fc91da41e1952cc8fb1bc5d512cabba4b058c824645c1c6d8d
                                            • Opcode Fuzzy Hash: 5bfeb822d19c2ec588612cdd7c14209fcb594044053b47d3645c03e4795b9216
                                            • Instruction Fuzzy Hash: 88412B7180DB588FDB59DB688855AF9BFF0FF56310F0482AFC049C7692CA29A805C791

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1022 7ffaac393569-7ffaac3935d8 1027 7ffaac3935e2-7ffaac393614 DeleteFileW 1022->1027 1028 7ffaac3935da-7ffaac3935df 1022->1028 1029 7ffaac393616 1027->1029 1030 7ffaac39361c-7ffaac39364a 1027->1030 1028->1027 1029->1030
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2511129555.00007FFAAC390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC390000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffaac390000_RuntimeBroker.jbxd
                                            Similarity
                                            • API ID: DeleteFile
                                            • String ID:
                                            • API String ID: 4033686569-0
                                            • Opcode ID: 653da1ee3d51a6af8680ee7a7723c4d00ef1f16797be3fb60c1faa7dc4301027
                                            • Instruction ID: 15a660c009ab78b7a5a6778851eeedbbc71cd98e4d5097041bd19066cadadc0d
                                            • Opcode Fuzzy Hash: 653da1ee3d51a6af8680ee7a7723c4d00ef1f16797be3fb60c1faa7dc4301027
                                            • Instruction Fuzzy Hash: BC31C37190CB5C8FDB59DB588845AF9BBF0FF66320F04826BD049D3262DB75A805CB91
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2511129555.00007FFAAC390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC390000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffaac390000_RuntimeBroker.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ed1519e71ff237b5f3997ae0c03ae8d5f00c5472e2b4b2f2e8894479e07685d4
                                            • Instruction ID: bda40ecfed30c28de84785ec44fba6bc68e7a1080698a93a58612c242616ea8c
                                            • Opcode Fuzzy Hash: ed1519e71ff237b5f3997ae0c03ae8d5f00c5472e2b4b2f2e8894479e07685d4
                                            • Instruction Fuzzy Hash: E1A13C57B0EAA18BE31177BDFC259E9FF50DF8127671881BBD289C91A3D804944A83E1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2511129555.00007FFAAC390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC390000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_7ffaac390000_RuntimeBroker.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8f121940242234b41b361b917e368ad9418e81d46c0e94303ab59fb097431815
                                            • Instruction ID: e8b8e4231a999d260430da722b456247abf5ac46849e33e5690ed12b59f51f3d
                                            • Opcode Fuzzy Hash: 8f121940242234b41b361b917e368ad9418e81d46c0e94303ab59fb097431815
                                            • Instruction Fuzzy Hash: 7031849B94A2A696E211B3BCF876CF93B50DF4223D71CC3B3E18D8D5739C09908A51E5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1323658084.00007FFAAC390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC390000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7ffaac390000_RuntimeBroker.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: H$r6$r6$r6$r6
                                            • API String ID: 0-2442804666
                                            • Opcode ID: e146828017d3cd009eccf2a7126251c1cf2f5be7f3759b8d2f830149022d2583
                                            • Instruction ID: 1d603c74bcf2553a8fe6f4ee9095a66c81956182ba423d2d87dbc5589d857c97
                                            • Opcode Fuzzy Hash: e146828017d3cd009eccf2a7126251c1cf2f5be7f3759b8d2f830149022d2583
                                            • Instruction Fuzzy Hash: 82718461A19D0D8FEB98E768C465BBCB7D2EF99310F448178D04ED32C2CE29AC068791
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1323658084.00007FFAAC390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC390000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7ffaac390000_RuntimeBroker.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ;N_I
                                            • API String ID: 0-1313454297
                                            • Opcode ID: 4b21b03ce4b57c0adddaafe90fc4b63d96815a1b5feb9197e3b63dfb99e59b1c
                                            • Instruction ID: 78f7f198e83b9700c7749e2e368e83dc88660686544885b1a77c8a3d8704fa62
                                            • Opcode Fuzzy Hash: 4b21b03ce4b57c0adddaafe90fc4b63d96815a1b5feb9197e3b63dfb99e59b1c
                                            • Instruction Fuzzy Hash: 07913B6191EB81CBF315D37C94A5DB5BFA0EF46304B5480BAD4898B29BD92CD80587D3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1323658084.00007FFAAC390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC390000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7ffaac390000_RuntimeBroker.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (L
                                            • API String ID: 0-2945913762
                                            • Opcode ID: 25e68b740862dda26a185ec6ea3cdeb754f67aa8313bad30c45ab4d707a8e704
                                            • Instruction ID: eb785ebe4709d6a8571a6bc505bfbe424652ac2e3cbb00973c5c865b89ecf985
                                            • Opcode Fuzzy Hash: 25e68b740862dda26a185ec6ea3cdeb754f67aa8313bad30c45ab4d707a8e704
                                            • Instruction Fuzzy Hash: 0441F562A1DE494FF758A728D416BB9BBD1EB95310F04817AE04EC32D2CD2E980683D2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1323658084.00007FFAAC390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC390000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7ffaac390000_RuntimeBroker.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: .N_^
                                            • API String ID: 0-2858261171
                                            • Opcode ID: 749055d39700e34ae8dbf2f91f76a6d1c93d6d75185631e27164ad6fdcea1064
                                            • Instruction ID: 865d92978796fc9be604adbc3e36b341e3013d193226889f20c22246469713a4
                                            • Opcode Fuzzy Hash: 749055d39700e34ae8dbf2f91f76a6d1c93d6d75185631e27164ad6fdcea1064
                                            • Instruction Fuzzy Hash: AE210816B0DE594FF355A72C9C795E47BD0EF5623170C41B7C28CC7193C80C980A83A1
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1323658084.00007FFAAC390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC390000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7ffaac390000_RuntimeBroker.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4f898794044a84d473d7f99dd7c6741a22f3c645d9ef28e779f9d270e1b651bd
                                            • Instruction ID: 4cffa0172379117408334713e37df62686cedc88559b091a88d6a79029f19709
                                            • Opcode Fuzzy Hash: 4f898794044a84d473d7f99dd7c6741a22f3c645d9ef28e779f9d270e1b651bd
                                            • Instruction Fuzzy Hash: B1A1D661A1DE8A8FFB95E7288461EB9B7E1EF95300F0481B5D04EC7196CD2DEC0687D2
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1323658084.00007FFAAC390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC390000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7ffaac390000_RuntimeBroker.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6c9f722e181596e719f7edeedaaaa26bfa4c5b1ce4dfe2a848ffc75ea6b0fbde
                                            • Instruction ID: fca55bf466e8365432466f177b2c0814184912f578807703d0d3fa1a1245e9c5
                                            • Opcode Fuzzy Hash: 6c9f722e181596e719f7edeedaaaa26bfa4c5b1ce4dfe2a848ffc75ea6b0fbde
                                            • Instruction Fuzzy Hash: 79519F11B6DE6A4BFB85A33C8071EBA6AD2DF86250B44C4B9D00DC72A7CD1DDC068792
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1323658084.00007FFAAC390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC390000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7ffaac390000_RuntimeBroker.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9f2040f1d1207f53b8aa1a9f07a224f8bfe44a0356bc7302c75b50867419c722
                                            • Instruction ID: ef875410c9450c5d2b858e62dc4f1de94e7c3a3022566b7935ff69039ccb6864
                                            • Opcode Fuzzy Hash: 9f2040f1d1207f53b8aa1a9f07a224f8bfe44a0356bc7302c75b50867419c722
                                            • Instruction Fuzzy Hash: E041C66190DE898FFB95E7688461EF9BBA1EF56310F0480B6D14EC7193CD1ED80987D2
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1323658084.00007FFAAC390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC390000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7ffaac390000_RuntimeBroker.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: dfa4b240040a7710a228c0ecbd5bbbb28605059f45a3a5d4c37902b9e714afbe
                                            • Instruction ID: cf53e3c4f929b2518a6a82d784d0b84d45f0fd5d0d98e27f3b3c220f0b5f8608
                                            • Opcode Fuzzy Hash: dfa4b240040a7710a228c0ecbd5bbbb28605059f45a3a5d4c37902b9e714afbe
                                            • Instruction Fuzzy Hash: E721F53190AA828FE7459B38C0958A5BB91EF52310B1882B9D14CDF19BD92DEC8AC7D0
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1323658084.00007FFAAC390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC390000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7ffaac390000_RuntimeBroker.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4fe6851c7fbfdfcd5d3c2266f2c2c50a49772c58bcba2a74a4655347d387ba25
                                            • Instruction ID: d5228c8f26d6683762dd54995ff1a2e1eaca216f38d18ade7975167af7471ba8
                                            • Opcode Fuzzy Hash: 4fe6851c7fbfdfcd5d3c2266f2c2c50a49772c58bcba2a74a4655347d387ba25
                                            • Instruction Fuzzy Hash: FE31C5705A97558BF304E73CC092EB53F61AF89308F80C16DE809873A6CE39A901CB97
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1323658084.00007FFAAC390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC390000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7ffaac390000_RuntimeBroker.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b56c557a3c1e320fb10a704598c3662baa3e1fec7e5f34b5574a593d6b956613
                                            • Instruction ID: 8b2f55b0c7decd066d56e5b16e333436a7b0711a26001de4f1eebfd56975abdf
                                            • Opcode Fuzzy Hash: b56c557a3c1e320fb10a704598c3662baa3e1fec7e5f34b5574a593d6b956613
                                            • Instruction Fuzzy Hash: AD21079291DFC68FF355A7B48835A65ABA0EF56340B0445FAC08EC71E3DC0CA908C7E2
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1323658084.00007FFAAC390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC390000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7ffaac390000_RuntimeBroker.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 27801549fd77785d059efdd44438f3addfc4e8cbcf2731ece17b02c6dee08609
                                            • Instruction ID: 9b552334563da6600252e4ab68a6fe3da4fe5046fe5dc888f68ea31e6da9027d
                                            • Opcode Fuzzy Hash: 27801549fd77785d059efdd44438f3addfc4e8cbcf2731ece17b02c6dee08609
                                            • Instruction Fuzzy Hash: 8C21D371E19A598FE794EB3CC4A9EB877E1EF59311B4444FAE40DC72A2DE28D804C781
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1323658084.00007FFAAC390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC390000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7ffaac390000_RuntimeBroker.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 67916787992b90d5078ff1c48e98ca69cd4c678e8eea8659cfc9b455e528cdf6
                                            • Instruction ID: bce12af7e761390dec0a89aa2d12f74434942fe9728e417870bb6c42028e3849
                                            • Opcode Fuzzy Hash: 67916787992b90d5078ff1c48e98ca69cd4c678e8eea8659cfc9b455e528cdf6
                                            • Instruction Fuzzy Hash: E311576290EA810FF381E738585A8F1BBD0DB9122070982BBE44DC32A3CD0D998A8391
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1323658084.00007FFAAC390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC390000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7ffaac390000_RuntimeBroker.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0abdcc1f47dd711ccfcd674960ad65559aa43fb443c901872e45d760e012daaf
                                            • Instruction ID: b30534aa02b48744495894e2d19ef0beb5c08cc82fdd4d73a0bcccc578918e2d
                                            • Opcode Fuzzy Hash: 0abdcc1f47dd711ccfcd674960ad65559aa43fb443c901872e45d760e012daaf
                                            • Instruction Fuzzy Hash: 9711C621A4EAC84FE347E33898A9AA47FD1AF47214B0941F6D08CCB1A3D9598845C352
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1323658084.00007FFAAC390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC390000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7ffaac390000_RuntimeBroker.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ca18f1fbc8b9a62f6cc63f4d2ab1159eb48a4dab1dc93fa9a06f44d5cbe01cba
                                            • Instruction ID: 89829900187f5e46d10e45c939e6bdb2f8f9f4c66d10f75a771209cc95805035
                                            • Opcode Fuzzy Hash: ca18f1fbc8b9a62f6cc63f4d2ab1159eb48a4dab1dc93fa9a06f44d5cbe01cba
                                            • Instruction Fuzzy Hash: B201BD53A6DD8A8FF699A36C4455DF5ABD1DB9A320F008177D00FC319ADC09EC4A43C2
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1323658084.00007FFAAC390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC390000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7ffaac390000_RuntimeBroker.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4267aa0cd7e3ccbb34f36088c13b903f58dd9fa746d397ce091f886328de9fa2
                                            • Instruction ID: f35d1f6f3c82b4ecfbef29f5e5e0c332938d575cfe6e629a4bf28e415e6fcfde
                                            • Opcode Fuzzy Hash: 4267aa0cd7e3ccbb34f36088c13b903f58dd9fa746d397ce091f886328de9fa2
                                            • Instruction Fuzzy Hash: 8FF02422B19C1C4FA684F3BD94E9EFA67C5DBAD22131445B3E00CC72B3DC08984283D0
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1323658084.00007FFAAC390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC390000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7ffaac390000_RuntimeBroker.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 57d9ff1bd49e2a20df1067a5095bf9fad9baafd1d83076ad066d90a39f638250
                                            • Instruction ID: 3f3a39bea6945061a14db9d519680b95838c5bdb92e2f16d521d0ef797cb6242
                                            • Opcode Fuzzy Hash: 57d9ff1bd49e2a20df1067a5095bf9fad9baafd1d83076ad066d90a39f638250
                                            • Instruction Fuzzy Hash: DDE06D22B19C1D5FAB98F37D84D9F7966C5EBAD21171045B6E40CC72A3DD19DC418390
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1323658084.00007FFAAC390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC390000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7ffaac390000_RuntimeBroker.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 10666e605bb1cda7b42b63568faa4231add675beea91f98a4f768d506bfdc415
                                            • Instruction ID: bf9f20a0e6f5df60b4888b73ed42d7635a768a681410b512d83b5b82723e1c22
                                            • Opcode Fuzzy Hash: 10666e605bb1cda7b42b63568faa4231add675beea91f98a4f768d506bfdc415
                                            • Instruction Fuzzy Hash: B9E0DFA2E1AE1686F49833B860125BC91829F88211B44103AE00DD6287CC2EEA4602CA