Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Loader.exe

Overview

General Information

Sample name:Loader.exe
Analysis ID:1574484
MD5:e9a138d8c5ab2cccc8bf9976f66d30c8
SHA1:e996894168f0d4e852162d1290250dfa986310f8
SHA256:e63b41bfdd3a89b6ebcfc05db158fdc399dbc081e49b01498831a62df34defc3
Tags:exeQuasarRATuser-lontze7
Infos:

Detection

Quasar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Quasar RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to detect virtual machines (STR)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • Loader.exe (PID: 4892 cmdline: "C:\Users\user\Desktop\Loader.exe" MD5: E9A138D8C5AB2CCCC8BF9976F66D30C8)
    • schtasks.exe (PID: 7140 cmdline: "schtasks" /create /tn "SubStart" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • conhost.exe (PID: 564 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Client.exe (PID: 6632 cmdline: "C:\Users\user\AppData\Roaming\SubDir\Client.exe" MD5: E9A138D8C5AB2CCCC8BF9976F66D30C8)
      • schtasks.exe (PID: 6356 cmdline: "schtasks" /create /tn "SubStart" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
        • conhost.exe (PID: 2024 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • Client.exe (PID: 6992 cmdline: C:\Users\user\AppData\Roaming\SubDir\Client.exe MD5: E9A138D8C5AB2CCCC8BF9976F66D30C8)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
{"Version": "1.4.1", "Host:Port": "Dystopian-62863.portmap.host:62863;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "e1de8f9b-5a7a-4798-a6fb-c03591ef3442", "StartupKey": "SubStart", "Tag": "Office04", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
SourceRuleDescriptionAuthorStrings
Loader.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
    Loader.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      Loader.exeMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
      • 0x28eed8:$x1: Quasar.Common.Messages
      • 0x29f201:$x1: Quasar.Common.Messages
      • 0x2ab83a:$x4: Uninstalling... good bye :-(
      • 0x2ad02f:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
      Loader.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
      • 0x2aadec:$f1: FileZilla\recentservers.xml
      • 0x2aae2c:$f2: FileZilla\sitemanager.xml
      • 0x2aae6e:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
      • 0x2ab0ba:$b1: Chrome\User Data\
      • 0x2ab110:$b1: Chrome\User Data\
      • 0x2ab3e8:$b2: Mozilla\Firefox\Profiles
      • 0x2ab4e4:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2fd468:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2ab63c:$b4: Opera Software\Opera Stable\Login Data
      • 0x2ab6f6:$b5: YandexBrowser\User Data\
      • 0x2ab764:$b5: YandexBrowser\User Data\
      • 0x2ab438:$s4: logins.json
      • 0x2ab16e:$a1: username_value
      • 0x2ab18c:$a2: password_value
      • 0x2ab478:$a3: encryptedUsername
      • 0x2fd3ac:$a3: encryptedUsername
      • 0x2ab49c:$a4: encryptedPassword
      • 0x2fd3ca:$a4: encryptedPassword
      • 0x2fd348:$a5: httpRealm
      Loader.exeMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
      • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
      • 0x2ab924:$s3: Process already elevated.
      • 0x28ebd7:$s4: get_PotentiallyVulnerablePasswords
      • 0x278c58:$s5: GetKeyloggerLogsDirectory
      • 0x29e960:$s5: GetKeyloggerLogsDirectory
      • 0x28ebfa:$s6: set_PotentiallyVulnerablePasswords
      • 0x2fea96:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
      SourceRuleDescriptionAuthorStrings
      C:\Users\user\AppData\Roaming\SubDir\Client.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
        C:\Users\user\AppData\Roaming\SubDir\Client.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          C:\Users\user\AppData\Roaming\SubDir\Client.exeMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
          • 0x28eed8:$x1: Quasar.Common.Messages
          • 0x29f201:$x1: Quasar.Common.Messages
          • 0x2ab83a:$x4: Uninstalling... good bye :-(
          • 0x2ad02f:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
          C:\Users\user\AppData\Roaming\SubDir\Client.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
          • 0x2aadec:$f1: FileZilla\recentservers.xml
          • 0x2aae2c:$f2: FileZilla\sitemanager.xml
          • 0x2aae6e:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
          • 0x2ab0ba:$b1: Chrome\User Data\
          • 0x2ab110:$b1: Chrome\User Data\
          • 0x2ab3e8:$b2: Mozilla\Firefox\Profiles
          • 0x2ab4e4:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
          • 0x2fd468:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
          • 0x2ab63c:$b4: Opera Software\Opera Stable\Login Data
          • 0x2ab6f6:$b5: YandexBrowser\User Data\
          • 0x2ab764:$b5: YandexBrowser\User Data\
          • 0x2ab438:$s4: logins.json
          • 0x2ab16e:$a1: username_value
          • 0x2ab18c:$a2: password_value
          • 0x2ab478:$a3: encryptedUsername
          • 0x2fd3ac:$a3: encryptedUsername
          • 0x2ab49c:$a4: encryptedPassword
          • 0x2fd3ca:$a4: encryptedPassword
          • 0x2fd348:$a5: httpRealm
          C:\Users\user\AppData\Roaming\SubDir\Client.exeMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
          • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
          • 0x2ab924:$s3: Process already elevated.
          • 0x28ebd7:$s4: get_PotentiallyVulnerablePasswords
          • 0x278c58:$s5: GetKeyloggerLogsDirectory
          • 0x29e960:$s5: GetKeyloggerLogsDirectory
          • 0x28ebfa:$s6: set_PotentiallyVulnerablePasswords
          • 0x2fea96:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
          SourceRuleDescriptionAuthorStrings
          00000000.00000000.1235547319.00000000005E0000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
            00000004.00000002.3708336873.00000000039DD000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
              00000000.00000002.1264333421.000000001B460000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
                00000000.00000000.1235147298.00000000002C2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
                  Process Memory Space: Loader.exe PID: 4892JoeSecurity_QuasarYara detected Quasar RATJoe Security
                    Click to see the 1 entries
                    SourceRuleDescriptionAuthorStrings
                    0.0.Loader.exe.2c0000.0.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
                      0.0.Loader.exe.2c0000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                        0.0.Loader.exe.2c0000.0.unpackMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
                        • 0x28eed8:$x1: Quasar.Common.Messages
                        • 0x29f201:$x1: Quasar.Common.Messages
                        • 0x2ab83a:$x4: Uninstalling... good bye :-(
                        • 0x2ad02f:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
                        0.0.Loader.exe.2c0000.0.unpackINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
                        • 0x2aadec:$f1: FileZilla\recentservers.xml
                        • 0x2aae2c:$f2: FileZilla\sitemanager.xml
                        • 0x2aae6e:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
                        • 0x2ab0ba:$b1: Chrome\User Data\
                        • 0x2ab110:$b1: Chrome\User Data\
                        • 0x2ab3e8:$b2: Mozilla\Firefox\Profiles
                        • 0x2ab4e4:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                        • 0x2fd468:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                        • 0x2ab63c:$b4: Opera Software\Opera Stable\Login Data
                        • 0x2ab6f6:$b5: YandexBrowser\User Data\
                        • 0x2ab764:$b5: YandexBrowser\User Data\
                        • 0x2ab438:$s4: logins.json
                        • 0x2ab16e:$a1: username_value
                        • 0x2ab18c:$a2: password_value
                        • 0x2ab478:$a3: encryptedUsername
                        • 0x2fd3ac:$a3: encryptedUsername
                        • 0x2ab49c:$a4: encryptedPassword
                        • 0x2fd3ca:$a4: encryptedPassword
                        • 0x2fd348:$a5: httpRealm
                        0.0.Loader.exe.2c0000.0.unpackMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
                        • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
                        • 0x2ab924:$s3: Process already elevated.
                        • 0x28ebd7:$s4: get_PotentiallyVulnerablePasswords
                        • 0x278c58:$s5: GetKeyloggerLogsDirectory
                        • 0x29e960:$s5: GetKeyloggerLogsDirectory
                        • 0x28ebfa:$s6: set_PotentiallyVulnerablePasswords
                        • 0x2fea96:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>

                        System Summary

                        barindex
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "SubStart" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "SubStart" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\SubDir\Client.exe", ParentImage: C:\Users\user\AppData\Roaming\SubDir\Client.exe, ParentProcessId: 6632, ParentProcessName: Client.exe, ProcessCommandLine: "schtasks" /create /tn "SubStart" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, ProcessId: 6356, ProcessName: schtasks.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "SubStart" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "SubStart" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Loader.exe", ParentImage: C:\Users\user\Desktop\Loader.exe, ParentProcessId: 4892, ParentProcessName: Loader.exe, ProcessCommandLine: "schtasks" /create /tn "SubStart" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, ProcessId: 7140, ProcessName: schtasks.exe
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-12-13T11:16:24.671472+010020355951Domain Observed Used for C2 Detected193.161.193.9962863192.168.2.749699TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-12-13T11:16:24.671472+010020276191Domain Observed Used for C2 Detected193.161.193.9962863192.168.2.749699TCP

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: Loader.exeAvira: detected
                        Source: Dystopian-62863.portmap.hostAvira URL Cloud: Label: malware
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeAvira: detection malicious, Label: HEUR/AGEN.1307453
                        Source: Loader.exeMalware Configuration Extractor: Quasar {"Version": "1.4.1", "Host:Port": "Dystopian-62863.portmap.host:62863;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "e1de8f9b-5a7a-4798-a6fb-c03591ef3442", "StartupKey": "SubStart", "Tag": "Office04", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeReversingLabs: Detection: 78%
                        Source: Loader.exeReversingLabs: Detection: 78%
                        Source: Yara matchFile source: Loader.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.Loader.exe.2c0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000000.1235547319.00000000005E0000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.3708336873.00000000039DD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1264333421.000000001B460000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.1235147298.00000000002C2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Loader.exe PID: 4892, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 6632, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeJoe Sandbox ML: detected
                        Source: Loader.exeJoe Sandbox ML: detected
                        Source: Loader.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: unknownHTTPS traffic detected: 108.181.61.49:443 -> 192.168.2.7:49702 version: TLS 1.2
                        Source: Loader.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                        Networking

                        barindex
                        Source: Network trafficSuricata IDS: 2027619 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (Quasar CnC) : 193.161.193.99:62863 -> 192.168.2.7:49699
                        Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 193.161.193.99:62863 -> 192.168.2.7:49699
                        Source: Malware configuration extractorURLs: Dystopian-62863.portmap.host
                        Source: Yara matchFile source: Loader.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.Loader.exe.2c0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED
                        Source: global trafficTCP traffic: 192.168.2.7:49699 -> 193.161.193.99:62863
                        Source: Joe Sandbox ViewIP Address: 193.161.193.99 193.161.193.99
                        Source: Joe Sandbox ViewIP Address: 108.181.61.49 108.181.61.49
                        Source: Joe Sandbox ViewASN Name: BITREE-ASRU BITREE-ASRU
                        Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                        Source: unknownDNS query: name: ipwho.is
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
                        Source: global trafficDNS traffic detected: DNS query: Dystopian-62863.portmap.host
                        Source: global trafficDNS traffic detected: DNS query: ipwho.is
                        Source: Client.exe, 00000004.00000002.3713603694.000000001C107000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                        Source: Client.exe, 00000004.00000002.3706720852.00000000018B8000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.4.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                        Source: Client.exe, 00000004.00000002.3706720852.00000000018B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?9cdf77c02eb3b
                        Source: Client.exe, 00000004.00000002.3708336873.000000000398E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ipwho.is
                        Source: Client.exe, 00000004.00000002.3708336873.00000000039DD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
                        Source: Loader.exe, 00000000.00000002.1259103778.0000000002851000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000004.00000002.3708336873.00000000035E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: Loader.exe, Client.exe.0.drString found in binary or memory: https://api.ipify.org/
                        Source: Client.exe, 00000004.00000002.3708336873.0000000003974000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipwho.is
                        Source: Loader.exe, Client.exe.0.drString found in binary or memory: https://ipwho.is/
                        Source: Loader.exe, Client.exe.0.drString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                        Source: Loader.exe, Client.exe.0.drString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                        Source: Loader.exe, Client.exe.0.drString found in binary or memory: https://stackoverflow.com/q/2152978/23354sCannot
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
                        Source: unknownHTTPS traffic detected: 108.181.61.49:443 -> 192.168.2.7:49702 version: TLS 1.2

                        Key, Mouse, Clipboard, Microphone and Screen Capturing

                        barindex
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\SubDir\Client.exeJump to behavior

                        E-Banking Fraud

                        barindex
                        Source: Yara matchFile source: Loader.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.Loader.exe.2c0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000000.1235547319.00000000005E0000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.3708336873.00000000039DD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1264333421.000000001B460000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.1235147298.00000000002C2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Loader.exe PID: 4892, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 6632, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED

                        System Summary

                        barindex
                        Source: Loader.exe, type: SAMPLEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                        Source: Loader.exe, type: SAMPLEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                        Source: Loader.exe, type: SAMPLEMatched rule: Detects Quasar infostealer Author: ditekshen
                        Source: 0.0.Loader.exe.2c0000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                        Source: 0.0.Loader.exe.2c0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                        Source: 0.0.Loader.exe.2c0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: Detects QuasarRAT malware Author: Florian Roth
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: Detects Quasar infostealer Author: ditekshen
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FFAAC973C6F4_2_00007FFAAC973C6F
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FFAACBFE5814_2_00007FFAACBFE581
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FFAACBFFE904_2_00007FFAACBFFE90
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FFAACBE55E94_2_00007FFAACBE55E9
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FFAACBFB8614_2_00007FFAACBFB861
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FFAACBE9FD04_2_00007FFAACBE9FD0
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FFAACBEAFDD4_2_00007FFAACBEAFDD
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FFAACBE92714_2_00007FFAACBE9271
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FFAACBF8A1B4_2_00007FFAACBF8A1B
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FFAACBFCAE54_2_00007FFAACBFCAE5
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FFAACBF7C264_2_00007FFAACBF7C26
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FFAACBFEBD44_2_00007FFAACBFEBD4
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FFAACBE621F4_2_00007FFAACBE621F
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FFAACD023214_2_00007FFAACD02321
                        Source: Loader.exe, 00000000.00000002.1264333421.000000001B460000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClient.exe. vs Loader.exe
                        Source: Loader.exe, 00000000.00000000.1235547319.00000000005E0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameClient.exe. vs Loader.exe
                        Source: Loader.exeBinary or memory string: OriginalFilenameClient.exe. vs Loader.exe
                        Source: Loader.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: Loader.exe, type: SAMPLEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                        Source: Loader.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                        Source: Loader.exe, type: SAMPLEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                        Source: 0.0.Loader.exe.2c0000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                        Source: 0.0.Loader.exe.2c0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                        Source: 0.0.Loader.exe.2c0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@10/5@2/2
                        Source: C:\Users\user\Desktop\Loader.exeFile created: C:\Users\user\AppData\Roaming\SubDirJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMutant created: NULL
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMutant created: \Sessions\1\BaseNamedObjects\Local\e1de8f9b-5a7a-4798-a6fb-c03591ef3442
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:564:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2024:120:WilError_03
                        Source: Loader.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: Loader.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\Desktop\Loader.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: Loader.exeReversingLabs: Detection: 78%
                        Source: Loader.exeString found in binary or memory: HasSubValue3Conflicting item/add type
                        Source: C:\Users\user\Desktop\Loader.exeFile read: C:\Users\user\Desktop\Loader.exeJump to behavior
                        Source: unknownProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"
                        Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "SubStart" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                        Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: unknownProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe C:\Users\user\AppData\Roaming\SubDir\Client.exe
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "SubStart" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                        Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "SubStart" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /fJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "SubStart" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /fJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: schannel.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mskeyprotect.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ncryptsslp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptnet.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: webio.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cabinet.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rasapi32.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rasman.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rtutils.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                        Source: Loader.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                        Source: Loader.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                        Source: Loader.exeStatic file information: File size 3266048 > 1048576
                        Source: Loader.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x31c600
                        Source: Loader.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00007FFAAC9600BD pushad ; iretd 0_2_00007FFAAC9600C1
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FFAAC85D2A5 pushad ; iretd 4_2_00007FFAAC85D2A6
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FFAAC9700BD pushad ; iretd 4_2_00007FFAAC9700C1
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FFAACBFDBB0 push ss; retn FFD7h4_2_00007FFAACBFDD1F
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FFAACBE33FF push eax; ret 4_2_00007FFAACBE340C
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FFAACD02321 push edx; retf 5F20h4_2_00007FFAACD05A3B
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 5_2_00007FFAAC9A00BD pushad ; iretd 5_2_00007FFAAC9A00C1
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 5_2_00007FFAAC9A0B2D push esp; ret 5_2_00007FFAAC9A0B26
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 5_2_00007FFAAC9A0231 push ecx; ret 5_2_00007FFAAC9A02B6
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 5_2_00007FFAAC9A0A08 push edi; ret 5_2_00007FFAAC9A0A76
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 5_2_00007FFAAC9A0B17 push esp; ret 5_2_00007FFAAC9A0B26
                        Source: C:\Users\user\Desktop\Loader.exeFile created: C:\Users\user\AppData\Roaming\SubDir\Client.exeJump to dropped file

                        Boot Survival

                        barindex
                        Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "SubStart" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\Desktop\Loader.exe:Zone.Identifier read attributes | deleteJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\Client.exe:Zone.Identifier read attributes | deleteJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\Client.exe:Zone.Identifier read attributes | deleteJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOTJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeMemory allocated: D10000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeMemory allocated: 1A850000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1A40000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1B5B0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 3280000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1B490000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FFAAC97F1F2 str ax4_2_00007FFAAC97F1F2
                        Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeWindow / User API: threadDelayed 2036Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeWindow / User API: threadDelayed 7823Jump to behavior
                        Source: C:\Users\user\Desktop\Loader.exe TID: 6124Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 6524Thread sleep time: -26747778906878833s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 396Thread sleep count: 2036 > 30Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 396Thread sleep count: 7823 > 30Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 6880Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BaseBoard
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BIOS
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Users\user\Desktop\Loader.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: Client.exe, 00000004.00000002.3713603694.000000001C184000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                        Source: Client.exe, 00000004.00000002.3713004189.000000001BDB2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW)
                        Source: C:\Users\user\Desktop\Loader.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeMemory allocated: page read and write | page guardJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "SubStart" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /fJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "SubStart" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /fJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeQueries volume information: C:\Users\user\Desktop\Loader.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\Client.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\Client.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Loader.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: Loader.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.Loader.exe.2c0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000000.1235547319.00000000005E0000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.3708336873.00000000039DD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1264333421.000000001B460000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.1235147298.00000000002C2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Loader.exe PID: 4892, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 6632, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: Loader.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.Loader.exe.2c0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000000.1235547319.00000000005E0000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.3708336873.00000000039DD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1264333421.000000001B460000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.1235147298.00000000002C2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Loader.exe PID: 4892, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 6632, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
                        Windows Management Instrumentation
                        1
                        Scheduled Task/Job
                        11
                        Process Injection
                        1
                        Masquerading
                        11
                        Input Capture
                        1
                        Query Registry
                        Remote Services11
                        Input Capture
                        11
                        Encrypted Channel
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault Accounts2
                        Command and Scripting Interpreter
                        1
                        DLL Side-Loading
                        1
                        Scheduled Task/Job
                        1
                        Disable or Modify Tools
                        LSASS Memory111
                        Security Software Discovery
                        Remote Desktop Protocol1
                        Archive Collected Data
                        1
                        Non-Standard Port
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain Accounts1
                        Scheduled Task/Job
                        Logon Script (Windows)1
                        DLL Side-Loading
                        51
                        Virtualization/Sandbox Evasion
                        Security Account Manager51
                        Virtualization/Sandbox Evasion
                        SMB/Windows Admin SharesData from Network Shared Drive1
                        Ingress Tool Transfer
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                        Process Injection
                        NTDS1
                        Application Window Discovery
                        Distributed Component Object ModelInput Capture2
                        Non-Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                        Hidden Files and Directories
                        LSA Secrets1
                        System Network Configuration Discovery
                        SSHKeylogging113
                        Application Layer Protocol
                        Scheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        Obfuscated Files or Information
                        Cached Domain Credentials23
                        System Information Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                        DLL Side-Loading
                        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1574484 Sample: Loader.exe Startdate: 13/12/2024 Architecture: WINDOWS Score: 100 31 Dystopian-62863.portmap.host 2->31 33 ipwho.is 2->33 35 bg.microsoft.map.fastly.net 2->35 49 Suricata IDS alerts for network traffic 2->49 51 Found malware configuration 2->51 53 Malicious sample detected (through community Yara rule) 2->53 55 8 other signatures 2->55 9 Loader.exe 5 2->9         started        13 Client.exe 3 2->13         started        signatures3 process4 file5 27 C:\Users\user\AppData\Roaming\...\Client.exe, PE32 9->27 dropped 29 C:\Users\user\AppData\...\Loader.exe.log, CSV 9->29 dropped 57 Uses schtasks.exe or at.exe to add and modify task schedules 9->57 59 Hides that the sample has been downloaded from the Internet (zone.identifier) 9->59 15 Client.exe 14 2 9->15         started        19 schtasks.exe 1 9->19         started        signatures6 process7 dnsIp8 37 Dystopian-62863.portmap.host 193.161.193.99, 49699, 62863 BITREE-ASRU Russian Federation 15->37 39 ipwho.is 108.181.61.49, 443, 49702 ASN852CA Canada 15->39 41 Antivirus detection for dropped file 15->41 43 Multi AV Scanner detection for dropped file 15->43 45 Machine Learning detection for dropped file 15->45 47 2 other signatures 15->47 21 schtasks.exe 1 15->21         started        23 conhost.exe 19->23         started        signatures9 process10 process11 25 conhost.exe 21->25         started       

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        Loader.exe79%ReversingLabsByteCode-MSIL.Backdoor.Quasar
                        Loader.exe100%AviraHEUR/AGEN.1307453
                        Loader.exe100%Joe Sandbox ML
                        SourceDetectionScannerLabelLink
                        C:\Users\user\AppData\Roaming\SubDir\Client.exe100%AviraHEUR/AGEN.1307453
                        C:\Users\user\AppData\Roaming\SubDir\Client.exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Roaming\SubDir\Client.exe79%ReversingLabsByteCode-MSIL.Backdoor.Quasar
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        Dystopian-62863.portmap.host100%Avira URL Cloudmalware
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        bg.microsoft.map.fastly.net
                        199.232.214.172
                        truefalse
                          high
                          ipwho.is
                          108.181.61.49
                          truefalse
                            high
                            Dystopian-62863.portmap.host
                            193.161.193.99
                            truetrue
                              unknown
                              NameMaliciousAntivirus DetectionReputation
                              https://ipwho.is/false
                                high
                                Dystopian-62863.portmap.hosttrue
                                • Avira URL Cloud: malware
                                unknown
                                NameSourceMaliciousAntivirus DetectionReputation
                                https://api.ipify.org/Loader.exe, Client.exe.0.drfalse
                                  high
                                  https://stackoverflow.com/q/14436606/23354Loader.exe, Client.exe.0.drfalse
                                    high
                                    https://stackoverflow.com/q/2152978/23354sCannotLoader.exe, Client.exe.0.drfalse
                                      high
                                      http://schemas.datacontract.org/2004/07/Client.exe, 00000004.00000002.3708336873.00000000039DD000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameLoader.exe, 00000000.00000002.1259103778.0000000002851000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000004.00000002.3708336873.00000000035E9000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://ipwho.isClient.exe, 00000004.00000002.3708336873.000000000398E000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://stackoverflow.com/q/11564914/23354;Loader.exe, Client.exe.0.drfalse
                                              high
                                              https://ipwho.isClient.exe, 00000004.00000002.3708336873.0000000003974000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                193.161.193.99
                                                Dystopian-62863.portmap.hostRussian Federation
                                                198134BITREE-ASRUtrue
                                                108.181.61.49
                                                ipwho.isCanada
                                                852ASN852CAfalse
                                                Joe Sandbox version:41.0.0 Charoite
                                                Analysis ID:1574484
                                                Start date and time:2024-12-13 11:15:21 +01:00
                                                Joe Sandbox product:CloudBasic
                                                Overall analysis duration:0h 8m 4s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                Number of analysed new started processes analysed:19
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Sample name:Loader.exe
                                                Detection:MAL
                                                Classification:mal100.troj.spyw.evad.winEXE@10/5@2/2
                                                EGA Information:
                                                • Successful, ratio: 66.7%
                                                HCA Information:
                                                • Successful, ratio: 88%
                                                • Number of executed functions: 60
                                                • Number of non-executed functions: 1
                                                Cookbook Comments:
                                                • Found application associated with file extension: .exe
                                                • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                                                • Excluded IPs from analysis (whitelisted): 2.22.50.131, 2.22.50.144, 13.107.246.63, 4.245.163.56, 4.175.87.197
                                                • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, time.windows.com, a767.dspw65.akamai.net, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net
                                                • Execution Graph export aborted for target Client.exe, PID 6992 because it is empty
                                                • Not all processes where analyzed, report is missing behavior information
                                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                • VT rate limit hit for: Loader.exe
                                                TimeTypeDescription
                                                05:16:18API Interceptor14125009x Sleep call for process: Client.exe modified
                                                11:16:16Task SchedulerRun new task: SubStart path: C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                193.161.193.99Yq5Gp2g2vB.exeGet hashmaliciousRedLineBrowse
                                                • okmaq-24505.portmap.host:24505/
                                                JnBNepHH7K.exeGet hashmaliciousAsyncRAT RedLineBrowse
                                                • exara32-64703.portmap.host:64703/
                                                99SKW728vf.exeGet hashmaliciousRedLineBrowse
                                                • lottie9nwtina-55339.portmap.host:55339/
                                                amazoninvoiceAF0388d83739dee83479171dbcf.exeGet hashmaliciousRedLineBrowse
                                                • tete2792-22120.portmap.host:22120//
                                                108.181.61.49Cracker.exeGet hashmaliciousLuca StealerBrowse
                                                • /?output=json
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                ipwho.isHydra.ccLoader.batGet hashmaliciousUnknownBrowse
                                                • 108.181.61.49
                                                full.exeGet hashmaliciousQuasarBrowse
                                                • 108.181.61.49
                                                https://gvvc18-secondary.z15.web.core.windows.net/werrx01USAHTML/?bcda=1-844-439-9938Get hashmaliciousTechSupportScamBrowse
                                                • 108.181.61.49
                                                file.exeGet hashmaliciousAmadey, AsyncRAT, Credential Flusher, LummaC Stealer, Stealc, Vidar, XWormBrowse
                                                • 103.126.138.87
                                                TeudA4phjN.exeGet hashmaliciousQuasarBrowse
                                                • 103.126.138.87
                                                http://www.sbh.co.uk/Get hashmaliciousHTMLPhisher, TechSupportScamBrowse
                                                • 103.126.138.87
                                                file.exeGet hashmaliciousQuasarBrowse
                                                • 103.126.138.87
                                                file.exeGet hashmaliciousQuasarBrowse
                                                • 103.126.138.87
                                                ugjigghFzZ.exeGet hashmaliciousQuasarBrowse
                                                • 103.126.138.87
                                                http://web-quorvyn.azurewebsites.netGet hashmaliciousTechSupportScamBrowse
                                                • 103.126.138.87
                                                bg.microsoft.map.fastly.net1434orz.exeGet hashmaliciousQuasarBrowse
                                                • 199.232.214.172
                                                file.exeGet hashmaliciousStealcBrowse
                                                • 199.232.214.172
                                                3.exeGet hashmaliciousCobaltStrike, ReflectiveLoaderBrowse
                                                • 199.232.210.172
                                                3.exeGet hashmaliciousCobaltStrikeBrowse
                                                • 199.232.210.172
                                                Bilbao.dll.dllGet hashmaliciousUnknownBrowse
                                                • 199.232.210.172
                                                3181425fa7464801a03868a1adf86bc1.ps1Get hashmaliciousUnknownBrowse
                                                • 199.232.214.172
                                                job.ps1Get hashmaliciousDcRat, StormKitty, VenomRATBrowse
                                                • 199.232.210.172
                                                job.ps1Get hashmaliciousDcRat, StormKitty, VenomRATBrowse
                                                • 199.232.210.172
                                                Ni2ghr9eUJ.exeGet hashmaliciousSocks5SystemzBrowse
                                                • 199.232.214.172
                                                MN2MXYYRQG.exeGet hashmaliciousUnknownBrowse
                                                • 199.232.214.172
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                ASN852CAarm7.nn-20241213-0355.elfGet hashmaliciousMirai, OkiruBrowse
                                                • 50.98.219.123
                                                Hydra.ccLoader.batGet hashmaliciousUnknownBrowse
                                                • 108.181.61.49
                                                full.exeGet hashmaliciousQuasarBrowse
                                                • 108.181.61.49
                                                jew.sh4.elfGet hashmaliciousUnknownBrowse
                                                • 75.158.230.151
                                                mpsl.elfGet hashmaliciousMiraiBrowse
                                                • 198.166.177.229
                                                mips.elfGet hashmaliciousMiraiBrowse
                                                • 142.41.252.248
                                                https://gvvc18-secondary.z15.web.core.windows.net/werrx01USAHTML/?bcda=1-844-439-9938Get hashmaliciousTechSupportScamBrowse
                                                • 108.181.61.49
                                                PO2412010.exeGet hashmaliciousFormBookBrowse
                                                • 108.181.189.7
                                                rebirth.x86.elfGet hashmaliciousMirai, OkiruBrowse
                                                • 206.116.110.1
                                                la.bot.arm6.elfGet hashmaliciousMiraiBrowse
                                                • 108.181.135.156
                                                BITREE-ASRUSystem.exeGet hashmaliciousQuasarBrowse
                                                • 193.161.193.99
                                                CritScript.exeGet hashmaliciousBinder HackTool, QuasarBrowse
                                                • 193.161.193.99
                                                Client-built.exeGet hashmaliciousQuasarBrowse
                                                • 193.161.193.99
                                                https://bb.vg/STDBANKGet hashmaliciousUnknownBrowse
                                                • 193.161.193.99
                                                0Nj1sxmCtr.exeGet hashmaliciousBinder HackTool, QuasarBrowse
                                                • 193.161.193.99
                                                10a790a9b50e4c6f915746b6794d78015c30d86f929e0.exeGet hashmaliciousQuasarBrowse
                                                • 193.161.193.99
                                                kwlYObMOSn.exeGet hashmaliciousXWormBrowse
                                                • 193.161.193.99
                                                https://fxwf9-53194.portmap.io:53194/?x=sb232111Get hashmaliciousUnknownBrowse
                                                • 193.161.193.99
                                                invoice263886766 AWB.vbsGet hashmaliciousAveMaria, PrivateLoader, UACMeBrowse
                                                • 193.161.193.99
                                                https://E.vg/FoedcaVhTGet hashmaliciousUnknownBrowse
                                                • 193.161.193.99
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                3b5074b1b5d032e5620f69f9f700ff0esmb.ps1Get hashmaliciousXmrigBrowse
                                                • 108.181.61.49
                                                j87MOFviv4.lnkGet hashmaliciousUnknownBrowse
                                                • 108.181.61.49
                                                DvGZE4FU02.lnkGet hashmaliciousUnknownBrowse
                                                • 108.181.61.49
                                                j3z5kxxt52.lnkGet hashmaliciousUnknownBrowse
                                                • 108.181.61.49
                                                zpbiw0htk6.lnkGet hashmaliciousUnknownBrowse
                                                • 108.181.61.49
                                                Uniswap Sniper Bot With GUI.exeGet hashmaliciousUnknownBrowse
                                                • 108.181.61.49
                                                Kopia%20p%C5%82atno%C5%9Bci_Santander_TF1903218545300000564290004.exeGet hashmaliciousUnknownBrowse
                                                • 108.181.61.49
                                                Kopia%20p%C5%82atno%C5%9Bci_Santander_TF1903218545300000564290004.exeGet hashmaliciousUnknownBrowse
                                                • 108.181.61.49
                                                archive.htmGet hashmaliciousHTMLPhisherBrowse
                                                • 108.181.61.49
                                                2024_12_12_Aster_Oak_Babywear_Advertising_Project_Shopify.pdf.lnk.download.lnkGet hashmaliciousUnknownBrowse
                                                • 108.181.61.49
                                                No context
                                                Process:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                                File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                                Category:dropped
                                                Size (bytes):71954
                                                Entropy (8bit):7.996617769952133
                                                Encrypted:true
                                                SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                                MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                                SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                                SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                                SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                                Malicious:false
                                                Reputation:high, very likely benign file
                                                Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                                Process:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):328
                                                Entropy (8bit):3.150184159866505
                                                Encrypted:false
                                                SSDEEP:6:kKZL9UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:BiDnLNkPlE99SNxAhUe/3
                                                MD5:95FF8A558ADBD98EDCD33B5D65F5D13F
                                                SHA1:841A73C0BF8676AF0AE1AE569C87CEF716EDB22C
                                                SHA-256:3A2F04A668869AD7932CDAF98F149F30CBF59E4708CE399F01FA99047064F20E
                                                SHA-512:524161E461DEB55423425C15D0212AD554B4E368B5DD7D14D7DD4C7D8F5DB9B7520AA5CFCB8D78D4A845A15F85DFCC238FBC21EF3BEDFC401A19651604FC792E
                                                Malicious:false
                                                Reputation:low
                                                Preview:p...... ..........O.IM..(....................................................... ........G..@.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                                Process:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                                File Type:CSV text
                                                Category:dropped
                                                Size (bytes):1281
                                                Entropy (8bit):5.370111951859942
                                                Encrypted:false
                                                SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
                                                MD5:12C61586CD59AA6F2A21DF30501F71BD
                                                SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
                                                SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
                                                SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
                                                Malicious:false
                                                Reputation:high, very likely benign file
                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                                Process:C:\Users\user\Desktop\Loader.exe
                                                File Type:CSV text
                                                Category:dropped
                                                Size (bytes):1281
                                                Entropy (8bit):5.370111951859942
                                                Encrypted:false
                                                SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
                                                MD5:12C61586CD59AA6F2A21DF30501F71BD
                                                SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
                                                SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
                                                SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
                                                Malicious:true
                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                                Process:C:\Users\user\Desktop\Loader.exe
                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Category:dropped
                                                Size (bytes):3266048
                                                Entropy (8bit):6.08501627050001
                                                Encrypted:false
                                                SSDEEP:49152:fvrI22SsaNYfdPBldt698dBcjHCWvXE/sGkCqILo+dPVTHHB72eh2NT:fvU22SsaNYfdPBldt6+dBcjHCWvTm
                                                MD5:E9A138D8C5AB2CCCC8BF9976F66D30C8
                                                SHA1:E996894168F0D4E852162D1290250DFA986310F8
                                                SHA-256:E63B41BFDD3A89B6EBCFC05DB158FDC399DBC081E49B01498831A62DF34DEFC3
                                                SHA-512:5982FC759C8B1121AB5BEFAAC53E1521931F06D276140195FA1FCBCD1069F546253E366EF4CC37245B3BC2ED60C4B8D0583F133A1264EFD77938ADF456A08CCC
                                                Malicious:true
                                                Yara Hits:
                                                • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Joe Security
                                                • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Joe Security
                                                • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Florian Roth
                                                • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: ditekSHen
                                                • Rule: MALWARE_Win_QuasarStealer, Description: Detects Quasar infostealer, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: ditekshen
                                                Antivirus:
                                                • Antivirus: Avira, Detection: 100%
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                • Antivirus: ReversingLabs, Detection: 79%
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d..................1...........1.. ........@.. .......................@2...........@...................................1.K.....2...................... 2...................................................... ............... ..H............text...$.1.. ....1................. ..`.rsrc.........2.......1.............@..@.reloc....... 2.......1.............@..B..................1.....H........................k..p............................................0..M....... ....(.....(...........s....(....(...........s....o....(.....(....s....(....*....0..8.......(....(0....s....%.o....%.o....%.o....(....&..&...(.....*........--..........00.......0..@........o....,7(....(0....s....%.o....%.o....%.o....(....&..&...(.....*........-5..........08......f~w...,.~....(....(....*.*v.(.....s....}.....s....}....*r..(......(.....(......(....*....0..L........{....r...po....
                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Entropy (8bit):6.08501627050001
                                                TrID:
                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                • Win32 Executable (generic) a (10002005/4) 49.75%
                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                • Windows Screen Saver (13104/52) 0.07%
                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                File name:Loader.exe
                                                File size:3'266'048 bytes
                                                MD5:e9a138d8c5ab2cccc8bf9976f66d30c8
                                                SHA1:e996894168f0d4e852162d1290250dfa986310f8
                                                SHA256:e63b41bfdd3a89b6ebcfc05db158fdc399dbc081e49b01498831a62df34defc3
                                                SHA512:5982fc759c8b1121ab5befaac53e1521931f06d276140195fa1fcbcd1069f546253e366ef4cc37245b3bc2ed60c4b8d0583f133a1264efd77938adf456a08ccc
                                                SSDEEP:49152:fvrI22SsaNYfdPBldt698dBcjHCWvXE/sGkCqILo+dPVTHHB72eh2NT:fvU22SsaNYfdPBldt6+dBcjHCWvTm
                                                TLSH:A7E55B043BF85E23E1BBE27395B0041667F0FC6AB3A3EB1B6191677D1C53B4059426AB
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d..................1...........1.. ........@.. .......................@2...........@................................
                                                Icon Hash:00928e8e8686b000
                                                Entrypoint:0x71e41e
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x640DFAE7 [Sun Mar 12 16:16:39 2023 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                Instruction
                                                jmp dword ptr [00402000h]
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x31e3d00x4b.text
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x3200000xa93.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x3220000xc.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x20000x31c4240x31c600486d04f2872d865d32404745efd903deunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rsrc0x3200000xa930xc00cdeae95ac72e9e58017d2bcc89d2fbeaFalse0.36328125data4.653972105845318IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0x3220000xc0x200fa735c7d99f8b46f526d66db4681db3bFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_VERSION0x3200a00x31cdata0.4484924623115578
                                                RT_MANIFEST0x3203bc0x6d7XML 1.0 document, Unicode text, UTF-8 (with BOM) text0.40319817247287265
                                                DLLImport
                                                mscoree.dll_CorExeMain
                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                2024-12-13T11:16:24.671472+01002027619ET MALWARE Observed Malicious SSL Cert (Quasar CnC)1193.161.193.9962863192.168.2.749699TCP
                                                2024-12-13T11:16:24.671472+01002035595ET MALWARE Generic AsyncRAT Style SSL Cert1193.161.193.9962863192.168.2.749699TCP
                                                TimestampSource PortDest PortSource IPDest IP
                                                Dec 13, 2024 11:16:19.363657951 CET4969962863192.168.2.7193.161.193.99
                                                Dec 13, 2024 11:16:19.484633923 CET6286349699193.161.193.99192.168.2.7
                                                Dec 13, 2024 11:16:19.485301018 CET4969962863192.168.2.7193.161.193.99
                                                Dec 13, 2024 11:16:19.516057968 CET4969962863192.168.2.7193.161.193.99
                                                Dec 13, 2024 11:16:19.636174917 CET6286349699193.161.193.99192.168.2.7
                                                Dec 13, 2024 11:16:24.312633038 CET6286349699193.161.193.99192.168.2.7
                                                Dec 13, 2024 11:16:24.312659979 CET6286349699193.161.193.99192.168.2.7
                                                Dec 13, 2024 11:16:24.312774897 CET4969962863192.168.2.7193.161.193.99
                                                Dec 13, 2024 11:16:24.544712067 CET6286349699193.161.193.99192.168.2.7
                                                Dec 13, 2024 11:16:24.551382065 CET4969962863192.168.2.7193.161.193.99
                                                Dec 13, 2024 11:16:24.671472073 CET6286349699193.161.193.99192.168.2.7
                                                Dec 13, 2024 11:16:25.105519056 CET6286349699193.161.193.99192.168.2.7
                                                Dec 13, 2024 11:16:25.152365923 CET4969962863192.168.2.7193.161.193.99
                                                Dec 13, 2024 11:16:27.494064093 CET49702443192.168.2.7108.181.61.49
                                                Dec 13, 2024 11:16:27.494108915 CET44349702108.181.61.49192.168.2.7
                                                Dec 13, 2024 11:16:27.494229078 CET49702443192.168.2.7108.181.61.49
                                                Dec 13, 2024 11:16:27.495754004 CET49702443192.168.2.7108.181.61.49
                                                Dec 13, 2024 11:16:27.495765924 CET44349702108.181.61.49192.168.2.7
                                                Dec 13, 2024 11:16:29.904550076 CET44349702108.181.61.49192.168.2.7
                                                Dec 13, 2024 11:16:29.904689074 CET49702443192.168.2.7108.181.61.49
                                                Dec 13, 2024 11:16:29.909032106 CET49702443192.168.2.7108.181.61.49
                                                Dec 13, 2024 11:16:29.909068108 CET44349702108.181.61.49192.168.2.7
                                                Dec 13, 2024 11:16:29.909339905 CET44349702108.181.61.49192.168.2.7
                                                Dec 13, 2024 11:16:29.913090944 CET49702443192.168.2.7108.181.61.49
                                                Dec 13, 2024 11:16:29.959338903 CET44349702108.181.61.49192.168.2.7
                                                Dec 13, 2024 11:16:30.524059057 CET44349702108.181.61.49192.168.2.7
                                                Dec 13, 2024 11:16:30.524147034 CET44349702108.181.61.49192.168.2.7
                                                Dec 13, 2024 11:16:30.524188042 CET49702443192.168.2.7108.181.61.49
                                                Dec 13, 2024 11:16:30.648833036 CET49702443192.168.2.7108.181.61.49
                                                Dec 13, 2024 11:16:30.877738953 CET4969962863192.168.2.7193.161.193.99
                                                Dec 13, 2024 11:16:30.998281002 CET6286349699193.161.193.99192.168.2.7
                                                Dec 13, 2024 11:16:30.998486042 CET4969962863192.168.2.7193.161.193.99
                                                Dec 13, 2024 11:16:31.118458986 CET6286349699193.161.193.99192.168.2.7
                                                Dec 13, 2024 11:16:32.374737024 CET6286349699193.161.193.99192.168.2.7
                                                Dec 13, 2024 11:16:32.417714119 CET4969962863192.168.2.7193.161.193.99
                                                Dec 13, 2024 11:16:32.675568104 CET6286349699193.161.193.99192.168.2.7
                                                Dec 13, 2024 11:16:32.730206013 CET4969962863192.168.2.7193.161.193.99
                                                Dec 13, 2024 11:16:57.683864117 CET4969962863192.168.2.7193.161.193.99
                                                Dec 13, 2024 11:16:57.803679943 CET6286349699193.161.193.99192.168.2.7
                                                Dec 13, 2024 11:17:22.808572054 CET4969962863192.168.2.7193.161.193.99
                                                Dec 13, 2024 11:17:22.932614088 CET6286349699193.161.193.99192.168.2.7
                                                Dec 13, 2024 11:17:47.933659077 CET4969962863192.168.2.7193.161.193.99
                                                Dec 13, 2024 11:17:48.053730011 CET6286349699193.161.193.99192.168.2.7
                                                Dec 13, 2024 11:18:13.058885098 CET4969962863192.168.2.7193.161.193.99
                                                Dec 13, 2024 11:18:13.179228067 CET6286349699193.161.193.99192.168.2.7
                                                Dec 13, 2024 11:18:38.183901072 CET4969962863192.168.2.7193.161.193.99
                                                Dec 13, 2024 11:18:38.304728985 CET6286349699193.161.193.99192.168.2.7
                                                Dec 13, 2024 11:19:03.310910940 CET4969962863192.168.2.7193.161.193.99
                                                Dec 13, 2024 11:19:03.430783033 CET6286349699193.161.193.99192.168.2.7
                                                Dec 13, 2024 11:19:28.468522072 CET4969962863192.168.2.7193.161.193.99
                                                Dec 13, 2024 11:19:28.588588953 CET6286349699193.161.193.99192.168.2.7
                                                Dec 13, 2024 11:19:53.605962992 CET4969962863192.168.2.7193.161.193.99
                                                Dec 13, 2024 11:19:53.725895882 CET6286349699193.161.193.99192.168.2.7
                                                Dec 13, 2024 11:20:18.731066942 CET4969962863192.168.2.7193.161.193.99
                                                Dec 13, 2024 11:20:18.851042032 CET6286349699193.161.193.99192.168.2.7
                                                TimestampSource PortDest PortSource IPDest IP
                                                Dec 13, 2024 11:16:18.825575113 CET5011853192.168.2.71.1.1.1
                                                Dec 13, 2024 11:16:19.151226044 CET53501181.1.1.1192.168.2.7
                                                Dec 13, 2024 11:16:27.349133968 CET5066653192.168.2.71.1.1.1
                                                Dec 13, 2024 11:16:27.489552975 CET53506661.1.1.1192.168.2.7
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Dec 13, 2024 11:16:18.825575113 CET192.168.2.71.1.1.10xb91dStandard query (0)Dystopian-62863.portmap.hostA (IP address)IN (0x0001)false
                                                Dec 13, 2024 11:16:27.349133968 CET192.168.2.71.1.1.10x15d8Standard query (0)ipwho.isA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Dec 13, 2024 11:16:19.151226044 CET1.1.1.1192.168.2.70xb91dNo error (0)Dystopian-62863.portmap.host193.161.193.99A (IP address)IN (0x0001)false
                                                Dec 13, 2024 11:16:27.489552975 CET1.1.1.1192.168.2.70x15d8No error (0)ipwho.is108.181.61.49A (IP address)IN (0x0001)false
                                                Dec 13, 2024 11:16:32.525046110 CET1.1.1.1192.168.2.70xc8f7No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                Dec 13, 2024 11:16:32.525046110 CET1.1.1.1192.168.2.70xc8f7No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                • ipwho.is
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.749702108.181.61.494436632C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                                TimestampBytes transferredDirectionData
                                                2024-12-13 10:16:29 UTC150OUTGET / HTTP/1.1
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0
                                                Host: ipwho.is
                                                Connection: Keep-Alive
                                                2024-12-13 10:16:30 UTC223INHTTP/1.1 200 OK
                                                Date: Fri, 13 Dec 2024 10:16:30 GMT
                                                Content-Type: application/json; charset=utf-8
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                Server: ipwhois
                                                Access-Control-Allow-Headers: *
                                                X-Robots-Tag: noindex
                                                2024-12-13 10:16:30 UTC1021INData Raw: 33 66 31 0d 0a 7b 0a 20 20 20 20 22 41 62 6f 75 74 20 55 73 22 3a 20 22 68 74 74 70 73 3a 5c 2f 5c 2f 69 70 77 68 6f 69 73 2e 69 6f 22 2c 0a 20 20 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 0a 20 20 20 20 22 73 75 63 63 65 73 73 22 3a 20 74 72 75 65 2c 0a 20 20 20 20 22 74 79 70 65 22 3a 20 22 49 50 76 34 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 22 3a 20 22 4e 6f 72 74 68 20 41 6d 65 72 69 63 61 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 5f 63 6f 64 65 22 3a 20 22 4e 41 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 5f 63 6f 64 65 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f
                                                Data Ascii: 3f1{ "About Us": "https:\/\/ipwhois.io", "ip": "8.46.123.189", "success": true, "type": "IPv4", "continent": "North America", "continent_code": "NA", "country": "United States", "country_code": "US", "region": "New Yo


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:05:16:13
                                                Start date:13/12/2024
                                                Path:C:\Users\user\Desktop\Loader.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Users\user\Desktop\Loader.exe"
                                                Imagebase:0x2c0000
                                                File size:3'266'048 bytes
                                                MD5 hash:E9A138D8C5AB2CCCC8BF9976F66D30C8
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000000.1235547319.00000000005E0000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.1264333421.000000001B460000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000000.1235147298.00000000002C2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                Reputation:low
                                                Has exited:true

                                                Target ID:2
                                                Start time:05:16:15
                                                Start date:13/12/2024
                                                Path:C:\Windows\System32\schtasks.exe
                                                Wow64 process (32bit):false
                                                Commandline:"schtasks" /create /tn "SubStart" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                                Imagebase:0x7ff606200000
                                                File size:235'008 bytes
                                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:3
                                                Start time:05:16:15
                                                Start date:13/12/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff75da10000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:4
                                                Start time:05:16:15
                                                Start date:13/12/2024
                                                Path:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                                                Imagebase:0xef0000
                                                File size:3'266'048 bytes
                                                MD5 hash:E9A138D8C5AB2CCCC8BF9976F66D30C8
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000004.00000002.3708336873.00000000039DD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Joe Security
                                                • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Joe Security
                                                • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Florian Roth
                                                • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: ditekSHen
                                                • Rule: MALWARE_Win_QuasarStealer, Description: Detects Quasar infostealer, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: ditekshen
                                                Antivirus matches:
                                                • Detection: 100%, Avira
                                                • Detection: 100%, Joe Sandbox ML
                                                • Detection: 79%, ReversingLabs
                                                Reputation:low
                                                Has exited:false

                                                Target ID:5
                                                Start time:05:16:16
                                                Start date:13/12/2024
                                                Path:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                                Imagebase:0xf70000
                                                File size:3'266'048 bytes
                                                MD5 hash:E9A138D8C5AB2CCCC8BF9976F66D30C8
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low
                                                Has exited:true

                                                Target ID:9
                                                Start time:05:16:17
                                                Start date:13/12/2024
                                                Path:C:\Windows\System32\schtasks.exe
                                                Wow64 process (32bit):false
                                                Commandline:"schtasks" /create /tn "SubStart" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                                Imagebase:0x7ff606200000
                                                File size:235'008 bytes
                                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:10
                                                Start time:05:16:17
                                                Start date:13/12/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff75da10000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:23.2%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:7
                                                  Total number of Limit Nodes:0
                                                  execution_graph 1693 7ffaac963569 1694 7ffaac963571 DeleteFileW 1693->1694 1696 7ffaac963616 1694->1696 1697 7ffaac963525 1698 7ffaac963531 1697->1698 1699 7ffaac963571 DeleteFileW 1697->1699 1701 7ffaac963616 1699->1701

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1265443123.00007FFAAC960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ffaac960000_Loader.jbxd
                                                  Similarity
                                                  • API ID: DeleteFile
                                                  • String ID:
                                                  • API String ID: 4033686569-0
                                                  • Opcode ID: 53d675993d8509ce1ba326a733486caf33ddf98d7ee6d597d19f86fb81ddaf75
                                                  • Instruction ID: db46f2fb54c9fdd2db09b096141651feeec17c5d00961cb6080b48dd840bc5d6
                                                  • Opcode Fuzzy Hash: 53d675993d8509ce1ba326a733486caf33ddf98d7ee6d597d19f86fb81ddaf75
                                                  • Instruction Fuzzy Hash: 8641C37180DB888FDB59DB6888496F9BFF0FF56310F0481AFD04DC7692DA24A8098791

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 14 7ffaac963569-7ffaac9635d8 19 7ffaac9635da-7ffaac9635df 14->19 20 7ffaac9635e2-7ffaac963614 DeleteFileW 14->20 19->20 21 7ffaac96361c-7ffaac96364a 20->21 22 7ffaac963616 20->22 22->21
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1265443123.00007FFAAC960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC960000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ffaac960000_Loader.jbxd
                                                  Similarity
                                                  • API ID: DeleteFile
                                                  • String ID:
                                                  • API String ID: 4033686569-0
                                                  • Opcode ID: 24d29a9467c1056d760607dafe567b6e54780e3ef00d41ce726fbc2fb4d38d1f
                                                  • Instruction ID: 7931748fd36b5b17b968b550ae66cf4e5df786419d99864684509448449cb522
                                                  • Opcode Fuzzy Hash: 24d29a9467c1056d760607dafe567b6e54780e3ef00d41ce726fbc2fb4d38d1f
                                                  • Instruction Fuzzy Hash: C631C27190CA5C8FDB19DB58C8496F9BBF0FF66310F04426FD049D3292DB64A805CB81

                                                  Execution Graph

                                                  Execution Coverage:5.9%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:8
                                                  Total number of Limit Nodes:1
                                                  execution_graph 48743 7ffaacbee709 48744 7ffaacbee71f 48743->48744 48745 7ffaacbee7cb 48744->48745 48746 7ffaacbee8c4 SetWindowsHookExW 48744->48746 48747 7ffaacbee906 48746->48747 48748 7ffaac973569 48749 7ffaac973571 DeleteFileW 48748->48749 48751 7ffaac973616 48749->48751
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718941264.00007FFAACD00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD00000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacd00000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: H
                                                  • API String ID: 0-2852464175
                                                  • Opcode ID: 3f2370b91f571877c29b60f09b1f0650437bd143ef510cf100c4471c5880c258
                                                  • Instruction ID: 01a889f52bd56d88325f5ea3a83019d88c6e89fbc9a52826e90d3ee68905f98b
                                                  • Opcode Fuzzy Hash: 3f2370b91f571877c29b60f09b1f0650437bd143ef510cf100c4471c5880c258
                                                  • Instruction Fuzzy Hash: 6F834C41B1AE4B9FFAEA932C046537957D2EFDA640B59857AD02FC32C6ED18DC0A43C1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718167299.00007FFAACBE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACBE0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacbe0000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $
                                                  • API String ID: 0-227171996
                                                  • Opcode ID: 4fa685de0ddf996901415cbb6c051e25482d9210cb345302dfca005c586eaa4e
                                                  • Instruction ID: 1b2095371805fae64b591451123ddc3b8119c8669012f2fc7c5538aa9c750b34
                                                  • Opcode Fuzzy Hash: 4fa685de0ddf996901415cbb6c051e25482d9210cb345302dfca005c586eaa4e
                                                  • Instruction Fuzzy Hash: 5F82F531A1DA49AFEBE4EF2CC455A7837D1FF5A301B1541B9D04EC72A2DE28EC498781
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718167299.00007FFAACBE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACBE0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacbe0000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3c09c55e86abef31d7e4e5daf96bca8eb716468505f28f1e86016ad239d24f11
                                                  • Instruction ID: 2771a7c9ab6fd45cb886f4b4f9e0e1ff9a3465ecf54542269ba45c73a6daef59
                                                  • Opcode Fuzzy Hash: 3c09c55e86abef31d7e4e5daf96bca8eb716468505f28f1e86016ad239d24f11
                                                  • Instruction Fuzzy Hash: 4AE27270A18A1D8FEF98DF18C494BA977E2FF59700F1081A9D44ED7296DB35E846CB80
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718167299.00007FFAACBE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACBE0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacbe0000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: S&_H
                                                  • API String ID: 0-2165886267
                                                  • Opcode ID: 32cf31652824a2d7d88733b4b4226a758b4ddf705c2e3d3afbc479ed1ac33836
                                                  • Instruction ID: 890e7b91e714a2272dd360e4b761068dbcaed0125fe549b3daae51b269e8d796
                                                  • Opcode Fuzzy Hash: 32cf31652824a2d7d88733b4b4226a758b4ddf705c2e3d3afbc479ed1ac33836
                                                  • Instruction Fuzzy Hash: 1E32066180E7D68FF7A59728C4565B43BE0EF57310B0485FAD09DCB6A3D919E80E83D1
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718167299.00007FFAACBE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACBE0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacbe0000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fe8d30ed78c1f9ad1e891b9c3b602f185a06ef6a73c991a589b84cfbb150e8a7
                                                  • Instruction ID: b90446b9e649c2fcdf673867046a15db17495aa947299474e6ceac444465f13d
                                                  • Opcode Fuzzy Hash: fe8d30ed78c1f9ad1e891b9c3b602f185a06ef6a73c991a589b84cfbb150e8a7
                                                  • Instruction Fuzzy Hash: FD924671A1EB598FF7A5DB2CC4556B837E1EF9A310B0441B9D04DCB292DE29EC0A87C1

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 4782 7ffaacbe9fd0-7ffaacbea018 4786 7ffaacbea5be-7ffaacbea5d0 4782->4786 4787 7ffaacbea01e-7ffaacbea030 4782->4787 4787->4786 4789 7ffaacbea036-7ffaacbea06f 4787->4789 4789->4786 4793 7ffaacbea075-7ffaacbea0b6 4789->4793 4797 7ffaacbea168-7ffaacbea17b 4793->4797 4798 7ffaacbea0bc-7ffaacbea0d4 4793->4798 4803 7ffaacbea1d0 4797->4803 4804 7ffaacbea17d-7ffaacbea19e 4797->4804 4801 7ffaacbea15c-7ffaacbea162 4798->4801 4802 7ffaacbea0da-7ffaacbea0fa 4798->4802 4801->4797 4801->4798 4802->4801 4815 7ffaacbea0fc-7ffaacbea10e 4802->4815 4805 7ffaacbea1d2-7ffaacbea1d7 4803->4805 4810 7ffaacbea1c9-7ffaacbea1ce 4804->4810 4811 7ffaacbea1a0-7ffaacbea1c7 4804->4811 4806 7ffaacbea1d9-7ffaacbea1e0 4805->4806 4807 7ffaacbea21e-7ffaacbea241 4805->4807 4812 7ffaacbea1e7-7ffaacbea201 4806->4812 4816 7ffaacbea337-7ffaacbea343 4807->4816 4817 7ffaacbea247-7ffaacbea26f 4807->4817 4810->4805 4811->4805 4812->4807 4821 7ffaacbea203-7ffaacbea21c 4812->4821 4815->4801 4824 7ffaacbea110-7ffaacbea114 4815->4824 4816->4786 4820 7ffaacbea349-7ffaacbea35e 4816->4820 4829 7ffaacbea275-7ffaacbea290 4817->4829 4830 7ffaacbea32b-7ffaacbea331 4817->4830 4820->4786 4821->4807 4827 7ffaacbea5d1-7ffaacbea673 4824->4827 4828 7ffaacbea11a-7ffaacbea12f 4824->4828 4840 7ffaacbea679-7ffaacbea67b 4827->4840 4841 7ffaacbea785-7ffaacbea791 4827->4841 4835 7ffaacbea136-7ffaacbea138 4828->4835 4829->4830 4842 7ffaacbea296-7ffaacbea2a8 4829->4842 4830->4816 4830->4817 4835->4801 4836 7ffaacbea13a-7ffaacbea158 call 7ffaacbe53c0 4835->4836 4836->4801 4844 7ffaacbea695-7ffaacbea6a3 4840->4844 4845 7ffaacbea67d-7ffaacbea68f 4840->4845 4850 7ffaacbea793-7ffaacbea7b8 4841->4850 4851 7ffaacbea7ba 4841->4851 4842->4830 4855 7ffaacbea2ae-7ffaacbea2b2 4842->4855 4848 7ffaacbea7f8-7ffaacbea82b 4844->4848 4849 7ffaacbea6a9-7ffaacbea6c0 4844->4849 4845->4844 4857 7ffaacbea7bf-7ffaacbea7f1 4845->4857 4873 7ffaacbea832-7ffaacbea83e 4848->4873 4868 7ffaacbea6c2-7ffaacbea6d4 4849->4868 4869 7ffaacbea6da-7ffaacbea6dd 4849->4869 4850->4851 4851->4857 4855->4827 4859 7ffaacbea2b8-7ffaacbea2fb 4855->4859 4857->4848 4859->4830 4886 7ffaacbea2fd-7ffaacbea328 call 7ffaacbe53c0 4859->4886 4868->4869 4868->4873 4870 7ffaacbea706-7ffaacbea722 call 7ffaacbe7a50 4869->4870 4871 7ffaacbea6df-7ffaacbea6f6 4869->4871 4891 7ffaacbea724-7ffaacbea752 4870->4891 4892 7ffaacbea753-7ffaacbea757 4870->4892 4871->4870 4896 7ffaacbea6f8-7ffaacbea6fc 4871->4896 4879 7ffaacbea867 4873->4879 4880 7ffaacbea840-7ffaacbea864 4873->4880 4882 7ffaacbea869-7ffaacbea871 4879->4882 4883 7ffaacbea87b 4879->4883 4880->4879 4887 7ffaacbea873-7ffaacbea879 4882->4887 4888 7ffaacbea87d 4882->4888 4883->4888 4886->4830 4887->4883 4894 7ffaacbea881-7ffaacbea8bc 4887->4894 4888->4894 4895 7ffaacbea87f 4888->4895 4900 7ffaacbea75e-7ffaacbea784 4892->4900 4903 7ffaacbea8be-7ffaacbea8e5 4894->4903 4904 7ffaacbea8ff-7ffaacbea932 4894->4904 4895->4894 4902 7ffaacbea703-7ffaacbea704 4896->4902 4902->4870 4914 7ffaacbea939-7ffaacbea981 4903->4914 4915 7ffaacbea8e7-7ffaacbea8fe 4903->4915 4904->4914 4922 7ffaacbea985-7ffaacbea9a7 4914->4922 4923 7ffaacbea983 4914->4923 4926 7ffaacbea9ad-7ffaacbea9bf 4922->4926 4927 7ffaacbeaa8a-7ffaacbeaa96 4922->4927 4923->4922 4924 7ffaacbea9c5-7ffaacbea9ca 4923->4924 4933 7ffaacbea9c1-7ffaacbea9c4 4926->4933 4934 7ffaacbea9cb-7ffaacbea9e3 call 7ffaacbe40b0 4926->4934 4929 7ffaacbeaa98-7ffaacbeaabd 4927->4929 4930 7ffaacbeaabf-7ffaacbeaad3 4927->4930 4929->4930 4938 7ffaacbeab15-7ffaacbeab17 4930->4938 4939 7ffaacbeaad5-7ffaacbeaaf2 4930->4939 4933->4924 4943 7ffaacbeaa47-7ffaacbeaa50 4934->4943 4944 7ffaacbea9e5-7ffaacbeaa16 4934->4944 4942 7ffaacbeab19-7ffaacbeab1b 4938->4942 4939->4942 4945 7ffaacbeaaf4-7ffaacbeab0f 4939->4945 4946 7ffaacbeab2c-7ffaacbeab3c 4942->4946 4947 7ffaacbeab1d-7ffaacbeab2b 4942->4947 4952 7ffaacbeaa18-7ffaacbeaa3f 4944->4952 4953 7ffaacbeaa41-7ffaacbeaa45 4944->4953 4945->4942 4949 7ffaacbeab11-7ffaacbeab12 4945->4949 4949->4938 4952->4953 4955 7ffaacbeaa51-7ffaacbeaa89 4952->4955 4953->4943 4953->4944
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718167299.00007FFAACBE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACBE0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacbe0000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7656ee180936a143ad3958a979a5dc20aa114f6d1c6d92f28dba5fae745d720e
                                                  • Instruction ID: dda955b4a13ec2d7a42202bc040c2846d062d0b89204e77ccf4f1cfc06abd510
                                                  • Opcode Fuzzy Hash: 7656ee180936a143ad3958a979a5dc20aa114f6d1c6d92f28dba5fae745d720e
                                                  • Instruction Fuzzy Hash: 1E62573171DA198FFB98EB2CD455AB43BD1FF9A700B0541B9E44EC3292DE29EC068781

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 5426 7ffaacbfebd4-7ffaacbfec3f call 7ffaacbe5070 5430 7ffaacbfec49-7ffaacbfec59 5426->5430 5431 7ffaacbfec41-7ffaacbfec46 5426->5431 5432 7ffaacbff182-7ffaacbff18d 5430->5432 5433 7ffaacbfec5f-7ffaacbfec6f call 7ffaacbeac60 5430->5433 5431->5430 5435 7ffaacbff197-7ffaacbff1f7 call 7ffaacbe4780 5432->5435 5436 7ffaacbff18f-7ffaacbff194 5432->5436 5437 7ffaacbfec74-7ffaacbfec79 5433->5437 5444 7ffaacbff121-7ffaacbff17d 5435->5444 5445 7ffaacbff1fd-7ffaacbff206 5435->5445 5436->5435 5439 7ffaacbff08f-7ffaacbff0e1 5437->5439 5440 7ffaacbfec7f-7ffaacbfec8a 5437->5440 5457 7ffaacbff0e8-7ffaacbff11a 5439->5457 5442 7ffaacbfeca7-7ffaacbfece0 call 7ffaacbe4780 5440->5442 5443 7ffaacbfec8c-7ffaacbfec9d 5440->5443 5461 7ffaacbfece2-7ffaacbfed06 call 7ffaacbea990 call 7ffaacbeaae0 5442->5461 5462 7ffaacbfed0b-7ffaacbfede9 call 7ffaacbe4780 5442->5462 5443->5442 5460 7ffaacbfec9f-7ffaacbfeca4 5443->5460 5449 7ffaacbff20c-7ffaacbff217 5445->5449 5450 7ffaacbff3fb-7ffaacbff447 5445->5450 5449->5450 5456 7ffaacbff21d-7ffaacbff220 5449->5456 5477 7ffaacbff44e-7ffaacbff495 5450->5477 5456->5457 5458 7ffaacbff226-7ffaacbff2c7 5456->5458 5457->5444 5496 7ffaacbff514-7ffaacbff51d 5458->5496 5497 7ffaacbff2cd-7ffaacbff2d5 5458->5497 5460->5442 5461->5462 5518 7ffaacbff056-7ffaacbff061 5462->5518 5519 7ffaacbfedef-7ffaacbfedf3 5462->5519 5484 7ffaacbff497-7ffaacbff4a6 5477->5484 5485 7ffaacbff4b2-7ffaacbff4bb 5477->5485 5491 7ffaacbff4ad-7ffaacbff4b0 5484->5491 5488 7ffaacbff4be-7ffaacbff505 5485->5488 5493 7ffaacbff50c-7ffaacbff50f 5488->5493 5491->5488 5495 7ffaacbff3a1-7ffaacbff3cf 5493->5495 5509 7ffaacbfef67-7ffaacbfef73 5495->5509 5510 7ffaacbff3d5-7ffaacbff3f6 5495->5510 5496->5495 5500 7ffaacbff523-7ffaacbff52b 5496->5500 5501 7ffaacbff2d7-7ffaacbff2dc 5497->5501 5502 7ffaacbff2e4-7ffaacbff2fb 5497->5502 5500->5495 5503 7ffaacbff531-7ffaacbff542 5500->5503 5501->5502 5502->5477 5507 7ffaacbff301-7ffaacbff34f 5502->5507 5503->5495 5514 7ffaacbff548-7ffaacbff578 5503->5514 5507->5495 5521 7ffaacbfef79-7ffaacbfef91 5509->5521 5522 7ffaacbff022-7ffaacbff029 5509->5522 5510->5509 5514->5495 5524 7ffaacbfedf9-7ffaacbfee61 5519->5524 5525 7ffaacbff02e 5519->5525 5531 7ffaacbfef97-7ffaacbfefc2 5521->5531 5532 7ffaacbff57d-7ffaacbff595 5521->5532 5526 7ffaacbff5e1-7ffaacbff601 call 7ffaacbff602 5522->5526 5524->5509 5534 7ffaacbff033-7ffaacbff04f 5525->5534 5541 7ffaacbfefc9-7ffaacbfefdd 5531->5541 5532->5534 5537 7ffaacbff59b-7ffaacbff5da 5532->5537 5534->5518 5537->5526 5546 7ffaacbfeff2-7ffaacbff020 5541->5546 5547 7ffaacbfefdf-7ffaacbfeff0 5541->5547 5546->5522 5547->5522 5547->5546
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718167299.00007FFAACBE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACBE0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacbe0000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f4324e783f9dee5b8ad2ef97c282d88b3d03f68f056f75cb00f37ec2081cb259
                                                  • Instruction ID: 4a957f2dc5b0cfe1957cd2f082f816c5ce2171790ef27e76aadd08f61aaf8869
                                                  • Opcode Fuzzy Hash: f4324e783f9dee5b8ad2ef97c282d88b3d03f68f056f75cb00f37ec2081cb259
                                                  • Instruction Fuzzy Hash: AF528071A18A5A8FEB88DF1CC491BB977D2FF99700F144169E44EC7286CE35E8468781

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 5557 7ffaacbfb861-7ffaacbfb8c4 5560 7ffaacbfb8c6-7ffaacbfb920 5557->5560 5561 7ffaacbfb925-7ffaacbfb929 5557->5561 5601 7ffaacbfbeff-7ffaacbfbf12 5560->5601 5562 7ffaacbfb92b-7ffaacbfb933 call 7ffaacbe9fd0 5561->5562 5563 7ffaacbfb93a 5561->5563 5568 7ffaacbfb938 5562->5568 5566 7ffaacbfb93c-7ffaacbfb945 5563->5566 5569 7ffaacbfb94b-7ffaacbfb950 5566->5569 5570 7ffaacbfba7a-7ffaacbfba7f 5566->5570 5568->5566 5573 7ffaacbfb956-7ffaacbfb95b 5569->5573 5574 7ffaacbfbf13-7ffaacbfbf45 5569->5574 5571 7ffaacbfbae5-7ffaacbfbae9 5570->5571 5572 7ffaacbfba81-7ffaacbfba93 call 7ffaacbe3830 5570->5572 5575 7ffaacbfbaeb-7ffaacbfbb07 call 7ffaacbe4180 5571->5575 5576 7ffaacbfbb3a-7ffaacbfbb65 5571->5576 5590 7ffaacbfba98-7ffaacbfba9f 5572->5590 5580 7ffaacbfb96f-7ffaacbfb985 call 7ffaacbe9bf0 5573->5580 5581 7ffaacbfb95d-7ffaacbfb969 5573->5581 5582 7ffaacbfbf4c-7ffaacbfbf7e 5574->5582 5607 7ffaacbfbf85-7ffaacbfbfa1 5575->5607 5608 7ffaacbfbb0d-7ffaacbfbb23 5575->5608 5604 7ffaacbfbb67-7ffaacbfbb72 5576->5604 5605 7ffaacbfbb74 5576->5605 5588 7ffaacbfb98a-7ffaacbfba75 call 7ffaacbea890 5580->5588 5581->5580 5581->5582 5582->5607 5588->5601 5596 7ffaacbfba95-7ffaacbfba96 5590->5596 5597 7ffaacbfbaa1-7ffaacbfbab8 5590->5597 5596->5590 5609 7ffaacbfbb24-7ffaacbfbb35 5597->5609 5610 7ffaacbfbaba-7ffaacbfbac2 call 7ffaacbfb700 5597->5610 5612 7ffaacbfbb76-7ffaacbfbb99 5604->5612 5605->5612 5629 7ffaacbfbfa8-7ffaacbfbfb3 5607->5629 5608->5609 5609->5601 5619 7ffaacbfbac7-7ffaacbfbae0 5610->5619 5623 7ffaacbfbc05-7ffaacbfbc0a 5612->5623 5624 7ffaacbfbb9b-7ffaacbfbba5 5612->5624 5619->5601 5627 7ffaacbfbc36-7ffaacbfbc3d 5623->5627 5628 7ffaacbfbc0c-7ffaacbfbc30 5623->5628 5630 7ffaacbfbd87-7ffaacbfbd8a 5624->5630 5631 7ffaacbfbbab-7ffaacbfbbca call 7ffaacbe7b40 5624->5631 5633 7ffaacbfbc43-7ffaacbfbc5a 5627->5633 5634 7ffaacbfbffe-7ffaacbfc016 5627->5634 5628->5627 5628->5629 5641 7ffaacbfbfb5 5629->5641 5642 7ffaacbfc01a-7ffaacbfc040 5629->5642 5637 7ffaacbfbc9a-7ffaacbfbc9c 5630->5637 5652 7ffaacbfbbd0-7ffaacbfbbe7 call 7ffaacbe7220 5631->5652 5653 7ffaacbfbd7f-7ffaacbfbd82 5631->5653 5643 7ffaacbfbc5c-7ffaacbfbc79 5633->5643 5644 7ffaacbfbc7b-7ffaacbfbc94 call 7ffaacbe7b40 5633->5644 5634->5642 5638 7ffaacbfbca2-7ffaacbfbcc1 call 7ffaacbe7b40 5637->5638 5639 7ffaacbfbd51-7ffaacbfbd5a 5637->5639 5638->5639 5665 7ffaacbfbcc7-7ffaacbfbcde call 7ffaacbe7220 5638->5665 5650 7ffaacbfbe37-7ffaacbfbe3c 5639->5650 5651 7ffaacbfbd60-7ffaacbfbd65 5639->5651 5649 7ffaacbfbfb7-7ffaacbfbfd2 5641->5649 5647 7ffaacbfc042-7ffaacbfc049 5642->5647 5648 7ffaacbfc04b-7ffaacbfc056 5642->5648 5643->5644 5644->5637 5694 7ffaacbfbd77-7ffaacbfbd78 5644->5694 5647->5648 5657 7ffaacbfc057-7ffaacbfc0a8 5647->5657 5692 7ffaacbfbfd4-7ffaacbfbff7 5649->5692 5658 7ffaacbfbe3e-7ffaacbfbe62 5650->5658 5659 7ffaacbfbe8a-7ffaacbfbef4 5650->5659 5660 7ffaacbfbd67-7ffaacbfbd75 5651->5660 5661 7ffaacbfbd8f 5651->5661 5683 7ffaacbfbbe9-7ffaacbfbbff 5652->5683 5684 7ffaacbfbc00-7ffaacbfbc04 5652->5684 5653->5637 5679 7ffaacbfbe64-7ffaacbfbe7b 5658->5679 5680 7ffaacbfbe82-7ffaacbfbe83 5658->5680 5693 7ffaacbfbefb-7ffaacbfbefc 5659->5693 5672 7ffaacbfbd91-7ffaacbfbd93 5660->5672 5661->5672 5697 7ffaacbfbcf7-7ffaacbfbcfe 5665->5697 5698 7ffaacbfbce0-7ffaacbfbcf5 5665->5698 5674 7ffaacbfbd95-7ffaacbfbd98 5672->5674 5675 7ffaacbfbd9a-7ffaacbfbd9f 5672->5675 5686 7ffaacbfbdd2-7ffaacbfbdde 5674->5686 5687 7ffaacbfbda1-7ffaacbfbdc3 5675->5687 5688 7ffaacbfbdca-7ffaacbfbdcf 5675->5688 5679->5680 5680->5659 5683->5684 5684->5623 5706 7ffaacbfbde0-7ffaacbfbde3 5686->5706 5707 7ffaacbfbe2a-7ffaacbfbe31 5686->5707 5687->5688 5688->5686 5692->5634 5693->5601 5694->5653 5697->5634 5702 7ffaacbfbd04-7ffaacbfbd1a 5697->5702 5698->5697 5708 7ffaacbfbd33-7ffaacbfbd4b call 7ffaacbe7b40 5702->5708 5709 7ffaacbfbd1c-7ffaacbfbd1d 5702->5709 5711 7ffaacbfbe08-7ffaacbfbe26 call 7ffaacbe53c0 5706->5711 5712 7ffaacbfbde5-7ffaacbfbe00 5706->5712 5707->5650 5707->5651 5708->5639 5708->5665 5716 7ffaacbfbd24-7ffaacbfbd2c 5709->5716 5711->5707 5712->5711 5716->5708
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718167299.00007FFAACBE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACBE0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacbe0000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 55528554f19a565665720701d821e16b6a2ccefc980f1cbac8cdafdf17efadee
                                                  • Instruction ID: 71338310a9d699855bfbb024bf3ba371bcbfeeced49134f0010d65638bedbf24
                                                  • Opcode Fuzzy Hash: 55528554f19a565665720701d821e16b6a2ccefc980f1cbac8cdafdf17efadee
                                                  • Instruction Fuzzy Hash: 9452CE71A18B19CFEB98EB2CC4456B5B3E1FF99310F008679D44EC3696DE29E84687C1

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 5721 7ffaacbeafdd-7ffaacbeb079 5723 7ffaacbeb6f1-7ffaacbeb706 5721->5723 5724 7ffaacbeb07f-7ffaacbeb082 5721->5724 5724->5723 5725 7ffaacbeb088-7ffaacbeb0a5 5724->5725 5725->5723 5727 7ffaacbeb0ab-7ffaacbeb0ca 5725->5727 5729 7ffaacbeb0d6-7ffaacbeb0e9 5727->5729 5730 7ffaacbeb0cc-7ffaacbeb0cf 5727->5730 5733 7ffaacbeb179-7ffaacbeb18b 5729->5733 5731 7ffaacbeb0d1 5730->5731 5732 7ffaacbeb0ee-7ffaacbeb11e 5730->5732 5731->5723 5732->5723 5738 7ffaacbeb124-7ffaacbeb172 5732->5738 5733->5723 5737 7ffaacbeb191-7ffaacbeb1d0 5733->5737 5737->5723 5743 7ffaacbeb1d6-7ffaacbeb1e0 5737->5743 5738->5733 5746 7ffaacbeb1f8-7ffaacbeb208 5743->5746 5747 7ffaacbeb1e2-7ffaacbeb1f6 5743->5747 5750 7ffaacbeb212-7ffaacbeb267 5746->5750 5747->5750 5754 7ffaacbeb26d-7ffaacbeb275 5750->5754 5755 7ffaacbeb277-7ffaacbeb28b 5754->5755 5756 7ffaacbeb2db-7ffaacbeb2e3 5754->5756 5755->5756 5760 7ffaacbeb28d-7ffaacbeb2d7 5755->5760 5756->5723 5757 7ffaacbeb2e9-7ffaacbeb30b 5756->5757 5761 7ffaacbeb311-7ffaacbeb33a 5757->5761 5762 7ffaacbeb40f-7ffaacbeb41a 5757->5762 5760->5756 5768 7ffaacbeb340-7ffaacbeb366 5761->5768 5769 7ffaacbeb3c1-7ffaacbeb3e2 5761->5769 5766 7ffaacbeb48c-7ffaacbeb4b5 5762->5766 5767 7ffaacbeb41c-7ffaacbeb445 5762->5767 5783 7ffaacbeb4d8-7ffaacbeb4e5 5766->5783 5784 7ffaacbeb4b7-7ffaacbeb4d1 5766->5784 5767->5723 5778 7ffaacbeb44b-7ffaacbeb45d 5767->5778 5768->5769 5782 7ffaacbeb368-7ffaacbeb37e 5768->5782 5769->5761 5771 7ffaacbeb3e8 5769->5771 5771->5762 5778->5723 5786 7ffaacbeb463-7ffaacbeb481 5778->5786 5782->5769 5790 7ffaacbeb380-7ffaacbeb398 5782->5790 5792 7ffaacbeb5aa-7ffaacbeb5ca 5783->5792 5793 7ffaacbeb4eb-7ffaacbeb518 5783->5793 5784->5783 5786->5723 5801 7ffaacbeb487-7ffaacbeb488 5786->5801 5790->5769 5795 7ffaacbeb39a-7ffaacbeb3bf 5790->5795 5799 7ffaacbeb5d4-7ffaacbeb610 5792->5799 5800 7ffaacbeb5cc-7ffaacbeb5cd 5792->5800 5807 7ffaacbeb51a-7ffaacbeb534 5793->5807 5808 7ffaacbeb53b-7ffaacbeb547 5793->5808 5795->5769 5804 7ffaacbeb3ea-7ffaacbeb408 5795->5804 5799->5723 5816 7ffaacbeb616-7ffaacbeb633 5799->5816 5800->5799 5801->5766 5804->5762 5807->5808 5814 7ffaacbeb598-7ffaacbeb5a4 5808->5814 5815 7ffaacbeb549-7ffaacbeb555 5808->5815 5814->5723 5814->5792 5817 7ffaacbeb840-7ffaacbeb857 5815->5817 5818 7ffaacbeb55b-7ffaacbeb591 5815->5818 5821 7ffaacbeb635-7ffaacbeb636 5816->5821 5822 7ffaacbeb63d-7ffaacbeb678 5816->5822 5825 7ffaacbeb859-7ffaacbeb860 5817->5825 5826 7ffaacbeb861-7ffaacbeb8cf call 7ffaacbe5070 call 7ffaacbe7d70 call 7ffaacbe5370 call 7ffaacbeb8d0 5817->5826 5818->5814 5821->5822 5822->5723 5838 7ffaacbeb67a-7ffaacbeb68c 5822->5838 5825->5826 5838->5723 5843 7ffaacbeb68e-7ffaacbeb6ac 5838->5843 5843->5723 5846 7ffaacbeb6ae-7ffaacbeb6ca 5843->5846 5849 7ffaacbeb707-7ffaacbeb77c 5846->5849 5850 7ffaacbeb6cc-7ffaacbeb6ef 5846->5850 5860 7ffaacbeb827-7ffaacbeb83f 5849->5860 5861 7ffaacbeb782-7ffaacbeb78b 5849->5861 5850->5723 5850->5849 5861->5860
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718167299.00007FFAACBE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACBE0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacbe0000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c6ef0432c342339c3858a3cbdb0c177e2a0a768e9e347c135a6d00b94edbf04c
                                                  • Instruction ID: f59ac142f76bc954a6ae9ab9ed0f7fce685a12aafeab02730094b45ae127d0bf
                                                  • Opcode Fuzzy Hash: c6ef0432c342339c3858a3cbdb0c177e2a0a768e9e347c135a6d00b94edbf04c
                                                  • Instruction Fuzzy Hash: 2B525E30608A49CFEB98EB2CC455B6977E1FF9A300F1485B9E44DC72A2DF35E8468B41
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718167299.00007FFAACBE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACBE0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacbe0000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8824e2d9b3872ff545c24f80bfcd479d98eb0f849503327b400d83cf607f300b
                                                  • Instruction ID: dcbc5e7569f464d24b7ed1cd9fb93c7f701614ba9d1733210b2f5b05a4192b21
                                                  • Opcode Fuzzy Hash: 8824e2d9b3872ff545c24f80bfcd479d98eb0f849503327b400d83cf607f300b
                                                  • Instruction Fuzzy Hash: 4A22A130A19A198FEB98EB1CC4557B977E2FF99700F14417DD44EC3292DE39E84A8781
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718167299.00007FFAACBE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACBE0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacbe0000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 89175665e2f4414dc56c8f7907cb14e26824625449b00e159e012c9a2742b431
                                                  • Instruction ID: 2633f61fa44fb8d030178f39d4c0a4e40d6545911636e642b4a86ce51a4c31de
                                                  • Opcode Fuzzy Hash: 89175665e2f4414dc56c8f7907cb14e26824625449b00e159e012c9a2742b431
                                                  • Instruction Fuzzy Hash: 50027D74E18A298FEB98DB18C4447B9B7E1FF59701F1085BAD44ED3292DB35F8858B80
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718167299.00007FFAACBE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACBE0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacbe0000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a8455fe3cb172f7418f2b5e491b12239c12492366e0435dd6bdf7eaf4abe2d80
                                                  • Instruction ID: 8ec67642d139165811d9896f36f01599ae57cf21d224d22634592396fbf4573d
                                                  • Opcode Fuzzy Hash: a8455fe3cb172f7418f2b5e491b12239c12492366e0435dd6bdf7eaf4abe2d80
                                                  • Instruction Fuzzy Hash: 78F18070908A8E8FEBA8DF28C855BE977E1FF55310F04826AE84DC7291DB35D9458BC1
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718167299.00007FFAACBE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACBE0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacbe0000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a23d2ca2c65fa31c278cd0c89d78772eb2c9bba527c9b7b48468e4e257126c56
                                                  • Instruction ID: d969f49a628c36ef44432f0d42579bf51729de69632285185ab9d673190b6168
                                                  • Opcode Fuzzy Hash: a23d2ca2c65fa31c278cd0c89d78772eb2c9bba527c9b7b48468e4e257126c56
                                                  • Instruction Fuzzy Hash: F0D19F70A09A4D8FEBA8DF28C8557E977D1FB55310F00826EE80DC7291DE76E9458BC1
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3715588343.00007FFAAC970000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC970000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaac970000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 95c62dd102c02900e3a3e3482caf671ba78b1addddbea33c9d9f47e0c5db8beb
                                                  • Instruction ID: 6d0271a3feaf29b1e82dd284f6f84f299771159ae463abc76b298a2500e9c40c
                                                  • Opcode Fuzzy Hash: 95c62dd102c02900e3a3e3482caf671ba78b1addddbea33c9d9f47e0c5db8beb
                                                  • Instruction Fuzzy Hash: 1BA12C5B70E9A24EE311777EF8159E97B50EFC2276708897BD289CD093D804588E83F1

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2187 7ffaacbee709-7ffaacbee7c9 call 7ffaacbee020 2201 7ffaacbee808-7ffaacbee88e 2187->2201 2202 7ffaacbee7cb-7ffaacbee807 2187->2202 2210 7ffaacbee946-7ffaacbee94a 2201->2210 2211 7ffaacbee894-7ffaacbee8a1 2201->2211 2212 7ffaacbee8a3-7ffaacbee904 SetWindowsHookExW 2210->2212 2211->2212 2216 7ffaacbee906 2212->2216 2217 7ffaacbee90c-7ffaacbee945 2212->2217 2216->2217
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718167299.00007FFAACBE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACBE0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacbe0000_Client.jbxd
                                                  Similarity
                                                  • API ID: HookWindows
                                                  • String ID:
                                                  • API String ID: 2559412058-0
                                                  • Opcode ID: 071df81f24434c443ed56f0f602e90a9d783fc3aa33e9518088fc7ec748f9fe4
                                                  • Instruction ID: f24273d5962f5a2725275c9ef41a6e4c2c379603dc09c2e542290737283a6253
                                                  • Opcode Fuzzy Hash: 071df81f24434c443ed56f0f602e90a9d783fc3aa33e9518088fc7ec748f9fe4
                                                  • Instruction Fuzzy Hash: 3B713871A1DA998FE758AB6CD8465F97BE1FF5A710F0442BED00EC3193DE24A80687C1

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2408 7ffaac973525-7ffaac97352f 2409 7ffaac973571-7ffaac9735d8 2408->2409 2410 7ffaac973531-7ffaac973562 2408->2410 2416 7ffaac9735da-7ffaac9735df 2409->2416 2417 7ffaac9735e2-7ffaac973614 DeleteFileW 2409->2417 2410->2409 2416->2417 2418 7ffaac97361c-7ffaac97364a 2417->2418 2419 7ffaac973616 2417->2419 2419->2418
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3715588343.00007FFAAC970000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC970000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaac970000_Client.jbxd
                                                  Similarity
                                                  • API ID: DeleteFile
                                                  • String ID:
                                                  • API String ID: 4033686569-0
                                                  • Opcode ID: 98976dc8775cc930b605ff2548d46682fcd9342d40eb53b5c86460b0199b1a56
                                                  • Instruction ID: eaa41a5d03f430db5392e3688382b77896c2e158ceccba8cfde5720ae7ba583c
                                                  • Opcode Fuzzy Hash: 98976dc8775cc930b605ff2548d46682fcd9342d40eb53b5c86460b0199b1a56
                                                  • Instruction Fuzzy Hash: AA41D77180EB9C8FDB19DB6888596F97FF0FF56310F04816FD04DD7692DA24A8098791

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2473 7ffaac973569-7ffaac9735d8 2478 7ffaac9735da-7ffaac9735df 2473->2478 2479 7ffaac9735e2-7ffaac973614 DeleteFileW 2473->2479 2478->2479 2480 7ffaac97361c-7ffaac97364a 2479->2480 2481 7ffaac973616 2479->2481 2481->2480
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3715588343.00007FFAAC970000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC970000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaac970000_Client.jbxd
                                                  Similarity
                                                  • API ID: DeleteFile
                                                  • String ID:
                                                  • API String ID: 4033686569-0
                                                  • Opcode ID: f69d97b0cdfff43903ce8744b7979686d8e02f45197afc7ab36a67ac9095eb88
                                                  • Instruction ID: e3b5a4f4afc414731abc41b5f69587a0a8c1856ee5546ed2e0e38b18a62daf70
                                                  • Opcode Fuzzy Hash: f69d97b0cdfff43903ce8744b7979686d8e02f45197afc7ab36a67ac9095eb88
                                                  • Instruction Fuzzy Hash: C831C27190DA5C8FDB19DB58C8496E9BBF0FF66310F04426FD049D3292DB64A8058B91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718941264.00007FFAACD00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD00000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacd00000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: H
                                                  • API String ID: 0-2852464175
                                                  • Opcode ID: 695850e8dccccf71d04c4f3784a9c095cc47d3b72d7f70594eb0278c8c4f2083
                                                  • Instruction ID: 59f0f6bf10c1824b5d13b82ce277c56796ef65a40c40fc77951ac79d80615f0f
                                                  • Opcode Fuzzy Hash: 695850e8dccccf71d04c4f3784a9c095cc47d3b72d7f70594eb0278c8c4f2083
                                                  • Instruction Fuzzy Hash: 84210D41B1EE4A8BFAEAA32C045517456D1EF86540B5585BDD41FC32C6ED18EC064384
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718941264.00007FFAACD00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD00000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacd00000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 422898ec6e13cd168a995faf9aeeadda79fd720e7dcd96c226f88156db04e1bc
                                                  • Instruction ID: 125f1311e0173518ea2bb7d2bd4c157a081d4dfb3ad5f44988d14c7b90aeaeb6
                                                  • Opcode Fuzzy Hash: 422898ec6e13cd168a995faf9aeeadda79fd720e7dcd96c226f88156db04e1bc
                                                  • Instruction Fuzzy Hash: 16814F10B1BEA69BF7869B6C44967B567D2EF9A700F54807AD10EC36C7CD18EC0943C2
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3715287038.00007FFAAC85D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC85D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaac85d000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1f7219831f0177f85a5b162931541f814b597071bce58013b7fe59dd4427d3e0
                                                  • Instruction ID: d7b570d8b500df44c66e2442d5c90e1d138092ba4c6f2a8bae6f427f6cebc824
                                                  • Opcode Fuzzy Hash: 1f7219831f0177f85a5b162931541f814b597071bce58013b7fe59dd4427d3e0
                                                  • Instruction Fuzzy Hash: 0241917140EB848FD756DF2898459523FF0EB57220B1506DFD088CB1A7D669E84AC792
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718941264.00007FFAACD00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD00000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacd00000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2911a4e864f4fdc9f03a091af77c5253ecfc8f8e9c79c54f3a4415774ef1dfd8
                                                  • Instruction ID: d1151040c3e49bdddc136ef00e9377a9c24046dd714ada4cf370f04ea120bc1c
                                                  • Opcode Fuzzy Hash: 2911a4e864f4fdc9f03a091af77c5253ecfc8f8e9c79c54f3a4415774ef1dfd8
                                                  • Instruction Fuzzy Hash: D9311562B1DA899FF798D72C54266B47BC1EB66210F0401BED05FC3293DD18AC4683C2
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718941264.00007FFAACD00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD00000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacd00000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3983b721937abeb8506453970caaa0f5470db33d9727d0dd9fabccfe2ea0cdcb
                                                  • Instruction ID: 3fb07f007c225409dc33bd9005e3467741adfda13f6cf480c0947cce1aa3c9a1
                                                  • Opcode Fuzzy Hash: 3983b721937abeb8506453970caaa0f5470db33d9727d0dd9fabccfe2ea0cdcb
                                                  • Instruction Fuzzy Hash: D9312662B1DB895FF6D8975C581A6B87BC1EBA9620F44017DD08FC3292DD18EC0A83C6
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718941264.00007FFAACD00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD00000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacd00000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d6b117e8fad056a6cd5eef1b6c0dcd2f0e9fee1051952cc7593640fa2927efe4
                                                  • Instruction ID: 6e95a463196933983aad2f822442fad208de3ec8f9b6b579b46276830c3a8534
                                                  • Opcode Fuzzy Hash: d6b117e8fad056a6cd5eef1b6c0dcd2f0e9fee1051952cc7593640fa2927efe4
                                                  • Instruction Fuzzy Hash: 9131F33170CA495FE799E62C9859A753BD1EB9A221F0402BFE44FC32E3C955EC4683C0
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718941264.00007FFAACD00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD00000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacd00000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2198c2c0fa8fe04c5800baabf646c8843b951167353c41ab67758abdc11d8ddd
                                                  • Instruction ID: b4882399844f87f55dd713535e9a993f87409c0ca1ee9e4a67e4a76fac41f666
                                                  • Opcode Fuzzy Hash: 2198c2c0fa8fe04c5800baabf646c8843b951167353c41ab67758abdc11d8ddd
                                                  • Instruction Fuzzy Hash: 3A213A11B1AE0B8FF7EAD72C049527852C2EFDA65075985BAD41FC32DAED28DC0643C0
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718941264.00007FFAACD00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD00000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacd00000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 02a1d33428f387b81b0254f47bac215ff808c7660ba7ac1418a66a7190933cd4
                                                  • Instruction ID: f1b7bab50c7be18977070bb5058710b4f9f8f64e19a28ea7da0125a116d5546d
                                                  • Opcode Fuzzy Hash: 02a1d33428f387b81b0254f47bac215ff808c7660ba7ac1418a66a7190933cd4
                                                  • Instruction Fuzzy Hash: 5D214801B1EE4B8FF7EAA32C046527856C2DF8A260B99817DD00FC3396ED18DC4643C1
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718941264.00007FFAACD00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD00000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacd00000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6ecf4e5c10f48097bcf065824daac4e935b755c63e8420f5710792fa34696cde
                                                  • Instruction ID: 9763e40e0df480831261123f35a3a4f5be6a24df15dffc3ffd71c87bb865d187
                                                  • Opcode Fuzzy Hash: 6ecf4e5c10f48097bcf065824daac4e935b755c63e8420f5710792fa34696cde
                                                  • Instruction Fuzzy Hash: 88210601B1FE4A9FFAEAA32C446527456C2EF8A650B5986BDD01FC32C6EC18EC064381
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718941264.00007FFAACD00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD00000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacd00000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 163bdbb26d0d15ceca0b5c05d8fe2e3412aca96645f67f4b975688f4d7a1517f
                                                  • Instruction ID: 4d2b8be8ec81ffe5737b032771f68d7cbb36a65a9dd81b9b2341cbfd0fb50422
                                                  • Opcode Fuzzy Hash: 163bdbb26d0d15ceca0b5c05d8fe2e3412aca96645f67f4b975688f4d7a1517f
                                                  • Instruction Fuzzy Hash: EE210711B1EE4A9BF6EAD32C045127956C2EFC9650B59817DD41FC32D6ED18EC0643C0
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718941264.00007FFAACD00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD00000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacd00000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7cd4aa6ae9a30dfd8b6388f99aa214e5ed7a47d4e8434459c072fbc82e10fd7a
                                                  • Instruction ID: eb88aadc6344997d3dd1bc7fcc6a63280b24b038d8ac62192c43fe91af33c6e2
                                                  • Opcode Fuzzy Hash: 7cd4aa6ae9a30dfd8b6388f99aa214e5ed7a47d4e8434459c072fbc82e10fd7a
                                                  • Instruction Fuzzy Hash: 0021F651B1AE4A8FFAEAA32C046167856D2EFCA640B598579D41FC32C6ED18EC0643C5
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718941264.00007FFAACD00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD00000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacd00000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 64d4b7aeaabd8a30b1a70925939950dc15158ad372d0f100d447ab6cf70480fc
                                                  • Instruction ID: c0ba0e09286c3e113f749a6c1c0de03f0a84c583412759e948c9736f0ed51d0d
                                                  • Opcode Fuzzy Hash: 64d4b7aeaabd8a30b1a70925939950dc15158ad372d0f100d447ab6cf70480fc
                                                  • Instruction Fuzzy Hash: 0A214941B1EE4B8FF6EAA32C045567456D2EFC9640B59857DD41FC32CADD18EC0A03C1
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718941264.00007FFAACD00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD00000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacd00000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 70eaf3e6f27c8de3d8aabb5557741cab8f365b62d3eecea12fdfc3cd1206bb8b
                                                  • Instruction ID: db2220b731d493ea40bb7c19f2df37af9a4d62efb4d0a35f51458f07a97274cb
                                                  • Opcode Fuzzy Hash: 70eaf3e6f27c8de3d8aabb5557741cab8f365b62d3eecea12fdfc3cd1206bb8b
                                                  • Instruction Fuzzy Hash: E021F811B1AE4A8FFAEAE32C449527856C2DFC951075985BED40FC32DADD29DC464381
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718941264.00007FFAACD00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD00000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacd00000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: aa66fd59768d259d03d9c41d4b7bae018a5e842fb9f94a59acac680cf39d43e5
                                                  • Instruction ID: e3594a538f5fea1f9e6a7c61db0d73c623c5058a29b24259c2d819ba2f56fa80
                                                  • Opcode Fuzzy Hash: aa66fd59768d259d03d9c41d4b7bae018a5e842fb9f94a59acac680cf39d43e5
                                                  • Instruction Fuzzy Hash: AB210A11B1AE0A8FFAEAA32C145527456C2EFC9550B59857DD41FC33D6DD18DC0643C1
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718941264.00007FFAACD00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD00000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacd00000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b002b02eee35812d9ffcd3f69e9003fd4b2f5fa401152f5a583bdeaf50255d14
                                                  • Instruction ID: 6ec489a822cf8777ec97729ec57cfc170cba3546769e5724cef0e80d03adcea0
                                                  • Opcode Fuzzy Hash: b002b02eee35812d9ffcd3f69e9003fd4b2f5fa401152f5a583bdeaf50255d14
                                                  • Instruction Fuzzy Hash: 9A210751B1AE0A8FFAEAA72C045527852D3EFC9610B9985BED41FC33D6ED28DC0643C5
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718941264.00007FFAACD00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD00000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacd00000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4d444a9b73f31e8d80388e2a5f2bfedaa0de7fdef3cd602d9429816bb397e844
                                                  • Instruction ID: 2356a853cbce98440c82424591ec111f4aa292358841c22b4936ddba02d13b3c
                                                  • Opcode Fuzzy Hash: 4d444a9b73f31e8d80388e2a5f2bfedaa0de7fdef3cd602d9429816bb397e844
                                                  • Instruction Fuzzy Hash: 37213751B1AE4A8FFAEAA32C045127452C2EFCA641B9985BDD41FC33C6ED18DC064381
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718941264.00007FFAACD00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD00000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacd00000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cc35de0a929615bed4f8ba9418b1b1d894fde576831c0eb1f04283ab31ffcd98
                                                  • Instruction ID: ca5cb696a404aa537f07d848ae16a36e5193b59c0a0f03340b8c9bf0c26828f0
                                                  • Opcode Fuzzy Hash: cc35de0a929615bed4f8ba9418b1b1d894fde576831c0eb1f04283ab31ffcd98
                                                  • Instruction Fuzzy Hash: D2210A51B1AE0A8FF7EAA32C045167456C2EFD9550B59C5BDD41FC32DAED18DC0643C1
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718941264.00007FFAACD00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD00000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacd00000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0f7b7a7f921b7b1f49f482eb84578bc1ef0a1430230f349e6d19593d129674e4
                                                  • Instruction ID: 270b33e9af140d44f377af3235fb01e4d7318c0ec6e501c9192d5c4d299e3602
                                                  • Opcode Fuzzy Hash: 0f7b7a7f921b7b1f49f482eb84578bc1ef0a1430230f349e6d19593d129674e4
                                                  • Instruction Fuzzy Hash: 17212915B1EE0A8FF6EAE32C445127852C2EFC951075985BED01FC32CADD28DC0643C1
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718941264.00007FFAACD00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD00000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacd00000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b574c9b8cb0930a8ae3f0c101fd676ad3527ebcad042abf4c3d3e377fcb7fe4d
                                                  • Instruction ID: b6bdd5c177c3247c7adae219fa1e5db9e4ba9cb40ef9ffd4206b005edf841a64
                                                  • Opcode Fuzzy Hash: b574c9b8cb0930a8ae3f0c101fd676ad3527ebcad042abf4c3d3e377fcb7fe4d
                                                  • Instruction Fuzzy Hash: 38213811B1BE4A8FF7EAA32C045127952C3EFC9611B9981BED51FC3296DC18EC0A43C5
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718941264.00007FFAACD00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD00000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacd00000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c927ab20ac7e4b987d258953946d6ffb1d34ad19956fb206933cc2aa5b7f186f
                                                  • Instruction ID: e677d813c61780cffa9ac734e2263a9118040cf05af44182adc6340c2466741c
                                                  • Opcode Fuzzy Hash: c927ab20ac7e4b987d258953946d6ffb1d34ad19956fb206933cc2aa5b7f186f
                                                  • Instruction Fuzzy Hash: 9A110821B1EE4B5FF7EAA32C406127456C2EF8A55075945BED41FC32D6ED29DC064381
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718941264.00007FFAACD00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD00000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacd00000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fa3cb8937c57377af01a26ba3036205987c095cf1f87e81e233698733323a97b
                                                  • Instruction ID: bd4543f9f9b68d6966f48f7f3efca2e16b0acc0764060d06b791bd1aa9650bb7
                                                  • Opcode Fuzzy Hash: fa3cb8937c57377af01a26ba3036205987c095cf1f87e81e233698733323a97b
                                                  • Instruction Fuzzy Hash: 5D115E5170EE0A4FFBE6A32C105123856D2DFCA110B59897ED41FC32D6EE19DC060385
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718941264.00007FFAACD00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD00000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacd00000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b0edb7d6f7fa4b3cfe210cf7a695aa63b6a40639514260f0ce3a5cf30fc04791
                                                  • Instruction ID: 34610f09b20828a9c42837b081a353860c5e0287655f52f8e0cb3e91303f8641
                                                  • Opcode Fuzzy Hash: b0edb7d6f7fa4b3cfe210cf7a695aa63b6a40639514260f0ce3a5cf30fc04791
                                                  • Instruction Fuzzy Hash: 96112B5171EE4A4FFBEAA32C445123866D2EFCA550B5945BED40FC32D6ED28EC064384
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718941264.00007FFAACD00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD00000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacd00000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cf626d97b497aca234b440c0a13c0ec240d285084dc6671d7b404e6a1d2fdfeb
                                                  • Instruction ID: dad9c49df1b089b3ef827cc9d694e23ee1a3b9a841d7b6f3a4a849042aaecf2d
                                                  • Opcode Fuzzy Hash: cf626d97b497aca234b440c0a13c0ec240d285084dc6671d7b404e6a1d2fdfeb
                                                  • Instruction Fuzzy Hash: 6F112B11B1AE4A9FFBEAA33C005113956D2EF8A140B5A85BDD40FC32D6ED18DC054384
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3718941264.00007FFAACD00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD00000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaacd00000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7132ee8eef00a2a47b9499304da65b0b0587b90a3f8772fa7fd1dea43b6e66bc
                                                  • Instruction ID: 3d9942ff480a853e23c505fe5134cce44c0cf45d2f2714cd8c0c9ee2cfcb2616
                                                  • Opcode Fuzzy Hash: 7132ee8eef00a2a47b9499304da65b0b0587b90a3f8772fa7fd1dea43b6e66bc
                                                  • Instruction Fuzzy Hash: 43D0C925B2B52287F244238CA8823F8B285CB89710F509177E41EC22C6C8CEECC942C2
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3715588343.00007FFAAC970000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC970000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_7ffaac970000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 77f6c44ba80d1b8df8c4d8062def05e20c94f317227b8f0a3af5d388af188d2a
                                                  • Instruction ID: 015e73e44d88df148e9c5c24a3e2a6937414ca0f2ceb6de75e875dbd5023bf87
                                                  • Opcode Fuzzy Hash: 77f6c44ba80d1b8df8c4d8062def05e20c94f317227b8f0a3af5d388af188d2a
                                                  • Instruction Fuzzy Hash: 083123DB9091A25EE211B3BCF477CE53B60DF532BA708C5BBD18DCD5A39C08508A42D5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1302812894.00007FFAAC9A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC9A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_7ffaac9a0000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: H
                                                  • API String ID: 0-2852464175
                                                  • Opcode ID: 849bb7263eb495a78a9e5574c323216b3825ca332b4258289f6815f4b3926225
                                                  • Instruction ID: b70b23d40db0f29ae46a34606d59d1c214a68641e3c67797924cae4b9dd7a57b
                                                  • Opcode Fuzzy Hash: 849bb7263eb495a78a9e5574c323216b3825ca332b4258289f6815f4b3926225
                                                  • Instruction Fuzzy Hash: 8F717F65A19D098FEB98EB6CC4557BCB7E2FF9D710F544178D04ED3282CE28AC468780
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1302812894.00007FFAAC9A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC9A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_7ffaac9a0000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ;L_I
                                                  • API String ID: 0-1305308343
                                                  • Opcode ID: b302070a1c91c6588b69998f9f6c3462557aa2a7f8b17e3fb4f4da7a50b9684c
                                                  • Instruction ID: 48651678e58a26bc5a461283177d8e166829ebc2791a22ba6edbfc60a0f451a0
                                                  • Opcode Fuzzy Hash: b302070a1c91c6588b69998f9f6c3462557aa2a7f8b17e3fb4f4da7a50b9684c
                                                  • Instruction Fuzzy Hash: 24815B6451D6828FF3159B6CD4656F43FA0FF47304F8480B9D48A876ABD928EC09C3C2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1302812894.00007FFAAC9A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC9A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_7ffaac9a0000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: .L_^
                                                  • API String ID: 0-2849591005
                                                  • Opcode ID: f06291083bd5c8157841a0f787b159fe93d7b4a7c72dc85ba6f1fd037f0a05e4
                                                  • Instruction ID: f1e2e383e5470694f10a8c49c680d02931ec6eb13381739e7913562b99a9412d
                                                  • Opcode Fuzzy Hash: f06291083bd5c8157841a0f787b159fe93d7b4a7c72dc85ba6f1fd037f0a05e4
                                                  • Instruction Fuzzy Hash: F421E726B0DA998FE355A72CAC665F43BE1EF5723170C41B7D14CCB2A3DD189C0A4391
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1302812894.00007FFAAC9A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC9A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_7ffaac9a0000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 87c5ec1bafe20eeaf0f06556ba79011ab8ea24750ed7f6ce1558ed14e87e6ccc
                                                  • Instruction ID: 132cc7118c967aebea5dbc3b95a6743363a3cbd37675b9716876499502090740
                                                  • Opcode Fuzzy Hash: 87c5ec1bafe20eeaf0f06556ba79011ab8ea24750ed7f6ce1558ed14e87e6ccc
                                                  • Instruction Fuzzy Hash: A0A1D365A1DE8A8FFB89EB2C84556B977D2EF96700F0445B9D40EC7196CE28EC0783C1
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1302812894.00007FFAAC9A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC9A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_7ffaac9a0000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6082a369618b8d2d0519863813d9d2d9f26836f4f44ed55b754462a91f741668
                                                  • Instruction ID: 8f000b5cbc79bb62ad67e2cb93626c5689b65188f7fd6cdb0aed19429234d7a2
                                                  • Opcode Fuzzy Hash: 6082a369618b8d2d0519863813d9d2d9f26836f4f44ed55b754462a91f741668
                                                  • Instruction Fuzzy Hash: 6A51B158B0DA5B8FFB86B77C80696E92BD2BB9A650B5480B5D00DC7297CE1CDC078385
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1302812894.00007FFAAC9A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC9A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_7ffaac9a0000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 25833faa47d42b3cad328cb2ca77a785f47b4e0c0cdeb8b9506d5086efbdf6cb
                                                  • Instruction ID: de43ad506814b80ab70a98101f5747036b3f4cd0571b2399d4c102d8386f60f1
                                                  • Opcode Fuzzy Hash: 25833faa47d42b3cad328cb2ca77a785f47b4e0c0cdeb8b9506d5086efbdf6cb
                                                  • Instruction Fuzzy Hash: 3341E966A0DE8A8FFB95E7288451AF97BA1EF56750F0441B6D00EC71C3DE18DC068791
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1302812894.00007FFAAC9A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC9A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_7ffaac9a0000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 62e8fb553e2d7a0cf9eb0a1db221c3703909d56d6750c8bfd08cb3ee1825e858
                                                  • Instruction ID: dc3a6b3f2039d848cf2d8deb38080766e2c1021b01183f40e606fe9d0d7df954
                                                  • Opcode Fuzzy Hash: 62e8fb553e2d7a0cf9eb0a1db221c3703909d56d6750c8bfd08cb3ee1825e858
                                                  • Instruction Fuzzy Hash: B2410762A1DA494FF758A72CD4567BA7BD5EF9A714F04417EE04EC3282CD28A84783C2
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1302812894.00007FFAAC9A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC9A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_7ffaac9a0000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6a3559cac7e77a29c0e1ebe45b6a04c7d73afc700730a0613242089fc218d0df
                                                  • Instruction ID: e85d65c01ca30af12bfcf847a66daf5417ccf43c2fe19c63f21ab417fd2ad1fa
                                                  • Opcode Fuzzy Hash: 6a3559cac7e77a29c0e1ebe45b6a04c7d73afc700730a0613242089fc218d0df
                                                  • Instruction Fuzzy Hash: 61219135909646CFE758DB28D0C55A577A1EFA6310B6982B5D04CCF1ABDB28EC8BC7C0
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1302812894.00007FFAAC9A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC9A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_7ffaac9a0000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a3547c8b3c72cad7db96fde891648a148bd7cf1850388e4b606ca5fc3de6a406
                                                  • Instruction ID: ec0daa5dcd8410a852cce90c308b4827b8bdec1ebde2c09306fdf85226f68cf8
                                                  • Opcode Fuzzy Hash: a3547c8b3c72cad7db96fde891648a148bd7cf1850388e4b606ca5fc3de6a406
                                                  • Instruction Fuzzy Hash: 4231946451964A4FF358EB2CC0A9AE53FA1BB9D308F8085A9D409C37A6CB7CAC40C755
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1302812894.00007FFAAC9A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC9A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_7ffaac9a0000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8420c91777e29f804fd73ec29a876efed2e50d9b8d21863477e1009f41e7ee59
                                                  • Instruction ID: 6750cdc64a1a2867490762fcdcf2c1932686d8678d26b538b75943a0e7194f42
                                                  • Opcode Fuzzy Hash: 8420c91777e29f804fd73ec29a876efed2e50d9b8d21863477e1009f41e7ee59
                                                  • Instruction Fuzzy Hash: 0F21E79291DBC68FF359A37888256A56B90FF92750F4845FEC08EC71D3DC1C980987D1
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1302812894.00007FFAAC9A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC9A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_7ffaac9a0000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 471046f3aee3ad131f5593ba6b7a944fc3e9401179128296cdab2e9273b7cfd1
                                                  • Instruction ID: 41930d00a1dd4a59eef513212ff9fb63472ad9026198af5d7f7938bed54cdd48
                                                  • Opcode Fuzzy Hash: 471046f3aee3ad131f5593ba6b7a944fc3e9401179128296cdab2e9273b7cfd1
                                                  • Instruction Fuzzy Hash: 1621C176E19A5A8FE794FB38C4599B877D1FF59300B4544B6E00DC72A2DE28EC05C780
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1302812894.00007FFAAC9A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC9A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_7ffaac9a0000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3ced980754135c34b617676058eef7336d268e8867e4c42d3c89949e6073a576
                                                  • Instruction ID: 54c6bf8dc44127c64ce8b45581f6c39fb27a5cdce155a152d11cdcc770ebddb6
                                                  • Opcode Fuzzy Hash: 3ced980754135c34b617676058eef7336d268e8867e4c42d3c89949e6073a576
                                                  • Instruction Fuzzy Hash: 10113D2191EB450FF355A73C98498F67BD5EB9522470441BBD44DC31A3CD0DD9878381
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1302812894.00007FFAAC9A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC9A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_7ffaac9a0000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cdc407acfd77228230b438cb798f10cfa984b454ca42870d79b91d0d92af58b2
                                                  • Instruction ID: 18d5b6122f44e46f01d19516f4d47aaf49d2c91baed9913d1f4b7368879eeccd
                                                  • Opcode Fuzzy Hash: cdc407acfd77228230b438cb798f10cfa984b454ca42870d79b91d0d92af58b2
                                                  • Instruction Fuzzy Hash: 8411A921A0EAC94FE347E3389899AB57FD1AF97215B1941F7E04CCB1B3D9588846C352
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1302812894.00007FFAAC9A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC9A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_7ffaac9a0000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d0a54c381a9d2ceefd5896c81a4190ab60c9c2d10701529a2bd8b53765e5fa77
                                                  • Instruction ID: f8f5f56810457b319905986d3f21d11d7e02fc7208952afd8723069c16e28caf
                                                  • Opcode Fuzzy Hash: d0a54c381a9d2ceefd5896c81a4190ab60c9c2d10701529a2bd8b53765e5fa77
                                                  • Instruction Fuzzy Hash: 6A016D53969D864FF699A32C94455F57BC1EFA6710F04457AD00FC3186ED14AC4743C2
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1302812894.00007FFAAC9A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC9A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_7ffaac9a0000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 870a6e65a2f330f0a17bb4defe1a86abe6f81f21b18d991f799a64b949cabdc0
                                                  • Instruction ID: f4d45945851832645cbdee808bf119c3d46000bdf7b50843e9d20740f2818bae
                                                  • Opcode Fuzzy Hash: 870a6e65a2f330f0a17bb4defe1a86abe6f81f21b18d991f799a64b949cabdc0
                                                  • Instruction Fuzzy Hash: 7CF02422B08C1C4FA680F2BD94D9EF977D5EBEE22171404B7E00CC72A3DC04988283C0
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1302812894.00007FFAAC9A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC9A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_7ffaac9a0000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: dce0c2d7158b751731b7e33220b18985b5386bcf1a964274e5c1f48b3ff5d8fa
                                                  • Instruction ID: 7b9305c7d43243a4d75e7f6ad1029e6e655b2feb5118dbbb3078d1b224d21645
                                                  • Opcode Fuzzy Hash: dce0c2d7158b751731b7e33220b18985b5386bcf1a964274e5c1f48b3ff5d8fa
                                                  • Instruction Fuzzy Hash: 1BE06D22B19C1D5FAB94F26D8089F7966C5EBAD21171005B6E40CC72A2DD18DC828380
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1302812894.00007FFAAC9A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC9A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_7ffaac9a0000_Client.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d542fb316d5c2bdc9dbf0b0bf973ef63f7e2c1c3af9fc8695b81c1f36e096d0c
                                                  • Instruction ID: 4718418a97cc87a57a21f21dc4c752a028b2aca528b67bbdbe43e7a75072ef63
                                                  • Opcode Fuzzy Hash: d542fb316d5c2bdc9dbf0b0bf973ef63f7e2c1c3af9fc8695b81c1f36e096d0c
                                                  • Instruction Fuzzy Hash: 14E08662F5A92A8BF099337C60421BD52C1EF49751B40247EE50ED6287DC1DEE4703C9