Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
vanilla.exe

Overview

General Information

Sample name:vanilla.exe
Analysis ID:1575642
MD5:7b168e023b1876cd9163d58f98f3b67c
SHA1:906a5cfacd3797c603f3efe863aaedeabacb5918
SHA256:781cdac62a589c52b2fb004eb53b262d4c2c29229cbbbd19a16d1669237ae553
Tags:exeQuasarRATuser-lontze7
Infos:

Detection

Quasar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Quasar RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • vanilla.exe (PID: 1460 cmdline: "C:\Users\user\Desktop\vanilla.exe" MD5: 7B168E023B1876CD9163D58F98F3B67C)
    • schtasks.exe (PID: 1380 cmdline: "schtasks" /create /tn "ctfmon" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • conhost.exe (PID: 5972 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Client.exe (PID: 5796 cmdline: "C:\Users\user\AppData\Roaming\SubDir\Client.exe" MD5: 7B168E023B1876CD9163D58F98F3B67C)
      • schtasks.exe (PID: 5648 cmdline: "schtasks" /create /tn "ctfmon" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
        • conhost.exe (PID: 2440 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • Client.exe (PID: 1280 cmdline: C:\Users\user\AppData\Roaming\SubDir\Client.exe MD5: 7B168E023B1876CD9163D58F98F3B67C)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
{"Version": "1.4.1", "Host:Port": "98.51.190.130:20;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "11bbf22e-826e-486b-b024-adbd86228a9e", "StartupKey": "ctfmon", "Tag": "RunTimeBroker", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
SourceRuleDescriptionAuthorStrings
vanilla.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
    vanilla.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      vanilla.exeMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
      • 0x28ee9d:$x1: Quasar.Common.Messages
      • 0x29f1c6:$x1: Quasar.Common.Messages
      • 0x2ab82a:$x4: Uninstalling... good bye :-(
      • 0x2ad01f:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
      vanilla.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
      • 0x2aaddc:$f1: FileZilla\recentservers.xml
      • 0x2aae1c:$f2: FileZilla\sitemanager.xml
      • 0x2aae5e:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
      • 0x2ab0aa:$b1: Chrome\User Data\
      • 0x2ab100:$b1: Chrome\User Data\
      • 0x2ab3d8:$b2: Mozilla\Firefox\Profiles
      • 0x2ab4d4:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2fd430:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2ab62c:$b4: Opera Software\Opera Stable\Login Data
      • 0x2ab6e6:$b5: YandexBrowser\User Data\
      • 0x2ab754:$b5: YandexBrowser\User Data\
      • 0x2ab428:$s4: logins.json
      • 0x2ab15e:$a1: username_value
      • 0x2ab17c:$a2: password_value
      • 0x2ab468:$a3: encryptedUsername
      • 0x2fd374:$a3: encryptedUsername
      • 0x2ab48c:$a4: encryptedPassword
      • 0x2fd392:$a4: encryptedPassword
      • 0x2fd310:$a5: httpRealm
      vanilla.exeMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
      • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
      • 0x2ab914:$s3: Process already elevated.
      • 0x28eb9c:$s4: get_PotentiallyVulnerablePasswords
      • 0x278c58:$s5: GetKeyloggerLogsDirectory
      • 0x29e925:$s5: GetKeyloggerLogsDirectory
      • 0x28ebbf:$s6: set_PotentiallyVulnerablePasswords
      • 0x2fea5e:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
      SourceRuleDescriptionAuthorStrings
      C:\Users\user\AppData\Roaming\SubDir\Client.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
        C:\Users\user\AppData\Roaming\SubDir\Client.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          C:\Users\user\AppData\Roaming\SubDir\Client.exeMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
          • 0x28ee9d:$x1: Quasar.Common.Messages
          • 0x29f1c6:$x1: Quasar.Common.Messages
          • 0x2ab82a:$x4: Uninstalling... good bye :-(
          • 0x2ad01f:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
          C:\Users\user\AppData\Roaming\SubDir\Client.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
          • 0x2aaddc:$f1: FileZilla\recentservers.xml
          • 0x2aae1c:$f2: FileZilla\sitemanager.xml
          • 0x2aae5e:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
          • 0x2ab0aa:$b1: Chrome\User Data\
          • 0x2ab100:$b1: Chrome\User Data\
          • 0x2ab3d8:$b2: Mozilla\Firefox\Profiles
          • 0x2ab4d4:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
          • 0x2fd430:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
          • 0x2ab62c:$b4: Opera Software\Opera Stable\Login Data
          • 0x2ab6e6:$b5: YandexBrowser\User Data\
          • 0x2ab754:$b5: YandexBrowser\User Data\
          • 0x2ab428:$s4: logins.json
          • 0x2ab15e:$a1: username_value
          • 0x2ab17c:$a2: password_value
          • 0x2ab468:$a3: encryptedUsername
          • 0x2fd374:$a3: encryptedUsername
          • 0x2ab48c:$a4: encryptedPassword
          • 0x2fd392:$a4: encryptedPassword
          • 0x2fd310:$a5: httpRealm
          C:\Users\user\AppData\Roaming\SubDir\Client.exeMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
          • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
          • 0x2ab914:$s3: Process already elevated.
          • 0x28eb9c:$s4: get_PotentiallyVulnerablePasswords
          • 0x278c58:$s5: GetKeyloggerLogsDirectory
          • 0x29e925:$s5: GetKeyloggerLogsDirectory
          • 0x28ebbf:$s6: set_PotentiallyVulnerablePasswords
          • 0x2fea5e:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
          SourceRuleDescriptionAuthorStrings
          00000000.00000000.1359754879.0000000000720000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
            00000004.00000002.3812391004.0000000002CE0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
              00000000.00000002.1387299925.000000001B422000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
                00000000.00000000.1359375048.0000000000402000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
                  Process Memory Space: vanilla.exe PID: 1460JoeSecurity_QuasarYara detected Quasar RATJoe Security
                    Click to see the 1 entries
                    SourceRuleDescriptionAuthorStrings
                    0.0.vanilla.exe.400000.0.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
                      0.0.vanilla.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                        0.0.vanilla.exe.400000.0.unpackMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
                        • 0x28ee9d:$x1: Quasar.Common.Messages
                        • 0x29f1c6:$x1: Quasar.Common.Messages
                        • 0x2ab82a:$x4: Uninstalling... good bye :-(
                        • 0x2ad01f:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
                        0.0.vanilla.exe.400000.0.unpackINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
                        • 0x2aaddc:$f1: FileZilla\recentservers.xml
                        • 0x2aae1c:$f2: FileZilla\sitemanager.xml
                        • 0x2aae5e:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
                        • 0x2ab0aa:$b1: Chrome\User Data\
                        • 0x2ab100:$b1: Chrome\User Data\
                        • 0x2ab3d8:$b2: Mozilla\Firefox\Profiles
                        • 0x2ab4d4:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                        • 0x2fd430:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                        • 0x2ab62c:$b4: Opera Software\Opera Stable\Login Data
                        • 0x2ab6e6:$b5: YandexBrowser\User Data\
                        • 0x2ab754:$b5: YandexBrowser\User Data\
                        • 0x2ab428:$s4: logins.json
                        • 0x2ab15e:$a1: username_value
                        • 0x2ab17c:$a2: password_value
                        • 0x2ab468:$a3: encryptedUsername
                        • 0x2fd374:$a3: encryptedUsername
                        • 0x2ab48c:$a4: encryptedPassword
                        • 0x2fd392:$a4: encryptedPassword
                        • 0x2fd310:$a5: httpRealm
                        0.0.vanilla.exe.400000.0.unpackMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
                        • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
                        • 0x2ab914:$s3: Process already elevated.
                        • 0x28eb9c:$s4: get_PotentiallyVulnerablePasswords
                        • 0x278c58:$s5: GetKeyloggerLogsDirectory
                        • 0x29e925:$s5: GetKeyloggerLogsDirectory
                        • 0x28ebbf:$s6: set_PotentiallyVulnerablePasswords
                        • 0x2fea5e:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>

                        System Summary

                        barindex
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "ctfmon" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "ctfmon" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\SubDir\Client.exe", ParentImage: C:\Users\user\AppData\Roaming\SubDir\Client.exe, ParentProcessId: 5796, ParentProcessName: Client.exe, ProcessCommandLine: "schtasks" /create /tn "ctfmon" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, ProcessId: 5648, ProcessName: schtasks.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "ctfmon" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "ctfmon" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\vanilla.exe", ParentImage: C:\Users\user\Desktop\vanilla.exe, ParentProcessId: 1460, ParentProcessName: vanilla.exe, ProcessCommandLine: "schtasks" /create /tn "ctfmon" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, ProcessId: 1380, ProcessName: schtasks.exe
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-12-16T07:39:43.611993+010020355951Domain Observed Used for C2 Detected98.51.190.13020192.168.2.949722TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-12-16T07:39:43.611993+010020276191Domain Observed Used for C2 Detected98.51.190.13020192.168.2.949722TCP

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: vanilla.exeAvira: detected
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeAvira: detection malicious, Label: HEUR/AGEN.1307453
                        Source: vanilla.exeMalware Configuration Extractor: Quasar {"Version": "1.4.1", "Host:Port": "98.51.190.130:20;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "11bbf22e-826e-486b-b024-adbd86228a9e", "StartupKey": "ctfmon", "Tag": "RunTimeBroker", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeReversingLabs: Detection: 73%
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeVirustotal: Detection: 75%Perma Link
                        Source: vanilla.exeVirustotal: Detection: 75%Perma Link
                        Source: vanilla.exeReversingLabs: Detection: 73%
                        Source: Yara matchFile source: vanilla.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.vanilla.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000000.1359754879.0000000000720000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.3812391004.0000000002CE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1387299925.000000001B422000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.1359375048.0000000000402000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: vanilla.exe PID: 1460, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 5796, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeJoe Sandbox ML: detected
                        Source: vanilla.exeJoe Sandbox ML: detected
                        Source: vanilla.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: unknownHTTPS traffic detected: 108.181.61.49:443 -> 192.168.2.9:49734 version: TLS 1.2
                        Source: vanilla.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                        Networking

                        barindex
                        Source: Network trafficSuricata IDS: 2027619 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (Quasar CnC) : 98.51.190.130:20 -> 192.168.2.9:49722
                        Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 98.51.190.130:20 -> 192.168.2.9:49722
                        Source: Malware configuration extractorURLs: 98.51.190.130
                        Source: Yara matchFile source: vanilla.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.vanilla.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED
                        Source: global trafficTCP traffic: 192.168.2.9:49722 -> 98.51.190.130:20
                        Source: Joe Sandbox ViewIP Address: 108.181.61.49 108.181.61.49
                        Source: Joe Sandbox ViewASN Name: COMCAST-7922US COMCAST-7922US
                        Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                        Source: unknownDNS query: name: ipwho.is
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
                        Source: unknownTCP traffic detected without corresponding DNS query: 98.51.190.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 98.51.190.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 98.51.190.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 98.51.190.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 98.51.190.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 98.51.190.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 98.51.190.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 98.51.190.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 98.51.190.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 98.51.190.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 98.51.190.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 98.51.190.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 98.51.190.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 98.51.190.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 98.51.190.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 98.51.190.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 98.51.190.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 98.51.190.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 98.51.190.130
                        Source: unknownTCP traffic detected without corresponding DNS query: 98.51.190.130
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
                        Source: global trafficDNS traffic detected: DNS query: ipwho.is
                        Source: Client.exe, 00000004.00000002.3817967243.000000001B252000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.v
                        Source: Client.exe, 00000004.00000002.3817967243.000000001B252000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                        Source: 77EC63BDA74BD0D0E0426DC8F80085060.4.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                        Source: Client.exe, 00000004.00000002.3811374980.0000000000AB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab4
                        Source: Client.exe, 00000004.00000002.3812391004.0000000002C91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ipwho.is
                        Source: Client.exe, 00000004.00000002.3812391004.0000000002CE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
                        Source: vanilla.exe, 00000000.00000002.1384968036.0000000002B11000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000004.00000002.3812391004.00000000028E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: vanilla.exe, Client.exe.0.drString found in binary or memory: https://api.ipify.org/
                        Source: Client.exe, 00000004.00000002.3812391004.0000000002C78000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipwho.is
                        Source: vanilla.exe, Client.exe.0.drString found in binary or memory: https://ipwho.is/
                        Source: vanilla.exe, Client.exe.0.drString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                        Source: vanilla.exe, Client.exe.0.drString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                        Source: vanilla.exe, Client.exe.0.drString found in binary or memory: https://stackoverflow.com/q/2152978/23354sCannot
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
                        Source: unknownHTTPS traffic detected: 108.181.61.49:443 -> 192.168.2.9:49734 version: TLS 1.2

                        Key, Mouse, Clipboard, Microphone and Screen Capturing

                        barindex
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\SubDir\Client.exeJump to behavior

                        E-Banking Fraud

                        barindex
                        Source: Yara matchFile source: vanilla.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.vanilla.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000000.1359754879.0000000000720000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.3812391004.0000000002CE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1387299925.000000001B422000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.1359375048.0000000000402000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: vanilla.exe PID: 1460, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 5796, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED

                        System Summary

                        barindex
                        Source: vanilla.exe, type: SAMPLEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                        Source: vanilla.exe, type: SAMPLEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                        Source: vanilla.exe, type: SAMPLEMatched rule: Detects Quasar infostealer Author: ditekshen
                        Source: 0.0.vanilla.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                        Source: 0.0.vanilla.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                        Source: 0.0.vanilla.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: Detects QuasarRAT malware Author: Florian Roth
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: Detects Quasar infostealer Author: ditekshen
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess Stats: CPU usage > 49%
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FF887F88A0F4_2_00007FF887F88A0F
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FF887F792714_2_00007FF887F79271
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FF887F8EB294_2_00007FF887F8EB29
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FF887F87C164_2_00007FF887F87C16
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FF887F755D64_2_00007FF887F755D6
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FF887F79FD04_2_00007FF887F79FD0
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FF887F7AFDD4_2_00007FF887F7AFDD
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FF887F8B8514_2_00007FF887F8B851
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FF887F7621F4_2_00007FF887F7621F
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FF8880923214_2_00007FF888092321
                        Source: vanilla.exe, 00000000.00000000.1359754879.0000000000720000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameClient.exe. vs vanilla.exe
                        Source: vanilla.exe, 00000000.00000002.1387299925.000000001B422000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClient.exe. vs vanilla.exe
                        Source: vanilla.exeBinary or memory string: OriginalFilenameClient.exe. vs vanilla.exe
                        Source: vanilla.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: vanilla.exe, type: SAMPLEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                        Source: vanilla.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                        Source: vanilla.exe, type: SAMPLEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                        Source: 0.0.vanilla.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                        Source: 0.0.vanilla.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                        Source: 0.0.vanilla.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@10/5@1/2
                        Source: C:\Users\user\Desktop\vanilla.exeFile created: C:\Users\user\AppData\Roaming\SubDirJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMutant created: NULL
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMutant created: \Sessions\1\BaseNamedObjects\Local\11bbf22e-826e-486b-b024-adbd86228a9e
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5972:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2440:120:WilError_03
                        Source: vanilla.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: vanilla.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\Desktop\vanilla.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: vanilla.exeVirustotal: Detection: 75%
                        Source: vanilla.exeReversingLabs: Detection: 73%
                        Source: vanilla.exeString found in binary or memory: HasSubValue3Conflicting item/add type
                        Source: C:\Users\user\Desktop\vanilla.exeFile read: C:\Users\user\Desktop\vanilla.exeJump to behavior
                        Source: unknownProcess created: C:\Users\user\Desktop\vanilla.exe "C:\Users\user\Desktop\vanilla.exe"
                        Source: C:\Users\user\Desktop\vanilla.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "ctfmon" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                        Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\vanilla.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: unknownProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe C:\Users\user\AppData\Roaming\SubDir\Client.exe
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "ctfmon" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                        Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\vanilla.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "ctfmon" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /fJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "ctfmon" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /fJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: schannel.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mskeyprotect.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ncryptsslp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptnet.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: webio.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cabinet.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rasapi32.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rasman.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rtutils.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                        Source: vanilla.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                        Source: vanilla.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                        Source: vanilla.exeStatic file information: File size 3265536 > 1048576
                        Source: vanilla.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x31c400
                        Source: vanilla.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FF887BED2A5 pushad ; iretd 4_2_00007FF887BED2A6
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FF887D0D848 push eax; iretd 4_2_00007FF887D0D869
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FF887D0812B push ebx; ret 4_2_00007FF887D0816A
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FF888092321 push edx; retf 5F1Eh4_2_00007FF888095A3B
                        Source: C:\Users\user\Desktop\vanilla.exeFile created: C:\Users\user\AppData\Roaming\SubDir\Client.exeJump to dropped file

                        Boot Survival

                        barindex
                        Source: C:\Users\user\Desktop\vanilla.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "ctfmon" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: C:\Users\user\Desktop\vanilla.exeFile opened: C:\Users\user\Desktop\vanilla.exe:Zone.Identifier read attributes | deleteJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\Client.exe:Zone.Identifier read attributes | deleteJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\Client.exe:Zone.Identifier read attributes | deleteJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeMemory allocated: 1060000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeMemory allocated: 1AB10000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: CE0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1A8B0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1670000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1B220000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeWindow / User API: threadDelayed 2113Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeWindow / User API: threadDelayed 7729Jump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exe TID: 1872Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 336Thread sleep count: 31 > 30Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 336Thread sleep time: -28592453314249787s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 6972Thread sleep count: 2113 > 30Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 6972Thread sleep count: 7729 > 30Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 2156Thread sleep time: -30000s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 5748Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BaseBoard
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BIOS
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Users\user\Desktop\vanilla.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: Client.exe, 00000004.00000002.3818570756.000000001B5A8000.00000004.00000020.00020000.00000000.sdmp, Client.exe, 00000004.00000002.3818570756.000000001B492000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                        Source: C:\Users\user\Desktop\vanilla.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeMemory allocated: page read and write | page guardJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "ctfmon" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /fJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "ctfmon" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /fJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeQueries volume information: C:\Users\user\Desktop\vanilla.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\Client.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\Client.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\vanilla.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: vanilla.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.vanilla.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000000.1359754879.0000000000720000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.3812391004.0000000002CE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1387299925.000000001B422000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.1359375048.0000000000402000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: vanilla.exe PID: 1460, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 5796, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: vanilla.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.vanilla.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000000.1359754879.0000000000720000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.3812391004.0000000002CE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1387299925.000000001B422000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.1359375048.0000000000402000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: vanilla.exe PID: 1460, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 5796, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
                        Windows Management Instrumentation
                        1
                        Scheduled Task/Job
                        11
                        Process Injection
                        1
                        Masquerading
                        11
                        Input Capture
                        1
                        Query Registry
                        Remote Services11
                        Input Capture
                        11
                        Encrypted Channel
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault Accounts2
                        Command and Scripting Interpreter
                        1
                        DLL Side-Loading
                        1
                        Scheduled Task/Job
                        1
                        Disable or Modify Tools
                        LSASS Memory111
                        Security Software Discovery
                        Remote Desktop Protocol1
                        Archive Collected Data
                        1
                        Non-Standard Port
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain Accounts1
                        Scheduled Task/Job
                        Logon Script (Windows)1
                        DLL Side-Loading
                        41
                        Virtualization/Sandbox Evasion
                        Security Account Manager41
                        Virtualization/Sandbox Evasion
                        SMB/Windows Admin SharesData from Network Shared Drive1
                        Ingress Tool Transfer
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                        Process Injection
                        NTDS1
                        Application Window Discovery
                        Distributed Component Object ModelInput Capture2
                        Non-Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                        Hidden Files and Directories
                        LSA Secrets1
                        System Network Configuration Discovery
                        SSHKeylogging113
                        Application Layer Protocol
                        Scheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        Obfuscated Files or Information
                        Cached Domain Credentials23
                        System Information Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                        DLL Side-Loading
                        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        vanilla.exe75%VirustotalBrowse
                        vanilla.exe74%ReversingLabsByteCode-MSIL.Backdoor.Quasar
                        vanilla.exe100%AviraHEUR/AGEN.1307453
                        vanilla.exe100%Joe Sandbox ML
                        SourceDetectionScannerLabelLink
                        C:\Users\user\AppData\Roaming\SubDir\Client.exe100%AviraHEUR/AGEN.1307453
                        C:\Users\user\AppData\Roaming\SubDir\Client.exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Roaming\SubDir\Client.exe74%ReversingLabsByteCode-MSIL.Backdoor.Quasar
                        C:\Users\user\AppData\Roaming\SubDir\Client.exe75%VirustotalBrowse
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        98.51.190.1300%Avira URL Cloudsafe
                        98.51.190.1302%VirustotalBrowse
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        bg.microsoft.map.fastly.net
                        199.232.214.172
                        truefalse
                          high
                          ipwho.is
                          108.181.61.49
                          truefalse
                            high
                            s-part-0035.t-0009.t-msedge.net
                            13.107.246.63
                            truefalse
                              high
                              NameMaliciousAntivirus DetectionReputation
                              98.51.190.130true
                              • 2%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              https://ipwho.is/false
                                high
                                NameSourceMaliciousAntivirus DetectionReputation
                                https://api.ipify.org/vanilla.exe, Client.exe.0.drfalse
                                  high
                                  https://stackoverflow.com/q/14436606/23354vanilla.exe, Client.exe.0.drfalse
                                    high
                                    https://stackoverflow.com/q/2152978/23354sCannotvanilla.exe, Client.exe.0.drfalse
                                      high
                                      http://schemas.datacontract.org/2004/07/Client.exe, 00000004.00000002.3812391004.0000000002CE0000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namevanilla.exe, 00000000.00000002.1384968036.0000000002B11000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000004.00000002.3812391004.00000000028E9000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://crl.vClient.exe, 00000004.00000002.3817967243.000000001B252000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://ipwho.isClient.exe, 00000004.00000002.3812391004.0000000002C91000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://stackoverflow.com/q/11564914/23354;vanilla.exe, Client.exe.0.drfalse
                                                high
                                                https://ipwho.isClient.exe, 00000004.00000002.3812391004.0000000002C78000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  • No. of IPs < 25%
                                                  • 25% < No. of IPs < 50%
                                                  • 50% < No. of IPs < 75%
                                                  • 75% < No. of IPs
                                                  IPDomainCountryFlagASNASN NameMalicious
                                                  98.51.190.130
                                                  unknownUnited States
                                                  7922COMCAST-7922UStrue
                                                  108.181.61.49
                                                  ipwho.isCanada
                                                  852ASN852CAfalse
                                                  Joe Sandbox version:41.0.0 Charoite
                                                  Analysis ID:1575642
                                                  Start date and time:2024-12-16 07:38:44 +01:00
                                                  Joe Sandbox product:CloudBasic
                                                  Overall analysis duration:0h 8m 38s
                                                  Hypervisor based Inspection enabled:false
                                                  Report type:full
                                                  Cookbook file name:default.jbs
                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                  Number of analysed new started processes analysed:12
                                                  Number of new started drivers analysed:0
                                                  Number of existing processes analysed:0
                                                  Number of existing drivers analysed:0
                                                  Number of injected processes analysed:0
                                                  Technologies:
                                                  • HCA enabled
                                                  • EGA enabled
                                                  • AMSI enabled
                                                  Analysis Mode:default
                                                  Analysis stop reason:Timeout
                                                  Sample name:vanilla.exe
                                                  Detection:MAL
                                                  Classification:mal100.troj.spyw.evad.winEXE@10/5@1/2
                                                  EGA Information:
                                                  • Successful, ratio: 66.7%
                                                  HCA Information:
                                                  • Successful, ratio: 91%
                                                  • Number of executed functions: 60
                                                  • Number of non-executed functions: 0
                                                  Cookbook Comments:
                                                  • Found application associated with file extension: .exe
                                                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                  • Excluded IPs from analysis (whitelisted): 199.232.214.172, 13.107.246.63, 4.245.163.56
                                                  • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                                  • Execution Graph export aborted for target Client.exe, PID 1280 because it is empty
                                                  • Not all processes where analyzed, report is missing behavior information
                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                  TimeTypeDescription
                                                  01:39:42API Interceptor14851160x Sleep call for process: Client.exe modified
                                                  06:39:39Task SchedulerRun new task: ctfmon path: C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  98.51.190.1301434orz.exeGet hashmaliciousQuasarBrowse
                                                    108.181.61.49888.exeGet hashmaliciousLuca StealerBrowse
                                                    • /?output=json
                                                    888.exeGet hashmaliciousLuca StealerBrowse
                                                    • /?output=json
                                                    Cracker.exeGet hashmaliciousLuca StealerBrowse
                                                    • /?output=json
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    s-part-0035.t-0009.t-msedge.netFast Download.exeGet hashmaliciousNjratBrowse
                                                    • 13.107.246.63
                                                    Client.exeGet hashmaliciousAsyncRATBrowse
                                                    • 13.107.246.63
                                                    backd00rhome.exeGet hashmaliciousMetasploitBrowse
                                                    • 13.107.246.63
                                                    fern_wifi_recon%2.34.exeGet hashmaliciousMetasploitBrowse
                                                    • 13.107.246.63
                                                    CrSpoofer.exeGet hashmaliciousAsyncRATBrowse
                                                    • 13.107.246.63
                                                    ImageMso.Gallery.xllGet hashmaliciousUnknownBrowse
                                                    • 13.107.246.63
                                                    iAERhkhaZC.exeGet hashmaliciousUnknownBrowse
                                                    • 13.107.246.63
                                                    I37faEaz1K.exeGet hashmaliciousLummaCBrowse
                                                    • 13.107.246.63
                                                    6eftz6UKDm.exeGet hashmaliciousCredential FlusherBrowse
                                                    • 13.107.246.63
                                                    Adver Ransomware.exeGet hashmaliciousUnknownBrowse
                                                    • 13.107.246.63
                                                    ipwho.is888.exeGet hashmaliciousLuca StealerBrowse
                                                    • 108.181.61.49
                                                    888.exeGet hashmaliciousLuca StealerBrowse
                                                    • 108.181.61.49
                                                    https://aggttt.z4.web.core.windows.net/?bcda=00-1-234-294-2156Get hashmaliciousTechSupportScamBrowse
                                                    • 108.181.61.49
                                                    Loader.exeGet hashmaliciousQuasarBrowse
                                                    • 108.181.61.49
                                                    Hydra.ccLoader.batGet hashmaliciousUnknownBrowse
                                                    • 108.181.61.49
                                                    full.exeGet hashmaliciousQuasarBrowse
                                                    • 108.181.61.49
                                                    https://gvvc18-secondary.z15.web.core.windows.net/werrx01USAHTML/?bcda=1-844-439-9938Get hashmaliciousTechSupportScamBrowse
                                                    • 108.181.61.49
                                                    file.exeGet hashmaliciousAmadey, AsyncRAT, Credential Flusher, LummaC Stealer, Stealc, Vidar, XWormBrowse
                                                    • 103.126.138.87
                                                    TeudA4phjN.exeGet hashmaliciousQuasarBrowse
                                                    • 103.126.138.87
                                                    http://www.sbh.co.uk/Get hashmaliciousHTMLPhisher, TechSupportScamBrowse
                                                    • 103.126.138.87
                                                    bg.microsoft.map.fastly.netImageMso.Gallery.xllGet hashmaliciousUnknownBrowse
                                                    • 199.232.210.172
                                                    Setup.msiGet hashmaliciousVidarBrowse
                                                    • 199.232.214.172
                                                    DVW8WyapUR.exeGet hashmaliciousSpyrix KeyloggerBrowse
                                                    • 199.232.210.172
                                                    v12p3S8p36.exeGet hashmaliciousGhostRat, MimikatzBrowse
                                                    • 199.232.214.172
                                                    3333.png.lnk.d.lnkGet hashmaliciousUnknownBrowse
                                                    • 199.232.214.172
                                                    https://f29cc861.solaraweb-alj.pages.dev/download/static/files/Bootstrapper.exeGet hashmaliciousHTMLPhisherBrowse
                                                    • 199.232.210.172
                                                    PO_0099822111ORDER.jsGet hashmaliciousRemcosBrowse
                                                    • 199.232.210.172
                                                    PAYMENT COPY_PDF.exeGet hashmaliciousFormBookBrowse
                                                    • 199.232.210.172
                                                    Shipment 990847575203.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 199.232.214.172
                                                    xu27D0L6Ak.exeGet hashmaliciousDCRatBrowse
                                                    • 199.232.210.172
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    ASN852CA1.elfGet hashmaliciousUnknownBrowse
                                                    • 207.83.27.163
                                                    mips.elfGet hashmaliciousUnknownBrowse
                                                    • 173.182.249.68
                                                    mips.elfGet hashmaliciousUnknownBrowse
                                                    • 199.175.133.251
                                                    armv5l.elfGet hashmaliciousMiraiBrowse
                                                    • 209.29.162.111
                                                    armv6l.elfGet hashmaliciousMiraiBrowse
                                                    • 75.156.205.249
                                                    armv4l.elfGet hashmaliciousUnknownBrowse
                                                    • 161.188.10.7
                                                    armv6l.elfGet hashmaliciousMiraiBrowse
                                                    • 204.191.203.107
                                                    i686.elfGet hashmaliciousMiraiBrowse
                                                    • 50.93.121.166
                                                    IGz.m68k.elfGet hashmaliciousMiraiBrowse
                                                    • 161.188.197.44
                                                    IGz.x86.elfGet hashmaliciousMiraiBrowse
                                                    • 173.182.47.170
                                                    COMCAST-7922USarm5.elfGet hashmaliciousUnknownBrowse
                                                    • 30.204.239.181
                                                    arm.elfGet hashmaliciousUnknownBrowse
                                                    • 29.140.48.103
                                                    sh4.elfGet hashmaliciousUnknownBrowse
                                                    • 30.230.215.28
                                                    ppc.elfGet hashmaliciousUnknownBrowse
                                                    • 26.208.197.77
                                                    mips.elfGet hashmaliciousUnknownBrowse
                                                    • 26.166.149.230
                                                    arm6.elfGet hashmaliciousUnknownBrowse
                                                    • 30.64.154.166
                                                    m68k.elfGet hashmaliciousUnknownBrowse
                                                    • 26.244.63.11
                                                    arm7.elfGet hashmaliciousUnknownBrowse
                                                    • 96.145.155.79
                                                    x86.elfGet hashmaliciousUnknownBrowse
                                                    • 98.33.187.70
                                                    sparc.elfGet hashmaliciousUnknownBrowse
                                                    • 28.205.101.237
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    3b5074b1b5d032e5620f69f9f700ff0egivenbestupdatedoingformebestthingswithgreatnewsformegive.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                    • 108.181.61.49
                                                    clearentirethingwithbestnoticetheeverythinggooodfrome.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                    • 108.181.61.49
                                                    c2.htaGet hashmaliciousXWormBrowse
                                                    • 108.181.61.49
                                                    file.exeGet hashmaliciousAmadey, LummaC Stealer, Vidar, XmrigBrowse
                                                    • 108.181.61.49
                                                    SWIFT09181-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                    • 108.181.61.49
                                                    TD2HjoogPx.dllGet hashmaliciousUnknownBrowse
                                                    • 108.181.61.49
                                                    wmdqEYgW2i.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                    • 108.181.61.49
                                                    LaRHzSijsq.exeGet hashmaliciousDCRatBrowse
                                                    • 108.181.61.49
                                                    Whatsapp-GUI.exeGet hashmaliciousDarkGate, MailPassViewBrowse
                                                    • 108.181.61.49
                                                    Whatsapp-GUI.exeGet hashmaliciousDarkGate, MailPassViewBrowse
                                                    • 108.181.61.49
                                                    No context
                                                    Process:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                                    File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                                    Category:dropped
                                                    Size (bytes):71954
                                                    Entropy (8bit):7.996617769952133
                                                    Encrypted:true
                                                    SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                                    MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                                    SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                                    SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                                    SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                                    Malicious:false
                                                    Reputation:high, very likely benign file
                                                    Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                                    Process:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):328
                                                    Entropy (8bit):3.253995428229511
                                                    Encrypted:false
                                                    SSDEEP:6:kKZD9UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:RaDImsLNkPlE99SNxAhUe/3
                                                    MD5:B1CBB4532546B9FC90FCE10E310FD6C3
                                                    SHA1:D6EC1F08DF175AA7B3F94CBC03E3E3038BBCFA9D
                                                    SHA-256:269189BD4546802BB19FF4379C2E49A5D7CD9F03FDD017E2B447ACD0D5A091FE
                                                    SHA-512:98A571E724C6A68D5F7A874E863489530537BD92A1517A198B05B4C553DE4DEC850AEB3A6D9178BE839EAA055A6D438D077C222CB232B99AD14F468C1B96642C
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:p...... ........x.Z$.O..(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                                    Process:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                                    File Type:CSV text
                                                    Category:dropped
                                                    Size (bytes):1281
                                                    Entropy (8bit):5.370111951859942
                                                    Encrypted:false
                                                    SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
                                                    MD5:12C61586CD59AA6F2A21DF30501F71BD
                                                    SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
                                                    SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
                                                    SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
                                                    Malicious:false
                                                    Reputation:high, very likely benign file
                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                                    Process:C:\Users\user\Desktop\vanilla.exe
                                                    File Type:CSV text
                                                    Category:dropped
                                                    Size (bytes):1281
                                                    Entropy (8bit):5.370111951859942
                                                    Encrypted:false
                                                    SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
                                                    MD5:12C61586CD59AA6F2A21DF30501F71BD
                                                    SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
                                                    SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
                                                    SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
                                                    Malicious:true
                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                                    Process:C:\Users\user\Desktop\vanilla.exe
                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):3265536
                                                    Entropy (8bit):6.084091986096179
                                                    Encrypted:false
                                                    SSDEEP:49152:avkt62XlaSFNWPjljiFa2RoUYIlBRJ63bR3LoGdGFTHHB72eh2NT:av462XlaSFNWPjljiFXRoUYIlBRJ6J
                                                    MD5:7B168E023B1876CD9163D58F98F3B67C
                                                    SHA1:906A5CFACD3797C603F3EFE863AAEDEABACB5918
                                                    SHA-256:781CDAC62A589C52B2FB004EB53B262D4C2C29229CBBBD19A16D1669237AE553
                                                    SHA-512:BED18054E9FCE2CDC185E4536386D042F20D98C9354E1603BB87B8747403E63BDBABFB88E72708DCDFB3468860655DCB34B237024D3395782C092DD772FEC518
                                                    Malicious:true
                                                    Yara Hits:
                                                    • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Joe Security
                                                    • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Joe Security
                                                    • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Florian Roth
                                                    • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: ditekSHen
                                                    • Rule: MALWARE_Win_QuasarStealer, Description: Detects Quasar infostealer, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: ditekshen
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    • Antivirus: ReversingLabs, Detection: 74%
                                                    • Antivirus: Virustotal, Detection: 75%, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d..................1...........1.. ........@.. .......................@2...........@...................................1.S.....2...................... 2...................................................... ............... ..H............text.....1.. ....1................. ..`.rsrc.........2.......1.............@..@.reloc....... 2.......1.............@..B..................1.....H........................k..p............................................0..M....... ....(.....(...........s....(....(...........s....o....(.....(....s....(....*....0..8.......(....(0....s....%.o....%.o....%.o....(....&..&...(.....*........--..........00.......0..@........o....,7(....(0....s....%.o....%.o....%.o....(....&..&...(.....*........-5..........08......f~w...,.~....(....(....*.*v.(.....s....}.....s....}....*r..(......(.....(......(....*....0..L........{....r...po....
                                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Entropy (8bit):6.084091986096179
                                                    TrID:
                                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                    • Windows Screen Saver (13104/52) 0.07%
                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                    File name:vanilla.exe
                                                    File size:3'265'536 bytes
                                                    MD5:7b168e023b1876cd9163d58f98f3b67c
                                                    SHA1:906a5cfacd3797c603f3efe863aaedeabacb5918
                                                    SHA256:781cdac62a589c52b2fb004eb53b262d4c2c29229cbbbd19a16d1669237ae553
                                                    SHA512:bed18054e9fce2cdc185e4536386d042f20d98c9354e1603bb87b8747403e63bdbabfb88e72708dcdfb3468860655dcb34b237024d3395782c092dd772fec518
                                                    SSDEEP:49152:avkt62XlaSFNWPjljiFa2RoUYIlBRJ63bR3LoGdGFTHHB72eh2NT:av462XlaSFNWPjljiFXRoUYIlBRJ6J
                                                    TLSH:FBE56B143BF85E27E1BBE277E5B0041267F0FC1AB363EB0B6581677A1C53B5098426A7
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d..................1...........1.. ........@.. .......................@2...........@................................
                                                    Icon Hash:00928e8e8686b000
                                                    Entrypoint:0x71e3ee
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x640DFAE7 [Sun Mar 12 16:16:39 2023 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:4
                                                    OS Version Minor:0
                                                    File Version Major:4
                                                    File Version Minor:0
                                                    Subsystem Version Major:4
                                                    Subsystem Version Minor:0
                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                    Instruction
                                                    jmp dword ptr [00402000h]
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x31e3980x53.text
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x3200000xa93.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x3220000xc.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x20000x31c3f40x31c40036465c385302daa1cb02f5d560475620unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rsrc0x3200000xa930xc00cdeae95ac72e9e58017d2bcc89d2fbeaFalse0.36328125data4.653972105845318IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .reloc0x3220000xc0x200221440a5d95d2d9aec29428c5700ca78False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    RT_VERSION0x3200a00x31cdata0.4484924623115578
                                                    RT_MANIFEST0x3203bc0x6d7XML 1.0 document, Unicode text, UTF-8 (with BOM) text0.40319817247287265
                                                    DLLImport
                                                    mscoree.dll_CorExeMain
                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                    2024-12-16T07:39:43.611993+01002027619ET MALWARE Observed Malicious SSL Cert (Quasar CnC)198.51.190.13020192.168.2.949722TCP
                                                    2024-12-16T07:39:43.611993+01002035595ET MALWARE Generic AsyncRAT Style SSL Cert198.51.190.13020192.168.2.949722TCP
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Dec 16, 2024 07:39:41.862929106 CET4972220192.168.2.998.51.190.130
                                                    Dec 16, 2024 07:39:41.982719898 CET204972298.51.190.130192.168.2.9
                                                    Dec 16, 2024 07:39:41.982820988 CET4972220192.168.2.998.51.190.130
                                                    Dec 16, 2024 07:39:41.993304014 CET4972220192.168.2.998.51.190.130
                                                    Dec 16, 2024 07:39:42.113223076 CET204972298.51.190.130192.168.2.9
                                                    Dec 16, 2024 07:39:43.251625061 CET204972298.51.190.130192.168.2.9
                                                    Dec 16, 2024 07:39:43.251657963 CET204972298.51.190.130192.168.2.9
                                                    Dec 16, 2024 07:39:43.251730919 CET4972220192.168.2.998.51.190.130
                                                    Dec 16, 2024 07:39:43.487413883 CET204972298.51.190.130192.168.2.9
                                                    Dec 16, 2024 07:39:43.492213964 CET4972220192.168.2.998.51.190.130
                                                    Dec 16, 2024 07:39:43.611993074 CET204972298.51.190.130192.168.2.9
                                                    Dec 16, 2024 07:39:43.894793034 CET204972298.51.190.130192.168.2.9
                                                    Dec 16, 2024 07:39:43.937330961 CET4972220192.168.2.998.51.190.130
                                                    Dec 16, 2024 07:39:46.160738945 CET49734443192.168.2.9108.181.61.49
                                                    Dec 16, 2024 07:39:46.160769939 CET44349734108.181.61.49192.168.2.9
                                                    Dec 16, 2024 07:39:46.160835028 CET49734443192.168.2.9108.181.61.49
                                                    Dec 16, 2024 07:39:46.162261963 CET49734443192.168.2.9108.181.61.49
                                                    Dec 16, 2024 07:39:46.162276030 CET44349734108.181.61.49192.168.2.9
                                                    Dec 16, 2024 07:39:48.557213068 CET44349734108.181.61.49192.168.2.9
                                                    Dec 16, 2024 07:39:48.557472944 CET49734443192.168.2.9108.181.61.49
                                                    Dec 16, 2024 07:39:48.561136961 CET49734443192.168.2.9108.181.61.49
                                                    Dec 16, 2024 07:39:48.561147928 CET44349734108.181.61.49192.168.2.9
                                                    Dec 16, 2024 07:39:48.561508894 CET44349734108.181.61.49192.168.2.9
                                                    Dec 16, 2024 07:39:48.568242073 CET49734443192.168.2.9108.181.61.49
                                                    Dec 16, 2024 07:39:48.611377954 CET44349734108.181.61.49192.168.2.9
                                                    Dec 16, 2024 07:39:49.167525053 CET44349734108.181.61.49192.168.2.9
                                                    Dec 16, 2024 07:39:49.167615891 CET44349734108.181.61.49192.168.2.9
                                                    Dec 16, 2024 07:39:49.167654037 CET49734443192.168.2.9108.181.61.49
                                                    Dec 16, 2024 07:39:49.256494045 CET49734443192.168.2.9108.181.61.49
                                                    Dec 16, 2024 07:39:49.475724936 CET4972220192.168.2.998.51.190.130
                                                    Dec 16, 2024 07:39:49.595603943 CET204972298.51.190.130192.168.2.9
                                                    Dec 16, 2024 07:39:49.595676899 CET4972220192.168.2.998.51.190.130
                                                    Dec 16, 2024 07:39:49.715466022 CET204972298.51.190.130192.168.2.9
                                                    Dec 16, 2024 07:39:50.013526917 CET204972298.51.190.130192.168.2.9
                                                    Dec 16, 2024 07:39:50.062357903 CET4972220192.168.2.998.51.190.130
                                                    Dec 16, 2024 07:39:50.205123901 CET204972298.51.190.130192.168.2.9
                                                    Dec 16, 2024 07:39:50.249866962 CET4972220192.168.2.998.51.190.130
                                                    Dec 16, 2024 07:40:15.218666077 CET4972220192.168.2.998.51.190.130
                                                    Dec 16, 2024 07:40:15.338485956 CET204972298.51.190.130192.168.2.9
                                                    Dec 16, 2024 07:40:40.343820095 CET4972220192.168.2.998.51.190.130
                                                    Dec 16, 2024 07:40:40.463746071 CET204972298.51.190.130192.168.2.9
                                                    Dec 16, 2024 07:41:05.562494993 CET4972220192.168.2.998.51.190.130
                                                    Dec 16, 2024 07:41:05.682303905 CET204972298.51.190.130192.168.2.9
                                                    Dec 16, 2024 07:41:30.687638044 CET4972220192.168.2.998.51.190.130
                                                    Dec 16, 2024 07:41:30.807415962 CET204972298.51.190.130192.168.2.9
                                                    Dec 16, 2024 07:41:55.883002996 CET4972220192.168.2.998.51.190.130
                                                    Dec 16, 2024 07:41:56.002962112 CET204972298.51.190.130192.168.2.9
                                                    Dec 16, 2024 07:42:21.015757084 CET4972220192.168.2.998.51.190.130
                                                    Dec 16, 2024 07:42:21.135396957 CET204972298.51.190.130192.168.2.9
                                                    Dec 16, 2024 07:42:46.250188112 CET4972220192.168.2.998.51.190.130
                                                    Dec 16, 2024 07:42:46.370094061 CET204972298.51.190.130192.168.2.9
                                                    Dec 16, 2024 07:43:11.409044981 CET4972220192.168.2.998.51.190.130
                                                    Dec 16, 2024 07:43:11.528970003 CET204972298.51.190.130192.168.2.9
                                                    Dec 16, 2024 07:43:36.578418016 CET4972220192.168.2.998.51.190.130
                                                    Dec 16, 2024 07:43:36.698179007 CET204972298.51.190.130192.168.2.9
                                                    Dec 16, 2024 07:44:01.702131987 CET4972220192.168.2.998.51.190.130
                                                    Dec 16, 2024 07:44:01.822046041 CET204972298.51.190.130192.168.2.9
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Dec 16, 2024 07:39:45.920744896 CET5150053192.168.2.91.1.1.1
                                                    Dec 16, 2024 07:39:46.153126001 CET53515001.1.1.1192.168.2.9
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Dec 16, 2024 07:39:45.920744896 CET192.168.2.91.1.1.10xf2c3Standard query (0)ipwho.isA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Dec 16, 2024 07:39:33.554651976 CET1.1.1.1192.168.2.90x3bf5No error (0)shed.dual-low.s-part-0035.t-0009.t-msedge.nets-part-0035.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                    Dec 16, 2024 07:39:33.554651976 CET1.1.1.1192.168.2.90x3bf5No error (0)s-part-0035.t-0009.t-msedge.net13.107.246.63A (IP address)IN (0x0001)false
                                                    Dec 16, 2024 07:39:44.114716053 CET1.1.1.1192.168.2.90x58daNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                    Dec 16, 2024 07:39:44.114716053 CET1.1.1.1192.168.2.90x58daNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                    Dec 16, 2024 07:39:46.153126001 CET1.1.1.1192.168.2.90xf2c3No error (0)ipwho.is108.181.61.49A (IP address)IN (0x0001)false
                                                    • ipwho.is
                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.949734108.181.61.494435796C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-12-16 06:39:48 UTC150OUTGET / HTTP/1.1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0
                                                    Host: ipwho.is
                                                    Connection: Keep-Alive
                                                    2024-12-16 06:39:49 UTC223INHTTP/1.1 200 OK
                                                    Date: Mon, 16 Dec 2024 06:39:48 GMT
                                                    Content-Type: application/json; charset=utf-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Server: ipwhois
                                                    Access-Control-Allow-Headers: *
                                                    X-Robots-Tag: noindex
                                                    2024-12-16 06:39:49 UTC1021INData Raw: 33 66 31 0d 0a 7b 0a 20 20 20 20 22 41 62 6f 75 74 20 55 73 22 3a 20 22 68 74 74 70 73 3a 5c 2f 5c 2f 69 70 77 68 6f 69 73 2e 69 6f 22 2c 0a 20 20 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 0a 20 20 20 20 22 73 75 63 63 65 73 73 22 3a 20 74 72 75 65 2c 0a 20 20 20 20 22 74 79 70 65 22 3a 20 22 49 50 76 34 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 22 3a 20 22 4e 6f 72 74 68 20 41 6d 65 72 69 63 61 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 5f 63 6f 64 65 22 3a 20 22 4e 41 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 5f 63 6f 64 65 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f
                                                    Data Ascii: 3f1{ "About Us": "https:\/\/ipwhois.io", "ip": "8.46.123.189", "success": true, "type": "IPv4", "continent": "North America", "continent_code": "NA", "country": "United States", "country_code": "US", "region": "New Yo


                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:01:39:37
                                                    Start date:16/12/2024
                                                    Path:C:\Users\user\Desktop\vanilla.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Users\user\Desktop\vanilla.exe"
                                                    Imagebase:0x400000
                                                    File size:3'265'536 bytes
                                                    MD5 hash:7B168E023B1876CD9163D58F98F3B67C
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000000.1359754879.0000000000720000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.1387299925.000000001B422000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000000.1359375048.0000000000402000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:2
                                                    Start time:01:39:39
                                                    Start date:16/12/2024
                                                    Path:C:\Windows\System32\schtasks.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"schtasks" /create /tn "ctfmon" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                                    Imagebase:0x7ff7f5720000
                                                    File size:235'008 bytes
                                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:3
                                                    Start time:01:39:39
                                                    Start date:16/12/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff70f010000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:4
                                                    Start time:01:39:39
                                                    Start date:16/12/2024
                                                    Path:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                                                    Imagebase:0x390000
                                                    File size:3'265'536 bytes
                                                    MD5 hash:7B168E023B1876CD9163D58F98F3B67C
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000004.00000002.3812391004.0000000002CE0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Joe Security
                                                    • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Joe Security
                                                    • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Florian Roth
                                                    • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: ditekSHen
                                                    • Rule: MALWARE_Win_QuasarStealer, Description: Detects Quasar infostealer, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: ditekshen
                                                    Antivirus matches:
                                                    • Detection: 100%, Avira
                                                    • Detection: 100%, Joe Sandbox ML
                                                    • Detection: 74%, ReversingLabs
                                                    • Detection: 75%, Virustotal, Browse
                                                    Reputation:low
                                                    Has exited:false

                                                    Target ID:5
                                                    Start time:01:39:39
                                                    Start date:16/12/2024
                                                    Path:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                                    Imagebase:0xc20000
                                                    File size:3'265'536 bytes
                                                    MD5 hash:7B168E023B1876CD9163D58F98F3B67C
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:6
                                                    Start time:01:39:40
                                                    Start date:16/12/2024
                                                    Path:C:\Windows\System32\schtasks.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"schtasks" /create /tn "ctfmon" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                                    Imagebase:0x7ff7f5720000
                                                    File size:235'008 bytes
                                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:7
                                                    Start time:01:39:40
                                                    Start date:16/12/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff70f010000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:14.2%
                                                      Dynamic/Decrypted Code Coverage:100%
                                                      Signature Coverage:0%
                                                      Total number of Nodes:12
                                                      Total number of Limit Nodes:0
                                                      execution_graph 2227 7ff887d03525 2228 7ff887d03571 DeleteFileW 2227->2228 2229 7ff887d034c3 2227->2229 2231 7ff887d03616 2228->2231 2222 7ff887d03650 2223 7ff887d03659 2222->2223 2224 7ff887d035f3 DeleteFileW 2223->2224 2226 7ff887d0366c 2223->2226 2225 7ff887d03616 2224->2225 2232 7ff887d03569 2233 7ff887d03571 DeleteFileW 2232->2233 2235 7ff887d03616 2233->2235

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1389075719.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff887d00000_vanilla.jbxd
                                                      Similarity
                                                      • API ID: DeleteFile
                                                      • String ID: 8eL
                                                      • API String ID: 4033686569-2915619072
                                                      • Opcode ID: e3ee325de2205da956ac54ad56675cdc135fba272187db8effad2fa74ddd190c
                                                      • Instruction ID: 5203220dad1e0d50297bc36c0c0e13113e1b4c4627935e98b0fa1bf3754617e5
                                                      • Opcode Fuzzy Hash: e3ee325de2205da956ac54ad56675cdc135fba272187db8effad2fa74ddd190c
                                                      • Instruction Fuzzy Hash: 5751F33290DA488FDB59EB6898496FDBBF0FF65311F04427FD00EC72A2DA28A8458741

                                                      Control-flow Graph

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1389075719.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff887d00000_vanilla.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7605d474c4850c829c68574e7d8d8f7031ae757644da80921f99fd9600a0336c
                                                      • Instruction ID: d95ab6dd473c6301e3784752871fb46257c8d37ba7dfa4c8bd74aabd16e11daf
                                                      • Opcode Fuzzy Hash: 7605d474c4850c829c68574e7d8d8f7031ae757644da80921f99fd9600a0336c
                                                      • Instruction Fuzzy Hash: 9D31D432D0C6458EEB64AB6990093FDBBE1FF41390F04427AD05EC36CADF6DA8158792

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 124 7ff887d03569-7ff887d035d8 129 7ff887d035e2-7ff887d03614 DeleteFileW 124->129 130 7ff887d035da-7ff887d035df 124->130 131 7ff887d03616 129->131 132 7ff887d0361c-7ff887d0364a 129->132 130->129 131->132
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1389075719.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff887d00000_vanilla.jbxd
                                                      Similarity
                                                      • API ID: DeleteFile
                                                      • String ID:
                                                      • API String ID: 4033686569-0
                                                      • Opcode ID: c3fef29095dd5818450215124e18d0c9ae21d072f06dd9325e7bd39a24815607
                                                      • Instruction ID: f9d5e35e7f4a81fa3771a85ab1ac917c41e6f5e2cd1a9f1508b39c088140134d
                                                      • Opcode Fuzzy Hash: c3fef29095dd5818450215124e18d0c9ae21d072f06dd9325e7bd39a24815607
                                                      • Instruction Fuzzy Hash: 8C31BE3190CA5C8FDB59DB5888496E9BBF0FF65311F04426FD049D3292DB64A806CB81

                                                      Execution Graph

                                                      Execution Coverage:6.7%
                                                      Dynamic/Decrypted Code Coverage:100%
                                                      Signature Coverage:0%
                                                      Total number of Nodes:15
                                                      Total number of Limit Nodes:1
                                                      execution_graph 48990 7ff887d03525 48993 7ff887d03531 48990->48993 48991 7ff887d034c3 48992 7ff887d035e2 DeleteFileW 48994 7ff887d03616 48992->48994 48993->48991 48993->48992 48980 7ff887f7eb09 48982 7ff887f7eb1f 48980->48982 48981 7ff887f7ebcb 48982->48981 48983 7ff887f7ecc4 SetWindowsHookExW 48982->48983 48984 7ff887f7ed06 48983->48984 48985 7ff887d03650 48986 7ff887d03659 48985->48986 48987 7ff887d035f3 DeleteFileW 48986->48987 48989 7ff887d0366c 48986->48989 48988 7ff887d03616 48987->48988

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 7ff887f8b851-7ff887f8b8b4 3 7ff887f8b915-7ff887f8b919 0->3 4 7ff887f8b8b6-7ff887f8b910 0->4 6 7ff887f8b92a 3->6 7 7ff887f8b91b-7ff887f8b923 call 7ff887f79fd0 3->7 47 7ff887f8beef-7ff887f8bf02 4->47 9 7ff887f8b92c-7ff887f8b935 6->9 13 7ff887f8b928 7->13 10 7ff887f8ba6a-7ff887f8ba6f 9->10 11 7ff887f8b93b-7ff887f8b940 9->11 16 7ff887f8ba71-7ff887f8ba83 call 7ff887f73830 10->16 17 7ff887f8bad5-7ff887f8bad9 10->17 14 7ff887f8bf03-7ff887f8bf35 11->14 15 7ff887f8b946-7ff887f8b94b 11->15 13->9 26 7ff887f8bf3c-7ff887f8bf5f 14->26 19 7ff887f8b94d-7ff887f8b959 15->19 20 7ff887f8b95f-7ff887f8b975 call 7ff887f79bf0 15->20 34 7ff887f8ba88-7ff887f8ba8f 16->34 21 7ff887f8bb2a-7ff887f8bb55 17->21 22 7ff887f8badb-7ff887f8baf7 call 7ff887f74180 17->22 19->20 19->26 31 7ff887f8b97a-7ff887f8ba65 call 7ff887f7a890 20->31 49 7ff887f8bb64 21->49 50 7ff887f8bb57-7ff887f8bb62 21->50 52 7ff887f8bf75-7ff887f8bf88 22->52 53 7ff887f8bafd-7ff887f8bb25 22->53 45 7ff887f8bf61-7ff887f8bf6e 26->45 46 7ff887f8bf8b-7ff887f8bf91 26->46 31->47 40 7ff887f8ba91-7ff887f8bab2 call 7ff887f8b6f0 34->40 41 7ff887f8ba85-7ff887f8ba86 34->41 61 7ff887f8bab7-7ff887f8bad0 40->61 41->34 45->52 55 7ff887f8bf98-7ff887f8bfe7 46->55 56 7ff887f8bb66-7ff887f8bb95 49->56 50->56 52->46 53->47 94 7ff887f8bfee-7ff887f8c030 55->94 69 7ff887f8bd77-7ff887f8bd7a 56->69 70 7ff887f8bb9b-7ff887f8bbba call 7ff887f77b40 56->70 61->47 74 7ff887f8bc8a-7ff887f8bc8c 69->74 83 7ff887f8bbc0-7ff887f8bbd7 call 7ff887f77220 70->83 84 7ff887f8bd6f-7ff887f8bd72 70->84 77 7ff887f8bd41-7ff887f8bd4a 74->77 78 7ff887f8bc92-7ff887f8bcb1 call 7ff887f77b40 74->78 80 7ff887f8bd50-7ff887f8bd55 77->80 81 7ff887f8be27-7ff887f8be2c 77->81 78->77 92 7ff887f8bcb7-7ff887f8bcce call 7ff887f77220 78->92 89 7ff887f8bd57-7ff887f8bd65 80->89 90 7ff887f8bd7f 80->90 87 7ff887f8be7a-7ff887f8bee4 81->87 88 7ff887f8be2e-7ff887f8be52 81->88 103 7ff887f8bbf0-7ff887f8bbfa 83->103 104 7ff887f8bbd9-7ff887f8bbef 83->104 84->74 112 7ff887f8beeb-7ff887f8beec 87->112 100 7ff887f8be72-7ff887f8be73 88->100 101 7ff887f8be54-7ff887f8be6b 88->101 97 7ff887f8bd81-7ff887f8bd83 89->97 90->97 119 7ff887f8bcd0-7ff887f8bce5 92->119 120 7ff887f8bce7-7ff887f8bcee 92->120 121 7ff887f8c032-7ff887f8c039 94->121 122 7ff887f8c03b-7ff887f8c046 94->122 105 7ff887f8bd85-7ff887f8bd88 97->105 106 7ff887f8bd8a-7ff887f8bd8f 97->106 100->87 101->100 114 7ff887f8bc26-7ff887f8bc2d 103->114 115 7ff887f8bbfc-7ff887f8bc20 103->115 104->103 116 7ff887f8bdc2-7ff887f8bdce 105->116 107 7ff887f8bd91-7ff887f8bdb3 106->107 108 7ff887f8bdba-7ff887f8bdbf 106->108 107->108 108->116 112->47 114->94 118 7ff887f8bc33-7ff887f8bc4a 114->118 115->55 115->114 132 7ff887f8bdd0-7ff887f8bdd3 116->132 133 7ff887f8be1a-7ff887f8be21 116->133 124 7ff887f8bc6b-7ff887f8bc84 call 7ff887f77b40 118->124 125 7ff887f8bc4c-7ff887f8bc69 118->125 119->120 120->94 129 7ff887f8bcf4-7ff887f8bd0a 120->129 121->122 130 7ff887f8c047-7ff887f8c098 121->130 124->74 154 7ff887f8bd67-7ff887f8bd6a 124->154 125->124 134 7ff887f8bd23-7ff887f8bd3b call 7ff887f77b40 129->134 135 7ff887f8bd0c-7ff887f8bd0d 129->135 139 7ff887f8bdd5-7ff887f8bdf0 132->139 140 7ff887f8bdf8-7ff887f8be16 call 7ff887f753c0 132->140 133->80 133->81 134->77 134->92 146 7ff887f8bd14-7ff887f8bd1c 135->146 139->140 140->133 146->134 154->83
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3823391100.00007FF887F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887F70000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff887f70000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 6B$0WL$0WL$0WL$b4B$b4B$d$_H
                                                      • API String ID: 0-3837676482
                                                      • Opcode ID: 38f63fd3a5caf734b2a27c71c189fdabf03bb270ebc879faac028a5c5bf18b6a
                                                      • Instruction ID: 2506a13d67070f726c1c499333b06cb04c236e5511c711d6a9484bb19bb32df8
                                                      • Opcode Fuzzy Hash: 38f63fd3a5caf734b2a27c71c189fdabf03bb270ebc879faac028a5c5bf18b6a
                                                      • Instruction Fuzzy Hash: 6A52E231A58E4D8FEBA8DB299445AB973E1FF98354F44067DC44EC3296DE38B842C781
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3824190842.00007FF888090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff888090000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: H
                                                      • API String ID: 0-2852464175
                                                      • Opcode ID: 3450a0e4ec8e4cadde4ced81a784b15fd7e82a165c1794ddfecea6f8fe9a7b63
                                                      • Instruction ID: 447d022830ec0a7c9d619f003cb4c178b6bd18c6bf9216e05e47664c074bd0a1
                                                      • Opcode Fuzzy Hash: 3450a0e4ec8e4cadde4ced81a784b15fd7e82a165c1794ddfecea6f8fe9a7b63
                                                      • Instruction Fuzzy Hash: 0683D961F58E4B5FFAE5962C086937952D2FF98690F59017AC01EC76DAEE38EC02C344

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1646 7ff887f8eb29-7ff887f8eb6b 1650 7ff887f8eb6d-7ff887f8eb8c 1646->1650 1651 7ff887f8ebbf-7ff887f8ebc8 1646->1651 1650->1651 1653 7ff887f8ebfa-7ff887f8ec2f call 7ff887f75070 1651->1653 1654 7ff887f8ebca-7ff887f8ebf5 1651->1654 1657 7ff887f8ec31-7ff887f8ec36 1653->1657 1658 7ff887f8ec39-7ff887f8ec49 1653->1658 1654->1653 1657->1658 1659 7ff887f8f172-7ff887f8f17d 1658->1659 1660 7ff887f8ec4f-7ff887f8ec5f call 7ff887f7ac60 1658->1660 1662 7ff887f8f187-7ff887f8f1e7 call 7ff887f74780 1659->1662 1663 7ff887f8f17f-7ff887f8f184 1659->1663 1664 7ff887f8ec64-7ff887f8ec69 1660->1664 1671 7ff887f8f111-7ff887f8f16d 1662->1671 1672 7ff887f8f1ed-7ff887f8f1f6 1662->1672 1663->1662 1666 7ff887f8f07f-7ff887f8f0d1 1664->1666 1667 7ff887f8ec6f-7ff887f8ec7a 1664->1667 1688 7ff887f8f0d8-7ff887f8f10a 1666->1688 1669 7ff887f8ec97-7ff887f8ecd0 call 7ff887f74780 1667->1669 1670 7ff887f8ec7c-7ff887f8ec8d 1667->1670 1685 7ff887f8ecd2-7ff887f8ecf6 call 7ff887f7a990 call 7ff887f7aae0 1669->1685 1686 7ff887f8ecfb-7ff887f8edd9 call 7ff887f74780 1669->1686 1670->1669 1684 7ff887f8ec8f-7ff887f8ec94 1670->1684 1676 7ff887f8f3eb-7ff887f8f437 1672->1676 1677 7ff887f8f1fc-7ff887f8f207 1672->1677 1702 7ff887f8f43e-7ff887f8f485 1676->1702 1677->1676 1683 7ff887f8f20d-7ff887f8f210 1677->1683 1687 7ff887f8f216-7ff887f8f2b7 1683->1687 1683->1688 1684->1669 1685->1686 1749 7ff887f8f046-7ff887f8f04f 1686->1749 1750 7ff887f8eddf-7ff887f8ede3 1686->1750 1722 7ff887f8f504-7ff887f8f50d 1687->1722 1723 7ff887f8f2bd-7ff887f8f2c5 1687->1723 1688->1671 1711 7ff887f8f4a2-7ff887f8f4ab 1702->1711 1712 7ff887f8f487-7ff887f8f496 1702->1712 1717 7ff887f8f4ae-7ff887f8f4f5 1711->1717 1718 7ff887f8f49d-7ff887f8f4a0 1712->1718 1721 7ff887f8f4fc-7ff887f8f4ff 1717->1721 1718->1717 1724 7ff887f8f391-7ff887f8f3ac 1721->1724 1722->1724 1729 7ff887f8f513-7ff887f8f51b 1722->1729 1727 7ff887f8f2d4-7ff887f8f2eb 1723->1727 1728 7ff887f8f2c7-7ff887f8f2cc 1723->1728 1730 7ff887f8f3de-7ff887f8f3e6 1724->1730 1731 7ff887f8f3ae-7ff887f8f3bf 1724->1731 1727->1702 1737 7ff887f8f2f1-7ff887f8f374 1727->1737 1728->1727 1729->1724 1732 7ff887f8f521-7ff887f8f532 1729->1732 1740 7ff887f8f3c5-7ff887f8f3dc 1731->1740 1741 7ff887f8ef57-7ff887f8ef63 1731->1741 1732->1724 1743 7ff887f8f538-7ff887f8f543 1732->1743 1737->1724 1740->1730 1753 7ff887f8f012-7ff887f8f019 1741->1753 1754 7ff887f8ef69-7ff887f8ef81 1741->1754 1751 7ff887f8f56d-7ff887f8f585 1743->1751 1749->1666 1755 7ff887f8ede9-7ff887f8ee4f 1750->1755 1756 7ff887f8f01e 1750->1756 1758 7ff887f8f023-7ff887f8f02c 1751->1758 1759 7ff887f8f58b-7ff887f8f5ca 1751->1759 1762 7ff887f8f5d1-7ff887f8f5f1 call 7ff887f8f5f2 1753->1762 1754->1751 1764 7ff887f8ef87-7ff887f8efb2 1754->1764 1755->1741 1756->1758 1758->1749 1759->1762 1774 7ff887f8efb9-7ff887f8efcd 1764->1774 1779 7ff887f8efe2-7ff887f8f010 1774->1779 1780 7ff887f8efcf-7ff887f8efe0 1774->1780 1779->1753 1780->1753 1780->1779
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3823391100.00007FF887F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887F70000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff887f70000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 6B$(LL$0XL
                                                      • API String ID: 0-1192899223
                                                      • Opcode ID: 8b4da225457557fefc942b1ac25c10e5add7d1c24c9b991305b88c09d91c688c
                                                      • Instruction ID: 98251878123121293e8773f350731603da12342bc0735cd093e29bc8bb3f886f
                                                      • Opcode Fuzzy Hash: 8b4da225457557fefc942b1ac25c10e5add7d1c24c9b991305b88c09d91c688c
                                                      • Instruction Fuzzy Hash: 3562A030A18A4A8FEB98EF19D495BB973E1FF98740F540179D45EC7296CE38E842CB41
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3823391100.00007FF887F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887F70000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff887f70000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0#L$0XL
                                                      • API String ID: 0-892149821
                                                      • Opcode ID: 45313929dc1c455e1a48a85634b97d095bd464e1272f90372d4c98604a62bd20
                                                      • Instruction ID: 6993fa91bd15906188aead798e5848a44e672ac1a89582f002cedb8c754e5c98
                                                      • Opcode Fuzzy Hash: 45313929dc1c455e1a48a85634b97d095bd464e1272f90372d4c98604a62bd20
                                                      • Instruction Fuzzy Hash: 56E29070A18A498FEF98DF18C494BA977F2FF99340F5441A9D04ED7296DE34E882CB41
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3823391100.00007FF887F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887F70000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff887f70000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0XL
                                                      • API String ID: 0-405417818
                                                      • Opcode ID: 9f148a536aad876a295d7d12a10d4b94fd9f3089f2b71cd96d7be9ca86e429fd
                                                      • Instruction ID: 52fc103cf4a2893627683e2e2adbe8c7429b06dce68799a0503425b37f4a6f2a
                                                      • Opcode Fuzzy Hash: 9f148a536aad876a295d7d12a10d4b94fd9f3089f2b71cd96d7be9ca86e429fd
                                                      • Instruction Fuzzy Hash: 12024A30E58A5A8FEB98EF19C4857A973F1FF99381F1441B9D44ED7296CA34B881CB40
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3823391100.00007FF887F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887F70000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff887f70000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3e1a087b7c195116b5d4e2384317c8c91d795a0f5a88819cec94bc038e7f847d
                                                      • Instruction ID: 49d94b053e1faee829ded633be1f4122d7512a5b6cf50d71feb73dbcbb804157
                                                      • Opcode Fuzzy Hash: 3e1a087b7c195116b5d4e2384317c8c91d795a0f5a88819cec94bc038e7f847d
                                                      • Instruction Fuzzy Hash: 45621231B5CD894FEB98EB2CD454AB933E1FF99391B0501BAD44EC7296DE28AC42C741
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3823391100.00007FF887F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887F70000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff887f70000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c5a2f816e206633a7c443f81bb7e4a2c11760e124d9b9417d3904183126319a3
                                                      • Instruction ID: 74d8596424970a9b8e9abad0816c0350dfa2014f48920a324b4bd38c9111ec87
                                                      • Opcode Fuzzy Hash: c5a2f816e206633a7c443f81bb7e4a2c11760e124d9b9417d3904183126319a3
                                                      • Instruction Fuzzy Hash: 94525030618A498FEB98EB2CC458BB977E1FF99345F1445B9E44DC72A2DE34E841CB42
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3823391100.00007FF887F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887F70000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff887f70000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 52fb17ee89ffbc9356dd464741008260e95dc7966f92dbcb53bf6c70fdd3e3b3
                                                      • Instruction ID: d83eb5b36e6ba5fc7dfb4060d141cf2ef97e3e1de933e8980bc3986a31973be3
                                                      • Opcode Fuzzy Hash: 52fb17ee89ffbc9356dd464741008260e95dc7966f92dbcb53bf6c70fdd3e3b3
                                                      • Instruction Fuzzy Hash: 64228E30A58A494FEB98EB2994957BD73F2FFA8380F54417DD44EC7292DE38A842C741
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3823391100.00007FF887F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887F70000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff887f70000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 22950eeb0f8b9cca40758d385b5858f200c54def85f36fe4a62e1c7e947e0262
                                                      • Instruction ID: ce6575da2b3a85d0cee9162ea76efb6987e8fb8fc119d544557a6130cd9e2432
                                                      • Opcode Fuzzy Hash: 22950eeb0f8b9cca40758d385b5858f200c54def85f36fe4a62e1c7e947e0262
                                                      • Instruction Fuzzy Hash: E2F19330908A8D8FEBA8DF29C855BF977E1FF55350F04426AE85DC7291CB389945CB82
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3823391100.00007FF887F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887F70000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff887f70000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3b68f70e11590a9b0be156d35bd0eae10acfac064355e6c4dcf696b66627599e
                                                      • Instruction ID: 123c8eea550f6f0b460ab5f2861400a2e1cc521f7cdf2bc7d67fbe50a6091590
                                                      • Opcode Fuzzy Hash: 3b68f70e11590a9b0be156d35bd0eae10acfac064355e6c4dcf696b66627599e
                                                      • Instruction Fuzzy Hash: FFE18130A18A4D8FEBA8DF28D855BED77E1FB54351F04422ED80DC7295CB78A945CB82

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 2327 7ff887d03525-7ff887d0352f 2328 7ff887d03571-7ff887d035d8 2327->2328 2329 7ff887d03531-7ff887d0353a 2327->2329 2342 7ff887d035e2-7ff887d03614 DeleteFileW 2328->2342 2343 7ff887d035da-7ff887d035df 2328->2343 2331 7ff887d034c3-7ff887d03503 call 7ff887d02a00 2329->2331 2332 7ff887d0353c-7ff887d03562 2329->2332 2341 7ff887d03508-7ff887d03522 2331->2341 2332->2328 2344 7ff887d03616 2342->2344 2345 7ff887d0361c-7ff887d0364a 2342->2345 2343->2342 2344->2345
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3821072275.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff887d00000_Client.jbxd
                                                      Similarity
                                                      • API ID: DeleteFile
                                                      • String ID: 8eL
                                                      • API String ID: 4033686569-2915619072
                                                      • Opcode ID: 40fb91fee20cd486e6b4295b74b7b88528bb2f4e7bad7e1e7acf8472b9aed51f
                                                      • Instruction ID: fab2f6e9cea392571faff359b716978b8b4c743c78128b255c6fdb09d7703868
                                                      • Opcode Fuzzy Hash: 40fb91fee20cd486e6b4295b74b7b88528bb2f4e7bad7e1e7acf8472b9aed51f
                                                      • Instruction Fuzzy Hash: 0151F33290DA488FDB59EB6898496FDBBF1FF65311F04427FD40EC72A2DA28A845C741

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 2502 7ff88809014a-7ff888090151 2503 7ff888090157-7ff888090193 2502->2503 2504 7ff88809072d-7ff888090795 2502->2504 2507 7ff888090199-7ff8880901a2 2503->2507 2509 7ff8880901a4-7ff8880901b2 2507->2509 2510 7ff8880901bc-7ff8880901f6 2507->2510 2509->2510 2514 7ff8880901b4-7ff8880901ba 2509->2514 2510->2504 2514->2510
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3824190842.00007FF888090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff888090000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: r6B$r6B
                                                      • API String ID: 0-2860294223
                                                      • Opcode ID: e174a03e6752e1fc9e2942616af09d04065851efc82a81bb065b8f45f87b28ab
                                                      • Instruction ID: 2cff0fef2497530e7dbc823ff634965541040585b5ca87ab67eec6ac8cd05727
                                                      • Opcode Fuzzy Hash: e174a03e6752e1fc9e2942616af09d04065851efc82a81bb065b8f45f87b28ab
                                                      • Instruction Fuzzy Hash: A731E722F1CB898FEA59DA6C58663B477C1FB56360F1401BED44EC32D2EE199C41C746

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 2523 7ff888090676-7ff888090680 2524 7ff888090686-7ff8880906c2 2523->2524 2525 7ff88809072d-7ff888090795 2523->2525 2528 7ff8880906c8-7ff8880906d1 2524->2528 2530 7ff8880906d3-7ff8880906e1 2528->2530 2531 7ff8880906eb-7ff888090725 2528->2531 2530->2531 2535 7ff8880906e3-7ff8880906e9 2530->2535 2531->2525 2535->2531
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3824190842.00007FF888090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff888090000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: r6B$r6B
                                                      • API String ID: 0-2860294223
                                                      • Opcode ID: 9638b15c92bd3c5caf8dbda38958865d8a1e12a175010aae4a69ad617b8961ed
                                                      • Instruction ID: 4fb2679a8e5f8d9fc79ca64a7f9e118a1506285f3beca012b2b858c7e2712896
                                                      • Opcode Fuzzy Hash: 9638b15c92bd3c5caf8dbda38958865d8a1e12a175010aae4a69ad617b8961ed
                                                      • Instruction Fuzzy Hash: 51311422E1CB4A4FEA98DA6C6816378B7C1FBA5760F5401BDD48EC32D2DA289C018647

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 2881 7ff887f7eb09-7ff887f7ebc9 call 7ff887f7e0e8 2895 7ff887f7ebcb-7ff887f7ec07 2881->2895 2896 7ff887f7ec08-7ff887f7ec8e 2881->2896 2904 7ff887f7ed46-7ff887f7ed4a 2896->2904 2905 7ff887f7ec94-7ff887f7eca1 2896->2905 2906 7ff887f7eca3-7ff887f7ed04 SetWindowsHookExW 2904->2906 2905->2906 2910 7ff887f7ed0c-7ff887f7ed45 2906->2910 2911 7ff887f7ed06 2906->2911 2911->2910
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3823391100.00007FF887F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887F70000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff887f70000_Client.jbxd
                                                      Similarity
                                                      • API ID: HookWindows
                                                      • String ID:
                                                      • API String ID: 2559412058-0
                                                      • Opcode ID: a0dbd698a49d1e6f37b4004814eb2b3bac18f7fdbbb33d9228fd7d6045c3c575
                                                      • Instruction ID: d906269915034ed711354ec366f102ac9ac46d6290069a6873428309a7151ec2
                                                      • Opcode Fuzzy Hash: a0dbd698a49d1e6f37b4004814eb2b3bac18f7fdbbb33d9228fd7d6045c3c575
                                                      • Instruction Fuzzy Hash: D1711831A5CE898FD758AB6C94566F97BF0FF99351B04417FD04EC3192DE28A802CB82
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3821072275.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff887d00000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7605d474c4850c829c68574e7d8d8f7031ae757644da80921f99fd9600a0336c
                                                      • Instruction ID: d95ab6dd473c6301e3784752871fb46257c8d37ba7dfa4c8bd74aabd16e11daf
                                                      • Opcode Fuzzy Hash: 7605d474c4850c829c68574e7d8d8f7031ae757644da80921f99fd9600a0336c
                                                      • Instruction Fuzzy Hash: 9D31D432D0C6458EEB64AB6990093FDBBE1FF41390F04427AD05EC36CADF6DA8158792
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3821072275.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff887d00000_Client.jbxd
                                                      Similarity
                                                      • API ID: DeleteFile
                                                      • String ID:
                                                      • API String ID: 4033686569-0
                                                      • Opcode ID: c3fef29095dd5818450215124e18d0c9ae21d072f06dd9325e7bd39a24815607
                                                      • Instruction ID: f9d5e35e7f4a81fa3771a85ab1ac917c41e6f5e2cd1a9f1508b39c088140134d
                                                      • Opcode Fuzzy Hash: c3fef29095dd5818450215124e18d0c9ae21d072f06dd9325e7bd39a24815607
                                                      • Instruction Fuzzy Hash: 8C31BE3190CA5C8FDB59DB5888496E9BBF0FF65311F04426FD049D3292DB64A806CB81
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3824190842.00007FF888090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff888090000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: H
                                                      • API String ID: 0-2852464175
                                                      • Opcode ID: d71089204879e590e4bbaa7f44902741ead7337eb82890749a460b267abd1519
                                                      • Instruction ID: 1474a1e1cbdb6c840dec3987e14fc90d2f4954c442c5fef771e723b7d357edc2
                                                      • Opcode Fuzzy Hash: d71089204879e590e4bbaa7f44902741ead7337eb82890749a460b267abd1519
                                                      • Instruction Fuzzy Hash: CF210761F0CE4A0BFA96A63D186627852D2FF996A0F984179D04EC72DBDE3CDC42C304
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3824190842.00007FF888090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff888090000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c3830c98af8a15f765f69f2d29c4047607ee8ec5b2db79e4e26e1ff86e88ce9a
                                                      • Instruction ID: 9fa33b46cb51b9c7eafa50573a3e186b21767c30721268e7abba360f3e2ce843
                                                      • Opcode Fuzzy Hash: c3830c98af8a15f765f69f2d29c4047607ee8ec5b2db79e4e26e1ff86e88ce9a
                                                      • Instruction Fuzzy Hash: 4A81B210B6CE5A0FEB85976D8895779A6E1FFA9740F4401BAD11DC72C7CE28EC06C385
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3824190842.00007FF888090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff888090000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ffe580636e0ee91c00e8a8e8ba4c59b1855a20169a0fbe8799a624461525ae89
                                                      • Instruction ID: 104ed31e4c5ad90915ba2a7eafd6d016b62d1a1e1700ef2567fa6d1f19e0d7b9
                                                      • Opcode Fuzzy Hash: ffe580636e0ee91c00e8a8e8ba4c59b1855a20169a0fbe8799a624461525ae89
                                                      • Instruction Fuzzy Hash: CA41E131A0CA894FD75A97289C59A703FE0EF67210F1A01FBD48ECB1E3DA28AC45C741
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3820784062.00007FF887BED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887BED000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff887bed000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7c9ee5fc4dadaaefe2b153fc0b3bd79826baf3faee8d392251958e5f4c93f755
                                                      • Instruction ID: 4177e7090b639e8ec45e05611e1e9d40e4fc6b79bfbfe91ddb1a9ca7a3d50bc6
                                                      • Opcode Fuzzy Hash: 7c9ee5fc4dadaaefe2b153fc0b3bd79826baf3faee8d392251958e5f4c93f755
                                                      • Instruction Fuzzy Hash: 7241E53140DBC44FD756CB2898459523FF0FF56364B1906EFD088CB2A3D729A846C7A2
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3824190842.00007FF888090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff888090000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 440261a5200568a1e13e1e8401312caa228d7642cb182d939b85ca01392e0943
                                                      • Instruction ID: 15e75bb5813612608cd567f0755495d7312856c1a7a02729d055e20e264705a8
                                                      • Opcode Fuzzy Hash: 440261a5200568a1e13e1e8401312caa228d7642cb182d939b85ca01392e0943
                                                      • Instruction Fuzzy Hash: 7F310B21F0DE4B1FFA95963C18A527856D2FF98690B591179C00EC72DAEE38EC01C705
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3824190842.00007FF888090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff888090000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ad9c96b82170a2d08b24ca229821bc85f6bf20c5f4adc2a3d7342508c8ff1750
                                                      • Instruction ID: fb2d7449d588b8c7f0fc928af9dddf85ee20733a7c899f35b232e91cf9f536fd
                                                      • Opcode Fuzzy Hash: ad9c96b82170a2d08b24ca229821bc85f6bf20c5f4adc2a3d7342508c8ff1750
                                                      • Instruction Fuzzy Hash: C721D821F18E4B1BFAD5923C189527952C2FF986A0B995179D00EC73EAEE38DC42C345
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3824190842.00007FF888090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff888090000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 66a073ac3ee5302236b1140b19a861f1535376e6f965751ad2826607e09cb546
                                                      • Instruction ID: 7e0a477d976befa22cce382d9a41a2b963e5cb575bed5841c694b10fb7f9aa5a
                                                      • Opcode Fuzzy Hash: 66a073ac3ee5302236b1140b19a861f1535376e6f965751ad2826607e09cb546
                                                      • Instruction Fuzzy Hash: 6721EC61F48E4A0FFAE5D62C185527992D2FFD87A0B98017AC01EC72DADE38DC028345
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3824190842.00007FF888090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff888090000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5634b95314e0155c8f8ac5ad0753368ca76a66919a5af19aa1d4fd62310ea308
                                                      • Instruction ID: 3830c0b5110ce57e919e2267405b1141a800be201940edc2e4ba2d4ec6df497a
                                                      • Opcode Fuzzy Hash: 5634b95314e0155c8f8ac5ad0753368ca76a66919a5af19aa1d4fd62310ea308
                                                      • Instruction Fuzzy Hash: 7021E521F58E4B5BFAE5D23C185627852C2FF987A0F995179C00EC72DAEE38EC428745
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3824190842.00007FF888090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff888090000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 07643474f92a3bb7526b8e28446299f20d1df91738446bfbdb3fd27b1969f7ad
                                                      • Instruction ID: 47f82a64d7a9892dc1ceb4bd19f8447720bbc41d8243b587cb33fad58ada3906
                                                      • Opcode Fuzzy Hash: 07643474f92a3bb7526b8e28446299f20d1df91738446bfbdb3fd27b1969f7ad
                                                      • Instruction Fuzzy Hash: A8219B31F48E4A5FFAD5962D186527952D2FFD86A0F580179C44EC72DAEE38DC028345
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3824190842.00007FF888090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff888090000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 15d88ed9aadcf67c269364914a93d8dc3c8df21942328ef7653969eeea3b2942
                                                      • Instruction ID: 2fdce0ce3bafe1de2af6b0c096c5f1693e723a87402fbc5fd916740b6f5bb925
                                                      • Opcode Fuzzy Hash: 15d88ed9aadcf67c269364914a93d8dc3c8df21942328ef7653969eeea3b2942
                                                      • Instruction Fuzzy Hash: A421DB61F58E4B0BFA99D63C085527862D2FF98691F980179D40ECB2DADE38EC028345
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3824190842.00007FF888090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff888090000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5e7ee95d31de957d24d0d42e710376c1b1ccb8266ad486d880f67b851db7dbc7
                                                      • Instruction ID: 2475b2830781d8f3069678ad5e7d6c42f0d37138c6c26d4b2ae8c833885946db
                                                      • Opcode Fuzzy Hash: 5e7ee95d31de957d24d0d42e710376c1b1ccb8266ad486d880f67b851db7dbc7
                                                      • Instruction Fuzzy Hash: 7721B321F59E0A4FFA95E62C185523852D2FF986A0B9D017AC44EC72DBDE38DC428345
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3824190842.00007FF888090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff888090000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 065b9bfdc02437879638fee4bf8a648c3a022511a7266870bc6205a2fb61e3c3
                                                      • Instruction ID: 4d160f4fc600358fa2659b7b4e7cd909d75eca52758b35132667e8bce9d03f86
                                                      • Opcode Fuzzy Hash: 065b9bfdc02437879638fee4bf8a648c3a022511a7266870bc6205a2fb61e3c3
                                                      • Instruction Fuzzy Hash: 5F21C521F0CE4A0BFAE5E63C185527C56D2FFD86A0B99117AC00EC72DADE38DC428745
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3824190842.00007FF888090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff888090000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: fe8494a3ebeabafd124b618e14ee8df319a2382feeac5fcd82ed667dbadb03df
                                                      • Instruction ID: 7f9d24da7f4e18afebb0a0750bc602ec2a719a75002be349f26c2c1c12990e59
                                                      • Opcode Fuzzy Hash: fe8494a3ebeabafd124b618e14ee8df319a2382feeac5fcd82ed667dbadb03df
                                                      • Instruction Fuzzy Hash: 1421C521F18E0A1FFA95E62D186523852C3FFD86A0B98027AD54EC73DBDE38DC428345
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3824190842.00007FF888090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff888090000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 950f4f7c09fdc7e9916934b017c3c4c519df24449b3e3b66639de327f756794b
                                                      • Instruction ID: 16f0af02213d72534ba691240b183b889719c7935da097a20e499df879fee8bc
                                                      • Opcode Fuzzy Hash: 950f4f7c09fdc7e9916934b017c3c4c519df24449b3e3b66639de327f756794b
                                                      • Instruction Fuzzy Hash: 2621F821F08E0B0FFAA5E63C085523951D2FFD86A1B991179C00EC73DAEE38DC428705
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3824190842.00007FF888090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff888090000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 29f8f6f4f7411bc3efe0785ef342e6dff6e06e3c8e8b76133c3abc3627adfcaa
                                                      • Instruction ID: 2de3b597ffad24d767e9568c4507d6075aaa8d4f0e6cb53c45ec71496d97e21a
                                                      • Opcode Fuzzy Hash: 29f8f6f4f7411bc3efe0785ef342e6dff6e06e3c8e8b76133c3abc3627adfcaa
                                                      • Instruction Fuzzy Hash: D721F961F58E0B4FFB95E62C48A527852C2FFD96A1B990179C00ECB3DADE38DC428345
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3824190842.00007FF888090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff888090000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 627ca5a4b11a880b112c80fa795b6e2251c6c8f1aa181451a0b8594ada5cd6f5
                                                      • Instruction ID: dfda1abe462fbb6a2cfc5413c2168b93cd0c8f9bbca4d47dcf4489505596e41d
                                                      • Opcode Fuzzy Hash: 627ca5a4b11a880b112c80fa795b6e2251c6c8f1aa181451a0b8594ada5cd6f5
                                                      • Instruction Fuzzy Hash: AA21F921F48E0B4FFADAA63C186627851D2FFD86A0B991179C00EC72DADE38DC028745
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3824190842.00007FF888090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff888090000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0560f771ccda03d47ead9e8091cae77846689913253c73a867efe024e4ba4c04
                                                      • Instruction ID: 984960a8e5e7706e254bf2050cf7f204dcb6cae9db4ac06966d29d2bd7a79e50
                                                      • Opcode Fuzzy Hash: 0560f771ccda03d47ead9e8091cae77846689913253c73a867efe024e4ba4c04
                                                      • Instruction Fuzzy Hash: 9621D421F58E4A1BFAD9A62C185527991D3FFD86A1F98017AC00EC72DADD38DC468345
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3824190842.00007FF888090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff888090000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 17ca95542a2836ff515930b197256d2cd815547336ce31359aefca5f1430a20e
                                                      • Instruction ID: a0471cacadb3bd53f8cf535836de0390d8d07d3940a6592c28603119555ec186
                                                      • Opcode Fuzzy Hash: 17ca95542a2836ff515930b197256d2cd815547336ce31359aefca5f1430a20e
                                                      • Instruction Fuzzy Hash: 0411C831B19E4A0BFAE5A62D186533952D2FF982A1F99017ED44EC72DADE38DC028305
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3824190842.00007FF888090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff888090000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e40926eae33a9f508d47e5904b05ca9b2433b58f27f1d7df56609a990d2e80e0
                                                      • Instruction ID: 592e2fd43daf670b5a255e8a3deee659bb124bc93efbb50621fd44df435a4462
                                                      • Opcode Fuzzy Hash: e40926eae33a9f508d47e5904b05ca9b2433b58f27f1d7df56609a990d2e80e0
                                                      • Instruction Fuzzy Hash: AA11CB31B0CD4B0BFAA5963C045527856C2FF946A1B990179C14EC72DBDE39DC028744
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3824190842.00007FF888090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff888090000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b5dc3084cf5b089ca734923474a76bfd841358df265163fa63ee3301ee8514ce
                                                      • Instruction ID: b8e1809b09d82e027846abf5f62ea3b55a9480d734de535bd4887b952edd9b86
                                                      • Opcode Fuzzy Hash: b5dc3084cf5b089ca734923474a76bfd841358df265163fa63ee3301ee8514ce
                                                      • Instruction Fuzzy Hash: 8A119871B08E4A4FFA95D62D185523856D2FF992A0F9942BAD44EC72DADE38DC02C305
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3824190842.00007FF888090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff888090000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c86ffd1e76c796aea7ec368e4be39552d1e1505d984224be589f00c112662bd1
                                                      • Instruction ID: abf50b6baa3eb821f3e09848a8c2d06a81772b490ebdde273deb05a6f16f4a92
                                                      • Opcode Fuzzy Hash: c86ffd1e76c796aea7ec368e4be39552d1e1505d984224be589f00c112662bd1
                                                      • Instruction Fuzzy Hash: 8211A731F0DE4A4BFA95A62D185523866D2FF996A0F9901B9D44EC72DADE38DC028305
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3824190842.00007FF888090000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff888090000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2914b9a9e60c285f944ec0746a45b620bbffb717907ac044ee18591f6d5a9901
                                                      • Instruction ID: d2ca7303ee761fdd086b38eee06ec27444f1e785f4df84cc282121ee6d399b81
                                                      • Opcode Fuzzy Hash: 2914b9a9e60c285f944ec0746a45b620bbffb717907ac044ee18591f6d5a9901
                                                      • Instruction Fuzzy Hash: 43D0C911B6941207FA04219C6C463B8B285EB98760F54513BE40ACA2CBC89EACC5C2C2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.1418173386.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_7ff887d00000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: r6B$r6B$r6B$r6B
                                                      • API String ID: 0-2530241429
                                                      • Opcode ID: 242142529d3511f22d30ec10d1041be3d9dcf8918209ed36cde4dfb79732dfd9
                                                      • Instruction ID: c99180b9ec398502d801c94e226d3a893f50f914f3c399c4201a30fb22a140f7
                                                      • Opcode Fuzzy Hash: 242142529d3511f22d30ec10d1041be3d9dcf8918209ed36cde4dfb79732dfd9
                                                      • Instruction Fuzzy Hash: 16614D31E589098FEB98EA6894557BDB7F2FF88390F545279D00ED32D6CE28AC42C741
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.1418173386.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_7ff887d00000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: (LH$0WL
                                                      • API String ID: 0-3009823392
                                                      • Opcode ID: b0c2e479e513c518b55e12ce1fd1e53ade2bd64eafddca0410a567882a8ecbea
                                                      • Instruction ID: 4b8e76c879df2c175a6860b11c04db756812678a18f92277ad7940960db32f95
                                                      • Opcode Fuzzy Hash: b0c2e479e513c518b55e12ce1fd1e53ade2bd64eafddca0410a567882a8ecbea
                                                      • Instruction Fuzzy Hash: 2D410721E5DA498FE758A768941A3BE77E1FF99350F04027EE04EC32C6DD2C68428382
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.1418173386.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_7ff887d00000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0DL
                                                      • API String ID: 0-3174716889
                                                      • Opcode ID: b8823c38317404b7cf231a8394a96bdbbaf0fa76e6a60e9681ad8331be5ad35b
                                                      • Instruction ID: d58ced09724c1cc2ab59dde531ad4f013e705c350a9c1af570a7efd56e1e8020
                                                      • Opcode Fuzzy Hash: b8823c38317404b7cf231a8394a96bdbbaf0fa76e6a60e9681ad8331be5ad35b
                                                      • Instruction Fuzzy Hash: 29A1B431A4D98A8FEB95EB2894567FD77E1FF95380F0412BAD40EC719BCD28A842C741
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.1418173386.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_7ff887d00000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ;M_I
                                                      • API String ID: 0-1276053120
                                                      • Opcode ID: 9cb059b83cbbc41bd3e80fb59d48e410937bc737f887e15d9525f73fca1f7fbb
                                                      • Instruction ID: 330be3e2a7371a242ccea03505cb8c7649de799c54a9adb10205ef091a36c34a
                                                      • Opcode Fuzzy Hash: 9cb059b83cbbc41bd3e80fb59d48e410937bc737f887e15d9525f73fca1f7fbb
                                                      • Instruction Fuzzy Hash: 97915631A0D6899BE315E76C98643FC7FE1FF55344B8842BAE4898728FCE2C9841C756
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.1418173386.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_7ff887d00000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: .M_^
                                                      • API String ID: 0-2820351210
                                                      • Opcode ID: 4e4077945f2338d2048d840a73832a3187355aaa5cd5999943eb075ac7dbf746
                                                      • Instruction ID: 6fc5d9c7c5f8d332a5e925d799f6d8f33ce799ecba5c64d07cfc5fc93d157155
                                                      • Opcode Fuzzy Hash: 4e4077945f2338d2048d840a73832a3187355aaa5cd5999943eb075ac7dbf746
                                                      • Instruction Fuzzy Hash: 8931E026B0D69D4BD311B67CA8692EC7BE0EF4237270813B7D59CCA093CD09184B879A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.1418173386.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_7ff887d00000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: r6B
                                                      • API String ID: 0-2624010786
                                                      • Opcode ID: 4482a8f2a4768b2c644489d8b0f42effab3e03273b34c1e6c1ae3375539bce4b
                                                      • Instruction ID: a598e448aa282723e312ee2a914c863f773afc76598d99918cf37dfd6e4636e9
                                                      • Opcode Fuzzy Hash: 4482a8f2a4768b2c644489d8b0f42effab3e03273b34c1e6c1ae3375539bce4b
                                                      • Instruction Fuzzy Hash: 4621F321E0DA8E8FEB45A76898563FD7BB1FF85381F4412B6D00EC71D7DD2868458382
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.1418173386.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_7ff887d00000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: `mL
                                                      • API String ID: 0-2103775323
                                                      • Opcode ID: 48a89f95972d314d7e80c0b7aae9532722aa6f9f1d153baaf07fb2620c86b059
                                                      • Instruction ID: 51c761a3143a5827f7f557cf0eb49380cacb15478b83804dd8e9cf0b7814fba1
                                                      • Opcode Fuzzy Hash: 48a89f95972d314d7e80c0b7aae9532722aa6f9f1d153baaf07fb2620c86b059
                                                      • Instruction Fuzzy Hash: 1521F7A1D1DAC69FF345A77458257A9ABB0FF51780F4902FAC09ECB1D7DC1C58048792
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.1418173386.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_7ff887d00000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 8eL
                                                      • API String ID: 0-2915619072
                                                      • Opcode ID: 651cd113f527d793fae52a42d6232d3cae7b0374677f49c8f81231dd5bcfb5bd
                                                      • Instruction ID: 3b5d1291edcab839c486236a982f01d1e914b5395a310d58044cd6dc38dcb08e
                                                      • Opcode Fuzzy Hash: 651cd113f527d793fae52a42d6232d3cae7b0374677f49c8f81231dd5bcfb5bd
                                                      • Instruction Fuzzy Hash: 0F117A2294DA850FE341A6386C494F97BE0EB9026070842BBD40DC7197CD1CD586C341
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.1418173386.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_7ff887d00000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 884e51f76465967ecf32244b71f5283cd8a3c9fb4a6e2022e6858c4a8936a5d9
                                                      • Instruction ID: fee68dcf0c9087970fedfe55f189187817e6046ccdf6d5b98a5a5eaefc6b2ef7
                                                      • Opcode Fuzzy Hash: 884e51f76465967ecf32244b71f5283cd8a3c9fb4a6e2022e6858c4a8936a5d9
                                                      • Instruction Fuzzy Hash: 8C51B620B4DA5A8FEB85F37844653ED6BE2EF952D078052B5E00EC719BCD2C9C42C342
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.1418173386.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_7ff887d00000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 00826315447a4e21370183bd972deede704269db3d8137bc1f230ac86ff2322a
                                                      • Instruction ID: e3b63acb31c64dd8d1075727464cf3c8824e98df2e767e85ac1246a51486f2fc
                                                      • Opcode Fuzzy Hash: 00826315447a4e21370183bd972deede704269db3d8137bc1f230ac86ff2322a
                                                      • Instruction Fuzzy Hash: B541E62194D68A8FEB91EB6898517FD3BB1FF55380F0412B6D00EC718BCE18A841C752
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.1418173386.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_7ff887d00000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d3708a5a9d72021305540000bba84f569c0aa6eb71e3641746ab2b74122b77fe
                                                      • Instruction ID: 99333c9d54f22eb03c83f9f0834e2f93cfe7e520c5ddc23ea40146a79a9532ae
                                                      • Opcode Fuzzy Hash: d3708a5a9d72021305540000bba84f569c0aa6eb71e3641746ab2b74122b77fe
                                                      • Instruction Fuzzy Hash: D12123309496828FDB45DF28C0C55AD7BA1FF95310B1893FAD459CF19BD929EC86C381
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.1418173386.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_7ff887d00000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b758a0c0c043ea22ccdd01165a5d61068a51300f638c228739f8b3b2151ca881
                                                      • Instruction ID: d4fd6627f429f799919f4df0507ce322dfd3c7c2621ed5d1c7b8f28663c5c59c
                                                      • Opcode Fuzzy Hash: b758a0c0c043ea22ccdd01165a5d61068a51300f638c228739f8b3b2151ca881
                                                      • Instruction Fuzzy Hash: D9316E3061965D8BE744FB5CC8993F97F62EB98348FD08164E5198338ACA3C6885CB53
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.1418173386.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_7ff887d00000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 650823013f4f8bb03d57cb4b5fa779cb2767a917b18703c411c1e05596c1cc24
                                                      • Instruction ID: 57e7f617cad2f3858362e4dd610d12cb7c19e82eadbfa5d9d0969b63d1bed5b1
                                                      • Opcode Fuzzy Hash: 650823013f4f8bb03d57cb4b5fa779cb2767a917b18703c411c1e05596c1cc24
                                                      • Instruction Fuzzy Hash: DE21B331F18A598FD794FB7894A96B877E1FF58351B4541BAE00DC72A2DE28D801C741
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.1418173386.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_7ff887d00000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 18b8c99f6c7b40c9bc85bf177998a8f6129bc5e78db761cf24cad47740f37359
                                                      • Instruction ID: 27d5a79cfce5d881007ef374fa946b8726ec63e385961c1c33d90845a1a11108
                                                      • Opcode Fuzzy Hash: 18b8c99f6c7b40c9bc85bf177998a8f6129bc5e78db761cf24cad47740f37359
                                                      • Instruction Fuzzy Hash: 6711E920A4EAC85FE347E3385899BB83FE1AF47254B0901F7D049CB0B7C9585845C352
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.1418173386.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_7ff887d00000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d517d45b1cf157e080886c36060e5faf32eb6a480911739b848a07cc8e5aa600
                                                      • Instruction ID: 4cc32d3ad7230782103e2a5ae8e38251e2560c56d63b2aced3a31ce877711484
                                                      • Opcode Fuzzy Hash: d517d45b1cf157e080886c36060e5faf32eb6a480911739b848a07cc8e5aa600
                                                      • Instruction Fuzzy Hash: 43014922EA8D8A1BD696A22858456F967E1FB95391B440776D00EC328ADD1868428382
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.1418173386.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_7ff887d00000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: fb23093d31cecc9c8b4ee99b857080552a7725e90faa00c3d4ca87974933f7a2
                                                      • Instruction ID: cefac0e902430f3b6d5bbc70a281ed97ef4a5fca7759da2b1fb55b59964a3635
                                                      • Opcode Fuzzy Hash: fb23093d31cecc9c8b4ee99b857080552a7725e90faa00c3d4ca87974933f7a2
                                                      • Instruction Fuzzy Hash: 02F02B21B08C1C1FA640F2AD64DDBFD67E0DFAC26130402B7E40CC7163DC0898828381
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.1418173386.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_7ff887d00000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 03a54d0953cef1cc230fc61801eac45947fbf94abe42ac04b7f58ed6b5a56469
                                                      • Instruction ID: c8eee9639d47fb0bd138c96703fa66a2c9147901f5544aec184cb45c4e3ae9d4
                                                      • Opcode Fuzzy Hash: 03a54d0953cef1cc230fc61801eac45947fbf94abe42ac04b7f58ed6b5a56469
                                                      • Instruction Fuzzy Hash: 66E09221B18C1D5FAB94F2AD50DDBBD62D1EBAC25171006B6E40DC72A6DD19EC81C381
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.1418173386.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_7ff887d00000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 38ddaaa409c0b2f3d8d3b2ceea0543f858216d697a317d1e5b180ff4b4fae589
                                                      • Instruction ID: a5a26a284cfd4ed532ca8a075bec733bfd71318e41cbf4ad9c1f09dbeb2c0005
                                                      • Opcode Fuzzy Hash: 38ddaaa409c0b2f3d8d3b2ceea0543f858216d697a317d1e5b180ff4b4fae589
                                                      • Instruction Fuzzy Hash: 37E08622F89A2617E18932B834062FC66D1EF446D1B4415BAE54EEA28BDC1D6D424385
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.1418173386.00007FF887D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D00000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_7ff887d00000_Client.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 64a76897c144fd02747de3f5a3256680d939d16e2a55b632939f2469077ed25d
                                                      • Instruction ID: 09bcadf011f7fa082b177a25f1f3ff440c0dbf112213718a243cd2c3a57cc5fc
                                                      • Opcode Fuzzy Hash: 64a76897c144fd02747de3f5a3256680d939d16e2a55b632939f2469077ed25d
                                                      • Instruction Fuzzy Hash: 5DC01222D55D4E8B9655CB5834852FC62B2FF883807940335C00DE2169CF2424A1D240