Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Client-built-Playit.exe

Overview

General Information

Sample name:Client-built-Playit.exe
Analysis ID:1576464
MD5:c3e8ea545254bb9d01bff3f53668e04f
SHA1:84bfec02d33d829736407744504c271f71c21078
SHA256:942e216bf41aea0642c7f219560630dc21d29219920e90be79e990e6387a3a9a
Tags:exeQuasarRATuser-lontze7
Infos:

Detection

Quasar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Quasar RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to detect virtual machines (STR)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • Client-built-Playit.exe (PID: 6400 cmdline: "C:\Users\user\Desktop\Client-built-Playit.exe" MD5: C3E8EA545254BB9D01BFF3F53668E04F)
    • schtasks.exe (PID: 3636 cmdline: "schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\System32\System32.exe" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • conhost.exe (PID: 2888 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • System32.exe (PID: 2436 cmdline: "C:\Users\user\AppData\Roaming\System32\System32.exe" MD5: C3E8EA545254BB9D01BFF3F53668E04F)
      • schtasks.exe (PID: 1532 cmdline: "schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\System32\System32.exe" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
        • conhost.exe (PID: 2452 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • System32.exe (PID: 2228 cmdline: C:\Users\user\AppData\Roaming\System32\System32.exe MD5: C3E8EA545254BB9D01BFF3F53668E04F)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
{"Version": "1.4.1", "Host:Port": "147.185.221.24:15249;", "SubDirectory": "System32", "InstallName": "System32.exe", "MutexName": "da67ff1b-f911-4ad4-a51c-c7c5bd13aeb3", "StartupKey": "System32", "Tag": "rat1", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "MIIE9DCCAtygAwIBAgIQAIiSH7hYaoIGKueL/RUXuTANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTI0MTAxOTE2NDkzOFoYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA28uy8neNh2xzV7hyJx8f+G94QKwKUTRBjefu1TZZP2rVXJj3INPqBknTWCy1qqQXd5ar4qbcHgl5QIU4c+lmPY0RV+J4Ba69oUsMxuCs8iFkyMR0C9NRixCdp4vbKdRIXrlBruvqiEsDqBAJMMTcaCj4e2bcb6vYoigUsWpZpV1KC/DwMXdXfNhKA/rAA6oifqe/q2Dlul7OCkpLIJZ6AptKEGXJkvlBaj2rGpy8YyXJxZ6fI+jsaUQoKYTmZIWbIrd1ZzgOMtDi6iU4oUGXLXpdna4umxqK/y3nSzRL+/aQuqVKGRiPTw8Zp93ZcKVtDCgsu3nhVit2rUa1i6SSkticgOAekoXXmPfg2zaBKHWRjHOKHUYWCOCPVEFneHLY6ZL/ZNhdmnjZfWeliFZ659OvLB5treJtkdfutrgrQHlqy/S7U4xkkWpoaQiBLNivCFqohex2pZhSxpY+GqeMJqiy7dPHQaWGrsm9UIsMMFw5E62b4IPkMoQM+tnqybAeUvkuEOU/sV2541k2jDN1e3XsLNmX5cZN8DTKviVwbDQumgjBzGFT046bDMtvqVFQbpyIGwObvYNG7JhfF6RUHJYKFGrO4V3Deo/pxinQOQPTwPNlGx+B9p82zyJ42HiW/+UvYnsBMWx8EFUMOWN2rb2IcmkGIPzgt0iPnO3uSRkCAwEAAaMyMDAwHQYDVR0OBBYEFI7a/T2ouXh29Ill7XpWM4Vf30hxMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQENBQADggIBAKWvYnET0+STGIaWmKToRnCQgKS1HfvUazEY0K8vpEaZ2yvr1NbIB6OALKv/1aKH8M8NEAU3A5Bj2zqxWSW2bwD8+YG6JV4bSR1WDkhCUHTYLS/QcodCl7TV/2xI2ro0uuIbaaapTtXsIa1S+wIqIf6VkzqI3tPg1G1wI3XsNkjYPzXCgOM0u6JJSmSrhCX5I1dPuZYjPZFJWeBmgu8vVZ48Tx1/zUJztk2oZgZVMPpqkPTdk7WODk02uTQIFZxr1Uf40rT8mLhC0sAOYQg7jyKMruvXs1KY/Aoj5LEYIV5DBXOGtKz2cS+VG/uVSDHs+E5Nr1zzASJqVlGHTQweKUbBnKX+dYo5qP9CuYnyYYBTfLR8dB3lfuoU8CRhnZTDqkC3VpLfyxhZtvUlkybUoBf3HCAoFeL9FNFu2tc4itrtQZtU9NORLNjqdDqNfB3PvRMcNLkDKKqALnRqYZ0GjgUCNgnbl+S/HaWLRAEDDzTfD7X9zjTwHB0I7yCqoj1iQrphXHkf3nRo92os4GPdabBy7FpspMsv+/Cdfox7qKeKBsw6gjZbfcNQIbg/70rMQPPXHfvAyriEJMbQ9z2uaFCmNzc6ktGSPOsR/uBnpBx3bIVeClsdP89hXzlSd7RU4JGQ68YJgsnm3QAcPlXqIB0mcI3YySp+5pUguji19lYZ"}
SourceRuleDescriptionAuthorStrings
Client-built-Playit.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
    Client-built-Playit.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      Client-built-Playit.exeMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
      • 0x28ede7:$x1: Quasar.Common.Messages
      • 0x29f104:$x1: Quasar.Common.Messages
      • 0x2ab756:$x4: Uninstalling... good bye :-(
      • 0x2acf4b:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
      Client-built-Playit.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
      • 0x2aad08:$f1: FileZilla\recentservers.xml
      • 0x2aad48:$f2: FileZilla\sitemanager.xml
      • 0x2aad8a:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
      • 0x2aafd6:$b1: Chrome\User Data\
      • 0x2ab02c:$b1: Chrome\User Data\
      • 0x2ab304:$b2: Mozilla\Firefox\Profiles
      • 0x2ab400:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2fd344:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2ab558:$b4: Opera Software\Opera Stable\Login Data
      • 0x2ab612:$b5: YandexBrowser\User Data\
      • 0x2ab680:$b5: YandexBrowser\User Data\
      • 0x2ab354:$s4: logins.json
      • 0x2ab08a:$a1: username_value
      • 0x2ab0a8:$a2: password_value
      • 0x2ab394:$a3: encryptedUsername
      • 0x2fd288:$a3: encryptedUsername
      • 0x2ab3b8:$a4: encryptedPassword
      • 0x2fd2a6:$a4: encryptedPassword
      • 0x2fd224:$a5: httpRealm
      Client-built-Playit.exeMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
      • 0x164eba:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
      • 0x2ab840:$s3: Process already elevated.
      • 0x28eae6:$s4: get_PotentiallyVulnerablePasswords
      • 0x278bb8:$s5: GetKeyloggerLogsDirectory
      • 0x29e863:$s5: GetKeyloggerLogsDirectory
      • 0x28eb09:$s6: set_PotentiallyVulnerablePasswords
      • 0x2fe964:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
      SourceRuleDescriptionAuthorStrings
      C:\Users\user\AppData\Roaming\System32\System32.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
        C:\Users\user\AppData\Roaming\System32\System32.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          C:\Users\user\AppData\Roaming\System32\System32.exeMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
          • 0x28ede7:$x1: Quasar.Common.Messages
          • 0x29f104:$x1: Quasar.Common.Messages
          • 0x2ab756:$x4: Uninstalling... good bye :-(
          • 0x2acf4b:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
          C:\Users\user\AppData\Roaming\System32\System32.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
          • 0x2aad08:$f1: FileZilla\recentservers.xml
          • 0x2aad48:$f2: FileZilla\sitemanager.xml
          • 0x2aad8a:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
          • 0x2aafd6:$b1: Chrome\User Data\
          • 0x2ab02c:$b1: Chrome\User Data\
          • 0x2ab304:$b2: Mozilla\Firefox\Profiles
          • 0x2ab400:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
          • 0x2fd344:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
          • 0x2ab558:$b4: Opera Software\Opera Stable\Login Data
          • 0x2ab612:$b5: YandexBrowser\User Data\
          • 0x2ab680:$b5: YandexBrowser\User Data\
          • 0x2ab354:$s4: logins.json
          • 0x2ab08a:$a1: username_value
          • 0x2ab0a8:$a2: password_value
          • 0x2ab394:$a3: encryptedUsername
          • 0x2fd288:$a3: encryptedUsername
          • 0x2ab3b8:$a4: encryptedPassword
          • 0x2fd2a6:$a4: encryptedPassword
          • 0x2fd224:$a5: httpRealm
          C:\Users\user\AppData\Roaming\System32\System32.exeMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
          • 0x164eba:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
          • 0x2ab840:$s3: Process already elevated.
          • 0x28eae6:$s4: get_PotentiallyVulnerablePasswords
          • 0x278bb8:$s5: GetKeyloggerLogsDirectory
          • 0x29e863:$s5: GetKeyloggerLogsDirectory
          • 0x28eb09:$s6: set_PotentiallyVulnerablePasswords
          • 0x2fe964:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
          SourceRuleDescriptionAuthorStrings
          00000000.00000002.2070520834.000000001B420000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
            00000000.00000000.2038376842.0000000000322000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
              Process Memory Space: Client-built-Playit.exe PID: 6400JoeSecurity_QuasarYara detected Quasar RATJoe Security
                Process Memory Space: System32.exe PID: 2436JoeSecurity_QuasarYara detected Quasar RATJoe Security
                  SourceRuleDescriptionAuthorStrings
                  0.0.Client-built-Playit.exe.320000.0.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
                    0.0.Client-built-Playit.exe.320000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                      0.0.Client-built-Playit.exe.320000.0.unpackMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
                      • 0x28ede7:$x1: Quasar.Common.Messages
                      • 0x29f104:$x1: Quasar.Common.Messages
                      • 0x2ab756:$x4: Uninstalling... good bye :-(
                      • 0x2acf4b:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
                      0.0.Client-built-Playit.exe.320000.0.unpackINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
                      • 0x2aad08:$f1: FileZilla\recentservers.xml
                      • 0x2aad48:$f2: FileZilla\sitemanager.xml
                      • 0x2aad8a:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
                      • 0x2aafd6:$b1: Chrome\User Data\
                      • 0x2ab02c:$b1: Chrome\User Data\
                      • 0x2ab304:$b2: Mozilla\Firefox\Profiles
                      • 0x2ab400:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                      • 0x2fd344:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                      • 0x2ab558:$b4: Opera Software\Opera Stable\Login Data
                      • 0x2ab612:$b5: YandexBrowser\User Data\
                      • 0x2ab680:$b5: YandexBrowser\User Data\
                      • 0x2ab354:$s4: logins.json
                      • 0x2ab08a:$a1: username_value
                      • 0x2ab0a8:$a2: password_value
                      • 0x2ab394:$a3: encryptedUsername
                      • 0x2fd288:$a3: encryptedUsername
                      • 0x2ab3b8:$a4: encryptedPassword
                      • 0x2fd2a6:$a4: encryptedPassword
                      • 0x2fd224:$a5: httpRealm
                      0.0.Client-built-Playit.exe.320000.0.unpackMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
                      • 0x164eba:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
                      • 0x2ab840:$s3: Process already elevated.
                      • 0x28eae6:$s4: get_PotentiallyVulnerablePasswords
                      • 0x278bb8:$s5: GetKeyloggerLogsDirectory
                      • 0x29e863:$s5: GetKeyloggerLogsDirectory
                      • 0x28eb09:$s6: set_PotentiallyVulnerablePasswords
                      • 0x2fe964:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\System32\System32.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\System32\System32.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\System32\System32.exe", ParentImage: C:\Users\user\AppData\Roaming\System32\System32.exe, ParentProcessId: 2436, ParentProcessName: System32.exe, ProcessCommandLine: "schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\System32\System32.exe" /rl HIGHEST /f, ProcessId: 1532, ProcessName: schtasks.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\System32\System32.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\System32\System32.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Client-built-Playit.exe", ParentImage: C:\Users\user\Desktop\Client-built-Playit.exe, ParentProcessId: 6400, ParentProcessName: Client-built-Playit.exe, ProcessCommandLine: "schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\System32\System32.exe" /rl HIGHEST /f, ProcessId: 3636, ProcessName: schtasks.exe
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: Client-built-Playit.exeAvira: detected
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeAvira: detection malicious, Label: HEUR/AGEN.1307453
                      Source: Client-built-Playit.exeMalware Configuration Extractor: Quasar {"Version": "1.4.1", "Host:Port": "147.185.221.24:15249;", "SubDirectory": "System32", "InstallName": "System32.exe", "MutexName": "da67ff1b-f911-4ad4-a51c-c7c5bd13aeb3", "StartupKey": "System32", "Tag": "rat1", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
                      Source: 147.185.221.24Virustotal: Detection: 17%Perma Link
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeReversingLabs: Detection: 73%
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeVirustotal: Detection: 75%Perma Link
                      Source: Client-built-Playit.exeVirustotal: Detection: 75%Perma Link
                      Source: Client-built-Playit.exeReversingLabs: Detection: 73%
                      Source: Yara matchFile source: Client-built-Playit.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.Client-built-Playit.exe.320000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2070520834.000000001B420000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.2038376842.0000000000322000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Client-built-Playit.exe PID: 6400, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: System32.exe PID: 2436, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\System32\System32.exe, type: DROPPED
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeJoe Sandbox ML: detected
                      Source: Client-built-Playit.exeJoe Sandbox ML: detected
                      Source: Client-built-Playit.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: Client-built-Playit.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                      Networking

                      barindex
                      Source: Malware configuration extractorURLs: 147.185.221.24
                      Source: global trafficTCP traffic: 147.185.221.24 ports 1,2,4,5,15249,9
                      Source: Yara matchFile source: Client-built-Playit.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.Client-built-Playit.exe.320000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\System32\System32.exe, type: DROPPED
                      Source: global trafficTCP traffic: 192.168.2.5:49704 -> 147.185.221.24:15249
                      Source: Joe Sandbox ViewIP Address: 147.185.221.24 147.185.221.24
                      Source: Joe Sandbox ViewASN Name: SALSGIVERUS SALSGIVERUS
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
                      Source: Client-built-Playit.exe, 00000000.00000002.2067157808.0000000002951000.00000004.00000800.00020000.00000000.sdmp, System32.exe, 00000004.00000002.4487542626.00000000032E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: Client-built-Playit.exe, System32.exe.0.drString found in binary or memory: https://api.ipify.org/
                      Source: Client-built-Playit.exe, System32.exe.0.drString found in binary or memory: https://ipwho.is/
                      Source: Client-built-Playit.exe, System32.exe.0.drString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                      Source: Client-built-Playit.exe, System32.exe.0.drString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                      Source: Client-built-Playit.exe, System32.exe.0.drString found in binary or memory: https://stackoverflow.com/q/2152978/23354sCannot

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\System32\System32.exeJump to behavior

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: Client-built-Playit.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.Client-built-Playit.exe.320000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2070520834.000000001B420000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.2038376842.0000000000322000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Client-built-Playit.exe PID: 6400, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: System32.exe PID: 2436, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\System32\System32.exe, type: DROPPED

                      System Summary

                      barindex
                      Source: Client-built-Playit.exe, type: SAMPLEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                      Source: Client-built-Playit.exe, type: SAMPLEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: Client-built-Playit.exe, type: SAMPLEMatched rule: Detects Quasar infostealer Author: ditekshen
                      Source: 0.0.Client-built-Playit.exe.320000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                      Source: 0.0.Client-built-Playit.exe.320000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: 0.0.Client-built-Playit.exe.320000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exe, type: DROPPEDMatched rule: Detects QuasarRAT malware Author: Florian Roth
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exe, type: DROPPEDMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exe, type: DROPPEDMatched rule: Detects Quasar infostealer Author: ditekshen
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeCode function: 4_2_00007FF8491892714_2_00007FF849189271
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeCode function: 4_2_00007FF8491855D64_2_00007FF8491855D6
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeCode function: 4_2_00007FF84918AFDD4_2_00007FF84918AFDD
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeCode function: 4_2_00007FF849189BD14_2_00007FF849189BD1
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeCode function: 4_2_00007FF84918621F4_2_00007FF84918621F
                      Source: Client-built-Playit.exe, 00000000.00000000.2038711405.0000000000640000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSystem322 vs Client-built-Playit.exe
                      Source: Client-built-Playit.exe, 00000000.00000002.2070520834.000000001B420000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem322 vs Client-built-Playit.exe
                      Source: Client-built-Playit.exeBinary or memory string: OriginalFilenameSystem322 vs Client-built-Playit.exe
                      Source: Client-built-Playit.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: Client-built-Playit.exe, type: SAMPLEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                      Source: Client-built-Playit.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: Client-built-Playit.exe, type: SAMPLEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                      Source: 0.0.Client-built-Playit.exe.320000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                      Source: 0.0.Client-built-Playit.exe.320000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: 0.0.Client-built-Playit.exe.320000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exe, type: DROPPEDMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exe, type: DROPPEDMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@10/3@0/1
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeFile created: C:\Users\user\AppData\Roaming\System32Jump to behavior
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2452:120:WilError_03
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeMutant created: NULL
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeMutant created: \Sessions\1\BaseNamedObjects\Local\da67ff1b-f911-4ad4-a51c-c7c5bd13aeb3
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2888:120:WilError_03
                      Source: Client-built-Playit.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: Client-built-Playit.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: Client-built-Playit.exeVirustotal: Detection: 75%
                      Source: Client-built-Playit.exeReversingLabs: Detection: 73%
                      Source: Client-built-Playit.exeString found in binary or memory: HasSubValue3Conflicting item/add type
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeFile read: C:\Users\user\Desktop\Client-built-Playit.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\Client-built-Playit.exe "C:\Users\user\Desktop\Client-built-Playit.exe"
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\System32\System32.exe" /rl HIGHEST /f
                      Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess created: C:\Users\user\AppData\Roaming\System32\System32.exe "C:\Users\user\AppData\Roaming\System32\System32.exe"
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\System32\System32.exe C:\Users\user\AppData\Roaming\System32\System32.exe
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\System32\System32.exe" /rl HIGHEST /f
                      Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\System32\System32.exe" /rl HIGHEST /fJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess created: C:\Users\user\AppData\Roaming\System32\System32.exe "C:\Users\user\AppData\Roaming\System32\System32.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\System32\System32.exe" /rl HIGHEST /fJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                      Source: Client-built-Playit.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: Client-built-Playit.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                      Source: Client-built-Playit.exeStatic file information: File size 3265536 > 1048576
                      Source: Client-built-Playit.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x31c400
                      Source: Client-built-Playit.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeCode function: 4_2_00007FF848F12B85 pushad ; iretd 4_2_00007FF848F12C3D
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeCode function: 4_2_00007FF848F12BE5 pushad ; iretd 4_2_00007FF848F12C3D
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeCode function: 4_2_00007FF8491833A0 push eax; ret 4_2_00007FF84918340C
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeFile created: C:\Users\user\AppData\Roaming\System32\System32.exeJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\System32\System32.exe" /rl HIGHEST /f

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeFile opened: C:\Users\user\Desktop\Client-built-Playit.exe:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeFile opened: C:\Users\user\AppData\Roaming\System32\System32.exe:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeFile opened: C:\Users\user\AppData\Roaming\System32\System32.exe:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeMemory allocated: B90000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeMemory allocated: 1A950000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeMemory allocated: 17E0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeMemory allocated: 1B2B0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeMemory allocated: 1A20000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeMemory allocated: 1B430000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeCode function: 4_2_00007FF848F1F1F2 str ax4_2_00007FF848F1F1F2
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeWindow / User API: threadDelayed 2025Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeWindow / User API: threadDelayed 7806Jump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exe TID: 1252Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exe TID: 3436Thread sleep count: 33 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exe TID: 3436Thread sleep time: -30437127721620741s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exe TID: 4796Thread sleep count: 2025 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exe TID: 4796Thread sleep count: 7806 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exe TID: 5160Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: System32.exe, 00000004.00000002.4494916451.000000001C073000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: System32.exe, 00000004.00000002.4494916451.000000001C073000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeMemory allocated: page read and write | page guardJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\System32\System32.exe" /rl HIGHEST /fJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeProcess created: C:\Users\user\AppData\Roaming\System32\System32.exe "C:\Users\user\AppData\Roaming\System32\System32.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\System32\System32.exe" /rl HIGHEST /fJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeQueries volume information: C:\Users\user\Desktop\Client-built-Playit.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeQueries volume information: C:\Users\user\AppData\Roaming\System32\System32.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\System32\System32.exeQueries volume information: C:\Users\user\AppData\Roaming\System32\System32.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Client-built-Playit.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: Client-built-Playit.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.Client-built-Playit.exe.320000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2070520834.000000001B420000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.2038376842.0000000000322000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Client-built-Playit.exe PID: 6400, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: System32.exe PID: 2436, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\System32\System32.exe, type: DROPPED

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: Client-built-Playit.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.Client-built-Playit.exe.320000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2070520834.000000001B420000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.2038376842.0000000000322000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Client-built-Playit.exe PID: 6400, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: System32.exe PID: 2436, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\System32\System32.exe, type: DROPPED
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                      Command and Scripting Interpreter
                      1
                      Scheduled Task/Job
                      11
                      Process Injection
                      1
                      Masquerading
                      11
                      Input Capture
                      11
                      Security Software Discovery
                      Remote Services11
                      Input Capture
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Scheduled Task/Job
                      1
                      DLL Side-Loading
                      1
                      Scheduled Task/Job
                      1
                      Disable or Modify Tools
                      LSASS Memory41
                      Virtualization/Sandbox Evasion
                      Remote Desktop Protocol1
                      Archive Collected Data
                      1
                      Non-Standard Port
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                      DLL Side-Loading
                      41
                      Virtualization/Sandbox Evasion
                      Security Account Manager1
                      Application Window Discovery
                      SMB/Windows Admin SharesData from Network Shared Drive1
                      Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                      Process Injection
                      NTDS12
                      System Information Discovery
                      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Hidden Files and Directories
                      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Obfuscated Files or Information
                      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      DLL Side-Loading
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      Client-built-Playit.exe75%VirustotalBrowse
                      Client-built-Playit.exe74%ReversingLabsByteCode-MSIL.Backdoor.Quasar
                      Client-built-Playit.exe100%AviraHEUR/AGEN.1307453
                      Client-built-Playit.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\System32\System32.exe100%AviraHEUR/AGEN.1307453
                      C:\Users\user\AppData\Roaming\System32\System32.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\System32\System32.exe74%ReversingLabsByteCode-MSIL.Backdoor.Quasar
                      C:\Users\user\AppData\Roaming\System32\System32.exe75%VirustotalBrowse
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      147.185.221.240%Avira URL Cloudsafe
                      147.185.221.2418%VirustotalBrowse
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      147.185.221.24true
                      • 18%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://api.ipify.org/Client-built-Playit.exe, System32.exe.0.drfalse
                        high
                        https://stackoverflow.com/q/14436606/23354Client-built-Playit.exe, System32.exe.0.drfalse
                          high
                          https://stackoverflow.com/q/2152978/23354sCannotClient-built-Playit.exe, System32.exe.0.drfalse
                            high
                            https://ipwho.is/Client-built-Playit.exe, System32.exe.0.drfalse
                              high
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameClient-built-Playit.exe, 00000000.00000002.2067157808.0000000002951000.00000004.00000800.00020000.00000000.sdmp, System32.exe, 00000004.00000002.4487542626.00000000032E9000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://stackoverflow.com/q/11564914/23354;Client-built-Playit.exe, System32.exe.0.drfalse
                                  high
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  147.185.221.24
                                  unknownUnited States
                                  12087SALSGIVERUStrue
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1576464
                                  Start date and time:2024-12-17 07:30:07 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 7m 57s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:10
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:Client-built-Playit.exe
                                  Detection:MAL
                                  Classification:mal100.troj.spyw.evad.winEXE@10/3@0/1
                                  EGA Information:
                                  • Successful, ratio: 66.7%
                                  HCA Information:
                                  • Successful, ratio: 100%
                                  • Number of executed functions: 29
                                  • Number of non-executed functions: 1
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                  • Excluded IPs from analysis (whitelisted): 13.107.246.63, 20.12.23.50
                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                  • Execution Graph export aborted for target System32.exe, PID 2228 because it is empty
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                  TimeTypeDescription
                                  01:31:01API Interceptor12495188x Sleep call for process: System32.exe modified
                                  07:30:59Task SchedulerRun new task: System32 path: C:\Users\user\AppData\Roaming\System32\System32.exe
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  147.185.221.24file.exeGet hashmaliciousScreenConnect Tool, Amadey, RHADAMANTHYS, XWorm, XmrigBrowse
                                    72OWK7wBVH.exeGet hashmaliciousXWormBrowse
                                      aZDwfEKorn.exeGet hashmaliciousXWormBrowse
                                        HdTSntLSMB.exeGet hashmaliciousXWormBrowse
                                          file.exeGet hashmaliciousXWormBrowse
                                            file.exeGet hashmaliciousXWormBrowse
                                              NhoqAfkhHL.batGet hashmaliciousUnknownBrowse
                                                a4lIk1Jrla.exeGet hashmaliciousNjrat, RevengeRATBrowse
                                                  W6s1vzcRdj.exeGet hashmaliciousXWormBrowse
                                                    u7e3vb5dfk.exeGet hashmaliciousXWormBrowse
                                                      No context
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      SALSGIVERUSPowerRat.exeGet hashmaliciousAsyncRATBrowse
                                                      • 147.185.221.211
                                                      file.exeGet hashmaliciousScreenConnect Tool, Amadey, RHADAMANTHYS, XWorm, XmrigBrowse
                                                      • 147.185.221.24
                                                      msedge.exeGet hashmaliciousXWormBrowse
                                                      • 147.185.221.22
                                                      imagelogger.exeGet hashmaliciousXWormBrowse
                                                      • 147.185.221.229
                                                      NJRAT DANGEROUS.exeGet hashmaliciousXWormBrowse
                                                      • 147.185.221.181
                                                      com surrogate.exeGet hashmaliciousXWormBrowse
                                                      • 147.185.221.22
                                                      lastest.exeGet hashmaliciousNjratBrowse
                                                      • 147.185.221.20
                                                      Fast Download.exeGet hashmaliciousNjratBrowse
                                                      • 147.185.221.229
                                                      cnct.exeGet hashmaliciousNjratBrowse
                                                      • 147.185.221.20
                                                      Server1.exeGet hashmaliciousNjratBrowse
                                                      • 147.185.221.17
                                                      No context
                                                      No context
                                                      Process:C:\Users\user\Desktop\Client-built-Playit.exe
                                                      File Type:CSV text
                                                      Category:dropped
                                                      Size (bytes):1281
                                                      Entropy (8bit):5.370111951859942
                                                      Encrypted:false
                                                      SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
                                                      MD5:12C61586CD59AA6F2A21DF30501F71BD
                                                      SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
                                                      SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
                                                      SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
                                                      Malicious:true
                                                      Reputation:high, very likely benign file
                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                                      Process:C:\Users\user\AppData\Roaming\System32\System32.exe
                                                      File Type:Unknown
                                                      Category:dropped
                                                      Size (bytes):1281
                                                      Entropy (8bit):5.370111951859942
                                                      Encrypted:false
                                                      SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
                                                      MD5:12C61586CD59AA6F2A21DF30501F71BD
                                                      SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
                                                      SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
                                                      SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
                                                      Malicious:false
                                                      Reputation:high, very likely benign file
                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                                      Process:C:\Users\user\Desktop\Client-built-Playit.exe
                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):3265536
                                                      Entropy (8bit):6.086654643570332
                                                      Encrypted:false
                                                      SSDEEP:49152:OUd1/DM2zv8aMlqCPwln5+Hjdh+Euvr9+VZzNAxoGnjwTHHB72eh2NTe:OUPrM2zEaMlqCPwln5+Ddh+Zvr4zq1k
                                                      MD5:C3E8EA545254BB9D01BFF3F53668E04F
                                                      SHA1:84BFEC02D33D829736407744504C271F71C21078
                                                      SHA-256:942E216BF41AEA0642C7F219560630DC21D29219920E90BE79E990E6387A3A9A
                                                      SHA-512:84933B3FC7A888673079C2FCCF987189777FC20831EB76CC3F4B94CF960C0C74831B98892781F2E9053C97DE7818922FD6A950A8AACCAF696903B536972F0B38
                                                      Malicious:true
                                                      Yara Hits:
                                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: C:\Users\user\AppData\Roaming\System32\System32.exe, Author: Joe Security
                                                      • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\System32\System32.exe, Author: Joe Security
                                                      • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: C:\Users\user\AppData\Roaming\System32\System32.exe, Author: Florian Roth
                                                      • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: C:\Users\user\AppData\Roaming\System32\System32.exe, Author: ditekSHen
                                                      • Rule: MALWARE_Win_QuasarStealer, Description: Detects Quasar infostealer, Source: C:\Users\user\AppData\Roaming\System32\System32.exe, Author: ditekshen
                                                      Antivirus:
                                                      • Antivirus: Avira, Detection: 100%
                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                      • Antivirus: ReversingLabs, Detection: 74%
                                                      • Antivirus: Virustotal, Detection: 75%, Browse
                                                      Reputation:low
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g..................1...........1.. ........@.. .......................@2...........@.................................x.1.S.....2.<.................... 2...................................................... ............... ..H............text.....1.. ....1................. ..`.rsrc...<.....2.......1.............@..@.reloc....... 2.......1.............@..B..................1.....H.......................@k..p............................................0..M....... ....(.....(...........s....(....(...........s....o....(.....(....s....(....*....0..8.......(....(0....s....%.o....%.o....%.o....(....&..&...(.....*........--..........00.......0..@........o....,7(....(0....s....%.o....%.o....%.o....(....&..&...(.....*........-5..........08......f~w...,.~....(....(....*.*v.(.....s....}.....s....}....*r..(......(.....(......(....*6.{.....o....*..0..........(...
                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Entropy (8bit):6.086654643570332
                                                      TrID:
                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                      • Win32 Executable (generic) a (10002005/4) 49.75%
                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                      • Windows Screen Saver (13104/52) 0.07%
                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                      File name:Client-built-Playit.exe
                                                      File size:3'265'536 bytes
                                                      MD5:c3e8ea545254bb9d01bff3f53668e04f
                                                      SHA1:84bfec02d33d829736407744504c271f71c21078
                                                      SHA256:942e216bf41aea0642c7f219560630dc21d29219920e90be79e990e6387a3a9a
                                                      SHA512:84933b3fc7a888673079c2fccf987189777fc20831eb76cc3f4b94cf960c0c74831b98892781f2e9053c97de7818922fd6a950a8aaccaf696903b536972f0b38
                                                      SSDEEP:49152:OUd1/DM2zv8aMlqCPwln5+Hjdh+Euvr9+VZzNAxoGnjwTHHB72eh2NTe:OUPrM2zEaMlqCPwln5+Ddh+Zvr4zq1k
                                                      TLSH:E1E55B1477F84E23E1ABE673D9B044126BF0FC2AB363EB0B658167B91C53B9058417A7
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g..................1...........1.. ........@.. .......................@2...........@................................
                                                      Icon Hash:00928e8e8686b000
                                                      Entrypoint:0x71e2ce
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x671685FA [Mon Oct 21 16:48:58 2024 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:4
                                                      OS Version Minor:0
                                                      File Version Major:4
                                                      File Version Minor:0
                                                      Subsystem Version Major:4
                                                      Subsystem Version Minor:0
                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                      Instruction
                                                      jmp dword ptr [00402000h]
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x31e2780x53.text
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x3200000xb3c.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x3220000xc.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x20000x31c2d40x31c400ddf52cca7c821df1235a8721fb2ed124unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rsrc0x3200000xb3c0xc00a8ee2a1d668a184f96fdf258195d48eaFalse0.3736979166666667data5.12328100731859IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0x3220000xc0x2006195ec41dc9e41ca4e666293a65322d4False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_VERSION0x3200a00x3c4data0.39107883817427386
                                                      RT_MANIFEST0x3204640x6d7XML 1.0 document, Unicode text, UTF-8 (with BOM) text0.40319817247287265
                                                      DLLImport
                                                      mscoree.dll_CorExeMain
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Dec 17, 2024 07:31:01.876777887 CET4970415249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:31:01.996570110 CET1524949704147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:31:01.996726036 CET4970415249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:31:02.014177084 CET4970415249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:31:02.133955956 CET1524949704147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:31:23.880109072 CET1524949704147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:31:23.880192041 CET4970415249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:31:23.892736912 CET4970415249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:31:24.012422085 CET1524949704147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:31:27.486116886 CET4973515249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:31:27.606281996 CET1524949735147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:31:27.606437922 CET4973515249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:31:27.606950045 CET4973515249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:31:27.726785898 CET1524949735147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:31:49.506433964 CET1524949735147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:31:49.506577015 CET4973515249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:31:49.506978989 CET4973515249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:31:49.626704931 CET1524949735147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:31:52.845520020 CET4979615249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:31:52.965421915 CET1524949796147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:31:52.965605021 CET4979615249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:31:52.966053963 CET4979615249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:31:53.085936069 CET1524949796147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:32:14.880909920 CET1524949796147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:32:14.880979061 CET4979615249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:32:14.884584904 CET4979615249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:32:15.004460096 CET1524949796147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:32:18.236143112 CET4985215249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:32:18.356592894 CET1524949852147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:32:18.356686115 CET4985215249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:32:18.357145071 CET4985215249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:32:18.476876974 CET1524949852147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:32:40.256513119 CET1524949852147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:32:40.256570101 CET4985215249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:32:40.257102966 CET4985215249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:32:40.377047062 CET1524949852147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:32:43.845899105 CET4991315249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:32:43.965766907 CET1524949913147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:32:43.965852022 CET4991315249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:32:43.966258049 CET4991315249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:32:44.085985899 CET1524949913147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:33:05.882064104 CET1524949913147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:33:05.882132053 CET4991315249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:33:05.882642984 CET4991315249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:33:06.002413034 CET1524949913147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:33:09.220654964 CET4997315249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:33:09.340528965 CET1524949973147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:33:09.340660095 CET4997315249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:33:09.340955973 CET4997315249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:33:09.460671902 CET1524949973147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:33:31.257786036 CET1524949973147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:33:31.257916927 CET4997315249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:33:31.258552074 CET4997315249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:33:31.378381014 CET1524949973147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:33:34.845617056 CET4998115249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:33:34.966912985 CET1524949981147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:33:34.970328093 CET4998115249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:33:34.970657110 CET4998115249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:33:35.090368986 CET1524949981147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:33:56.851605892 CET1524949981147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:33:56.851754904 CET4998115249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:33:56.852291107 CET4998115249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:33:56.972615957 CET1524949981147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:34:00.273888111 CET4998215249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:34:00.393604040 CET1524949982147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:34:00.393691063 CET4998215249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:34:00.394155979 CET4998215249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:34:00.515479088 CET1524949982147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:34:22.289674997 CET1524949982147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:34:22.289777040 CET4998215249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:34:22.290071964 CET4998215249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:34:22.410335064 CET1524949982147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:34:26.033265114 CET4998315249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:34:26.153189898 CET1524949983147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:34:26.153299093 CET4998315249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:34:26.153666019 CET4998315249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:34:26.273420095 CET1524949983147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:34:48.071866035 CET1524949983147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:34:48.071953058 CET4998315249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:34:48.076741934 CET4998315249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:34:48.196579933 CET1524949983147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:34:51.597284079 CET4998415249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:34:51.718719006 CET1524949984147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:34:51.718856096 CET4998415249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:34:51.719650030 CET4998415249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:34:51.840924978 CET1524949984147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:35:13.618993044 CET1524949984147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:35:13.619062901 CET4998415249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:35:13.619415045 CET4998415249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:35:13.739120007 CET1524949984147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:35:17.033170938 CET4998515249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:35:17.152987003 CET1524949985147.185.221.24192.168.2.5
                                                      Dec 17, 2024 07:35:17.153088093 CET4998515249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:35:17.153490067 CET4998515249192.168.2.5147.185.221.24
                                                      Dec 17, 2024 07:35:17.273127079 CET1524949985147.185.221.24192.168.2.5

                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:01:30:57
                                                      Start date:17/12/2024
                                                      Path:C:\Users\user\Desktop\Client-built-Playit.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Users\user\Desktop\Client-built-Playit.exe"
                                                      Imagebase:0x320000
                                                      File size:3'265'536 bytes
                                                      MD5 hash:C3E8EA545254BB9D01BFF3F53668E04F
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.2070520834.000000001B420000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000000.2038376842.0000000000322000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:2
                                                      Start time:01:30:58
                                                      Start date:17/12/2024
                                                      Path:C:\Windows\System32\schtasks.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\System32\System32.exe" /rl HIGHEST /f
                                                      Imagebase:0x7ff647eb0000
                                                      File size:235'008 bytes
                                                      MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:3
                                                      Start time:01:30:58
                                                      Start date:17/12/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:4
                                                      Start time:01:30:58
                                                      Start date:17/12/2024
                                                      Path:C:\Users\user\AppData\Roaming\System32\System32.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Users\user\AppData\Roaming\System32\System32.exe"
                                                      Imagebase:0xd90000
                                                      File size:3'265'536 bytes
                                                      MD5 hash:C3E8EA545254BB9D01BFF3F53668E04F
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: C:\Users\user\AppData\Roaming\System32\System32.exe, Author: Joe Security
                                                      • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\System32\System32.exe, Author: Joe Security
                                                      • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: C:\Users\user\AppData\Roaming\System32\System32.exe, Author: Florian Roth
                                                      • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: C:\Users\user\AppData\Roaming\System32\System32.exe, Author: ditekSHen
                                                      • Rule: MALWARE_Win_QuasarStealer, Description: Detects Quasar infostealer, Source: C:\Users\user\AppData\Roaming\System32\System32.exe, Author: ditekshen
                                                      Antivirus matches:
                                                      • Detection: 100%, Avira
                                                      • Detection: 100%, Joe Sandbox ML
                                                      • Detection: 74%, ReversingLabs
                                                      • Detection: 75%, Virustotal, Browse
                                                      Reputation:low
                                                      Has exited:false

                                                      Target ID:5
                                                      Start time:01:30:59
                                                      Start date:17/12/2024
                                                      Path:C:\Users\user\AppData\Roaming\System32\System32.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Users\user\AppData\Roaming\System32\System32.exe
                                                      Imagebase:0xec0000
                                                      File size:3'265'536 bytes
                                                      MD5 hash:C3E8EA545254BB9D01BFF3F53668E04F
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:6
                                                      Start time:01:31:00
                                                      Start date:17/12/2024
                                                      Path:C:\Windows\System32\schtasks.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\System32\System32.exe" /rl HIGHEST /f
                                                      Imagebase:0x7ff647eb0000
                                                      File size:235'008 bytes
                                                      MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:7
                                                      Start time:01:31:00
                                                      Start date:17/12/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:14.2%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:0%
                                                        Total number of Nodes:13
                                                        Total number of Limit Nodes:0
                                                        execution_graph 2232 7ff848f13569 2233 7ff848f13571 DeleteFileW 2232->2233 2235 7ff848f13616 2233->2235 2236 7ff848f13811 2237 7ff848f1382f 2236->2237 2238 7ff848f138c4 2237->2238 2241 7ff848f13540 2238->2241 2240 7ff848f138d1 2242 7ff848f13551 DeleteFileW 2241->2242 2244 7ff848f13616 2242->2244 2244->2240 2245 7ff848f13525 2246 7ff848f13531 DeleteFileW 2245->2246 2248 7ff848f13616 2246->2248

                                                        Control-flow Graph

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2071361440.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff848f10000_Client-built-Playit.jbxd
                                                        Similarity
                                                        • API ID: DeleteFile
                                                        • String ID:
                                                        • API String ID: 4033686569-0
                                                        • Opcode ID: 424f7f9430f43fd4bfea831b7104e9cf001006021b7d28277aef5e0a2260db1e
                                                        • Instruction ID: 068c57c94a78f2dd64ce20e4a37db12168b61fbe4dc0d600ed7de442752b1d7c
                                                        • Opcode Fuzzy Hash: 424f7f9430f43fd4bfea831b7104e9cf001006021b7d28277aef5e0a2260db1e
                                                        • Instruction Fuzzy Hash: 1841063180DB9D9FDB49EB6C98496E9BBF0EF56310F04426FC049C7192DB28684ACB91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 13 7ff848f13569-7ff848f135d8 18 7ff848f135da-7ff848f135df 13->18 19 7ff848f135e2-7ff848f13614 DeleteFileW 13->19 18->19 20 7ff848f1361c-7ff848f1364a 19->20 21 7ff848f13616 19->21 21->20
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2071361440.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff848f10000_Client-built-Playit.jbxd
                                                        Similarity
                                                        • API ID: DeleteFile
                                                        • String ID:
                                                        • API String ID: 4033686569-0
                                                        • Opcode ID: 1d910e5256cac39e22722a921e3f466f3610269a26abe065d0757ab6f871030b
                                                        • Instruction ID: 69882cb851ce44fff02090bc80b00609dead7888145b233cc19e5fab4dea83b2
                                                        • Opcode Fuzzy Hash: 1d910e5256cac39e22722a921e3f466f3610269a26abe065d0757ab6f871030b
                                                        • Instruction Fuzzy Hash: 8C31EF3180DB5C9FDB19DB6888496E9BBF0FF66311F04426BD049D3292DB78A846CB91

                                                        Execution Graph

                                                        Execution Coverage:11.6%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:0%
                                                        Total number of Nodes:8
                                                        Total number of Limit Nodes:1
                                                        execution_graph 12587 7ff848f13569 12588 7ff848f13571 DeleteFileW 12587->12588 12590 7ff848f13616 12588->12590 12582 7ff84918e6f9 12584 7ff84918e70f 12582->12584 12583 7ff84918e7bb 12584->12583 12585 7ff84918e8b4 SetWindowsHookExW 12584->12585 12586 7ff84918e8f6 12585->12586

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 0 7ff849189bd1-7ff849189c19 2 7ff849189c2a-7ff849189c3c 0->2 3 7ff849189c1b-7ff849189c29 0->3 5 7ff849189c42-7ff849189c52 2->5 6 7ff849189cbf-7ff849189cc3 2->6 12 7ff849189c58-7ff849189ca7 5->12 13 7ff849189f3b-7ff849189f8a 5->13 7 7ff849189cc5-7ff849189cc9 6->7 8 7ff849189cdb-7ff849189cdf 6->8 14 7ff849189cd0-7ff849189cd4 7->14 10 7ff849189ce1-7ff849189d08 8->10 11 7ff849189d0e-7ff849189d12 8->11 10->11 21 7ff849189f91-7ff849189fa9 10->21 15 7ff849189d18-7ff849189d1d 11->15 16 7ff849189f2c-7ff849189f3a 11->16 50 7ff849189cb4-7ff849189cb8 12->50 51 7ff849189ca9-7ff849189cb2 12->51 13->21 14->8 15->16 17 7ff849189d23-7ff849189d2d 15->17 25 7ff849189d7b-7ff849189d80 17->25 26 7ff849189d2f-7ff849189d41 17->26 37 7ff849189fb5 21->37 38 7ff849189fab-7ff849189fb1 21->38 30 7ff849189d86-7ff849189d90 25->30 31 7ff849189f08-7ff849189f0d 25->31 26->25 39 7ff849189d43-7ff849189d6e 26->39 30->31 41 7ff849189d96-7ff849189da8 30->41 31->16 32 7ff849189f0f-7ff849189f24 31->32 32->16 47 7ff849189f26-7ff849189f29 32->47 44 7ff849189fb9-7ff84918a018 37->44 45 7ff849189fb7 37->45 43 7ff849189fb3 38->43 38->44 39->25 58 7ff849189d70-7ff849189d74 39->58 53 7ff849189e9e-7ff849189ea9 41->53 54 7ff849189dae-7ff849189df3 41->54 43->37 64 7ff84918a5be-7ff84918a5d0 44->64 65 7ff84918a01e-7ff84918a030 44->65 45->44 47->16 50->6 51->6 60 7ff849189e30-7ff849189e57 53->60 61 7ff849189eab-7ff849189f01 53->61 54->53 78 7ff849189df9-7ff849189e10 54->78 58->25 60->53 73 7ff849189e59-7ff849189e6d 60->73 61->31 65->64 72 7ff84918a036-7ff84918a06f 65->72 72->64 84 7ff84918a075-7ff84918a0b6 72->84 88 7ff84918a168-7ff84918a17b 84->88 89 7ff84918a0bc-7ff84918a0d4 84->89 94 7ff84918a1d0 88->94 95 7ff84918a17d-7ff84918a19e 88->95 92 7ff84918a0da-7ff84918a0fa 89->92 93 7ff84918a15c-7ff84918a162 89->93 92->93 106 7ff84918a0fc-7ff84918a10e 92->106 93->88 93->89 96 7ff84918a1d2-7ff84918a1d7 94->96 101 7ff84918a1a0-7ff84918a1c7 95->101 102 7ff84918a1c9-7ff84918a1ce 95->102 97 7ff84918a1d9-7ff84918a1e0 96->97 98 7ff84918a21e-7ff84918a241 96->98 103 7ff84918a1e7-7ff84918a201 97->103 107 7ff84918a337-7ff84918a343 98->107 108 7ff84918a247-7ff84918a26f 98->108 101->96 102->96 103->98 112 7ff84918a203-7ff84918a21c 103->112 106->93 115 7ff84918a110-7ff84918a114 106->115 107->64 111 7ff84918a349-7ff84918a35e 107->111 120 7ff84918a275-7ff84918a290 108->120 121 7ff84918a32b-7ff84918a331 108->121 111->64 112->98 118 7ff84918a5d1-7ff84918a673 115->118 119 7ff84918a11a-7ff84918a12f 115->119 131 7ff84918a785-7ff84918a791 118->131 132 7ff84918a679-7ff84918a67b 118->132 126 7ff84918a136-7ff84918a138 119->126 120->121 133 7ff84918a296-7ff84918a2a8 120->133 121->107 121->108 126->93 129 7ff84918a13a-7ff84918a158 call 7ff8491853c0 126->129 129->93 141 7ff84918a793-7ff84918a7b8 131->141 142 7ff84918a7ba 131->142 135 7ff84918a695-7ff84918a6a3 132->135 136 7ff84918a67d-7ff84918a68f 132->136 133->121 146 7ff84918a2ae-7ff84918a2b2 133->146 139 7ff84918a7f8-7ff84918a82b 135->139 140 7ff84918a6a9-7ff84918a6c0 135->140 136->135 149 7ff84918a7bf-7ff84918a7f1 136->149 164 7ff84918a832-7ff84918a83e 139->164 159 7ff84918a6c2-7ff84918a6d4 140->159 160 7ff84918a6da-7ff84918a6dd 140->160 141->142 142->149 146->118 150 7ff84918a2b8-7ff84918a2fb 146->150 149->139 150->121 177 7ff84918a2fd-7ff84918a328 call 7ff8491853c0 150->177 159->160 159->164 161 7ff84918a706-7ff84918a722 call 7ff849187a50 160->161 162 7ff84918a6df-7ff84918a6f6 160->162 186 7ff84918a753-7ff84918a757 161->186 187 7ff84918a724-7ff84918a752 161->187 162->161 185 7ff84918a6f8-7ff84918a6fc 162->185 170 7ff84918a840-7ff84918a864 164->170 171 7ff84918a867 164->171 170->171 173 7ff84918a869-7ff84918a871 171->173 174 7ff84918a87b 171->174 178 7ff84918a873-7ff84918a879 173->178 179 7ff84918a87d 173->179 174->179 177->121 178->174 183 7ff84918a881-7ff84918a8bc 178->183 179->183 184 7ff84918a87f 179->184 194 7ff84918a8be-7ff84918a8e5 183->194 195 7ff84918a8ff-7ff84918a932 183->195 184->183 193 7ff84918a703-7ff84918a704 185->193 191 7ff84918a75e-7ff84918a784 186->191 193->161 205 7ff84918a939-7ff84918a981 194->205 206 7ff84918a8e7-7ff84918a8fe 194->206 195->205 213 7ff84918a983 205->213 214 7ff84918a985-7ff84918a9a7 205->214 213->214 215 7ff84918a9c5-7ff84918a9ca 213->215 217 7ff84918aa8a-7ff84918aa96 214->217 218 7ff84918a9ad-7ff84918a9bf 214->218 221 7ff84918aa98-7ff84918aabd 217->221 222 7ff84918aabf-7ff84918aad3 217->222 224 7ff84918a9c1-7ff84918a9c4 218->224 225 7ff84918a9cb-7ff84918a9e3 call 7ff8491840b0 218->225 221->222 229 7ff84918ab15-7ff84918ab17 222->229 230 7ff84918aad5-7ff84918aaf2 222->230 224->215 234 7ff84918a9e5-7ff84918aa16 225->234 235 7ff84918aa47-7ff84918aa50 225->235 233 7ff84918ab19-7ff84918ab1b 229->233 230->233 236 7ff84918aaf4-7ff84918ab0f 230->236 237 7ff84918ab2c-7ff84918ab3c 233->237 238 7ff84918ab1d-7ff84918ab2b 233->238 243 7ff84918aa41-7ff84918aa45 234->243 244 7ff84918aa18-7ff84918aa3f 234->244 236->233 240 7ff84918ab11-7ff84918ab12 236->240 240->229 243->234 243->235 244->243 246 7ff84918aa51-7ff84918aa89 244->246
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.4501355489.00007FF849180000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849180000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_7ff849180000_System32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: HAH$HAH$HAH$HAH$HAH$HAH$HAH$HAH
                                                        • API String ID: 0-4024470385
                                                        • Opcode ID: 8b88a0907fc04cb74fca69651a176f3c16b809b825c8d81bcc5faa3d01632a4d
                                                        • Instruction ID: d6d0d3f2ed8cb20f746facdd9e67f0c54fee7fef0227838ceea9923695b082fb
                                                        • Opcode Fuzzy Hash: 8b88a0907fc04cb74fca69651a176f3c16b809b825c8d81bcc5faa3d01632a4d
                                                        • Instruction Fuzzy Hash: A992D430B1C9894FEBA8FB2C945977577D1FF99390F0501BAD44EC7296DE28AC428B41
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.4501355489.00007FF849180000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849180000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_7ff849180000_System32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: *$I$HAH$HAH
                                                        • API String ID: 0-4050887664
                                                        • Opcode ID: a7160bd360ef9136e5b8c217ef11912bd81b3a8f30fad51daaafb1f79911e6d7
                                                        • Instruction ID: 33e9dd605a3daca8aa0f700fcb8b020f70563c97fa2688e9ad45d420b640e0b6
                                                        • Opcode Fuzzy Hash: a7160bd360ef9136e5b8c217ef11912bd81b3a8f30fad51daaafb1f79911e6d7
                                                        • Instruction Fuzzy Hash: 18F2A370A1CA498FDBA8EF18C484BA977E2FF58340F1445A9D44ED7296DE39E881CF41
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.4501355489.00007FF849180000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849180000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_7ff849180000_System32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: *$I
                                                        • API String ID: 0-3406757088
                                                        • Opcode ID: 7a8db7a5061314ae9707061419fe51fde913f63b48bb9ed8f19afc211232b15b
                                                        • Instruction ID: 1a385e26e0ba1a41b44e132e687a0a336afd66b972a940fb317f39d8fd2dda83
                                                        • Opcode Fuzzy Hash: 7a8db7a5061314ae9707061419fe51fde913f63b48bb9ed8f19afc211232b15b
                                                        • Instruction Fuzzy Hash: 81026E30E18A5A8FEBA8EF18C444779B7E1FF58385F1545B9D44ED3295DE38B8828B40

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1553 7ff84918afdd-7ff84918b079 1555 7ff84918b6f1-7ff84918b706 1553->1555 1556 7ff84918b07f-7ff84918b082 1553->1556 1556->1555 1557 7ff84918b088-7ff84918b0a5 1556->1557 1557->1555 1559 7ff84918b0ab-7ff84918b0ca 1557->1559 1561 7ff84918b0d6-7ff84918b0e9 1559->1561 1562 7ff84918b0cc-7ff84918b0cf 1559->1562 1565 7ff84918b179-7ff84918b18b 1561->1565 1563 7ff84918b0d1 1562->1563 1564 7ff84918b0ee-7ff84918b11e 1562->1564 1563->1555 1564->1555 1570 7ff84918b124-7ff84918b172 1564->1570 1565->1555 1569 7ff84918b191-7ff84918b1d0 1565->1569 1569->1555 1575 7ff84918b1d6-7ff84918b1e0 1569->1575 1570->1565 1578 7ff84918b1e2-7ff84918b1f6 1575->1578 1579 7ff84918b1f8-7ff84918b208 1575->1579 1582 7ff84918b212-7ff84918b275 1578->1582 1579->1582 1587 7ff84918b277-7ff84918b28b 1582->1587 1588 7ff84918b2db-7ff84918b2e3 1582->1588 1587->1588 1592 7ff84918b28d-7ff84918b2d7 1587->1592 1588->1555 1589 7ff84918b2e9-7ff84918b30b 1588->1589 1593 7ff84918b311-7ff84918b33a 1589->1593 1594 7ff84918b40f-7ff84918b41a 1589->1594 1592->1588 1600 7ff84918b340-7ff84918b366 1593->1600 1601 7ff84918b3c1-7ff84918b3e2 1593->1601 1598 7ff84918b48c-7ff84918b4b5 1594->1598 1599 7ff84918b41c-7ff84918b445 1594->1599 1615 7ff84918b4b7-7ff84918b4d1 1598->1615 1616 7ff84918b4d8-7ff84918b4e5 1598->1616 1599->1555 1610 7ff84918b44b-7ff84918b45d 1599->1610 1600->1601 1614 7ff84918b368-7ff84918b37e 1600->1614 1601->1593 1603 7ff84918b3e8 1601->1603 1603->1594 1610->1555 1618 7ff84918b463-7ff84918b481 1610->1618 1614->1601 1622 7ff84918b380-7ff84918b398 1614->1622 1615->1616 1624 7ff84918b5aa-7ff84918b5ca 1616->1624 1625 7ff84918b4eb-7ff84918b518 1616->1625 1618->1555 1633 7ff84918b487-7ff84918b488 1618->1633 1622->1601 1627 7ff84918b39a-7ff84918b3bf 1622->1627 1631 7ff84918b5d4-7ff84918b610 1624->1631 1632 7ff84918b5cc-7ff84918b5cd 1624->1632 1639 7ff84918b51a-7ff84918b534 1625->1639 1640 7ff84918b53b-7ff84918b547 1625->1640 1627->1601 1636 7ff84918b3ea-7ff84918b408 1627->1636 1631->1555 1648 7ff84918b616-7ff84918b633 1631->1648 1632->1631 1633->1598 1636->1594 1639->1640 1646 7ff84918b598-7ff84918b5a4 1640->1646 1647 7ff84918b549-7ff84918b555 1640->1647 1646->1555 1646->1624 1649 7ff84918b840-7ff84918b857 1647->1649 1650 7ff84918b55b-7ff84918b591 1647->1650 1653 7ff84918b635-7ff84918b636 1648->1653 1654 7ff84918b63d-7ff84918b678 1648->1654 1657 7ff84918b861-7ff84918b89f call 7ff849185070 1649->1657 1658 7ff84918b859-7ff84918b860 1649->1658 1650->1646 1653->1654 1654->1555 1670 7ff84918b67a-7ff84918b68c 1654->1670 1663 7ff84918b8a4-7ff84918b8cf call 7ff849187d70 call 7ff849185370 call 7ff84918b8d0 1657->1663 1658->1657 1670->1555 1675 7ff84918b68e-7ff84918b6ac 1670->1675 1675->1555 1678 7ff84918b6ae-7ff84918b6ca 1675->1678 1681 7ff84918b707-7ff84918b77c 1678->1681 1682 7ff84918b6cc-7ff84918b6ef 1678->1682 1692 7ff84918b782-7ff84918b78b 1681->1692 1693 7ff84918b827-7ff84918b83f 1681->1693 1682->1555 1682->1681 1692->1693
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.4501355489.00007FF849180000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849180000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_7ff849180000_System32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9e2fc55a89c4dbb652458c4fefb2b7de794e870ab0e9b811976669c5bcb33998
                                                        • Instruction ID: 5ceddb6c0ffa656dc0a39c9be80608947095f122b657bb2a2ebcbb948bfdcb26
                                                        • Opcode Fuzzy Hash: 9e2fc55a89c4dbb652458c4fefb2b7de794e870ab0e9b811976669c5bcb33998
                                                        • Instruction Fuzzy Hash: 7B527E30A0CA498FEBA8EF2CC458B6577E1FF99340F1541B9E44DC72A6DE39E8418B41
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.4501355489.00007FF849180000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849180000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_7ff849180000_System32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: aaecfa5d53200870766bbeda2a21f1bfc29f5f0c9c36214ef2d69aea536710e3
                                                        • Instruction ID: 40d63021ee0e5887386730a2f2978ef641a301d38c2d704d9e81cc2a550bfbab
                                                        • Opcode Fuzzy Hash: aaecfa5d53200870766bbeda2a21f1bfc29f5f0c9c36214ef2d69aea536710e3
                                                        • Instruction Fuzzy Hash: 68227130A1CA494FEB68EF1894957B973E2FF98340F55417DD44EC3296DE38AC428B85

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1107 7ff84918e6f9-7ff84918e7b9 call 7ff84918e0e8 1121 7ff84918e7f8-7ff84918e87e 1107->1121 1122 7ff84918e7bb-7ff84918e7f7 1107->1122 1130 7ff84918e884-7ff84918e891 1121->1130 1131 7ff84918e936-7ff84918e93a 1121->1131 1132 7ff84918e893-7ff84918e8f4 SetWindowsHookExW 1130->1132 1131->1132 1136 7ff84918e8f6 1132->1136 1137 7ff84918e8fc-7ff84918e935 1132->1137 1136->1137
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.4501355489.00007FF849180000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849180000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_7ff849180000_System32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 98bbba2ed5dd96c5979930093a761c91eab26ed4c8dd052809baf8893e12cc0a
                                                        • Instruction ID: 02f666e9d3ade53a9918ec778003f3a534c21cab7f7705afe8fda71a81094d44
                                                        • Opcode Fuzzy Hash: 98bbba2ed5dd96c5979930093a761c91eab26ed4c8dd052809baf8893e12cc0a
                                                        • Instruction Fuzzy Hash: D7711631E1DA9A5FD758FB6C984A1B97BE0EF59750F0441BBD00AC3287DE28AC4687C1

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1237 7ff848f13525-7ff848f1352f 1238 7ff848f13571-7ff848f135d8 1237->1238 1239 7ff848f13531-7ff848f13562 1237->1239 1246 7ff848f135da-7ff848f135df 1238->1246 1247 7ff848f135e2-7ff848f13614 DeleteFileW 1238->1247 1239->1238 1246->1247 1248 7ff848f1361c-7ff848f1364a 1247->1248 1249 7ff848f13616 1247->1249 1249->1248
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.4498981989.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_7ff848f10000_System32.jbxd
                                                        Similarity
                                                        • API ID: DeleteFile
                                                        • String ID:
                                                        • API String ID: 4033686569-0
                                                        • Opcode ID: e6b213d8d9803cf979de96db528495b92caddabd1a0f9b4a66710d34fca53395
                                                        • Instruction ID: ab10fa655d28f5a68ced8c914674cb694ae4b9211b158b03e8a68786aaf07e8f
                                                        • Opcode Fuzzy Hash: e6b213d8d9803cf979de96db528495b92caddabd1a0f9b4a66710d34fca53395
                                                        • Instruction Fuzzy Hash: FD41F53180DB899FDB49EB6C88496E9BBF0EF56311F0442AFC049C7592DB286849CB91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1251 7ff848f13569-7ff848f135d8 1256 7ff848f135da-7ff848f135df 1251->1256 1257 7ff848f135e2-7ff848f13614 DeleteFileW 1251->1257 1256->1257 1258 7ff848f1361c-7ff848f1364a 1257->1258 1259 7ff848f13616 1257->1259 1259->1258
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.4498981989.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_7ff848f10000_System32.jbxd
                                                        Similarity
                                                        • API ID: DeleteFile
                                                        • String ID:
                                                        • API String ID: 4033686569-0
                                                        • Opcode ID: 1d910e5256cac39e22722a921e3f466f3610269a26abe065d0757ab6f871030b
                                                        • Instruction ID: 69882cb851ce44fff02090bc80b00609dead7888145b233cc19e5fab4dea83b2
                                                        • Opcode Fuzzy Hash: 1d910e5256cac39e22722a921e3f466f3610269a26abe065d0757ab6f871030b
                                                        • Instruction Fuzzy Hash: 8C31EF3180DB5C9FDB19DB6888496E9BBF0FF66311F04426BD049D3292DB78A846CB91
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.4498981989.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_7ff848f10000_System32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 111faaa5f5b30c88858d4465008ad9015a6ab344b950bc08a100c341080580a4
                                                        • Instruction ID: 385888b42e4b8b44dc5a251deac500f83280f27c5a29ac5c277eebd4003db719
                                                        • Opcode Fuzzy Hash: 111faaa5f5b30c88858d4465008ad9015a6ab344b950bc08a100c341080580a4
                                                        • Instruction Fuzzy Hash: E331481791F1A16AD251B3BC74A25E73B60EF523BDF0842B7D18C4D0939E0D548A42FD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2097203250.00007FF848F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F00000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff848f00000_System32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ;P_I
                                                        • API String ID: 0-1492203171
                                                        • Opcode ID: 99cc55dec58770206f4867cdde16747dacfa1cc35ca3fdd119516ba87cc1b1ae
                                                        • Instruction ID: 0cfc21ba3a25fad704207fdbccbc3401836512ecff291c9a9977cf14a9f46630
                                                        • Opcode Fuzzy Hash: 99cc55dec58770206f4867cdde16747dacfa1cc35ca3fdd119516ba87cc1b1ae
                                                        • Instruction Fuzzy Hash: B6A1373190E9929FE354B72854557B93BA0FF86398F4840BAD448873DBEA2C9805C35A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2097203250.00007FF848F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F00000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff848f00000_System32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: .P_^
                                                        • API String ID: 0-3169129673
                                                        • Opcode ID: ac88be3431922601719741f6211c95becaceb5c2c23e47a9eff4c4ccb1304b5b
                                                        • Instruction ID: b5a421fda7f01fb5dd7c9c62b1d70fe6cc6f6eda8bd8230b435c9eac968b50a3
                                                        • Opcode Fuzzy Hash: ac88be3431922601719741f6211c95becaceb5c2c23e47a9eff4c4ccb1304b5b
                                                        • Instruction Fuzzy Hash: 93212736A0E6890FE785EB2CAC655E53BE0EF96270B0C01BBD088CB193E91C5C4A4364
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2097203250.00007FF848F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F00000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff848f00000_System32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ef967c2ef36693efe74c3149adddb804eb7a9a5aa67755f089c333d72ee02090
                                                        • Instruction ID: d265b9508ffa13fec4f15849f4970bc59e1baf4cdf860eb9751d83efd5739aaf
                                                        • Opcode Fuzzy Hash: ef967c2ef36693efe74c3149adddb804eb7a9a5aa67755f089c333d72ee02090
                                                        • Instruction Fuzzy Hash: D7B1D631E0D98A5FEB96FB6894556F977D1FF96390F0801BAD00DC71C7EE28A8428394
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2097203250.00007FF848F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F00000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff848f00000_System32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 034d50870e79c4acc0d920190602dd0b51e96988d28dcd25fc66ec8039e62671
                                                        • Instruction ID: aa141e54b32eb0a882448c1f96232d38e4ca234cb1d038a977b1c26ba2b10c08
                                                        • Opcode Fuzzy Hash: 034d50870e79c4acc0d920190602dd0b51e96988d28dcd25fc66ec8039e62671
                                                        • Instruction Fuzzy Hash: 39717D31E1C90A5FEB99EBA884557BCB3E2EF99390F540179D00ED32C6DF28AC428755
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2097203250.00007FF848F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F00000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff848f00000_System32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 80969eadcc9aff1ce8bc40cc6e98d10ba7d21a5b74a7427591f86e7e6d84cfe5
                                                        • Instruction ID: de35e970e04bc3d3e42c663bf70780be1360338640b72611a6a1f6788ef0d859
                                                        • Opcode Fuzzy Hash: 80969eadcc9aff1ce8bc40cc6e98d10ba7d21a5b74a7427591f86e7e6d84cfe5
                                                        • Instruction Fuzzy Hash: 8551B824B0D96A0FE796B77840657BA2AE2EF8B290F4440B6D00DC72D7DE2CDD468359
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2097203250.00007FF848F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F00000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff848f00000_System32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 10ae7eabb054dcd4fa0288dc0794b347eb7fd03ce0b683d9afaa8e4efe6c5f72
                                                        • Instruction ID: 2182675126a434350dc087fb338f323c115a0144aaacdb59fca5680bc09a2b5d
                                                        • Opcode Fuzzy Hash: 10ae7eabb054dcd4fa0288dc0794b347eb7fd03ce0b683d9afaa8e4efe6c5f72
                                                        • Instruction Fuzzy Hash: 62415A3190D98A5FFB82FB6894516F97BA5EF96394F0400B6E04DCB1C3DF2DA8058365
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2097203250.00007FF848F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F00000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff848f00000_System32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 75569f788444d43f418c581b76b2cd324762321a1bb11f95e27dffcd7f7a8307
                                                        • Instruction ID: 36a428e28cd8717cc6d3bfeab15aed5997ea9c10054488471af1fa032fd4cb3a
                                                        • Opcode Fuzzy Hash: 75569f788444d43f418c581b76b2cd324762321a1bb11f95e27dffcd7f7a8307
                                                        • Instruction Fuzzy Hash: CE511732D1E9865FE356B73CA8555F5ABD0EF923A4F0801BBD448C71C7EE0C68498399
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2097203250.00007FF848F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F00000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff848f00000_System32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e9df788e4db58cddbbef4c7846dd456871ea8d0629ee2e675d35b36890cf05fb
                                                        • Instruction ID: 3e5e498e9cfde08fc66fbf0a60db25b029e78b94768c5654f5a3ffd85f7b6c98
                                                        • Opcode Fuzzy Hash: e9df788e4db58cddbbef4c7846dd456871ea8d0629ee2e675d35b36890cf05fb
                                                        • Instruction Fuzzy Hash: CD412731E1DA454FE759A768941A3B97BD1FF99760F04017EE04EC32C2DE2C98428366
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2097203250.00007FF848F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F00000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff848f00000_System32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1f71fa5d0bef40bd6cd3a916e348990a7f962b70d5c3f9a5702e415b15128584
                                                        • Instruction ID: c47a4f1550269997ea0c0c9bffd15d0cdfbd2d1a55ff622215c05646d736c0c5
                                                        • Opcode Fuzzy Hash: 1f71fa5d0bef40bd6cd3a916e348990a7f962b70d5c3f9a5702e415b15128584
                                                        • Instruction Fuzzy Hash: 7621F23090D5814FE745AF28C4C55A5B7A1EF56310F1842FAD4088F1EBE628ECC6C384
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2097203250.00007FF848F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F00000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff848f00000_System32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a13faa1cae1aa4a9144545cccb9960f748f24f6a9ed62ae2c96c148170b272f
                                                        • Instruction ID: 9a9736f99d9287fe19342527801849d9d4d7aec782c036a6d03689e3dffd0179
                                                        • Opcode Fuzzy Hash: 2a13faa1cae1aa4a9144545cccb9960f748f24f6a9ed62ae2c96c148170b272f
                                                        • Instruction Fuzzy Hash: B831A43454B6695FE354EB2C80953A63FB1FB89309F9041A5D408873DBCF3DA900C765
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2097203250.00007FF848F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F00000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff848f00000_System32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b69a89c2a0f5786ed7796b024292eea6cc69fdca51af7ab672dd2f0e92d4a597
                                                        • Instruction ID: c62be1757e4457812de4fc4db4cfe14f641fe586477e35084161b9e26d061db7
                                                        • Opcode Fuzzy Hash: b69a89c2a0f5786ed7796b024292eea6cc69fdca51af7ab672dd2f0e92d4a597
                                                        • Instruction Fuzzy Hash: 50215561C1EA868FF359B33848256A5ABE0FF92380F0805FAC049CB2D3ED0C18448395
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2097203250.00007FF848F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F00000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff848f00000_System32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 067adb916c8c85e08e30884563953f268791332d86b2994d5d29525a7288836a
                                                        • Instruction ID: 6ff7a29d274a0bcc79f4f10dc553d145990c8d1231a70974bcbd9869c4a3021f
                                                        • Opcode Fuzzy Hash: 067adb916c8c85e08e30884563953f268791332d86b2994d5d29525a7288836a
                                                        • Instruction Fuzzy Hash: A921CF31E19A599FD794FB3884996BA77E1EF99341B4500BAE00DC72A3EE38E841C740
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2097203250.00007FF848F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F00000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff848f00000_System32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d4a5aedff297d12765e2462ae79493f04c4b43bedd973a4536336d081e547a5a
                                                        • Instruction ID: b15ad7bdaaff7e0306b286c6b134d8716cf450a587cf1efe7afe4cf9afb95b95
                                                        • Opcode Fuzzy Hash: d4a5aedff297d12765e2462ae79493f04c4b43bedd973a4536336d081e547a5a
                                                        • Instruction Fuzzy Hash: 43115C31A1DA850FE345B73C6C594F27BD1DF96261B0842BBD44DCB2E3DE1C99868351
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2097203250.00007FF848F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F00000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff848f00000_System32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 590eb1cecec4f9afa76525117802a8b8ab715b047ee6cfea95e8442405458984
                                                        • Instruction ID: 82f875587402957c0b5b4c689956142bcc7ae5a852faaaf2c3087352af202ecc
                                                        • Opcode Fuzzy Hash: 590eb1cecec4f9afa76525117802a8b8ab715b047ee6cfea95e8442405458984
                                                        • Instruction Fuzzy Hash: E711E920A4EAC91FE347E3789898AB43FD1EF57250F0901F7D048CB1A3DA684845C352
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2097203250.00007FF848F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F00000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff848f00000_System32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 15018f0babf9165f12a2a7d9a9cd980c62ab8a6b68fff9a2638d00b9dd8287db
                                                        • Instruction ID: ea395ac60c506b37fdb3c65dbbb98d43523056db72ce1d681e349748ecd1056a
                                                        • Opcode Fuzzy Hash: 15018f0babf9165f12a2a7d9a9cd980c62ab8a6b68fff9a2638d00b9dd8287db
                                                        • Instruction Fuzzy Hash: 5601263292DC8B5ED69AB32824455F667D1EBD6254F4401B6D40EC32C7EE0C69424385
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2097203250.00007FF848F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F00000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff848f00000_System32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4a9758dc0ab777f7adb64743896e9d62452b544831493da5d95415c72367353e
                                                        • Instruction ID: 10cfd3c2b4d4a4b75350a0d3e1eae5c6b292710a76973f2243fc33573162f200
                                                        • Opcode Fuzzy Hash: 4a9758dc0ab777f7adb64743896e9d62452b544831493da5d95415c72367353e
                                                        • Instruction Fuzzy Hash: C4F02422B0D81C1FE690F3AD98D8AFA67C4DBAC265B0401B7E00CC72A3DC1898828390
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2097203250.00007FF848F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F00000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff848f00000_System32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 689726d576c510e0cedd9a49dfdfdfe4742e6bab80ec82d9deae548ef08dbc98
                                                        • Instruction ID: 72d1ac7c8f3f42eb4f7b96f2f8786c74e75063b81d41b54353948f87a01c24c3
                                                        • Opcode Fuzzy Hash: 689726d576c510e0cedd9a49dfdfdfe4742e6bab80ec82d9deae548ef08dbc98
                                                        • Instruction Fuzzy Hash: 7101AF21A0EEC90FD786E72C58246A43BE2EF9A250B0D02F7C08CCB1E7E9185C458395
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2097203250.00007FF848F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F00000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff848f00000_System32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8bd7886ccefb17b670663deaa53672d378b1eb4aaafd7419fcb709d6a355a943
                                                        • Instruction ID: 312c143ce487ef721dcfbc86bb1ea0709fbc44beb608229d0814405d5eaf4f1b
                                                        • Opcode Fuzzy Hash: 8bd7886ccefb17b670663deaa53672d378b1eb4aaafd7419fcb709d6a355a943
                                                        • Instruction Fuzzy Hash: 4AE09231B19C1D1FAB94F7AD84CDB7962C1EBAC251B1005B6E40CC72A6DD28AC819390
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2097203250.00007FF848F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F00000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff848f00000_System32.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5fedf5d644249932def50e3f0134c389279f721b012c748d0eee25cb14ff38af
                                                        • Instruction ID: 28efca4dbb9292c7df39597514c284fa53d40f92b39a98d6fee13aa7fe11cba8
                                                        • Opcode Fuzzy Hash: 5fedf5d644249932def50e3f0134c389279f721b012c748d0eee25cb14ff38af
                                                        • Instruction Fuzzy Hash: 24E0DF22E0E8565FE69A337C24021B8A280DF966D1B0800BAE40DCB2C3ED1C29420288