Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
EZFN op cheats.exe

Overview

General Information

Sample name:EZFN op cheats.exe
Analysis ID:1581174
MD5:ef4d8a6e9965bc6bb50cc1dfc5afde69
SHA1:22dc66b0dec9e655fc049063eb9ed1ac40163d63
SHA256:fc0afaabeb1bec166e86302143e2ae0387142cc17df7a8980c8b7a9de43aad67
Tags:exeQuasarRATuser-lontze7
Infos:

Detection

Quasar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Quasar RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to detect virtual machines (STR)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • EZFN op cheats.exe (PID: 7164 cmdline: "C:\Users\user\Desktop\EZFN op cheats.exe" MD5: EF4D8A6E9965BC6BB50CC1DFC5AFDE69)
    • schtasks.exe (PID: 6396 cmdline: "schtasks" /create /tn "cheats" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • conhost.exe (PID: 6372 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Client.exe (PID: 1612 cmdline: "C:\Users\user\AppData\Roaming\SubDir\Client.exe" MD5: EF4D8A6E9965BC6BB50CC1DFC5AFDE69)
      • schtasks.exe (PID: 5928 cmdline: "schtasks" /create /tn "cheats" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
        • conhost.exe (PID: 4192 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • Client.exe (PID: 2312 cmdline: C:\Users\user\AppData\Roaming\SubDir\Client.exe MD5: EF4D8A6E9965BC6BB50CC1DFC5AFDE69)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
{"Version": "1.4.1", "Host:Port": "192.168.137.1:4782;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "c9e46391-a513-481f-850c-0575d9434d9b", "StartupKey": "cheats", "Tag": "Office04", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
SourceRuleDescriptionAuthorStrings
EZFN op cheats.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
    EZFN op cheats.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      EZFN op cheats.exeMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
      • 0x28eed8:$x1: Quasar.Common.Messages
      • 0x29f201:$x1: Quasar.Common.Messages
      • 0x2ab7f6:$x4: Uninstalling... good bye :-(
      • 0x2acfeb:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
      EZFN op cheats.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
      • 0x2aada8:$f1: FileZilla\recentservers.xml
      • 0x2aade8:$f2: FileZilla\sitemanager.xml
      • 0x2aae2a:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
      • 0x2ab076:$b1: Chrome\User Data\
      • 0x2ab0cc:$b1: Chrome\User Data\
      • 0x2ab3a4:$b2: Mozilla\Firefox\Profiles
      • 0x2ab4a0:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2fd3fc:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2ab5f8:$b4: Opera Software\Opera Stable\Login Data
      • 0x2ab6b2:$b5: YandexBrowser\User Data\
      • 0x2ab720:$b5: YandexBrowser\User Data\
      • 0x2ab3f4:$s4: logins.json
      • 0x2ab12a:$a1: username_value
      • 0x2ab148:$a2: password_value
      • 0x2ab434:$a3: encryptedUsername
      • 0x2fd340:$a3: encryptedUsername
      • 0x2ab458:$a4: encryptedPassword
      • 0x2fd35e:$a4: encryptedPassword
      • 0x2fd2dc:$a5: httpRealm
      EZFN op cheats.exeMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
      • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
      • 0x2ab8e0:$s3: Process already elevated.
      • 0x28ebd7:$s4: get_PotentiallyVulnerablePasswords
      • 0x278c93:$s5: GetKeyloggerLogsDirectory
      • 0x29e960:$s5: GetKeyloggerLogsDirectory
      • 0x28ebfa:$s6: set_PotentiallyVulnerablePasswords
      • 0x2fea2a:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
      SourceRuleDescriptionAuthorStrings
      C:\Users\user\AppData\Roaming\SubDir\Client.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
        C:\Users\user\AppData\Roaming\SubDir\Client.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          C:\Users\user\AppData\Roaming\SubDir\Client.exeMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
          • 0x28eed8:$x1: Quasar.Common.Messages
          • 0x29f201:$x1: Quasar.Common.Messages
          • 0x2ab7f6:$x4: Uninstalling... good bye :-(
          • 0x2acfeb:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
          C:\Users\user\AppData\Roaming\SubDir\Client.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
          • 0x2aada8:$f1: FileZilla\recentservers.xml
          • 0x2aade8:$f2: FileZilla\sitemanager.xml
          • 0x2aae2a:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
          • 0x2ab076:$b1: Chrome\User Data\
          • 0x2ab0cc:$b1: Chrome\User Data\
          • 0x2ab3a4:$b2: Mozilla\Firefox\Profiles
          • 0x2ab4a0:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
          • 0x2fd3fc:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
          • 0x2ab5f8:$b4: Opera Software\Opera Stable\Login Data
          • 0x2ab6b2:$b5: YandexBrowser\User Data\
          • 0x2ab720:$b5: YandexBrowser\User Data\
          • 0x2ab3f4:$s4: logins.json
          • 0x2ab12a:$a1: username_value
          • 0x2ab148:$a2: password_value
          • 0x2ab434:$a3: encryptedUsername
          • 0x2fd340:$a3: encryptedUsername
          • 0x2ab458:$a4: encryptedPassword
          • 0x2fd35e:$a4: encryptedPassword
          • 0x2fd2dc:$a5: httpRealm
          C:\Users\user\AppData\Roaming\SubDir\Client.exeMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
          • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
          • 0x2ab8e0:$s3: Process already elevated.
          • 0x28ebd7:$s4: get_PotentiallyVulnerablePasswords
          • 0x278c93:$s5: GetKeyloggerLogsDirectory
          • 0x29e960:$s5: GetKeyloggerLogsDirectory
          • 0x28ebfa:$s6: set_PotentiallyVulnerablePasswords
          • 0x2fea2a:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
          SourceRuleDescriptionAuthorStrings
          00000000.00000000.1662526352.0000000000690000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
            00000000.00000000.1662190614.0000000000372000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
              Process Memory Space: EZFN op cheats.exe PID: 7164JoeSecurity_QuasarYara detected Quasar RATJoe Security
                Process Memory Space: Client.exe PID: 1612JoeSecurity_QuasarYara detected Quasar RATJoe Security
                  SourceRuleDescriptionAuthorStrings
                  0.0.EZFN op cheats.exe.370000.0.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
                    0.0.EZFN op cheats.exe.370000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                      0.0.EZFN op cheats.exe.370000.0.unpackMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
                      • 0x28eed8:$x1: Quasar.Common.Messages
                      • 0x29f201:$x1: Quasar.Common.Messages
                      • 0x2ab7f6:$x4: Uninstalling... good bye :-(
                      • 0x2acfeb:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
                      0.0.EZFN op cheats.exe.370000.0.unpackINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
                      • 0x2aada8:$f1: FileZilla\recentservers.xml
                      • 0x2aade8:$f2: FileZilla\sitemanager.xml
                      • 0x2aae2a:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
                      • 0x2ab076:$b1: Chrome\User Data\
                      • 0x2ab0cc:$b1: Chrome\User Data\
                      • 0x2ab3a4:$b2: Mozilla\Firefox\Profiles
                      • 0x2ab4a0:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                      • 0x2fd3fc:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                      • 0x2ab5f8:$b4: Opera Software\Opera Stable\Login Data
                      • 0x2ab6b2:$b5: YandexBrowser\User Data\
                      • 0x2ab720:$b5: YandexBrowser\User Data\
                      • 0x2ab3f4:$s4: logins.json
                      • 0x2ab12a:$a1: username_value
                      • 0x2ab148:$a2: password_value
                      • 0x2ab434:$a3: encryptedUsername
                      • 0x2fd340:$a3: encryptedUsername
                      • 0x2ab458:$a4: encryptedPassword
                      • 0x2fd35e:$a4: encryptedPassword
                      • 0x2fd2dc:$a5: httpRealm
                      0.0.EZFN op cheats.exe.370000.0.unpackMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
                      • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
                      • 0x2ab8e0:$s3: Process already elevated.
                      • 0x28ebd7:$s4: get_PotentiallyVulnerablePasswords
                      • 0x278c93:$s5: GetKeyloggerLogsDirectory
                      • 0x29e960:$s5: GetKeyloggerLogsDirectory
                      • 0x28ebfa:$s6: set_PotentiallyVulnerablePasswords
                      • 0x2fea2a:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "cheats" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "cheats" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\SubDir\Client.exe", ParentImage: C:\Users\user\AppData\Roaming\SubDir\Client.exe, ParentProcessId: 1612, ParentProcessName: Client.exe, ProcessCommandLine: "schtasks" /create /tn "cheats" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, ProcessId: 5928, ProcessName: schtasks.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "cheats" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "cheats" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\EZFN op cheats.exe", ParentImage: C:\Users\user\Desktop\EZFN op cheats.exe, ParentProcessId: 7164, ParentProcessName: EZFN op cheats.exe, ProcessCommandLine: "schtasks" /create /tn "cheats" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, ProcessId: 6396, ProcessName: schtasks.exe
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: EZFN op cheats.exeAvira: detected
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeAvira: detection malicious, Label: HEUR/AGEN.1307453
                      Source: EZFN op cheats.exeMalware Configuration Extractor: Quasar {"Version": "1.4.1", "Host:Port": "192.168.137.1:4782;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "c9e46391-a513-481f-850c-0575d9434d9b", "StartupKey": "cheats", "Tag": "Office04", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "MIIE9DCCAtygAwIBAgIQAJH+yisawyH1t/3B1e4XQTANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTI0MDcxNjAwMjAxN1oYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAiz0zqpeUYmVtNdqPyjMMD9OQRh8tg1eeer/avPMzNJErdC00Qm+0F5jGOD5gJhXDk86aaVWdnd93uNreyxpI9nMQaW1Imv9RLLkQBijIVk2SWvPMsbYHmZzzJHZVdEmrOu3+VSgMJTARh8QqGvBOHEEGB2C+fwh+PKpFJuCQZRwuhPz4WYHVwCuWZN4+LXMvMkW+Efio8GSfq/6MzHzAWpeaoDrOEP92cbSP2T5xOgqAhxle7xjbI66pSJjNJE6uzCp+PKeth54hzXGIOUB4rEzoCTxcOWSyrXv0XHTU8KTH4EHjkwv3fYPULoR80X2aC3ns3s2dMaFw9SNasKeVFxHelRl8jEMOdPi8uo/taGh3jMQ0gn2lQfchJMbqCgQmykxZR28+a6M3dsSO1x0M1MkQHYT0CgRtLv2CC5IU9/OdwuBNucoa/iVbW3M0czHi36kqMvH/6c5+1eh1bcrLXl3p4glNXAs3wpdFlaNyQ0P92HmEzXYtX8a0oYPJvcJGbOjRTXvt1P8qPoPO6qlKHU2svCNVSouH0byQVj8X7aEcJLRuPGgMXN0My4OGJSDGfAARz/uATejNXMqqHVe5FIZ66jsJTXZNJ8pPBW0Ya2ehy4r++iFtmBZVt+SL1bC0UMeg0h4rLXB1jSVAHhzuFFMSnp+LLAIVpWQJ9wZ2ZGkCAwEAAaMyMDAwHQYDVR0OBBYEFF6jCGqE3WkSs35EnX7xuZ9CpfvfMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQENBQADggIBADWbG8qxtK7gYvLxyj01Xq2Bmi/Yzyn0+03wrsZRjLceXHB7LOjC8bzuH8JDrFnX5+c6aouJkW9HoNfa6q0WPinvkeL/b0FjfgemoF4cbZmqPWtsuboBohaXn4jPUeTt9nKlQSX5G5eUvWF4Rbj67ToPZxqfFmKJJ5QC/2Zndd4sMk2D3uFmxWqVyLR+qB5ybjW+wEzW+9dlURJI0ezboPd+BWZcnHz2Ysc0DZzB5lwhjToto4IGgG3gPZH4rCOhjf3T7H+hi3hDckrEEqQ+Wc/CF9CbApI0jkrNCZeqA8gNqYiVzuYLnnVu51cKEBUz9VNRKoepmaLd7FmksvSZtAkk44brALBEwmeNDqRSqJMM9n2/Nvr6+hJ1wdz6e99d9RFEVOOm3I3F5MAfCe/mnmz+fYweI+OgbFcKnuXUUHcLlpIqw32Ppvn3aI+oEw8tBH/cJGml0ESIlu5341ArY+QOvhHRzW1ORYD3QrZODgYpB3b6PUQAMRnouIF6FtHBEmQHp4kzUVLbPvklbxkRBmze0JIwC0NdWcdFRgMXLixJk0AUzp0BOny3dY8TTS/TjUe7yrqt7CQrnhd/t47+ixoSbQCfdRpDx/ABWOLZBIDvX3FeFGKh7tNyJsjgm3HBQxxs3XLNvnmAn2kxC4mhYwDKYsVgDQD4m1Gp7Uqdy+Xn"}
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeReversingLabs: Detection: 76%
                      Source: EZFN op cheats.exeReversingLabs: Detection: 76%
                      Source: EZFN op cheats.exeVirustotal: Detection: 85%Perma Link
                      Source: Yara matchFile source: EZFN op cheats.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.EZFN op cheats.exe.370000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.1662526352.0000000000690000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1662190614.0000000000372000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: EZFN op cheats.exe PID: 7164, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: Client.exe PID: 1612, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeJoe Sandbox ML: detected
                      Source: EZFN op cheats.exeJoe Sandbox ML: detected
                      Source: EZFN op cheats.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: EZFN op cheats.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                      Networking

                      barindex
                      Source: Malware configuration extractorURLs: 192.168.137.1
                      Source: Yara matchFile source: EZFN op cheats.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.EZFN op cheats.exe.370000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED
                      Source: EZFN op cheats.exe, 00000000.00000002.1689444295.0000000002871000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000003.00000002.4120119667.0000000003419000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: EZFN op cheats.exe, Client.exe.0.drString found in binary or memory: https://api.ipify.org/
                      Source: EZFN op cheats.exe, Client.exe.0.drString found in binary or memory: https://ipwho.is/
                      Source: EZFN op cheats.exe, Client.exe.0.drString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                      Source: EZFN op cheats.exe, Client.exe.0.drString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                      Source: EZFN op cheats.exe, Client.exe.0.drString found in binary or memory: https://stackoverflow.com/q/2152978/23354sCannot

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\SubDir\Client.exeJump to behavior

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: EZFN op cheats.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.EZFN op cheats.exe.370000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.1662526352.0000000000690000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1662190614.0000000000372000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: EZFN op cheats.exe PID: 7164, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: Client.exe PID: 1612, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED

                      System Summary

                      barindex
                      Source: EZFN op cheats.exe, type: SAMPLEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                      Source: EZFN op cheats.exe, type: SAMPLEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: EZFN op cheats.exe, type: SAMPLEMatched rule: Detects Quasar infostealer Author: ditekshen
                      Source: 0.0.EZFN op cheats.exe.370000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                      Source: 0.0.EZFN op cheats.exe.370000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: 0.0.EZFN op cheats.exe.370000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: Detects QuasarRAT malware Author: Florian Roth
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: Detects Quasar infostealer Author: ditekshen
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess Stats: CPU usage > 49%
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 3_2_00007FFD9BA6AFDD3_2_00007FFD9BA6AFDD
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 3_2_00007FFD9BA69BD13_2_00007FFD9BA69BD1
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 3_2_00007FFD9BA692713_2_00007FFD9BA69271
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 3_2_00007FFD9BA655D63_2_00007FFD9BA655D6
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 3_2_00007FFD9BA6621F3_2_00007FFD9BA6621F
                      Source: EZFN op cheats.exe, 00000000.00000000.1662526352.0000000000690000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameClient.exe. vs EZFN op cheats.exe
                      Source: EZFN op cheats.exeBinary or memory string: OriginalFilenameClient.exe. vs EZFN op cheats.exe
                      Source: EZFN op cheats.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: EZFN op cheats.exe, type: SAMPLEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                      Source: EZFN op cheats.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: EZFN op cheats.exe, type: SAMPLEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                      Source: 0.0.EZFN op cheats.exe.370000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                      Source: 0.0.EZFN op cheats.exe.370000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: 0.0.EZFN op cheats.exe.370000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@10/3@0/1
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeFile created: C:\Users\user\AppData\Roaming\SubDirJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMutant created: NULL
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMutant created: \Sessions\1\BaseNamedObjects\Local\c9e46391-a513-481f-850c-0575d9434d9b
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4192:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6372:120:WilError_03
                      Source: EZFN op cheats.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: EZFN op cheats.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: EZFN op cheats.exeReversingLabs: Detection: 76%
                      Source: EZFN op cheats.exeVirustotal: Detection: 85%
                      Source: EZFN op cheats.exeString found in binary or memory: HasSubValue3Conflicting item/add type
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeFile read: C:\Users\user\Desktop\EZFN op cheats.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\EZFN op cheats.exe "C:\Users\user\Desktop\EZFN op cheats.exe"
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "cheats" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                      Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe C:\Users\user\AppData\Roaming\SubDir\Client.exe
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "cheats" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                      Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "cheats" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /fJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "cheats" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /fJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                      Source: EZFN op cheats.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: EZFN op cheats.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                      Source: EZFN op cheats.exeStatic file information: File size 3265536 > 1048576
                      Source: EZFN op cheats.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x31c400
                      Source: EZFN op cheats.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeCode function: 0_2_00007FFD9B7D00AD pushad ; iretd 0_2_00007FFD9B7D00C1
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 3_2_00007FFD9B7F2BE5 pushad ; iretd 3_2_00007FFD9B7F2C3D
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 3_2_00007FFD9B7F2BB0 pushad ; iretd 3_2_00007FFD9B7F2C3D
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 3_2_00007FFD9B7F00AD pushad ; iretd 3_2_00007FFD9B7F00C1
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 3_2_00007FFD9BA6336E push eax; ret 3_2_00007FFD9BA6340C
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 4_2_00007FFD9B7F00AD pushad ; iretd 4_2_00007FFD9B7F00C1
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeFile created: C:\Users\user\AppData\Roaming\SubDir\Client.exeJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "cheats" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeFile opened: C:\Users\user\Desktop\EZFN op cheats.exe:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\Client.exe:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\Client.exe:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeMemory allocated: DD0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeMemory allocated: 1A870000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1850000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1B3E0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1280000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1AD90000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 3_2_00007FFD9B7FF1F2 str ax3_2_00007FFD9B7FF1F2
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeWindow / User API: threadDelayed 1438Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeWindow / User API: threadDelayed 8387Jump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exe TID: 7152Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 4092Thread sleep time: -26747778906878833s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 1740Thread sleep count: 1438 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 1740Thread sleep count: 8387 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 4092Thread sleep count: 38 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 1880Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: Client.exe, 00000003.00000002.4126084722.000000001BFF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeMemory allocated: page read and write | page guardJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "cheats" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /fJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "cheats" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /fJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeQueries volume information: C:\Users\user\Desktop\EZFN op cheats.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\Client.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\Client.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\EZFN op cheats.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: EZFN op cheats.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.EZFN op cheats.exe.370000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.1662526352.0000000000690000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1662190614.0000000000372000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: EZFN op cheats.exe PID: 7164, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: Client.exe PID: 1612, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: EZFN op cheats.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.EZFN op cheats.exe.370000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.1662526352.0000000000690000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1662190614.0000000000372000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: EZFN op cheats.exe PID: 7164, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: Client.exe PID: 1612, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                      Command and Scripting Interpreter
                      1
                      Scheduled Task/Job
                      11
                      Process Injection
                      1
                      Masquerading
                      11
                      Input Capture
                      11
                      Security Software Discovery
                      Remote Services11
                      Input Capture
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Scheduled Task/Job
                      1
                      DLL Side-Loading
                      1
                      Scheduled Task/Job
                      1
                      Disable or Modify Tools
                      LSASS Memory41
                      Virtualization/Sandbox Evasion
                      Remote Desktop Protocol1
                      Archive Collected Data
                      1
                      Application Layer Protocol
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                      DLL Side-Loading
                      41
                      Virtualization/Sandbox Evasion
                      Security Account Manager1
                      Application Window Discovery
                      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                      Process Injection
                      NTDS12
                      System Information Discovery
                      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Hidden Files and Directories
                      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Obfuscated Files or Information
                      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      DLL Side-Loading
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1581174 Sample: EZFN op cheats.exe Startdate: 27/12/2024 Architecture: WINDOWS Score: 100 32 Found malware configuration 2->32 34 Malicious sample detected (through community Yara rule) 2->34 36 Antivirus / Scanner detection for submitted sample 2->36 38 7 other signatures 2->38 8 EZFN op cheats.exe 5 2->8         started        12 Client.exe 3 2->12         started        process3 file4 26 C:\Users\user\AppData\Roaming\...\Client.exe, PE32 8->26 dropped 28 C:\Users\user\...ZFN op cheats.exe.log, CSV 8->28 dropped 40 Hides that the sample has been downloaded from the Internet (zone.identifier) 8->40 14 Client.exe 2 8->14         started        18 schtasks.exe 1 8->18         started        signatures5 process6 dnsIp7 30 192.168.137.1, 4782, 49730, 49737 unknown unknown 14->30 42 Antivirus detection for dropped file 14->42 44 Multi AV Scanner detection for dropped file 14->44 46 Machine Learning detection for dropped file 14->46 48 2 other signatures 14->48 20 schtasks.exe 1 14->20         started        22 conhost.exe 18->22         started        signatures8 process9 process10 24 conhost.exe 20->24         started       

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      EZFN op cheats.exe76%ReversingLabsByteCode-MSIL.Backdoor.Quasar
                      EZFN op cheats.exe85%VirustotalBrowse
                      EZFN op cheats.exe100%AviraHEUR/AGEN.1307453
                      EZFN op cheats.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\SubDir\Client.exe100%AviraHEUR/AGEN.1307453
                      C:\Users\user\AppData\Roaming\SubDir\Client.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\SubDir\Client.exe76%ReversingLabsByteCode-MSIL.Backdoor.Quasar
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      192.168.137.10%Avira URL Cloudsafe
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      192.168.137.1true
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://api.ipify.org/EZFN op cheats.exe, Client.exe.0.drfalse
                        high
                        https://stackoverflow.com/q/14436606/23354EZFN op cheats.exe, Client.exe.0.drfalse
                          high
                          https://stackoverflow.com/q/2152978/23354sCannotEZFN op cheats.exe, Client.exe.0.drfalse
                            high
                            https://ipwho.is/EZFN op cheats.exe, Client.exe.0.drfalse
                              high
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameEZFN op cheats.exe, 00000000.00000002.1689444295.0000000002871000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 00000003.00000002.4120119667.0000000003419000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://stackoverflow.com/q/11564914/23354;EZFN op cheats.exe, Client.exe.0.drfalse
                                  high
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  IP
                                  192.168.137.1
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1581174
                                  Start date and time:2024-12-27 06:54:07 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 7m 35s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:11
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:EZFN op cheats.exe
                                  Detection:MAL
                                  Classification:mal100.troj.spyw.evad.winEXE@10/3@0/1
                                  EGA Information:
                                  • Successful, ratio: 66.7%
                                  HCA Information:
                                  • Successful, ratio: 100%
                                  • Number of executed functions: 27
                                  • Number of non-executed functions: 1
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                  • Excluded IPs from analysis (whitelisted): 4.175.87.197, 13.107.246.63
                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                  • Execution Graph export aborted for target Client.exe, PID 2312 because it is empty
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                  TimeTypeDescription
                                  00:55:02API Interceptor12727463x Sleep call for process: Client.exe modified
                                  05:55:00Task SchedulerRun new task: cheats path: C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                  No context
                                  No context
                                  No context
                                  No context
                                  No context
                                  Process:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                  File Type:CSV text
                                  Category:dropped
                                  Size (bytes):1281
                                  Entropy (8bit):5.370111951859942
                                  Encrypted:false
                                  SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
                                  MD5:12C61586CD59AA6F2A21DF30501F71BD
                                  SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
                                  SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
                                  SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
                                  Malicious:false
                                  Reputation:high, very likely benign file
                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                  Process:C:\Users\user\Desktop\EZFN op cheats.exe
                                  File Type:CSV text
                                  Category:dropped
                                  Size (bytes):1281
                                  Entropy (8bit):5.370111951859942
                                  Encrypted:false
                                  SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
                                  MD5:12C61586CD59AA6F2A21DF30501F71BD
                                  SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
                                  SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
                                  SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
                                  Malicious:true
                                  Reputation:high, very likely benign file
                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                  Process:C:\Users\user\Desktop\EZFN op cheats.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):3265536
                                  Entropy (8bit):6.083843675606913
                                  Encrypted:false
                                  SSDEEP:49152:+vIt62XlaSFNWPjljiFa2RoUYICH/aEfpKk/YFsoGdzbTHHB72eh2NT:+vE62XlaSFNWPjljiFXRoUYICH/umj
                                  MD5:EF4D8A6E9965BC6BB50CC1DFC5AFDE69
                                  SHA1:22DC66B0DEC9E655FC049063EB9ED1AC40163D63
                                  SHA-256:FC0AFAABEB1BEC166E86302143E2AE0387142CC17DF7A8980C8B7A9DE43AAD67
                                  SHA-512:681EE20AEBD9E6C39004CF79C25A06C88F969ED2891DC46323314D9FEDBE99799894DEB88A4DF3175F93787C37B5B2037050BECF04280669B5499C649A25C9E9
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Joe Security
                                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Joe Security
                                  • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Florian Roth
                                  • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_QuasarStealer, Description: Detects Quasar infostealer, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: ditekshen
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 76%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d..................1...........1.. ........@.. .......................@2...........@.................................d.1.W.....2...................... 2...................................................... ............... ..H............text.....1.. ....1................. ..`.rsrc.........2.......1.............@..@.reloc....... 2.......1.............@..B..................1.....H...........T............k..p............................................0..M....... ....(.....(...........s....(....(...........s....o....(.....(....s....(....*....0..8.......(....(0....s....%.o....%.o....%.o....(....&..&...(.....*........--..........00.......0..@........o....,7(....(0....s....%.o....%.o....%.o....(....&..&...(.....*........-5..........08......f~w...,.~....(....(....*.*v.(.....s....}.....s....}....*r..(......(.....(......(....*....0..L........{....r...po....
                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):6.083843675606913
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                  • Win32 Executable (generic) a (10002005/4) 49.75%
                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                  • Windows Screen Saver (13104/52) 0.07%
                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                  File name:EZFN op cheats.exe
                                  File size:3'265'536 bytes
                                  MD5:ef4d8a6e9965bc6bb50cc1dfc5afde69
                                  SHA1:22dc66b0dec9e655fc049063eb9ed1ac40163d63
                                  SHA256:fc0afaabeb1bec166e86302143e2ae0387142cc17df7a8980c8b7a9de43aad67
                                  SHA512:681ee20aebd9e6c39004cf79c25a06c88f969ed2891dc46323314d9fedbe99799894deb88a4df3175f93787c37b5b2037050becf04280669b5499c649a25c9e9
                                  SSDEEP:49152:+vIt62XlaSFNWPjljiFa2RoUYICH/aEfpKk/YFsoGdzbTHHB72eh2NT:+vE62XlaSFNWPjljiFXRoUYICH/umj
                                  TLSH:77E55B143BF85F23E1BBE27395B0041667F0EC2AB3A3EB1B5191677E1C53B5058426AB
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d..................1...........1.. ........@.. .......................@2...........@................................
                                  Icon Hash:90cececece8e8eb0
                                  Entrypoint:0x71e3be
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x640DFAE7 [Sun Mar 12 16:16:39 2023 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                  Instruction
                                  jmp dword ptr [00402000h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x31e3640x57.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x3200000xa93.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x3220000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000x31c3c40x31c4003000d562c05b3e5a10571379bd7defbcunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rsrc0x3200000xa930xc00cdeae95ac72e9e58017d2bcc89d2fbeaFalse0.36328125data4.653972105845318IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x3220000xc0x2004d500f037eed75b56776bd5a41faef15False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_VERSION0x3200a00x31cdata0.4484924623115578
                                  RT_MANIFEST0x3203bc0x6d7XML 1.0 document, Unicode text, UTF-8 (with BOM) text0.40319817247287265
                                  DLLImport
                                  mscoree.dll_CorExeMain
                                  TimestampSource PortDest PortSource IPDest IP
                                  Dec 27, 2024 06:55:03.014285088 CET497304782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:55:03.133985043 CET478249730192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:55:03.134160995 CET497304782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:55:03.144686937 CET497304782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:55:03.264413118 CET478249730192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:55:25.115940094 CET478249730192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:55:25.116024971 CET497304782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:55:25.129101992 CET497304782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:55:25.248719931 CET478249730192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:55:28.454298973 CET497374782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:55:28.573966980 CET478249737192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:55:28.574100018 CET497374782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:55:28.574537039 CET497374782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:55:28.693994999 CET478249737192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:55:50.482220888 CET478249737192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:55:50.482559919 CET497374782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:55:50.482739925 CET497374782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:55:50.602359056 CET478249737192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:55:53.939254999 CET497384782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:55:54.059010029 CET478249738192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:55:54.059196949 CET497384782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:55:54.059501886 CET497384782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:55:54.179347038 CET478249738192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:56:15.951267958 CET478249738192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:56:15.951468945 CET497384782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:56:15.951708078 CET497384782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:56:16.071367979 CET478249738192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:56:19.532505035 CET497814782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:56:19.651961088 CET478249781192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:56:19.652074099 CET497814782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:56:19.652456045 CET497814782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:56:19.772093058 CET478249781192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:56:41.607589960 CET478249781192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:56:41.610586882 CET497814782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:56:41.610586882 CET497814782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:56:41.730150938 CET478249781192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:56:45.220278978 CET498374782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:56:45.339888096 CET478249837192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:56:45.340373039 CET498374782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:56:45.344255924 CET498374782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:56:45.463720083 CET478249837192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:57:07.304810047 CET478249837192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:57:07.306515932 CET498374782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:57:07.310313940 CET498374782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:57:07.429833889 CET478249837192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:57:10.766701937 CET498934782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:57:10.886337996 CET478249893192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:57:10.886435032 CET498934782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:57:10.886707067 CET498934782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:57:11.006186008 CET478249893192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:57:32.812767982 CET478249893192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:57:32.812850952 CET498934782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:57:32.819108009 CET498934782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:57:32.938746929 CET478249893192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:57:36.158437967 CET499464782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:57:36.278101921 CET478249946192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:57:36.278170109 CET499464782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:57:36.278476954 CET499464782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:57:36.398070097 CET478249946192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:57:58.212023020 CET478249946192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:57:58.212114096 CET499464782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:57:58.212426901 CET499464782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:57:58.331887007 CET478249946192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:58:01.596175909 CET500024782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:58:01.715715885 CET478250002192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:58:01.715904951 CET500024782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:58:01.716173887 CET500024782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:58:01.835661888 CET478250002192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:58:23.640532017 CET478250002192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:58:23.644270897 CET500024782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:58:23.648152113 CET500024782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:58:23.767924070 CET478250002192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:58:27.297835112 CET500104782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:58:27.417501926 CET478250010192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:58:27.417649031 CET500104782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:58:27.418363094 CET500104782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:58:27.537823915 CET478250010192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:58:49.328701019 CET478250010192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:58:49.332490921 CET500104782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:58:49.332492113 CET500104782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:58:49.452066898 CET478250010192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:58:52.719808102 CET500114782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:58:52.839452982 CET478250011192.168.137.1192.168.2.4
                                  Dec 27, 2024 06:58:52.839519024 CET500114782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:58:52.839838982 CET500114782192.168.2.4192.168.137.1
                                  Dec 27, 2024 06:58:52.959500074 CET478250011192.168.137.1192.168.2.4

                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:00:54:58
                                  Start date:27/12/2024
                                  Path:C:\Users\user\Desktop\EZFN op cheats.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\Desktop\EZFN op cheats.exe"
                                  Imagebase:0x370000
                                  File size:3'265'536 bytes
                                  MD5 hash:EF4D8A6E9965BC6BB50CC1DFC5AFDE69
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000000.1662526352.0000000000690000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000000.1662190614.0000000000372000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:true

                                  Target ID:1
                                  Start time:00:54:59
                                  Start date:27/12/2024
                                  Path:C:\Windows\System32\schtasks.exe
                                  Wow64 process (32bit):false
                                  Commandline:"schtasks" /create /tn "cheats" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                  Imagebase:0x7ff76f990000
                                  File size:235'008 bytes
                                  MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:2
                                  Start time:00:54:59
                                  Start date:27/12/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7699e0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:3
                                  Start time:00:55:00
                                  Start date:27/12/2024
                                  Path:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                                  Imagebase:0xf00000
                                  File size:3'265'536 bytes
                                  MD5 hash:EF4D8A6E9965BC6BB50CC1DFC5AFDE69
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Joe Security
                                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Joe Security
                                  • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Florian Roth
                                  • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: ditekSHen
                                  • Rule: MALWARE_Win_QuasarStealer, Description: Detects Quasar infostealer, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: ditekshen
                                  Antivirus matches:
                                  • Detection: 100%, Avira
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 76%, ReversingLabs
                                  Reputation:low
                                  Has exited:false

                                  Target ID:4
                                  Start time:00:55:00
                                  Start date:27/12/2024
                                  Path:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                  Imagebase:0x820000
                                  File size:3'265'536 bytes
                                  MD5 hash:EF4D8A6E9965BC6BB50CC1DFC5AFDE69
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:5
                                  Start time:00:55:01
                                  Start date:27/12/2024
                                  Path:C:\Windows\System32\schtasks.exe
                                  Wow64 process (32bit):false
                                  Commandline:"schtasks" /create /tn "cheats" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                  Imagebase:0x7ff76f990000
                                  File size:235'008 bytes
                                  MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:6
                                  Start time:00:55:01
                                  Start date:27/12/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7699e0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:17.8%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:6
                                    Total number of Limit Nodes:0
                                    execution_graph 1639 7ffd9b7d3569 1640 7ffd9b7d3571 DeleteFileW 1639->1640 1642 7ffd9b7d3616 1640->1642 1643 7ffd9b7d3525 1644 7ffd9b7d3531 DeleteFileW 1643->1644 1646 7ffd9b7d3616 1644->1646

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1692760424.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ffd9b7d0000_EZFN op cheats.jbxd
                                    Similarity
                                    • API ID: DeleteFile
                                    • String ID:
                                    • API String ID: 4033686569-0
                                    • Opcode ID: af53af9f984cb4870553ffc7e8e94dcf5209709c121f1c9e04421320439fa7a1
                                    • Instruction ID: d03e7390519f2b551ea17b069c404dcbe3a5700aa8648252ec7f182c712e379c
                                    • Opcode Fuzzy Hash: af53af9f984cb4870553ffc7e8e94dcf5209709c121f1c9e04421320439fa7a1
                                    • Instruction Fuzzy Hash: 1531143190CB4C8FDB19DB688859AE9BBF0FF56311F0542AFD049D71A2CB34A909CB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 11 7ffd9b7d3569-7ffd9b7d35d8 16 7ffd9b7d35da-7ffd9b7d35df 11->16 17 7ffd9b7d35e2-7ffd9b7d3614 DeleteFileW 11->17 16->17 18 7ffd9b7d361c-7ffd9b7d364a 17->18 19 7ffd9b7d3616 17->19 19->18
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1692760424.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ffd9b7d0000_EZFN op cheats.jbxd
                                    Similarity
                                    • API ID: DeleteFile
                                    • String ID:
                                    • API String ID: 4033686569-0
                                    • Opcode ID: 1d3f35bcb4f1c16bac66cb6f9841f2fa20088f62f9a08502dac3c0b80d900177
                                    • Instruction ID: 7cfc8fb1434b9cd790aeb3f3b1c706afa0c1b00c50b3afaf7c294445ca98e7c2
                                    • Opcode Fuzzy Hash: 1d3f35bcb4f1c16bac66cb6f9841f2fa20088f62f9a08502dac3c0b80d900177
                                    • Instruction Fuzzy Hash: 3431E43190DB5C8FDB19DB588859AE9BBF0FFA6311F05426FD049D32A2CB74A805CB91

                                    Execution Graph

                                    Execution Coverage:12%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:8
                                    Total number of Limit Nodes:1
                                    execution_graph 11478 7ffd9b7f3569 11479 7ffd9b7f3571 DeleteFileW 11478->11479 11481 7ffd9b7f3616 11479->11481 11482 7ffd9ba6e6f9 11484 7ffd9ba6e70f 11482->11484 11483 7ffd9ba6e7bb 11484->11483 11485 7ffd9ba6e8b4 SetWindowsHookExW 11484->11485 11486 7ffd9ba6e8f6 11485->11486
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.4130850523.00007FFD9BA60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_7ffd9ba60000_Client.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 726253479e014d3cd2f75309dcb0a24235c02a2914f77887f2b1bf967286bb91
                                    • Instruction ID: c75d95f7656b1bbc0e2d1696f9224be93b7cf41bf925a5c33bb2b3e848853bdf
                                    • Opcode Fuzzy Hash: 726253479e014d3cd2f75309dcb0a24235c02a2914f77887f2b1bf967286bb91
                                    • Instruction Fuzzy Hash: 4BF2A170A19A0D8FDFA8DF68C894BA977E1FF98300F1141B9D04ED72A6DA75E941CB40

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 592 7ffd9ba69bd1-7ffd9ba69c19 594 7ffd9ba69c1b-7ffd9ba69c29 592->594 595 7ffd9ba69c2a-7ffd9ba69c3c 592->595 597 7ffd9ba69c42-7ffd9ba69c52 595->597 598 7ffd9ba69cbf-7ffd9ba69cc3 595->598 606 7ffd9ba69f3b-7ffd9ba69f8a 597->606 607 7ffd9ba69c58-7ffd9ba69ca7 597->607 599 7ffd9ba69cdb-7ffd9ba69cdf 598->599 600 7ffd9ba69cc5-7ffd9ba69cc9 598->600 601 7ffd9ba69ce1-7ffd9ba69d08 599->601 602 7ffd9ba69d0e-7ffd9ba69d12 599->602 608 7ffd9ba69cd0-7ffd9ba69cd4 600->608 601->602 613 7ffd9ba69f91-7ffd9ba69fa9 601->613 604 7ffd9ba69f2c-7ffd9ba69f3a 602->604 605 7ffd9ba69d18-7ffd9ba69d1d 602->605 605->604 611 7ffd9ba69d23-7ffd9ba69d2d 605->611 606->613 642 7ffd9ba69cb4-7ffd9ba69cb8 607->642 643 7ffd9ba69ca9-7ffd9ba69cb2 607->643 608->599 619 7ffd9ba69d2f-7ffd9ba69d41 611->619 620 7ffd9ba69d7b-7ffd9ba69d80 611->620 630 7ffd9ba69fab-7ffd9ba69fb1 613->630 631 7ffd9ba69fb5 613->631 619->620 632 7ffd9ba69d43-7ffd9ba69d6e 619->632 622 7ffd9ba69f08-7ffd9ba69f0d 620->622 623 7ffd9ba69d86-7ffd9ba69d90 620->623 622->604 625 7ffd9ba69f0f-7ffd9ba69f24 622->625 623->622 633 7ffd9ba69d96-7ffd9ba69da8 623->633 625->604 640 7ffd9ba69f26-7ffd9ba69f29 625->640 635 7ffd9ba69fb3 630->635 636 7ffd9ba69fb9-7ffd9ba6a018 630->636 631->636 637 7ffd9ba69fb7 631->637 632->620 649 7ffd9ba69d70-7ffd9ba69d74 632->649 647 7ffd9ba69e9e-7ffd9ba69ea9 633->647 648 7ffd9ba69dae-7ffd9ba69df3 633->648 635->631 655 7ffd9ba6a5be-7ffd9ba6a5d0 636->655 656 7ffd9ba6a01e-7ffd9ba6a030 636->656 637->636 640->604 642->598 643->598 653 7ffd9ba69e30-7ffd9ba69e57 647->653 654 7ffd9ba69eab-7ffd9ba69f01 647->654 648->647 669 7ffd9ba69df9-7ffd9ba69e10 648->669 649->620 653->647 668 7ffd9ba69e59-7ffd9ba69e6d 653->668 654->622 656->655 663 7ffd9ba6a036-7ffd9ba6a06f 656->663 663->655 676 7ffd9ba6a075-7ffd9ba6a0b6 663->676 680 7ffd9ba6a0bc-7ffd9ba6a0d4 676->680 681 7ffd9ba6a168-7ffd9ba6a17b 676->681 684 7ffd9ba6a15c-7ffd9ba6a162 680->684 685 7ffd9ba6a0da-7ffd9ba6a0fa 680->685 686 7ffd9ba6a1d0 681->686 687 7ffd9ba6a17d-7ffd9ba6a19e 681->687 684->680 684->681 685->684 701 7ffd9ba6a0fc-7ffd9ba6a10e 685->701 688 7ffd9ba6a1d2-7ffd9ba6a1d7 686->688 693 7ffd9ba6a1a0-7ffd9ba6a1c7 687->693 694 7ffd9ba6a1c9-7ffd9ba6a1ce 687->694 690 7ffd9ba6a21e-7ffd9ba6a241 688->690 691 7ffd9ba6a1d9-7ffd9ba6a1e0 688->691 698 7ffd9ba6a337-7ffd9ba6a343 690->698 699 7ffd9ba6a247-7ffd9ba6a26f 690->699 696 7ffd9ba6a1e7-7ffd9ba6a201 691->696 693->688 694->688 696->690 705 7ffd9ba6a203-7ffd9ba6a21c 696->705 698->655 702 7ffd9ba6a349-7ffd9ba6a35e 698->702 712 7ffd9ba6a32b-7ffd9ba6a331 699->712 713 7ffd9ba6a275-7ffd9ba6a290 699->713 701->684 707 7ffd9ba6a110-7ffd9ba6a114 701->707 702->655 705->690 708 7ffd9ba6a5d1-7ffd9ba6a673 707->708 709 7ffd9ba6a11a-7ffd9ba6a12f 707->709 723 7ffd9ba6a679-7ffd9ba6a67b 708->723 724 7ffd9ba6a785-7ffd9ba6a791 708->724 718 7ffd9ba6a136-7ffd9ba6a138 709->718 712->698 712->699 713->712 725 7ffd9ba6a296-7ffd9ba6a2a8 713->725 718->684 719 7ffd9ba6a13a-7ffd9ba6a158 call 7ffd9ba653c0 718->719 719->684 727 7ffd9ba6a67d-7ffd9ba6a68f 723->727 728 7ffd9ba6a695-7ffd9ba6a6a3 723->728 732 7ffd9ba6a793-7ffd9ba6a7b7 724->732 733 7ffd9ba6a7b8 724->733 725->712 735 7ffd9ba6a2ae-7ffd9ba6a2b2 725->735 727->728 742 7ffd9ba6a7bf-7ffd9ba6a7f1 727->742 730 7ffd9ba6a6a9-7ffd9ba6a6c0 728->730 731 7ffd9ba6a7f8-7ffd9ba6a82b 728->731 751 7ffd9ba6a6c2-7ffd9ba6a6d4 730->751 752 7ffd9ba6a6da-7ffd9ba6a6dd 730->752 753 7ffd9ba6a832-7ffd9ba6a83e 731->753 732->733 733->742 735->708 740 7ffd9ba6a2b8-7ffd9ba6a2fb 735->740 740->712 768 7ffd9ba6a2fd-7ffd9ba6a328 call 7ffd9ba653c0 740->768 742->731 751->752 751->753 754 7ffd9ba6a6df-7ffd9ba6a6f6 752->754 755 7ffd9ba6a706-7ffd9ba6a722 call 7ffd9ba67a50 752->755 761 7ffd9ba6a840-7ffd9ba6a864 753->761 762 7ffd9ba6a865-7ffd9ba6a871 753->762 754->755 776 7ffd9ba6a6f8-7ffd9ba6a6fc 754->776 771 7ffd9ba6a753-7ffd9ba6a757 755->771 772 7ffd9ba6a724-7ffd9ba6a752 755->772 761->762 774 7ffd9ba6a873-7ffd9ba6a879 762->774 775 7ffd9ba6a87d 762->775 768->712 784 7ffd9ba6a75e-7ffd9ba6a784 771->784 778 7ffd9ba6a881-7ffd9ba6a8bc 774->778 779 7ffd9ba6a87b 774->779 775->778 780 7ffd9ba6a87f 775->780 782 7ffd9ba6a703-7ffd9ba6a704 776->782 786 7ffd9ba6a8ff-7ffd9ba6a932 778->786 787 7ffd9ba6a8be-7ffd9ba6a8e5 778->787 779->775 780->778 782->755 796 7ffd9ba6a939-7ffd9ba6a981 786->796 787->796 799 7ffd9ba6a8e7-7ffd9ba6a8fe 787->799 805 7ffd9ba6a983 796->805 806 7ffd9ba6a985-7ffd9ba6a9a7 796->806 805->806 807 7ffd9ba6a9c5-7ffd9ba6a9ca 805->807 809 7ffd9ba6a9ad-7ffd9ba6a9bf 806->809 810 7ffd9ba6aa8a-7ffd9ba6aa96 806->810 815 7ffd9ba6a9c1-7ffd9ba6a9c4 809->815 816 7ffd9ba6a9cb-7ffd9ba6a9e3 call 7ffd9ba640b0 809->816 812 7ffd9ba6aabd-7ffd9ba6aad3 810->812 813 7ffd9ba6aa98-7ffd9ba6aabc 810->813 822 7ffd9ba6ab15-7ffd9ba6ab17 812->822 823 7ffd9ba6aad5-7ffd9ba6aaf2 812->823 813->812 815->807 825 7ffd9ba6aa47-7ffd9ba6aa50 816->825 826 7ffd9ba6a9e5-7ffd9ba6aa16 816->826 824 7ffd9ba6ab19-7ffd9ba6ab1b 822->824 823->824 827 7ffd9ba6aaf4-7ffd9ba6ab0f 823->827 828 7ffd9ba6ab1d-7ffd9ba6ab2b 824->828 829 7ffd9ba6ab2c-7ffd9ba6ab3c 824->829 834 7ffd9ba6aa41-7ffd9ba6aa45 826->834 835 7ffd9ba6aa18-7ffd9ba6aa3f 826->835 827->824 830 7ffd9ba6ab11-7ffd9ba6ab12 827->830 830->822 834->825 834->826 835->834 837 7ffd9ba6aa51-7ffd9ba6aa89 835->837
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.4130850523.00007FFD9BA60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_7ffd9ba60000_Client.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b037157e12707ade099e0025b840d4a98004b3af41bb0a09af5ad171144b5cf8
                                    • Instruction ID: 1356fc9c353d8adf729013124202bfa5720dd8663bdb3df4a2c839ea2d74bba6
                                    • Opcode Fuzzy Hash: b037157e12707ade099e0025b840d4a98004b3af41bb0a09af5ad171144b5cf8
                                    • Instruction Fuzzy Hash: 8F922871B0D94D8FEBA8EB6CD465A7537D1EF99310F0500BAE44EC72A6DE68EC028741

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 895 7ffd9ba6afdd-7ffd9ba6b079 897 7ffd9ba6b6f1-7ffd9ba6b706 895->897 898 7ffd9ba6b07f-7ffd9ba6b082 895->898 898->897 899 7ffd9ba6b088-7ffd9ba6b0a5 898->899 899->897 901 7ffd9ba6b0ab-7ffd9ba6b0ca 899->901 903 7ffd9ba6b0cc-7ffd9ba6b0cf 901->903 904 7ffd9ba6b0d6-7ffd9ba6b0e9 901->904 905 7ffd9ba6b0d1 903->905 906 7ffd9ba6b0ee-7ffd9ba6b11e 903->906 907 7ffd9ba6b179-7ffd9ba6b18b 904->907 905->897 906->897 912 7ffd9ba6b124-7ffd9ba6b172 906->912 907->897 910 7ffd9ba6b191-7ffd9ba6b1d0 907->910 910->897 917 7ffd9ba6b1d6-7ffd9ba6b1e0 910->917 912->907 920 7ffd9ba6b1e2-7ffd9ba6b1f6 917->920 921 7ffd9ba6b1f8-7ffd9ba6b208 917->921 924 7ffd9ba6b212-7ffd9ba6b267 920->924 921->924 928 7ffd9ba6b26d-7ffd9ba6b275 924->928 929 7ffd9ba6b2db-7ffd9ba6b2e3 928->929 930 7ffd9ba6b277-7ffd9ba6b28b 928->930 929->897 931 7ffd9ba6b2e9-7ffd9ba6b30b 929->931 930->929 933 7ffd9ba6b28d-7ffd9ba6b2d7 930->933 935 7ffd9ba6b311-7ffd9ba6b33a 931->935 936 7ffd9ba6b40f-7ffd9ba6b41a 931->936 933->929 942 7ffd9ba6b3c1-7ffd9ba6b3e2 935->942 943 7ffd9ba6b340-7ffd9ba6b366 935->943 940 7ffd9ba6b48c-7ffd9ba6b4b5 936->940 941 7ffd9ba6b41c-7ffd9ba6b445 936->941 957 7ffd9ba6b4b7-7ffd9ba6b4d1 940->957 958 7ffd9ba6b4d8-7ffd9ba6b4e5 940->958 941->897 954 7ffd9ba6b44b-7ffd9ba6b45d 941->954 942->935 945 7ffd9ba6b3e8 942->945 943->942 955 7ffd9ba6b368-7ffd9ba6b37e 943->955 945->936 954->897 961 7ffd9ba6b463-7ffd9ba6b481 954->961 955->942 963 7ffd9ba6b380-7ffd9ba6b398 955->963 957->958 966 7ffd9ba6b4eb-7ffd9ba6b518 958->966 967 7ffd9ba6b5aa-7ffd9ba6b5ca 958->967 961->897 973 7ffd9ba6b487-7ffd9ba6b488 961->973 963->942 971 7ffd9ba6b39a-7ffd9ba6b3bf 963->971 983 7ffd9ba6b53b-7ffd9ba6b547 966->983 984 7ffd9ba6b51a-7ffd9ba6b534 966->984 974 7ffd9ba6b5d4-7ffd9ba6b610 967->974 975 7ffd9ba6b5cc-7ffd9ba6b5cd 967->975 971->942 979 7ffd9ba6b3ea-7ffd9ba6b408 971->979 973->940 974->897 990 7ffd9ba6b616-7ffd9ba6b633 974->990 975->974 979->936 988 7ffd9ba6b549-7ffd9ba6b555 983->988 989 7ffd9ba6b598-7ffd9ba6b5a4 983->989 984->983 991 7ffd9ba6b840-7ffd9ba6b857 988->991 992 7ffd9ba6b55b-7ffd9ba6b591 988->992 989->897 989->967 997 7ffd9ba6b63d-7ffd9ba6b678 990->997 998 7ffd9ba6b635-7ffd9ba6b636 990->998 999 7ffd9ba6b861-7ffd9ba6b8cf call 7ffd9ba65070 call 7ffd9ba67d70 call 7ffd9ba65370 call 7ffd9ba6b8d0 991->999 1000 7ffd9ba6b859-7ffd9ba6b860 991->1000 992->989 997->897 1012 7ffd9ba6b67a-7ffd9ba6b68c 997->1012 998->997 1000->999 1012->897 1016 7ffd9ba6b68e-7ffd9ba6b6ac 1012->1016 1016->897 1019 7ffd9ba6b6ae-7ffd9ba6b6ca 1016->1019 1022 7ffd9ba6b6cc-7ffd9ba6b6ef 1019->1022 1023 7ffd9ba6b707-7ffd9ba6b77c 1019->1023 1022->897 1022->1023 1033 7ffd9ba6b782-7ffd9ba6b78b 1023->1033 1034 7ffd9ba6b827-7ffd9ba6b83f 1023->1034 1033->1034
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.4130850523.00007FFD9BA60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_7ffd9ba60000_Client.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d8a90dbbece85ef00b5a0aecb9b155e63ac4a9f40830d7da0f14e7c8adc76da6
                                    • Instruction ID: 35224601c712b9a52b222af21f99e5608aeeb4359e100ad51af1f8a48d20eab6
                                    • Opcode Fuzzy Hash: d8a90dbbece85ef00b5a0aecb9b155e63ac4a9f40830d7da0f14e7c8adc76da6
                                    • Instruction Fuzzy Hash: 6A528170B08A498FDBA8EB2CC4A5B7977E1FF99304F5545B9E04DC72A6CE34E8418741

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1036 7ffd9ba69271-7ffd9ba69295 1037 7ffd9ba692df-7ffd9ba692e2 1036->1037 1038 7ffd9ba69297-7ffd9ba692bc 1036->1038 1039 7ffd9ba692d0-7ffd9ba692de 1038->1039 1040 7ffd9ba692be-7ffd9ba692ce 1038->1040 1039->1037 1040->1039 1042 7ffd9ba692e3-7ffd9ba69314 1040->1042 1045 7ffd9ba69363-7ffd9ba69388 call 7ffd9ba67e00 1042->1045 1046 7ffd9ba69316-7ffd9ba69335 call 7ffd9ba63950 1042->1046 1052 7ffd9ba695f2-7ffd9ba69605 call 7ffd9ba68d80 1045->1052 1053 7ffd9ba6938e-7ffd9ba6939c call 7ffd9ba64e50 1045->1053 1046->1045 1051 7ffd9ba69337-7ffd9ba69357 call 7ffd9ba63830 1046->1051 1051->1045 1060 7ffd9ba69359-7ffd9ba69360 1051->1060 1061 7ffd9ba69632-7ffd9ba69634 1052->1061 1062 7ffd9ba69607-7ffd9ba69628 1052->1062 1063 7ffd9ba6939e-7ffd9ba693b2 1053->1063 1064 7ffd9ba693b6-7ffd9ba693b9 1053->1064 1060->1045 1065 7ffd9ba69643-7ffd9ba696c6 1061->1065 1066 7ffd9ba69636-7ffd9ba6963a 1061->1066 1062->1061 1077 7ffd9ba6962a-7ffd9ba6962f 1062->1077 1063->1064 1067 7ffd9ba69583-7ffd9ba6958e 1064->1067 1068 7ffd9ba693bf-7ffd9ba693c2 1064->1068 1083 7ffd9ba696ce-7ffd9ba696cf 1065->1083 1066->1065 1072 7ffd9ba6963c-7ffd9ba6963e 1066->1072 1074 7ffd9ba695c5-7ffd9ba695d0 1067->1074 1073 7ffd9ba693c8 1068->1073 1068->1074 1078 7ffd9ba696d5-7ffd9ba696d8 1072->1078 1073->1052 1074->1052 1077->1061 1079 7ffd9ba696de-7ffd9ba69751 call 7ffd9ba68060 1078->1079 1080 7ffd9ba69ac7-7ffd9ba69ada 1078->1080 1090 7ffd9ba69753-7ffd9ba69774 1079->1090 1091 7ffd9ba69776 1079->1091 1083->1078 1090->1091 1092 7ffd9ba69778-7ffd9ba6978b 1090->1092 1091->1092 1095 7ffd9ba6978d-7ffd9ba697b6 1092->1095 1096 7ffd9ba697bb-7ffd9ba697f4 1092->1096 1103 7ffd9ba69870-7ffd9ba69877 1095->1103 1101 7ffd9ba697fe-7ffd9ba6982a 1096->1101 1102 7ffd9ba697f6-7ffd9ba697f7 1096->1102 1101->1103 1111 7ffd9ba6982c-7ffd9ba69860 1101->1111 1102->1101 1104 7ffd9ba69893-7ffd9ba698f4 1103->1104 1105 7ffd9ba69879-7ffd9ba69885 1103->1105 1115 7ffd9ba69915-7ffd9ba69937 1104->1115 1116 7ffd9ba698f6-7ffd9ba6990b 1104->1116 1105->1104 1107 7ffd9ba69887-7ffd9ba6988c 1105->1107 1107->1104 1111->1103 1119 7ffd9ba69862-7ffd9ba69869 1111->1119 1120 7ffd9ba69953-7ffd9ba69954 1115->1120 1121 7ffd9ba69939-7ffd9ba69945 1115->1121 1116->1115 1119->1103 1122 7ffd9ba69956-7ffd9ba69971 1120->1122 1123 7ffd9ba6994d-7ffd9ba69951 1121->1123 1122->1080 1125 7ffd9ba69977-7ffd9ba6998d call 7ffd9ba68d80 1122->1125 1123->1122 1125->1080 1128 7ffd9ba69993-7ffd9ba699b4 1125->1128 1130 7ffd9ba69a01-7ffd9ba69a22 1128->1130 1131 7ffd9ba699b6-7ffd9ba699e4 1128->1131 1136 7ffd9ba69a64-7ffd9ba69a85 1130->1136 1137 7ffd9ba69a24-7ffd9ba69a56 1130->1137 1131->1130 1135 7ffd9ba699e6-7ffd9ba699fc 1131->1135 1135->1080 1136->1080 1143 7ffd9ba69a87-7ffd9ba69ab9 1136->1143 1137->1136 1142 7ffd9ba69a58-7ffd9ba69a61 1137->1142 1142->1136 1143->1080 1147 7ffd9ba69abb-7ffd9ba69ac4 1143->1147 1147->1080
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.4130850523.00007FFD9BA60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_7ffd9ba60000_Client.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0782631f514cd229076376dd14c7da5c7be0c87503b039592cd99cd8ae799e6f
                                    • Instruction ID: 2a50d91fb1d7422b799feadeced273ba3e86b5434d61bb88fa88e388a829188a
                                    • Opcode Fuzzy Hash: 0782631f514cd229076376dd14c7da5c7be0c87503b039592cd99cd8ae799e6f
                                    • Instruction Fuzzy Hash: 1222A270B09A0D8FEBA8DB6884A57B877E2FF98300F11417DD44EC32A2CE74E9428745
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.4130850523.00007FFD9BA60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_7ffd9ba60000_Client.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 05821582e00e93df50116ba312e58a6841bc59a7e5ec9a06dda54836fb24beb9
                                    • Instruction ID: 9fc94e278b6ce0b685107d96cb4ddd0ac91cd16612cdaa2b60951b3d7e7c2661
                                    • Opcode Fuzzy Hash: 05821582e00e93df50116ba312e58a6841bc59a7e5ec9a06dda54836fb24beb9
                                    • Instruction Fuzzy Hash: 6A027D70E18A1E8FEBA8DF68C4947B973E1FF98301F1141B9D44ED32A5CA74B9818B40

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.4130850523.00007FFD9BA60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_7ffd9ba60000_Client.jbxd
                                    Similarity
                                    • API ID: HookWindows
                                    • String ID:
                                    • API String ID: 2559412058-0
                                    • Opcode ID: 0b207607c6b9bf17a719e7bab2e2e0d552f8aaf0294701d77bb6d01dd58a7ecb
                                    • Instruction ID: bc3f13ab8a9ef03160b605562c05b56e7ea80405b379cb682cf7408d01210ce1
                                    • Opcode Fuzzy Hash: 0b207607c6b9bf17a719e7bab2e2e0d552f8aaf0294701d77bb6d01dd58a7ecb
                                    • Instruction Fuzzy Hash: 5E712571B1DE4D4FDB58EB6C98665F97BE0EF98300B0541BEE05DC7293DE28A8428781

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 462 7ffd9b7f3525-7ffd9b7f352f 463 7ffd9b7f3571-7ffd9b7f35d8 462->463 464 7ffd9b7f3531-7ffd9b7f3537 462->464 468 7ffd9b7f35da-7ffd9b7f35df 463->468 469 7ffd9b7f35e2-7ffd9b7f3614 DeleteFileW 463->469 464->463 468->469 470 7ffd9b7f361c-7ffd9b7f364a 469->470 471 7ffd9b7f3616 469->471 471->470
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.4127533502.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_7ffd9b7f0000_Client.jbxd
                                    Similarity
                                    • API ID: DeleteFile
                                    • String ID:
                                    • API String ID: 4033686569-0
                                    • Opcode ID: 480abe52860cde742d2574cee4feb05341788f9385c385044f91f9a413102f60
                                    • Instruction ID: 0cb1905b8c6b3cecef55421ce666ec286eb3fc94548c4d51d5687683c68ad2c4
                                    • Opcode Fuzzy Hash: 480abe52860cde742d2574cee4feb05341788f9385c385044f91f9a413102f60
                                    • Instruction Fuzzy Hash: 0131163190CB4C4FDB19DB6888596E97FF0EF56311F0542AFC049D75A2CB34A905C791

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 473 7ffd9b7f3569-7ffd9b7f35d8 478 7ffd9b7f35da-7ffd9b7f35df 473->478 479 7ffd9b7f35e2-7ffd9b7f3614 DeleteFileW 473->479 478->479 480 7ffd9b7f361c-7ffd9b7f364a 479->480 481 7ffd9b7f3616 479->481 481->480
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.4127533502.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_7ffd9b7f0000_Client.jbxd
                                    Similarity
                                    • API ID: DeleteFile
                                    • String ID:
                                    • API String ID: 4033686569-0
                                    • Opcode ID: eadc03102c5eff10ed9b4c30124fa279c85142f165fa8b1c015b1f5a85b0f6e2
                                    • Instruction ID: e9aeedc9e0e12aff582aa6dcc78d1d29fc2ece21304b3b34b0cad1cfcfd4c983
                                    • Opcode Fuzzy Hash: eadc03102c5eff10ed9b4c30124fa279c85142f165fa8b1c015b1f5a85b0f6e2
                                    • Instruction Fuzzy Hash: 9631E63190DB5C8FDB19DB6888596E9BBF0FF65311F05426FD049D31A2CB74A805CB91
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.4127533502.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_7ffd9b7f0000_Client.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b780eb8136b56c159929a795730053f27b8f772fae26ba66643e95a8e14d24e7
                                    • Instruction ID: 1c6c0281cb2fe1283e49c988a192597070140f50e1700fa0c86a3c7bede19fa2
                                    • Opcode Fuzzy Hash: b780eb8136b56c159929a795730053f27b8f772fae26ba66643e95a8e14d24e7
                                    • Instruction Fuzzy Hash: C131521FF0A1E219E315F2BCB5768ED3B60DF9227E71982F3D19D4D0A79C09108641D9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1719774776.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_7ffd9b7f0000_Client.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ;M_I
                                    • API String ID: 0-1276053120
                                    • Opcode ID: 3d699dcf125d32a2708d186f10b94a6296caf8344082d04e5ed897b934fe0ee8
                                    • Instruction ID: 81b9f720ae4ae38573de53d6064e8d55617e77db2b9792600be49718acc6e890
                                    • Opcode Fuzzy Hash: 3d699dcf125d32a2708d186f10b94a6296caf8344082d04e5ed897b934fe0ee8
                                    • Instruction Fuzzy Hash: 07A16E72B0F6C64BE7189B6C98B45E87FE1EF81304B5542FAE488473EBDD286901C381
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1719774776.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_7ffd9b7f0000_Client.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: .M_^
                                    • API String ID: 0-2820351210
                                    • Opcode ID: 747a9978078ed1ccac7da01fe2f52fb743bbbd62d9bff7fe183f6c7e5ed22da0
                                    • Instruction ID: 51d5e58b6e6bdf569144e0e611c36c9901932db9e3842cca4da8460930d28796
                                    • Opcode Fuzzy Hash: 747a9978078ed1ccac7da01fe2f52fb743bbbd62d9bff7fe183f6c7e5ed22da0
                                    • Instruction Fuzzy Hash: 0121F316B0EA9D0FD365AB6C9C751F47BE0EF96221B0E03F7C089C71A3DC0859064394
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1719774776.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_7ffd9b7f0000_Client.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0b1ff1d59f51452401586f5632c9beabccd5b47074cd03a418af082d266436a3
                                    • Instruction ID: f9b6949521203d2876492543345e40e0834adcbf00698dbf1c7a26f614f79999
                                    • Opcode Fuzzy Hash: 0b1ff1d59f51452401586f5632c9beabccd5b47074cd03a418af082d266436a3
                                    • Instruction Fuzzy Hash: 1F91E831B19E4E4FEBA5EB6884657B977D2EF94340F4502B5E40DC72F6DD28AD028384
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1719774776.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_7ffd9b7f0000_Client.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 02356ae3ccec2a5f5ffeb1c8078a944e152b39bec9c90b1bbf3599b9b879952b
                                    • Instruction ID: 00e56bbd3e2129d708eb99dff5bd62feb347b8eaa6956965dd6ab78b2c8debb8
                                    • Opcode Fuzzy Hash: 02356ae3ccec2a5f5ffeb1c8078a944e152b39bec9c90b1bbf3599b9b879952b
                                    • Instruction Fuzzy Hash: 41619861B1990D4FDB98EBA884757FCB7D2EF98310F554279E05ED32E6CE14AC428780
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1719774776.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_7ffd9b7f0000_Client.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3f9a1b1a83dc7aaa8ca6ad05b62e1cb25f88822db842eb42f6b121ed6c507a6a
                                    • Instruction ID: 8fd9052b9828406a9dbbedf2ed952ffcc91ed4f7b335e37a34421a8f296599ad
                                    • Opcode Fuzzy Hash: 3f9a1b1a83dc7aaa8ca6ad05b62e1cb25f88822db842eb42f6b121ed6c507a6a
                                    • Instruction Fuzzy Hash: 92415F21B1DB490FE75897AC94657B97BD1EF94314F40027EF05EC32E2DD286D028796
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1719774776.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_7ffd9b7f0000_Client.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a01044e31afaac75583a470c0b15699c608f0d7f0a09ab09b2a9bcbb48c928b7
                                    • Instruction ID: 8db6ca4ee417c606609920667f1a1f3550550a72699438805b1d88832e882734
                                    • Opcode Fuzzy Hash: a01044e31afaac75583a470c0b15699c608f0d7f0a09ab09b2a9bcbb48c928b7
                                    • Instruction Fuzzy Hash: C6414525B59D1B0FEF98F6AC80B1AFD66D3AF84244B9145B4E01DC37EADD2C9D028385
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1719774776.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_7ffd9b7f0000_Client.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3a9203ffc76b708750fc55d526d1737f16222c6e3ba512f8ec1065c4b5c9aa6f
                                    • Instruction ID: 1f014d5dbb9f7ffc1aed9ab29263348cb992171c3d9331e84f82cf3ed4282a8c
                                    • Opcode Fuzzy Hash: 3a9203ffc76b708750fc55d526d1737f16222c6e3ba512f8ec1065c4b5c9aa6f
                                    • Instruction Fuzzy Hash: C3210331B0E6864FDB55DB6880D55A57B91EF51310F1683FAC0588B5BBD928AC86C3C0
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1719774776.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_7ffd9b7f0000_Client.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 28a8563db28fe917701d0e45d2b65fab752182641e6ade0933bf2772b68d19cb
                                    • Instruction ID: 69237ed524ae5da1eed70268736fbbbcfb47b479d9a03fa268a430ca2c5c6476
                                    • Opcode Fuzzy Hash: 28a8563db28fe917701d0e45d2b65fab752182641e6ade0933bf2772b68d19cb
                                    • Instruction Fuzzy Hash: 28316F34659AC64BEB48EB2CD4A1AE97F61AFC4308F9149E5F418833CECE3C6906C751
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1719774776.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_7ffd9b7f0000_Client.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ae7c0f1c006537fbbce6fc843ba0e32288dcd5eb949aeffd5c5926153dc4d422
                                    • Instruction ID: 0f560770bda8560471a44f62335a37f448d2395cf61721ca125d7a4b5baf6bfa
                                    • Opcode Fuzzy Hash: ae7c0f1c006537fbbce6fc843ba0e32288dcd5eb949aeffd5c5926153dc4d422
                                    • Instruction Fuzzy Hash: E621D631F19A5D4FDB94EB6888A99B977D1EF58301B4605B6E40DC72E6DE28EC00C781
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1719774776.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_7ffd9b7f0000_Client.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fb2547efd00d148559379f0782ec4e427321e3932357a3260677307587e3c564
                                    • Instruction ID: fe2d764eb55bbab585b647f5d81dffc9f1a1b37c1b1bd63bd2f7628a3eccc9ca
                                    • Opcode Fuzzy Hash: fb2547efd00d148559379f0782ec4e427321e3932357a3260677307587e3c564
                                    • Instruction Fuzzy Hash: A5213792B1EAC64FE355AB644835AA57FA1EF51740F0506FAD099C72E7EC08280483D1
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1719774776.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_7ffd9b7f0000_Client.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4c314a12c53bec6fefc2500d967f0c440f88e6feae55a193d4e5a472c25e5ef8
                                    • Instruction ID: a72c18078350a6e16183ad5e2389acf72be9b61cc8c27f05592ba22b0e420361
                                    • Opcode Fuzzy Hash: 4c314a12c53bec6fefc2500d967f0c440f88e6feae55a193d4e5a472c25e5ef8
                                    • Instruction Fuzzy Hash: B3117D21B0EB850FE395E6786C698F17FD0DF9022470503BBE44CC31B3CD0899868391
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1719774776.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_7ffd9b7f0000_Client.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 396a8372869d3e6d24a05ee1bee0cc4a3461b30504077316cf957504feedd9ce
                                    • Instruction ID: 2781bcd954107f2cb66156e1b87b5396acbd94ebed4a636039cb44bfe43b42de
                                    • Opcode Fuzzy Hash: 396a8372869d3e6d24a05ee1bee0cc4a3461b30504077316cf957504feedd9ce
                                    • Instruction Fuzzy Hash: 5B11C620B0EBCD0FE347E37858A8AA43FD1EF46215B0A41E7E488CB0B7C9584945C342
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1719774776.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_7ffd9b7f0000_Client.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 764da4d966ce21371d5472053bca8cfd49275c3baa22d1822eb6efaff5d975f6
                                    • Instruction ID: ba85f41c3e19a16dc2236c0675dcf876c920afc1b0a4e8d34ba6467f2cdb9c92
                                    • Opcode Fuzzy Hash: 764da4d966ce21371d5472053bca8cfd49275c3baa22d1822eb6efaff5d975f6
                                    • Instruction Fuzzy Hash: E7014E5371AD8E0EDBA9A62C54A59F67B82DBD5710B0506F6E40DC23B6DD147D4243C0
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1719774776.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_7ffd9b7f0000_Client.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 438500eb9df471dce427ea4611a325c169b5f8130cddda9fa0823cb93a827a76
                                    • Instruction ID: b6ee8f7ec8c951da5c002d9f40693b11a758fce38e8021a804c49389cc8aa791
                                    • Opcode Fuzzy Hash: 438500eb9df471dce427ea4611a325c169b5f8130cddda9fa0823cb93a827a76
                                    • Instruction Fuzzy Hash: D2F0F022F1981D0FE754F6AD54ECAFA7BD1DBAC22671502B7E40CC72B7DC0498428381
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1719774776.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_7ffd9b7f0000_Client.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a33c4f289f0f918d9ca77e1d5369cc6352d16bd8c698e3263572bb0c8931fbce
                                    • Instruction ID: 460693d778915d3dc3532e3c8fef514c5ede74a2b54f19813b0bd8c65b91c4a7
                                    • Opcode Fuzzy Hash: a33c4f289f0f918d9ca77e1d5369cc6352d16bd8c698e3263572bb0c8931fbce
                                    • Instruction Fuzzy Hash: C1E09B21F19C1D1FA794F6AD44DDF7966C1DBAC2117510576E41CC72B6DC149C418381
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1719774776.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_7ffd9b7f0000_Client.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 264275a600972998d3d8d45f3add922ad5f20d2365c9327ef6caecc6211609c7
                                    • Instruction ID: dceda6915c54ad741f89ddeebac1050784350ac23a6cb71f09d814d11a86b593
                                    • Opcode Fuzzy Hash: 264275a600972998d3d8d45f3add922ad5f20d2365c9327ef6caecc6211609c7
                                    • Instruction Fuzzy Hash: E7E02622F1A91A57E394337820364FC2581CF48690B41053AE40DC62EBEC1D6D420284
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1719774776.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_7ffd9b7f0000_Client.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: eb34cfd6402c0cf2cd3d1552bc79771280b33ffe8363ad7088facd0752a6bcfc
                                    • Instruction ID: 4f5a2ac70440ddbf5dd8d05bae4b54741cff1a685b8801eb762a0e07459db911
                                    • Opcode Fuzzy Hash: eb34cfd6402c0cf2cd3d1552bc79771280b33ffe8363ad7088facd0752a6bcfc
                                    • Instruction Fuzzy Hash: 99C01262B16E4E4BDB65EFC824912F87691FFC83807D50239A008E2175CF241551A284