Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
mtgjyX9gHF.exe

Overview

General Information

Sample name:mtgjyX9gHF.exe
renamed because original name is a hash value
Original sample name:641cb02c429feb106094750765d0d6af.exe
Analysis ID:1523151
MD5:641cb02c429feb106094750765d0d6af
SHA1:db5be32e7ef7c5e93b7ef4f06bd6854f3a393cbd
SHA256:4a04da4d657c3c6bc45ea42cfef67039cd51173159ce7b707467f69146e086f9
Tags:exeQuasarRATRATuser-abuse_ch
Infos:

Detection

Quasar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Quasar
Suricata IDS alerts for network traffic
Yara detected Quasar RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to detect virtual machines (STR)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • mtgjyX9gHF.exe (PID: 3620 cmdline: "C:\Users\user\Desktop\mtgjyX9gHF.exe" MD5: 641CB02C429FEB106094750765D0D6AF)
    • schtasks.exe (PID: 2404 cmdline: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • conhost.exe (PID: 5852 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Clienty.exe (PID: 6136 cmdline: "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" MD5: 641CB02C429FEB106094750765D0D6AF)
      • schtasks.exe (PID: 6284 cmdline: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
        • conhost.exe (PID: 876 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • Clienty.exe (PID: 4620 cmdline: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe MD5: 641CB02C429FEB106094750765D0D6AF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
{"Version": "1.4.1", "Host:Port": "39.102.36.209:4782;", "SubDirectory": "SubDir", "InstallName": "Clienty.exe", "MutexName": "6d2ccfb9-4bf8-4a23-933c-5674d8e6fac2", "StartupKey": "Quasar Client Startup", "Tag": "Office04", "LogDirectoryName": "Logs", "ServerSignature": "MunencjUTwH3Ra5nDH8gt96KcRM9mKu0wE4LzbN5Xg+bYmEv6qlfx6WL5Ta4bEXF24wNDWupkwJXDpw/qMVcZvYiCJtBQf2PuZxrCHM0mstLkmiwoQ0nbYpXKrZ2YdGKL+WYRtQN0M4ZcMZyJxey1kIHawzZuoj84okmDrx/0p4d2DcNmaA1Hf77+GVe5G6gBCBCTeyDOX2jBwhJvBmfujeQPJujOtB1M+Owjd86DzaI0Plhx66ZwxmGfbH53PQ3lTD8I1xyF7V15wlgg2u4x2V4Xuhdf9hkX1cjB1lLKCQIg2VZuPXA8571iwOAREaEvZairheJtNbRZlWewwbjN75m2WK+6utu1AEvx4J3TfdHNZRur4gpFmadnNE7fw5+eqIvNrbHEvneH8l4MRlP07Cr2FVyN0FjCf8hkjdUKZgA4dHvsyYBwNzJG7fAIZvvR4SrCkpd6QCYqGs6s6o//zfDoXreAYkb3TafFP+XJsJWCEphn9bYADO9OHDM4Yqf210wnQT3H8Yc3bUMYcvGeiQcVgrrumuGLwM0JAzeXv+0H7bFarlITXkraXmbTXsNAIEq+85bmY9mvfWa2Kxkphe3y30OklLiDeYBHNw9PbekrDev69XyxDjHsl6Z/Dz4z6jPrLX43rEOyBp4u+WWiSwmGO/rXPSlBWTQa6PLSWk=", "ServerCertificate": "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"}
SourceRuleDescriptionAuthorStrings
mtgjyX9gHF.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
    mtgjyX9gHF.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      mtgjyX9gHF.exeMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
      • 0x28eecf:$x1: Quasar.Common.Messages
      • 0x29f1f8:$x1: Quasar.Common.Messages
      • 0x2ab7ba:$x4: Uninstalling... good bye :-(
      • 0x2acfaf:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
      mtgjyX9gHF.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
      • 0x2aad6c:$f1: FileZilla\recentservers.xml
      • 0x2aadac:$f2: FileZilla\sitemanager.xml
      • 0x2aadee:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
      • 0x2ab03a:$b1: Chrome\User Data\
      • 0x2ab090:$b1: Chrome\User Data\
      • 0x2ab368:$b2: Mozilla\Firefox\Profiles
      • 0x2ab464:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2fd3e8:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2ab5bc:$b4: Opera Software\Opera Stable\Login Data
      • 0x2ab676:$b5: YandexBrowser\User Data\
      • 0x2ab6e4:$b5: YandexBrowser\User Data\
      • 0x2ab3b8:$s4: logins.json
      • 0x2ab0ee:$a1: username_value
      • 0x2ab10c:$a2: password_value
      • 0x2ab3f8:$a3: encryptedUsername
      • 0x2fd32c:$a3: encryptedUsername
      • 0x2ab41c:$a4: encryptedPassword
      • 0x2fd34a:$a4: encryptedPassword
      • 0x2fd2c8:$a5: httpRealm
      mtgjyX9gHF.exeMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
      • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
      • 0x2ab8a4:$s3: Process already elevated.
      • 0x28ebce:$s4: get_PotentiallyVulnerablePasswords
      • 0x278c8a:$s5: GetKeyloggerLogsDirectory
      • 0x29e957:$s5: GetKeyloggerLogsDirectory
      • 0x28ebf1:$s6: set_PotentiallyVulnerablePasswords
      • 0x2fea16:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
      SourceRuleDescriptionAuthorStrings
      C:\Users\user\AppData\Roaming\SubDir\Clienty.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
        C:\Users\user\AppData\Roaming\SubDir\Clienty.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          C:\Users\user\AppData\Roaming\SubDir\Clienty.exeMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
          • 0x28eecf:$x1: Quasar.Common.Messages
          • 0x29f1f8:$x1: Quasar.Common.Messages
          • 0x2ab7ba:$x4: Uninstalling... good bye :-(
          • 0x2acfaf:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
          C:\Users\user\AppData\Roaming\SubDir\Clienty.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
          • 0x2aad6c:$f1: FileZilla\recentservers.xml
          • 0x2aadac:$f2: FileZilla\sitemanager.xml
          • 0x2aadee:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
          • 0x2ab03a:$b1: Chrome\User Data\
          • 0x2ab090:$b1: Chrome\User Data\
          • 0x2ab368:$b2: Mozilla\Firefox\Profiles
          • 0x2ab464:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
          • 0x2fd3e8:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
          • 0x2ab5bc:$b4: Opera Software\Opera Stable\Login Data
          • 0x2ab676:$b5: YandexBrowser\User Data\
          • 0x2ab6e4:$b5: YandexBrowser\User Data\
          • 0x2ab3b8:$s4: logins.json
          • 0x2ab0ee:$a1: username_value
          • 0x2ab10c:$a2: password_value
          • 0x2ab3f8:$a3: encryptedUsername
          • 0x2fd32c:$a3: encryptedUsername
          • 0x2ab41c:$a4: encryptedPassword
          • 0x2fd34a:$a4: encryptedPassword
          • 0x2fd2c8:$a5: httpRealm
          C:\Users\user\AppData\Roaming\SubDir\Clienty.exeMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
          • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
          • 0x2ab8a4:$s3: Process already elevated.
          • 0x28ebce:$s4: get_PotentiallyVulnerablePasswords
          • 0x278c8a:$s5: GetKeyloggerLogsDirectory
          • 0x29e957:$s5: GetKeyloggerLogsDirectory
          • 0x28ebf1:$s6: set_PotentiallyVulnerablePasswords
          • 0x2fea16:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
          SourceRuleDescriptionAuthorStrings
          00000002.00000002.2185203736.0000026FF6A55000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
            00000004.00000002.4617304861.0000000002EB9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
              00000005.00000002.2199659201.000002B938AC0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
                00000002.00000002.2185070461.000000CA288A9000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
                  00000005.00000002.2199369633.000002B938880000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
                    Click to see the 16 entries
                    SourceRuleDescriptionAuthorStrings
                    0.0.mtgjyX9gHF.exe.490000.0.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
                      0.0.mtgjyX9gHF.exe.490000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                        0.0.mtgjyX9gHF.exe.490000.0.unpackMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
                        • 0x28eecf:$x1: Quasar.Common.Messages
                        • 0x29f1f8:$x1: Quasar.Common.Messages
                        • 0x2ab7ba:$x4: Uninstalling... good bye :-(
                        • 0x2acfaf:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
                        0.0.mtgjyX9gHF.exe.490000.0.unpackINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
                        • 0x2aad6c:$f1: FileZilla\recentservers.xml
                        • 0x2aadac:$f2: FileZilla\sitemanager.xml
                        • 0x2aadee:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
                        • 0x2ab03a:$b1: Chrome\User Data\
                        • 0x2ab090:$b1: Chrome\User Data\
                        • 0x2ab368:$b2: Mozilla\Firefox\Profiles
                        • 0x2ab464:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                        • 0x2fd3e8:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                        • 0x2ab5bc:$b4: Opera Software\Opera Stable\Login Data
                        • 0x2ab676:$b5: YandexBrowser\User Data\
                        • 0x2ab6e4:$b5: YandexBrowser\User Data\
                        • 0x2ab3b8:$s4: logins.json
                        • 0x2ab0ee:$a1: username_value
                        • 0x2ab10c:$a2: password_value
                        • 0x2ab3f8:$a3: encryptedUsername
                        • 0x2fd32c:$a3: encryptedUsername
                        • 0x2ab41c:$a4: encryptedPassword
                        • 0x2fd34a:$a4: encryptedPassword
                        • 0x2fd2c8:$a5: httpRealm
                        0.0.mtgjyX9gHF.exe.490000.0.unpackMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
                        • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
                        • 0x2ab8a4:$s3: Process already elevated.
                        • 0x28ebce:$s4: get_PotentiallyVulnerablePasswords
                        • 0x278c8a:$s5: GetKeyloggerLogsDirectory
                        • 0x29e957:$s5: GetKeyloggerLogsDirectory
                        • 0x28ebf1:$s6: set_PotentiallyVulnerablePasswords
                        • 0x2fea16:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>

                        AV Detection

                        barindex
                        Source: Process startedAuthor: Joe Security: Data: Command: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\mtgjyX9gHF.exe", ParentImage: C:\Users\user\Desktop\mtgjyX9gHF.exe, ParentProcessId: 3620, ParentProcessName: mtgjyX9gHF.exe, ProcessCommandLine: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" /rl HIGHEST /f, ProcessId: 2404, ProcessName: schtasks.exe

                        E-Banking Fraud

                        barindex
                        Source: Process startedAuthor: Joe Security: Data: Command: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\mtgjyX9gHF.exe", ParentImage: C:\Users\user\Desktop\mtgjyX9gHF.exe, ParentProcessId: 3620, ParentProcessName: mtgjyX9gHF.exe, ProcessCommandLine: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" /rl HIGHEST /f, ProcessId: 2404, ProcessName: schtasks.exe

                        System Summary

                        barindex
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe", ParentImage: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe, ParentProcessId: 6136, ParentProcessName: Clienty.exe, ProcessCommandLine: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" /rl HIGHEST /f, ProcessId: 6284, ProcessName: schtasks.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\mtgjyX9gHF.exe", ParentImage: C:\Users\user\Desktop\mtgjyX9gHF.exe, ParentProcessId: 3620, ParentProcessName: mtgjyX9gHF.exe, ProcessCommandLine: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" /rl HIGHEST /f, ProcessId: 2404, ProcessName: schtasks.exe

                        Stealing of Sensitive Information

                        barindex
                        Source: Process startedAuthor: Joe Security: Data: Command: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\mtgjyX9gHF.exe", ParentImage: C:\Users\user\Desktop\mtgjyX9gHF.exe, ParentProcessId: 3620, ParentProcessName: mtgjyX9gHF.exe, ProcessCommandLine: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" /rl HIGHEST /f, ProcessId: 2404, ProcessName: schtasks.exe

                        Remote Access Functionality

                        barindex
                        Source: Process startedAuthor: Joe Security: Data: Command: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\mtgjyX9gHF.exe", ParentImage: C:\Users\user\Desktop\mtgjyX9gHF.exe, ParentProcessId: 3620, ParentProcessName: mtgjyX9gHF.exe, ProcessCommandLine: "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" /rl HIGHEST /f, ProcessId: 2404, ProcessName: schtasks.exe
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-10-01T07:38:03.504328+020020355951Domain Observed Used for C2 Detected39.102.36.2094782192.168.2.649712TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-10-01T07:38:03.504328+020020276191Domain Observed Used for C2 Detected39.102.36.2094782192.168.2.649712TCP

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: mtgjyX9gHF.exeAvira: detected
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeAvira: detection malicious, Label: HEUR/AGEN.1307453
                        Source: mtgjyX9gHF.exeMalware Configuration Extractor: Quasar {"Version": "1.4.1", "Host:Port": "39.102.36.209:4782;", "SubDirectory": "SubDir", "InstallName": "Clienty.exe", "MutexName": "6d2ccfb9-4bf8-4a23-933c-5674d8e6fac2", "StartupKey": "Quasar Client Startup", "Tag": "Office04", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "MIIE9DCCAtygAwIBAgIQAJZfSV2md4GTYPNwNOg35TANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTIzMDQxNjExMTUxNloYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAt45/WV2IDnURejARa6ANVEKcE1MRG09a0F01beaKfmfzKl7ZP0EhXZgdwfKC6UL6Jyw2LZtpnu1OS+30FAYnMUHDKqP14vR1Ehmbbiwz3k4LsdOVYfOwj6+uEkPeed7xASxN0j5dC1b1OSC4CFVsT77L/rgg/yBsZ/CpwNDMdD+zUy2ddbNbj5oWlXh1cG9a1JNA6HHlW0D6rXaa1uNSvP0f9XNZnP8umF8c+e4NNRIGKbWZatjKSfuB3iwS+Jbs4rgW8H/sUDTtRH29aXmV/+DhHBn3RaSqkMhGT8KAwK1wx23rYvJ/4ZZJVbFd+fuOU0CmIwbEjEGBUS+MvxUHUWAlafgzm9tobaXYtiUPZ6IthZsqMOIo8yaJKoEYB9HX6cBDiS6cWCeycSp2aICWRqBJSLzlE/srea4gcpbDu8mO9kNL6IUTctAfv0131MSCqBFIF/tI7GEZX2xp2WCZiWB2IPuMRKfObeFkv5QdYHa3qy4qxK150JqtE+e8S6KpynfWrOs5NobOE8mMrdSvo5HbEF1QWDJJtFoTQf6dIWQB7m2fRIeKdjWQu4nHCfLiejkghNTjqiKOEc5aP62ypPZjez18JqIjzXlfmLL7uTdOdAVPo2rqlTLOnaLoX3atBoJVLSIT9WwNcXMZ69sbYBtr7426huA0Q7MFs4o7grUCAwEAAaMyMDAwHQYDVR0OBBYEFMp80NgW2J/+iOP3WvJP4L53JhahMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQENBQADggIBAG45tviqQInCqTewWS3NmUDsteYZO3eTBXDH8zwaZ1IbeZqf7rlCX5Nse4WQ9URXSGMEt+zhm9IGBPJtLzmal9pk9ITKe05XbLw+CHmlzo/4V0qlt75Oc6GcropFRYZrfD31zYj3dfYKDZYiY9cdDlpsyjK5OAaPc6cIUib1O+0S4M+IOPMpmfkdjgWTkpVRW6O5CMP5EMXTF1Cvgopm8eSn9+dYo1gLzVnSUUdUZvk8waTO3gmaUtHs5H9YZXzbKML32EAmE4AUKOJPdGxS1CpC5aQMKxRU3NOgf8kdsT55sCXi+ziAI0Y+MBPNcv7UaAqc8UiN+yLt9446s3tRAvDYQNvN0hPjQs5E3B0EY6i8A1eqXdwFQ+fn6zgDXRvazt0XNgzIPqxnXZIhiGMBEptzyVyFe8Gli/gyHVHp+lVG9Fd9nGALVLbPZ8Om52ywhG1XOuwee3PpN9g4EkxyuHXVAQjrYp5lKbBeYDpyrXi9RWYFxrYQMZ/M0709K/DEIpBzHV9suxI+xXXgwCI/Aqw0FQG1TMeNws+K4oPJrSdQzBTi+znjfIZWP18QARZPjLAXqUcTZgEDH7nKI6T2KR89xXRr2jCrSr6FqvKZq9sNhwbAVHkf2c3Z15HWJGO0EaNMreObx7Wx6gDRB19CEpMDCPEvxeplpWGwqYgL9+qo"}
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeReversingLabs: Detection: 78%
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeVirustotal: Detection: 78%Perma Link
                        Source: mtgjyX9gHF.exeReversingLabs: Detection: 78%
                        Source: mtgjyX9gHF.exeVirustotal: Detection: 78%Perma Link
                        Source: Yara matchFile source: mtgjyX9gHF.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.mtgjyX9gHF.exe.490000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000002.00000002.2185203736.0000026FF6A55000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.4617304861.0000000002EB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.2199659201.000002B938AC0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2185070461.000000CA288A9000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.2199369633.000002B938880000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2185117580.0000026FF6830000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.2199659201.000002B938AC5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.2197566283.000000FE32879000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.2152636170.00000000007B0000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2185203736.0000026FF6A50000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.2199369633.000002B938888000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.4617304861.00000000032B3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2185117580.0000026FF683F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2186712821.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.2152321586.0000000000492000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.2221194608.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: mtgjyX9gHF.exe PID: 3620, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: schtasks.exe PID: 2404, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Clienty.exe PID: 6136, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: schtasks.exe PID: 6284, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Clienty.exe PID: 4620, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe, type: DROPPED
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeJoe Sandbox ML: detected
                        Source: mtgjyX9gHF.exeJoe Sandbox ML: detected
                        Source: mtgjyX9gHF.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: unknownHTTPS traffic detected: 108.181.98.179:443 -> 192.168.2.6:49714 version: TLS 1.2
                        Source: mtgjyX9gHF.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                        Networking

                        barindex
                        Source: Network trafficSuricata IDS: 2027619 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (Quasar CnC) : 39.102.36.209:4782 -> 192.168.2.6:49712
                        Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 39.102.36.209:4782 -> 192.168.2.6:49712
                        Source: Malware configuration extractorURLs: 39.102.36.209
                        Source: Yara matchFile source: mtgjyX9gHF.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.mtgjyX9gHF.exe.490000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe, type: DROPPED
                        Source: global trafficTCP traffic: 192.168.2.6:49712 -> 39.102.36.209:4782
                        Source: Joe Sandbox ViewIP Address: 108.181.98.179 108.181.98.179
                        Source: Joe Sandbox ViewASN Name: CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtd CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtd
                        Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                        Source: unknownDNS query: name: ipwho.is
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
                        Source: unknownTCP traffic detected without corresponding DNS query: 39.102.36.209
                        Source: unknownTCP traffic detected without corresponding DNS query: 39.102.36.209
                        Source: unknownTCP traffic detected without corresponding DNS query: 39.102.36.209
                        Source: unknownTCP traffic detected without corresponding DNS query: 39.102.36.209
                        Source: unknownTCP traffic detected without corresponding DNS query: 39.102.36.209
                        Source: unknownTCP traffic detected without corresponding DNS query: 39.102.36.209
                        Source: unknownTCP traffic detected without corresponding DNS query: 39.102.36.209
                        Source: unknownTCP traffic detected without corresponding DNS query: 39.102.36.209
                        Source: unknownTCP traffic detected without corresponding DNS query: 39.102.36.209
                        Source: unknownTCP traffic detected without corresponding DNS query: 39.102.36.209
                        Source: unknownTCP traffic detected without corresponding DNS query: 39.102.36.209
                        Source: unknownTCP traffic detected without corresponding DNS query: 39.102.36.209
                        Source: unknownTCP traffic detected without corresponding DNS query: 39.102.36.209
                        Source: unknownTCP traffic detected without corresponding DNS query: 39.102.36.209
                        Source: unknownTCP traffic detected without corresponding DNS query: 39.102.36.209
                        Source: unknownTCP traffic detected without corresponding DNS query: 39.102.36.209
                        Source: unknownTCP traffic detected without corresponding DNS query: 39.102.36.209
                        Source: unknownTCP traffic detected without corresponding DNS query: 39.102.36.209
                        Source: unknownTCP traffic detected without corresponding DNS query: 39.102.36.209
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
                        Source: global trafficDNS traffic detected: DNS query: ipwho.is
                        Source: Clienty.exe, 00000004.00000002.4616262413.0000000001155000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                        Source: 77EC63BDA74BD0D0E0426DC8F80085060.4.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                        Source: Clienty.exe, 00000004.00000002.4624416684.000000001B9E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabB
                        Source: Clienty.exe, 00000004.00000002.4617304861.0000000003263000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ipwho.is
                        Source: Clienty.exe, 00000004.00000002.4617304861.00000000032B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
                        Source: mtgjyX9gHF.exe, 00000000.00000002.2186712821.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, Clienty.exe, 00000004.00000002.4617304861.0000000002EB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: mtgjyX9gHF.exe, Clienty.exe.0.drString found in binary or memory: https://api.ipify.org/
                        Source: Clienty.exe, 00000004.00000002.4617304861.0000000003249000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipwho.is
                        Source: mtgjyX9gHF.exe, Clienty.exe.0.drString found in binary or memory: https://ipwho.is/
                        Source: mtgjyX9gHF.exe, Clienty.exe.0.drString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                        Source: mtgjyX9gHF.exe, Clienty.exe.0.drString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                        Source: mtgjyX9gHF.exe, Clienty.exe.0.drString found in binary or memory: https://stackoverflow.com/q/2152978/23354sCannot
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                        Source: unknownHTTPS traffic detected: 108.181.98.179:443 -> 192.168.2.6:49714 version: TLS 1.2

                        Key, Mouse, Clipboard, Microphone and Screen Capturing

                        barindex
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\SubDir\Clienty.exeJump to behavior

                        E-Banking Fraud

                        barindex
                        Source: Yara matchFile source: mtgjyX9gHF.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.mtgjyX9gHF.exe.490000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000002.00000002.2185203736.0000026FF6A55000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.4617304861.0000000002EB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.2199659201.000002B938AC0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2185070461.000000CA288A9000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.2199369633.000002B938880000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2185117580.0000026FF6830000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.2199659201.000002B938AC5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.2197566283.000000FE32879000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.2152636170.00000000007B0000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2185203736.0000026FF6A50000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.2199369633.000002B938888000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.4617304861.00000000032B3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2185117580.0000026FF683F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2186712821.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.2152321586.0000000000492000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.2221194608.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: mtgjyX9gHF.exe PID: 3620, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: schtasks.exe PID: 2404, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Clienty.exe PID: 6136, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: schtasks.exe PID: 6284, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Clienty.exe PID: 4620, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe, type: DROPPED

                        System Summary

                        barindex
                        Source: mtgjyX9gHF.exe, type: SAMPLEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                        Source: mtgjyX9gHF.exe, type: SAMPLEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                        Source: mtgjyX9gHF.exe, type: SAMPLEMatched rule: Detects Quasar infostealer Author: ditekshen
                        Source: 0.0.mtgjyX9gHF.exe.490000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                        Source: 0.0.mtgjyX9gHF.exe.490000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                        Source: 0.0.mtgjyX9gHF.exe.490000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe, type: DROPPEDMatched rule: Detects QuasarRAT malware Author: Florian Roth
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe, type: DROPPEDMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe, type: DROPPEDMatched rule: Detects Quasar infostealer Author: ditekshen
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD341A3C6F4_2_00007FFD341A3C6F
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD341AB7FB4_2_00007FFD341AB7FB
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD341A403D4_2_00007FFD341A403D
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD341A60FB4_2_00007FFD341A60FB
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD341AB9F24_2_00007FFD341AB9F2
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD341AAB6F4_2_00007FFD341AAB6F
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD3441347E4_2_00007FFD3441347E
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD344215A04_2_00007FFD344215A0
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD344155D64_2_00007FFD344155D6
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD34438E304_2_00007FFD34438E30
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD3442FE804_2_00007FFD3442FE80
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD34419FD04_2_00007FFD34419FD0
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD3441AFDD4_2_00007FFD3441AFDD
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD3442B7E14_2_00007FFD3442B7E1
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD3442C13A4_2_00007FFD3442C13A
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD34428A0F4_2_00007FFD34428A0F
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD344192714_2_00007FFD34419271
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD3442EB294_2_00007FFD3442EB29
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD34433AF94_2_00007FFD34433AF9
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD34427C164_2_00007FFD34427C16
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD34424CFA4_2_00007FFD34424CFA
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD34424DFA4_2_00007FFD34424DFA
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD344105FC4_2_00007FFD344105FC
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD344217B04_2_00007FFD344217B0
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD344217D74_2_00007FFD344217D7
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD344217C84_2_00007FFD344217C8
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD344217EF4_2_00007FFD344217EF
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD3441000A4_2_00007FFD3441000A
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD344110D14_2_00007FFD344110D1
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD344218984_2_00007FFD34421898
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD3441115F4_2_00007FFD3441115F
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD3441621F4_2_00007FFD3441621F
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD344111F24_2_00007FFD344111F2
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD344121FA4_2_00007FFD344121FA
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD344E23914_2_00007FFD344E2391
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD344E08084_2_00007FFD344E0808
                        Source: mtgjyX9gHF.exe, 00000000.00000000.2152636170.00000000007B0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameClient.exe. vs mtgjyX9gHF.exe
                        Source: mtgjyX9gHF.exeBinary or memory string: OriginalFilenameClient.exe. vs mtgjyX9gHF.exe
                        Source: mtgjyX9gHF.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: mtgjyX9gHF.exe, type: SAMPLEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                        Source: mtgjyX9gHF.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                        Source: mtgjyX9gHF.exe, type: SAMPLEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                        Source: 0.0.mtgjyX9gHF.exe.490000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                        Source: 0.0.mtgjyX9gHF.exe.490000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                        Source: 0.0.mtgjyX9gHF.exe.490000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe, type: DROPPEDMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe, type: DROPPEDMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@10/5@1/2
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeFile created: C:\Users\user\AppData\Roaming\SubDirJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeMutant created: NULL
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:876:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5852:120:WilError_03
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeMutant created: \Sessions\1\BaseNamedObjects\Local\6d2ccfb9-4bf8-4a23-933c-5674d8e6fac2
                        Source: mtgjyX9gHF.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: mtgjyX9gHF.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: mtgjyX9gHF.exeReversingLabs: Detection: 78%
                        Source: mtgjyX9gHF.exeVirustotal: Detection: 78%
                        Source: mtgjyX9gHF.exeString found in binary or memory: HasSubValue3Conflicting item/add type
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeFile read: C:\Users\user\Desktop\mtgjyX9gHF.exeJump to behavior
                        Source: unknownProcess created: C:\Users\user\Desktop\mtgjyX9gHF.exe "C:\Users\user\Desktop\mtgjyX9gHF.exe"
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" /rl HIGHEST /f
                        Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" /rl HIGHEST /f
                        Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: unknownProcess created: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe C:\Users\user\AppData\Roaming\SubDir\Clienty.exe
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" /rl HIGHEST /fJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" /rl HIGHEST /fJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: schannel.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: mskeyprotect.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: ncryptsslp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: cryptnet.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: webio.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: cabinet.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: rasapi32.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: rasman.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: rtutils.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeSection loaded: msasn1.dllJump to behavior
                        Source: mtgjyX9gHF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                        Source: mtgjyX9gHF.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                        Source: mtgjyX9gHF.exeStatic file information: File size 3265536 > 1048576
                        Source: mtgjyX9gHF.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x31c400
                        Source: mtgjyX9gHF.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD3408D2A5 pushad ; iretd 4_2_00007FFD3408D2A6
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD341A2C02 push eax; iretd 4_2_00007FFD341A2C4D
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD3441336E push eax; ret 4_2_00007FFD3441340C
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD344E1021 push 8B48FFCCh; retf 4_2_00007FFD344E1029
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeFile created: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeJump to dropped file

                        Boot Survival

                        barindex
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" /rl HIGHEST /f

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeFile opened: C:\Users\user\Desktop\mtgjyX9gHF.exe:Zone.Identifier read attributes | deleteJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe:Zone.Identifier read attributes | deleteJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe:Zone.Identifier read attributes | deleteJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeMemory allocated: EF0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeMemory allocated: 1AA30000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeMemory allocated: 1320000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeMemory allocated: 1AE80000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeMemory allocated: 1150000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeMemory allocated: 1AE50000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD341AE5D8 rdtsc 4_2_00007FFD341AE5D8
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD341AF1F2 str ax4_2_00007FFD341AF1F2
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeWindow / User API: threadDelayed 6317Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeWindow / User API: threadDelayed 3364Jump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exe TID: 3816Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe TID: 368Thread sleep time: -27670116110564310s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe TID: 5700Thread sleep count: 6317 > 30Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe TID: 5700Thread sleep count: 3364 > 30Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe TID: 2888Thread sleep time: -30000s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe TID: 1916Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BaseBoard
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BIOS
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: Clienty.exe, 00000004.00000002.4623703825.000000001B836000.00000004.00000020.00020000.00000000.sdmp, Clienty.exe, 00000004.00000002.4624416684.000000001BA6A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                        Source: Clienty.exe, 00000004.00000002.4624416684.000000001B9E3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeCode function: 4_2_00007FFD341AE5D8 rdtsc 4_2_00007FFD341AE5D8
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeMemory allocated: page read and write | page guardJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" /rl HIGHEST /fJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" /rl HIGHEST /fJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeQueries volume information: C:\Users\user\Desktop\mtgjyX9gHF.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\mtgjyX9gHF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: mtgjyX9gHF.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.mtgjyX9gHF.exe.490000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000002.00000002.2185203736.0000026FF6A55000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.4617304861.0000000002EB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.2199659201.000002B938AC0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2185070461.000000CA288A9000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.2199369633.000002B938880000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2185117580.0000026FF6830000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.2199659201.000002B938AC5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.2197566283.000000FE32879000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.2152636170.00000000007B0000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2185203736.0000026FF6A50000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.2199369633.000002B938888000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.4617304861.00000000032B3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2185117580.0000026FF683F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2186712821.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.2152321586.0000000000492000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.2221194608.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: mtgjyX9gHF.exe PID: 3620, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: schtasks.exe PID: 2404, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Clienty.exe PID: 6136, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: schtasks.exe PID: 6284, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Clienty.exe PID: 4620, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe, type: DROPPED

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: mtgjyX9gHF.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.mtgjyX9gHF.exe.490000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000002.00000002.2185203736.0000026FF6A55000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.4617304861.0000000002EB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.2199659201.000002B938AC0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2185070461.000000CA288A9000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.2199369633.000002B938880000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2185117580.0000026FF6830000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.2199659201.000002B938AC5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.2197566283.000000FE32879000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.2152636170.00000000007B0000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2185203736.0000026FF6A50000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.2199369633.000002B938888000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.4617304861.00000000032B3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2185117580.0000026FF683F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2186712821.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.2152321586.0000000000492000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.2221194608.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: mtgjyX9gHF.exe PID: 3620, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: schtasks.exe PID: 2404, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Clienty.exe PID: 6136, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: schtasks.exe PID: 6284, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Clienty.exe PID: 4620, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe, type: DROPPED
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
                        Windows Management Instrumentation
                        1
                        Scheduled Task/Job
                        11
                        Process Injection
                        1
                        Masquerading
                        11
                        Input Capture
                        1
                        Query Registry
                        Remote Services11
                        Input Capture
                        11
                        Encrypted Channel
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault Accounts2
                        Command and Scripting Interpreter
                        1
                        DLL Side-Loading
                        1
                        Scheduled Task/Job
                        1
                        Disable or Modify Tools
                        LSASS Memory121
                        Security Software Discovery
                        Remote Desktop Protocol1
                        Archive Collected Data
                        1
                        Non-Standard Port
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain Accounts1
                        Scheduled Task/Job
                        Logon Script (Windows)1
                        DLL Side-Loading
                        51
                        Virtualization/Sandbox Evasion
                        Security Account Manager51
                        Virtualization/Sandbox Evasion
                        SMB/Windows Admin SharesData from Network Shared Drive1
                        Ingress Tool Transfer
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                        Process Injection
                        NTDS1
                        Application Window Discovery
                        Distributed Component Object ModelInput Capture2
                        Non-Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                        Hidden Files and Directories
                        LSA Secrets1
                        System Network Configuration Discovery
                        SSHKeylogging113
                        Application Layer Protocol
                        Scheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        Obfuscated Files or Information
                        Cached Domain Credentials23
                        System Information Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                        DLL Side-Loading
                        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        mtgjyX9gHF.exe79%ReversingLabsByteCode-MSIL.Backdoor.Quasar
                        mtgjyX9gHF.exe78%VirustotalBrowse
                        mtgjyX9gHF.exe100%AviraHEUR/AGEN.1307453
                        mtgjyX9gHF.exe100%Joe Sandbox ML
                        SourceDetectionScannerLabelLink
                        C:\Users\user\AppData\Roaming\SubDir\Clienty.exe100%AviraHEUR/AGEN.1307453
                        C:\Users\user\AppData\Roaming\SubDir\Clienty.exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Roaming\SubDir\Clienty.exe79%ReversingLabsByteCode-MSIL.Backdoor.Quasar
                        C:\Users\user\AppData\Roaming\SubDir\Clienty.exe78%VirustotalBrowse
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        ipwho.is0%VirustotalBrowse
                        SourceDetectionScannerLabelLink
                        https://api.ipify.org/0%URL Reputationsafe
                        https://api.ipify.org/0%URL Reputationsafe
                        https://stackoverflow.com/q/14436606/233540%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                        https://stackoverflow.com/q/11564914/23354;0%URL Reputationsafe
                        https://stackoverflow.com/q/2152978/23354sCannot0%VirustotalBrowse
                        http://schemas.datacontract.org/2004/07/0%VirustotalBrowse
                        https://ipwho.is0%VirustotalBrowse
                        http://ipwho.is0%VirustotalBrowse
                        39.102.36.2091%VirustotalBrowse
                        https://ipwho.is/0%VirustotalBrowse
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        ipwho.is
                        108.181.98.179
                        truefalseunknown
                        NameMaliciousAntivirus DetectionReputation
                        39.102.36.209trueunknown
                        https://ipwho.is/falseunknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://api.ipify.org/mtgjyX9gHF.exe, Clienty.exe.0.drfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://stackoverflow.com/q/14436606/23354mtgjyX9gHF.exe, Clienty.exe.0.drfalse
                        • URL Reputation: safe
                        unknown
                        https://stackoverflow.com/q/2152978/23354sCannotmtgjyX9gHF.exe, Clienty.exe.0.drfalseunknown
                        http://schemas.datacontract.org/2004/07/Clienty.exe, 00000004.00000002.4617304861.00000000032B3000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namemtgjyX9gHF.exe, 00000000.00000002.2186712821.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, Clienty.exe, 00000004.00000002.4617304861.0000000002EB9000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://ipwho.isClienty.exe, 00000004.00000002.4617304861.0000000003263000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                        https://stackoverflow.com/q/11564914/23354;mtgjyX9gHF.exe, Clienty.exe.0.drfalse
                        • URL Reputation: safe
                        unknown
                        https://ipwho.isClienty.exe, 00000004.00000002.4617304861.0000000003249000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        39.102.36.209
                        unknownChina
                        37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdtrue
                        108.181.98.179
                        ipwho.isCanada
                        852ASN852CAfalse
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1523151
                        Start date and time:2024-10-01 07:37:00 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 8m 2s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:10
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:mtgjyX9gHF.exe
                        renamed because original name is a hash value
                        Original Sample Name:641cb02c429feb106094750765d0d6af.exe
                        Detection:MAL
                        Classification:mal100.troj.spyw.evad.winEXE@10/5@1/2
                        EGA Information:
                        • Successful, ratio: 66.7%
                        HCA Information:
                        • Successful, ratio: 93%
                        • Number of executed functions: 71
                        • Number of non-executed functions: 17
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                        • Excluded IPs from analysis (whitelisted): 93.184.221.240
                        • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com
                        • Execution Graph export aborted for target Clienty.exe, PID 4620 because it is empty
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                        TimeTypeDescription
                        01:38:01API Interceptor12621463x Sleep call for process: Clienty.exe modified
                        07:38:00Task SchedulerRun new task: Quasar Client Startup path: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        108.181.98.179http://1d807473.flca.pages.dev/Get hashmaliciousTechSupportScamBrowse
                          https://f0mlxe0jneh1.pages.dev/Get hashmaliciousUnknownBrowse
                            http://yzkgxjyz0y4417anol.pages.dev/Get hashmaliciousUnknownBrowse
                              https://312d5c44.flca.pages.dev/Get hashmaliciousTechSupportScamBrowse
                                https://e95lq1vmgxojxrxkv7.pages.dev/Get hashmaliciousUnknownBrowse
                                  http://2204three.pages.dev/Get hashmaliciousTechSupportScamBrowse
                                    IMKssbDprn.exeGet hashmaliciousUnknownBrowse
                                      CVSIyqGKKK.exeGet hashmaliciousUnknownBrowse
                                        rVAKIFBANK-#U00d6demeonaymakbuzu20240826.pdf.exeGet hashmaliciousQuasarBrowse
                                          https://www.dropbox.com/scl/fi/2u0ns17aqf2nkkout3i4e/Wion-Setup.exe?rlkey=bczprnlv9lpsjsrcm2mwnqhrh&st=tkdq1g8n&dl=1Get hashmaliciousUnknownBrowse
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            ipwho.isSecuriteInfo.com.BackDoor.QuasarNET.3.14065.23993.exeGet hashmaliciousQuasarBrowse
                                            • 195.201.57.90
                                            http://ufvskbzrquea.pages.dev/Get hashmaliciousTechSupportScamBrowse
                                            • 195.201.57.90
                                            http://serviceappinfms12.pages.dev/Get hashmaliciousTechSupportScamBrowse
                                            • 195.201.57.90
                                            http://1d807473.flca.pages.dev/Get hashmaliciousTechSupportScamBrowse
                                            • 195.201.57.90
                                            https://f0mlxe0jneh1.pages.dev/Get hashmaliciousUnknownBrowse
                                            • 195.201.57.90
                                            https://bmrnyehuivryuaq.pages.dev/Get hashmaliciousUnknownBrowse
                                            • 195.201.57.90
                                            https://jltnm7ux9ko.pages.dev/Get hashmaliciousUnknownBrowse
                                            • 195.201.57.90
                                            http://irxpolrqchi.pages.dev/Get hashmaliciousUnknownBrowse
                                            • 195.201.57.90
                                            http://v1bwdoexd1lj9stgmwip.pages.dev/Get hashmaliciousUnknownBrowse
                                            • 195.201.57.90
                                            http://yzkgxjyz0y4417anol.pages.dev/Get hashmaliciousUnknownBrowse
                                            • 108.181.98.179
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtde4wLi4tmmo.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                                            • 47.120.3.3
                                            https://ebaite.cn/Get hashmaliciousUnknownBrowse
                                            • 120.25.112.99
                                            SecuriteInfo.com.FileRepMalware.23518.16980.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                                            • 106.14.141.209
                                            d3r1KVj317.exeGet hashmaliciousUnknownBrowse
                                            • 112.74.185.5
                                            http://aa5aa5aa5aa5aa44.app/Get hashmaliciousUnknownBrowse
                                            • 59.82.132.217
                                            http://hbyczyz.com/xrrGet hashmaliciousUnknownBrowse
                                            • 47.108.5.198
                                            http://www.tpckn.app/Get hashmaliciousUnknownBrowse
                                            • 203.107.62.140
                                            http://alibinaadi.com/.well-known/alibaba/Alibaba/index.phpGet hashmaliciousUnknownBrowse
                                            • 59.82.33.225
                                            cjg7obu8xR.exeGet hashmaliciousUnknownBrowse
                                            • 112.74.185.5
                                            cjg7obu8xR.exeGet hashmaliciousUnknownBrowse
                                            • 112.74.185.5
                                            ASN852CAKYwOaWhyl6.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                            • 108.181.20.39
                                            TJWbSGBK0I.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                            • 108.181.20.39
                                            Cr4745ElZg.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                            • 108.181.20.39
                                            SecuriteInfo.com.Linux.Siggen.9999.28931.8128.elfGet hashmaliciousMiraiBrowse
                                            • 161.187.154.36
                                            SecuriteInfo.com.Linux.Siggen.9999.30976.5557.elfGet hashmaliciousMiraiBrowse
                                            • 209.52.94.129
                                            http://1d807473.flca.pages.dev/Get hashmaliciousTechSupportScamBrowse
                                            • 108.181.98.179
                                            https://f0mlxe0jneh1.pages.dev/Get hashmaliciousUnknownBrowse
                                            • 108.181.98.179
                                            http://yzkgxjyz0y4417anol.pages.dev/Get hashmaliciousUnknownBrowse
                                            • 108.181.98.179
                                            https://312d5c44.flca.pages.dev/Get hashmaliciousTechSupportScamBrowse
                                            • 108.181.98.179
                                            https://e95lq1vmgxojxrxkv7.pages.dev/Get hashmaliciousUnknownBrowse
                                            • 108.181.98.179
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            3b5074b1b5d032e5620f69f9f700ff0ePO_9876563647-FLOWTRONIX (FT)UUE.exeGet hashmaliciousAgentTeslaBrowse
                                            • 108.181.98.179
                                            2zYP8qOYmJ.exeGet hashmaliciousUnknownBrowse
                                            • 108.181.98.179
                                            RFQ-00032035.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 108.181.98.179
                                            RFQ -SCHOTTEL Type SRP200.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 108.181.98.179
                                            Purchase Order 007823-PO# 005307.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 108.181.98.179
                                            2zYP8qOYmJ.exeGet hashmaliciousUnknownBrowse
                                            • 108.181.98.179
                                            invoice.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 108.181.98.179
                                            file.exeGet hashmaliciousUnknownBrowse
                                            • 108.181.98.179
                                            file.exeGet hashmaliciousUnknownBrowse
                                            • 108.181.98.179
                                            file.exeGet hashmaliciousUnknownBrowse
                                            • 108.181.98.179
                                            No context
                                            Process:C:\Users\user\AppData\Roaming\SubDir\Clienty.exe
                                            File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                            Category:dropped
                                            Size (bytes):71954
                                            Entropy (8bit):7.996617769952133
                                            Encrypted:true
                                            SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                            MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                            SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                            SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                            SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                            Malicious:false
                                            Reputation:high, very likely benign file
                                            Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                            Process:C:\Users\user\AppData\Roaming\SubDir\Clienty.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):328
                                            Entropy (8bit):3.150184159866505
                                            Encrypted:false
                                            SSDEEP:6:kKhmYD9UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:LaDnLNkPlE99SNxAhUe/3
                                            MD5:CDABDA8575769329515E7C9FDB329C14
                                            SHA1:467543A746EE7A00F88A81BF33A905CEA6E8EE87
                                            SHA-256:D1974614B93D06B0F140473953BA2F145D550EB3DAA03BB40348E8855B10E1B8
                                            SHA-512:F5E16CACD49F0C1B9E4467BD4E1EA8A5E9B7F2ADC90A30FCFD4BFF1E89296902561F9495AAB374825DAF2855100B0D84BC868E9D7EDB1ACFC96AE7C15A1A0EA2
                                            Malicious:false
                                            Reputation:low
                                            Preview:p...... ................(....................................................... ........G..@.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                            Process:C:\Users\user\AppData\Roaming\SubDir\Clienty.exe
                                            File Type:CSV text
                                            Category:dropped
                                            Size (bytes):1281
                                            Entropy (8bit):5.370111951859942
                                            Encrypted:false
                                            SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
                                            MD5:12C61586CD59AA6F2A21DF30501F71BD
                                            SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
                                            SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
                                            SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
                                            Malicious:false
                                            Reputation:moderate, very likely benign file
                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                            Process:C:\Users\user\Desktop\mtgjyX9gHF.exe
                                            File Type:CSV text
                                            Category:dropped
                                            Size (bytes):1281
                                            Entropy (8bit):5.370111951859942
                                            Encrypted:false
                                            SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
                                            MD5:12C61586CD59AA6F2A21DF30501F71BD
                                            SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
                                            SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
                                            SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
                                            Malicious:true
                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                            Process:C:\Users\user\Desktop\mtgjyX9gHF.exe
                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Category:dropped
                                            Size (bytes):3265536
                                            Entropy (8bit):6.084189771990339
                                            Encrypted:false
                                            SSDEEP:49152:TIMa8I9WtxU/Pom7ZlHMgK+YISxoJXFacCbG1JoQoGdLTHHB72eh2NT:TI38I9WtxU/Pom7ZlHMg8ISxoJXEcC4
                                            MD5:641CB02C429FEB106094750765D0D6AF
                                            SHA1:DB5BE32E7EF7C5E93B7EF4F06BD6854F3A393CBD
                                            SHA-256:4A04DA4D657C3C6BC45EA42CFEF67039CD51173159CE7B707467F69146E086F9
                                            SHA-512:8C4BAA95D860C22E0EDE96DA48136DB417F61EC6B19FCCB847D0317F775E77D1E299F80E2F19230055FABF9E91EC8DBB2D90B055DDEB75B4C714C971AFBF37B9
                                            Malicious:true
                                            Yara Hits:
                                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe, Author: Joe Security
                                            • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe, Author: Joe Security
                                            • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe, Author: Florian Roth
                                            • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe, Author: ditekSHen
                                            • Rule: MALWARE_Win_QuasarStealer, Description: Detects Quasar infostealer, Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe, Author: ditekshen
                                            Antivirus:
                                            • Antivirus: Avira, Detection: 100%
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            • Antivirus: ReversingLabs, Detection: 79%
                                            • Antivirus: Virustotal, Detection: 78%, Browse
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....>d..................1...........1.. ........@.. .......................@2...........@.................................P.1.K.....2...................... 2...................................................... ............... ..H............text.....1.. ....1................. ..`.rsrc.........2.......1.............@..@.reloc....... 2.......1.............@..B..................1.....H...........@............k..p............................................0..M....... ....(.....(...........s....(....(...........s....o....(.....(....s....(....*....0..8.......(....(0....s....%.o....%.o....%.o....(....&..&...(.....*........--..........00.......0..@........o....,7(....(0....s....%.o....%.o....%.o....(....&..&...(.....*........-5..........08......f~v...,.~....(....(....*.*v.(.....s....}.....s....}....*r..(......(.....(......(....*....0..L........{....r...po....
                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Entropy (8bit):6.084189771990339
                                            TrID:
                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                            • Win32 Executable (generic) a (10002005/4) 49.75%
                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                            • Windows Screen Saver (13104/52) 0.07%
                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                            File name:mtgjyX9gHF.exe
                                            File size:3'265'536 bytes
                                            MD5:641cb02c429feb106094750765d0d6af
                                            SHA1:db5be32e7ef7c5e93b7ef4f06bd6854f3a393cbd
                                            SHA256:4a04da4d657c3c6bc45ea42cfef67039cd51173159ce7b707467f69146e086f9
                                            SHA512:8c4baa95d860c22e0ede96da48136db417f61ec6b19fccb847d0317f775e77d1e299f80e2f19230055fabf9e91ec8dbb2d90b055ddeb75b4c714c971afbf37b9
                                            SSDEEP:49152:TIMa8I9WtxU/Pom7ZlHMgK+YISxoJXFacCbG1JoQoGdLTHHB72eh2NT:TI38I9WtxU/Pom7ZlHMg8ISxoJXEcC4
                                            TLSH:38E54A1437F85F23E1BBE27395B0041667F0EC2AB3A3FB5B6191677A1C53B505801AAB
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....>d..................1...........1.. ........@.. .......................@2...........@................................
                                            Icon Hash:00928e8e8686b000
                                            Entrypoint:0x71e39e
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                            Time Stamp:0x643E9305 [Tue Apr 18 12:54:29 2023 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                            Instruction
                                            jmp dword ptr [00402000h]
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x31e3500x4b.text
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x3200000xa93.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x3220000xc.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x20000x31c3a40x31c4007f436c8c99e111aa851e51e5972669bdunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rsrc0x3200000xa930xc00cdeae95ac72e9e58017d2bcc89d2fbeaFalse0.36328125data4.653972105845318IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0x3220000xc0x2003c0195728bee9aba3505b4138467aef0False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_VERSION0x3200a00x31cdata0.4484924623115578
                                            RT_MANIFEST0x3203bc0x6d7XML 1.0 document, Unicode text, UTF-8 (with BOM) text0.40319817247287265
                                            DLLImport
                                            mscoree.dll_CorExeMain
                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                            2024-10-01T07:38:03.504328+02002027619ET MALWARE Observed Malicious SSL Cert (Quasar CnC)139.102.36.2094782192.168.2.649712TCP
                                            2024-10-01T07:38:03.504328+02002035595ET MALWARE Generic AsyncRAT Style SSL Cert139.102.36.2094782192.168.2.649712TCP
                                            TimestampSource PortDest PortSource IPDest IP
                                            Oct 1, 2024 07:38:02.553545952 CEST497124782192.168.2.639.102.36.209
                                            Oct 1, 2024 07:38:02.558425903 CEST47824971239.102.36.209192.168.2.6
                                            Oct 1, 2024 07:38:02.558514118 CEST497124782192.168.2.639.102.36.209
                                            Oct 1, 2024 07:38:02.587765932 CEST497124782192.168.2.639.102.36.209
                                            Oct 1, 2024 07:38:02.592706919 CEST47824971239.102.36.209192.168.2.6
                                            Oct 1, 2024 07:38:03.493834019 CEST47824971239.102.36.209192.168.2.6
                                            Oct 1, 2024 07:38:03.493907928 CEST47824971239.102.36.209192.168.2.6
                                            Oct 1, 2024 07:38:03.493964911 CEST497124782192.168.2.639.102.36.209
                                            Oct 1, 2024 07:38:03.499317884 CEST497124782192.168.2.639.102.36.209
                                            Oct 1, 2024 07:38:03.504328012 CEST47824971239.102.36.209192.168.2.6
                                            Oct 1, 2024 07:38:03.828986883 CEST47824971239.102.36.209192.168.2.6
                                            Oct 1, 2024 07:38:03.869290113 CEST497124782192.168.2.639.102.36.209
                                            Oct 1, 2024 07:38:05.139359951 CEST49714443192.168.2.6108.181.98.179
                                            Oct 1, 2024 07:38:05.139410973 CEST44349714108.181.98.179192.168.2.6
                                            Oct 1, 2024 07:38:05.139482975 CEST49714443192.168.2.6108.181.98.179
                                            Oct 1, 2024 07:38:05.140501976 CEST49714443192.168.2.6108.181.98.179
                                            Oct 1, 2024 07:38:05.140520096 CEST44349714108.181.98.179192.168.2.6
                                            Oct 1, 2024 07:38:05.822007895 CEST44349714108.181.98.179192.168.2.6
                                            Oct 1, 2024 07:38:05.822084904 CEST49714443192.168.2.6108.181.98.179
                                            Oct 1, 2024 07:38:05.827241898 CEST49714443192.168.2.6108.181.98.179
                                            Oct 1, 2024 07:38:05.827263117 CEST44349714108.181.98.179192.168.2.6
                                            Oct 1, 2024 07:38:05.827569008 CEST44349714108.181.98.179192.168.2.6
                                            Oct 1, 2024 07:38:05.832910061 CEST49714443192.168.2.6108.181.98.179
                                            Oct 1, 2024 07:38:05.875412941 CEST44349714108.181.98.179192.168.2.6
                                            Oct 1, 2024 07:38:05.966722965 CEST44349714108.181.98.179192.168.2.6
                                            Oct 1, 2024 07:38:05.966795921 CEST44349714108.181.98.179192.168.2.6
                                            Oct 1, 2024 07:38:05.966844082 CEST49714443192.168.2.6108.181.98.179
                                            Oct 1, 2024 07:38:06.124419928 CEST49714443192.168.2.6108.181.98.179
                                            Oct 1, 2024 07:38:06.403863907 CEST497124782192.168.2.639.102.36.209
                                            Oct 1, 2024 07:38:06.408771992 CEST47824971239.102.36.209192.168.2.6
                                            Oct 1, 2024 07:38:06.408874989 CEST497124782192.168.2.639.102.36.209
                                            Oct 1, 2024 07:38:06.413722038 CEST47824971239.102.36.209192.168.2.6
                                            Oct 1, 2024 07:38:07.011307001 CEST47824971239.102.36.209192.168.2.6
                                            Oct 1, 2024 07:38:07.056866884 CEST497124782192.168.2.639.102.36.209
                                            Oct 1, 2024 07:38:07.313723087 CEST47824971239.102.36.209192.168.2.6
                                            Oct 1, 2024 07:38:07.369294882 CEST497124782192.168.2.639.102.36.209
                                            Oct 1, 2024 07:38:32.322472095 CEST497124782192.168.2.639.102.36.209
                                            Oct 1, 2024 07:38:32.327352047 CEST47824971239.102.36.209192.168.2.6
                                            Oct 1, 2024 07:38:57.338176012 CEST497124782192.168.2.639.102.36.209
                                            Oct 1, 2024 07:38:57.343029022 CEST47824971239.102.36.209192.168.2.6
                                            Oct 1, 2024 07:39:22.359682083 CEST497124782192.168.2.639.102.36.209
                                            Oct 1, 2024 07:39:22.364665031 CEST47824971239.102.36.209192.168.2.6
                                            Oct 1, 2024 07:39:47.543735027 CEST497124782192.168.2.639.102.36.209
                                            Oct 1, 2024 07:39:47.548641920 CEST47824971239.102.36.209192.168.2.6
                                            Oct 1, 2024 07:40:12.653598070 CEST497124782192.168.2.639.102.36.209
                                            Oct 1, 2024 07:40:13.067538023 CEST47824971239.102.36.209192.168.2.6
                                            Oct 1, 2024 07:40:38.072738886 CEST497124782192.168.2.639.102.36.209
                                            Oct 1, 2024 07:40:38.077682972 CEST47824971239.102.36.209192.168.2.6
                                            Oct 1, 2024 07:41:03.244544029 CEST497124782192.168.2.639.102.36.209
                                            Oct 1, 2024 07:41:03.256107092 CEST47824971239.102.36.209192.168.2.6
                                            Oct 1, 2024 07:41:28.432189941 CEST497124782192.168.2.639.102.36.209
                                            Oct 1, 2024 07:41:28.437103033 CEST47824971239.102.36.209192.168.2.6
                                            Oct 1, 2024 07:41:53.447751999 CEST497124782192.168.2.639.102.36.209
                                            Oct 1, 2024 07:41:53.452769995 CEST47824971239.102.36.209192.168.2.6
                                            TimestampSource PortDest PortSource IPDest IP
                                            Oct 1, 2024 07:38:05.127619982 CEST5703053192.168.2.61.1.1.1
                                            Oct 1, 2024 07:38:05.135721922 CEST53570301.1.1.1192.168.2.6
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Oct 1, 2024 07:38:05.127619982 CEST192.168.2.61.1.1.10xbd4aStandard query (0)ipwho.isA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Oct 1, 2024 07:38:05.135721922 CEST1.1.1.1192.168.2.60xbd4aNo error (0)ipwho.is108.181.98.179A (IP address)IN (0x0001)false
                                            • ipwho.is
                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.649714108.181.98.1794436136C:\Users\user\AppData\Roaming\SubDir\Clienty.exe
                                            TimestampBytes transferredDirectionData
                                            2024-10-01 05:38:05 UTC150OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0
                                            Host: ipwho.is
                                            Connection: Keep-Alive
                                            2024-10-01 05:38:05 UTC223INHTTP/1.1 200 OK
                                            Date: Tue, 01 Oct 2024 05:38:05 GMT
                                            Content-Type: application/json; charset=utf-8
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            Server: ipwhois
                                            Access-Control-Allow-Headers: *
                                            X-Robots-Tag: noindex
                                            2024-10-01 05:38:05 UTC1019INData Raw: 33 65 66 0d 0a 7b 0a 20 20 20 20 22 41 62 6f 75 74 20 55 73 22 3a 20 22 68 74 74 70 73 3a 5c 2f 5c 2f 69 70 77 68 6f 69 73 2e 69 6f 22 2c 0a 20 20 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 20 20 22 73 75 63 63 65 73 73 22 3a 20 74 72 75 65 2c 0a 20 20 20 20 22 74 79 70 65 22 3a 20 22 49 50 76 34 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 22 3a 20 22 4e 6f 72 74 68 20 41 6d 65 72 69 63 61 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 5f 63 6f 64 65 22 3a 20 22 4e 41 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 5f 63 6f 64 65 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72
                                            Data Ascii: 3ef{ "About Us": "https:\/\/ipwhois.io", "ip": "8.46.123.33", "success": true, "type": "IPv4", "continent": "North America", "continent_code": "NA", "country": "United States", "country_code": "US", "region": "New Yor


                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:01:37:55
                                            Start date:01/10/2024
                                            Path:C:\Users\user\Desktop\mtgjyX9gHF.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Users\user\Desktop\mtgjyX9gHF.exe"
                                            Imagebase:0x490000
                                            File size:3'265'536 bytes
                                            MD5 hash:641CB02C429FEB106094750765D0D6AF
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000000.2152636170.00000000007B0000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.2186712821.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000000.2152321586.0000000000492000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:true

                                            Target ID:2
                                            Start time:01:37:58
                                            Start date:01/10/2024
                                            Path:C:\Windows\System32\schtasks.exe
                                            Wow64 process (32bit):false
                                            Commandline:"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" /rl HIGHEST /f
                                            Imagebase:0x7ff6d2070000
                                            File size:235'008 bytes
                                            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000002.00000002.2185203736.0000026FF6A55000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000002.00000002.2185070461.000000CA288A9000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000002.00000002.2185117580.0000026FF6830000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000002.00000002.2185203736.0000026FF6A50000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000002.00000002.2185117580.0000026FF683F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:high
                                            Has exited:true

                                            Target ID:3
                                            Start time:01:37:58
                                            Start date:01/10/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff66e660000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:4
                                            Start time:01:37:59
                                            Start date:01/10/2024
                                            Path:C:\Users\user\AppData\Roaming\SubDir\Clienty.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Users\user\AppData\Roaming\SubDir\Clienty.exe"
                                            Imagebase:0x8d0000
                                            File size:3'265'536 bytes
                                            MD5 hash:641CB02C429FEB106094750765D0D6AF
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000004.00000002.4617304861.0000000002EB9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000004.00000002.4617304861.00000000032B3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe, Author: Joe Security
                                            • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe, Author: Joe Security
                                            • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe, Author: Florian Roth
                                            • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe, Author: ditekSHen
                                            • Rule: MALWARE_Win_QuasarStealer, Description: Detects Quasar infostealer, Source: C:\Users\user\AppData\Roaming\SubDir\Clienty.exe, Author: ditekshen
                                            Antivirus matches:
                                            • Detection: 100%, Avira
                                            • Detection: 100%, Joe Sandbox ML
                                            • Detection: 79%, ReversingLabs
                                            • Detection: 78%, Virustotal, Browse
                                            Reputation:low
                                            Has exited:false

                                            Target ID:5
                                            Start time:01:38:00
                                            Start date:01/10/2024
                                            Path:C:\Windows\System32\schtasks.exe
                                            Wow64 process (32bit):false
                                            Commandline:"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" /rl HIGHEST /f
                                            Imagebase:0x7ff6d2070000
                                            File size:235'008 bytes
                                            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000005.00000002.2199659201.000002B938AC0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000005.00000002.2199369633.000002B938880000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000005.00000002.2199659201.000002B938AC5000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000005.00000002.2197566283.000000FE32879000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000005.00000002.2199369633.000002B938888000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:high
                                            Has exited:true

                                            Target ID:6
                                            Start time:01:38:00
                                            Start date:01/10/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff66e660000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:7
                                            Start time:01:38:00
                                            Start date:01/10/2024
                                            Path:C:\Users\user\AppData\Roaming\SubDir\Clienty.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Users\user\AppData\Roaming\SubDir\Clienty.exe
                                            Imagebase:0x800000
                                            File size:3'265'536 bytes
                                            MD5 hash:641CB02C429FEB106094750765D0D6AF
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000007.00000002.2221194608.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:true

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:18.6%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:10
                                              Total number of Limit Nodes:0
                                              execution_graph 2181 7ffd341b3525 2182 7ffd341b3531 2181->2182 2183 7ffd341b3571 DeleteFileW 2181->2183 2185 7ffd341b3616 2183->2185 2173 7ffd341b3569 2174 7ffd341b3571 DeleteFileW 2173->2174 2176 7ffd341b3616 2174->2176 2177 7ffd341b206a 2178 7ffd341b3580 DeleteFileW 2177->2178 2180 7ffd341b3616 2178->2180

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 183 7ffd341b3525-7ffd341b352f 184 7ffd341b3571-7ffd341b35d8 183->184 185 7ffd341b3531-7ffd341b3562 183->185 191 7ffd341b35da-7ffd341b35df 184->191 192 7ffd341b35e2-7ffd341b3614 DeleteFileW 184->192 191->192 193 7ffd341b3616 192->193 194 7ffd341b361c-7ffd341b364a 192->194 193->194
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2189516930.00007FFD341B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341B0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ffd341b0000_mtgjyX9gHF.jbxd
                                              Similarity
                                              • API ID: DeleteFile
                                              • String ID:
                                              • API String ID: 4033686569-0
                                              • Opcode ID: 1a065ca52beb1ef6bf62af5153e935b091aea30dc438db42650642ef852b503e
                                              • Instruction ID: 6f3e59e128a425ae080986765b1d252f3281b76adaefc8178608bd272c32dc4f
                                              • Opcode Fuzzy Hash: 1a065ca52beb1ef6bf62af5153e935b091aea30dc438db42650642ef852b503e
                                              • Instruction Fuzzy Hash: CD41053290CB5C8FDB19DF6888596E97FF0FF56310F04826BD049D7692DB68A809C791

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 196 7ffd341b3569-7ffd341b35d8 201 7ffd341b35da-7ffd341b35df 196->201 202 7ffd341b35e2-7ffd341b3614 DeleteFileW 196->202 201->202 203 7ffd341b3616 202->203 204 7ffd341b361c-7ffd341b364a 202->204 203->204
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2189516930.00007FFD341B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341B0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ffd341b0000_mtgjyX9gHF.jbxd
                                              Similarity
                                              • API ID: DeleteFile
                                              • String ID:
                                              • API String ID: 4033686569-0
                                              • Opcode ID: 1a670805a6e5f5925cb18c7f75573f709f4198430047cf2b3a00d9ef335d2e7e
                                              • Instruction ID: 5b2e8eeaa864e24d9dcd0917710693e2eeabf0efa3f5f2d947e2bba79bef1da1
                                              • Opcode Fuzzy Hash: 1a670805a6e5f5925cb18c7f75573f709f4198430047cf2b3a00d9ef335d2e7e
                                              • Instruction Fuzzy Hash: 1631D03190CB5C8FDB19DB9888596E9BBF0FF66320F04426BD049D3292DB75A815CB91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 206 7ffd341b206a-7ffd341b35d8 210 7ffd341b35da-7ffd341b35df 206->210 211 7ffd341b35e2-7ffd341b3614 DeleteFileW 206->211 210->211 212 7ffd341b3616 211->212 213 7ffd341b361c-7ffd341b364a 211->213 212->213
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2189516930.00007FFD341B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341B0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ffd341b0000_mtgjyX9gHF.jbxd
                                              Similarity
                                              • API ID: DeleteFile
                                              • String ID:
                                              • API String ID: 4033686569-0
                                              • Opcode ID: 51d8d171a0d4411c9dc2cff336b178e49125ad0cc31b8f74702efd9713a53df8
                                              • Instruction ID: bdcac2db6bbe25de14207623dbd9b5abd26c97ce0cf396bb4275131c34f8a3b2
                                              • Opcode Fuzzy Hash: 51d8d171a0d4411c9dc2cff336b178e49125ad0cc31b8f74702efd9713a53df8
                                              • Instruction Fuzzy Hash: D431C131908A1C9FDB58DF98C449AF9BBE0FF69321F00822FD04AD3651DF74A8168B91

                                              Execution Graph

                                              Execution Coverage:6.3%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:8
                                              Total number of Limit Nodes:1
                                              execution_graph 57626 7ffd341a3569 57627 7ffd341a3571 DeleteFileW 57626->57627 57629 7ffd341a3616 57627->57629 57630 7ffd3441e6f9 57632 7ffd3441e70f 57630->57632 57631 7ffd3441e7bb 57632->57631 57633 7ffd3441e8b4 SetWindowsHookExW 57632->57633 57634 7ffd3441e8f6 57633->57634
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4631372092.00007FFD344E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD344E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd344e0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 004$ 004$ 004$ 004$ 504$ 504$ 504$(%04$(%04$(%04$(%04$(*04$(*04$(*04$(*04$(R04$(R04$(R04$(Z04$(Z04$(Z04$0B04$0B04$0B04$0B04$0Q04$0Q04$0Q04$0Q04$8A04$8A04$8A04$8A04$8H04$8H04$8H04$8H04$8]04$8]04$8]04$8]04$H$H.04$H.04$H.04$H.04$H104$H104$H104$H104$P-04$P-04$P-04$P-04$P804$P804$P804$P804$X,04$X,04$X,04$X,04$X704$X704$X704$XC04$XC04$XC04$XC04$XG04$XG04$XG04$`;04$`;04$`;04$`;04$p/04$p/04$p/04$p/04$p>04$p>04$p>04$x"04$x"04$x"04$x"04$x'04$x'04$x'04$x'04$04$04$04$04$<04$<04$<04$<04$H04$H04$H04$H04$I04$I04$I04$I04$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4$W+4
                                              • API String ID: 0-2354076621
                                              • Opcode ID: f74a79a1971048de3c4801911377f3df9f42c8b15ad098c3c71045fb8d67de83
                                              • Instruction ID: 29aa3507b300790f074bff2bd94e959198b704f5fd29875d2a3aa58bbd47b886
                                              • Opcode Fuzzy Hash: f74a79a1971048de3c4801911377f3df9f42c8b15ad098c3c71045fb8d67de83
                                              • Instruction Fuzzy Hash: FC73C852B19D4B0FFBE5962C04B523653C2EFDA640B5E41BAD55EC32CAED6CEC826340

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1337 7ffd34419fd0-7ffd3441a018 1341 7ffd3441a5be-7ffd3441a5d0 1337->1341 1342 7ffd3441a01e-7ffd3441a030 1337->1342 1342->1341 1344 7ffd3441a036-7ffd3441a06f 1342->1344 1344->1341 1348 7ffd3441a075-7ffd3441a0b6 1344->1348 1352 7ffd3441a168-7ffd3441a17b 1348->1352 1353 7ffd3441a0bc-7ffd3441a0d4 1348->1353 1358 7ffd3441a17d-7ffd3441a19e 1352->1358 1359 7ffd3441a1d0 1352->1359 1356 7ffd3441a0da-7ffd3441a0fa 1353->1356 1357 7ffd3441a15c-7ffd3441a162 1353->1357 1356->1357 1370 7ffd3441a0fc-7ffd3441a10e 1356->1370 1357->1352 1357->1353 1365 7ffd3441a1a0-7ffd3441a1c7 1358->1365 1366 7ffd3441a1c9-7ffd3441a1ce 1358->1366 1360 7ffd3441a1d2-7ffd3441a1d7 1359->1360 1361 7ffd3441a21e-7ffd3441a241 1360->1361 1362 7ffd3441a1d9-7ffd3441a1e0 1360->1362 1371 7ffd3441a337-7ffd3441a343 1361->1371 1372 7ffd3441a247-7ffd3441a26f 1361->1372 1367 7ffd3441a1e7-7ffd3441a201 1362->1367 1365->1360 1366->1360 1367->1361 1376 7ffd3441a203-7ffd3441a21c 1367->1376 1370->1357 1379 7ffd3441a110-7ffd3441a114 1370->1379 1371->1341 1375 7ffd3441a349-7ffd3441a35e 1371->1375 1384 7ffd3441a275-7ffd3441a290 1372->1384 1385 7ffd3441a32b-7ffd3441a331 1372->1385 1375->1341 1376->1361 1382 7ffd3441a5d1-7ffd3441a673 1379->1382 1383 7ffd3441a11a-7ffd3441a12f 1379->1383 1395 7ffd3441a785-7ffd3441a791 1382->1395 1396 7ffd3441a679-7ffd3441a67b 1382->1396 1390 7ffd3441a136-7ffd3441a138 1383->1390 1384->1385 1397 7ffd3441a296-7ffd3441a2a8 1384->1397 1385->1371 1385->1372 1390->1357 1391 7ffd3441a13a-7ffd3441a158 call 7ffd344153c0 1390->1391 1391->1357 1405 7ffd3441a793-7ffd3441a7b8 1395->1405 1406 7ffd3441a7ba 1395->1406 1399 7ffd3441a67d-7ffd3441a68f 1396->1399 1400 7ffd3441a695-7ffd3441a6a3 1396->1400 1397->1385 1410 7ffd3441a2ae-7ffd3441a2b2 1397->1410 1399->1400 1412 7ffd3441a7bf-7ffd3441a7f1 1399->1412 1403 7ffd3441a7f8-7ffd3441a82b 1400->1403 1404 7ffd3441a6a9-7ffd3441a6c0 1400->1404 1428 7ffd3441a832-7ffd3441a83e 1403->1428 1423 7ffd3441a6c2-7ffd3441a6d4 1404->1423 1424 7ffd3441a6da-7ffd3441a6dd 1404->1424 1405->1406 1406->1412 1410->1382 1414 7ffd3441a2b8-7ffd3441a2fb 1410->1414 1412->1403 1414->1385 1441 7ffd3441a2fd-7ffd3441a328 call 7ffd344153c0 1414->1441 1423->1424 1423->1428 1425 7ffd3441a6df-7ffd3441a6f6 1424->1425 1426 7ffd3441a706-7ffd3441a722 call 7ffd34417a50 1424->1426 1425->1426 1451 7ffd3441a6f8-7ffd3441a6fc 1425->1451 1446 7ffd3441a724-7ffd3441a752 1426->1446 1447 7ffd3441a753-7ffd3441a757 1426->1447 1434 7ffd3441a840-7ffd3441a864 1428->1434 1435 7ffd3441a867 1428->1435 1434->1435 1437 7ffd3441a869-7ffd3441a871 1435->1437 1438 7ffd3441a87b 1435->1438 1442 7ffd3441a87d 1437->1442 1443 7ffd3441a873-7ffd3441a879 1437->1443 1438->1442 1441->1385 1449 7ffd3441a881-7ffd3441a8bc 1442->1449 1450 7ffd3441a87f 1442->1450 1443->1438 1443->1449 1455 7ffd3441a75e-7ffd3441a784 1447->1455 1458 7ffd3441a8be-7ffd3441a8e5 1449->1458 1459 7ffd3441a8ff-7ffd3441a932 1449->1459 1450->1449 1457 7ffd3441a703-7ffd3441a704 1451->1457 1457->1426 1469 7ffd3441a939-7ffd3441a981 1458->1469 1470 7ffd3441a8e7-7ffd3441a8fe 1458->1470 1459->1469 1477 7ffd3441a983 1469->1477 1478 7ffd3441a985-7ffd3441a9a7 1469->1478 1477->1478 1479 7ffd3441a9c5-7ffd3441a9ca 1477->1479 1481 7ffd3441a9ad-7ffd3441a9bf 1478->1481 1482 7ffd3441aa8a-7ffd3441aa96 1478->1482 1488 7ffd3441a9c1-7ffd3441a9c4 1481->1488 1489 7ffd3441a9cb-7ffd3441a9e3 call 7ffd344140b0 1481->1489 1484 7ffd3441aabf-7ffd3441aad3 1482->1484 1485 7ffd3441aa98-7ffd3441aabd 1482->1485 1493 7ffd3441ab15-7ffd3441ab17 1484->1493 1494 7ffd3441aad5-7ffd3441aaf2 1484->1494 1485->1484 1488->1479 1498 7ffd3441a9e5-7ffd3441aa16 1489->1498 1499 7ffd3441aa47-7ffd3441aa50 1489->1499 1497 7ffd3441ab19-7ffd3441ab1b 1493->1497 1494->1497 1500 7ffd3441aaf4-7ffd3441ab0f 1494->1500 1501 7ffd3441ab1d-7ffd3441ab2b 1497->1501 1502 7ffd3441ab2c-7ffd3441ab3c 1497->1502 1507 7ffd3441aa41-7ffd3441aa45 1498->1507 1508 7ffd3441aa18-7ffd3441aa3f 1498->1508 1500->1497 1504 7ffd3441ab11-7ffd3441ab12 1500->1504 1504->1493 1507->1498 1507->1499 1508->1507 1510 7ffd3441aa51-7ffd3441aa89 1508->1510
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4630606157.00007FFD34410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34410000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd34410000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: HA4$HA4$HA4$HA4$HA4$HA4$HA4
                                              • API String ID: 0-2049325341
                                              • Opcode ID: 076483732a08b7907ca5aa0d76fdf019c61d12aea921c21b5972275fa7064c06
                                              • Instruction ID: 18e9a477a1d049bae70e196881d496917ac12e8931df35f257a07e83a577f53f
                                              • Opcode Fuzzy Hash: 076483732a08b7907ca5aa0d76fdf019c61d12aea921c21b5972275fa7064c06
                                              • Instruction Fuzzy Hash: BB62593171C9494FEB98EB2CD4A5AB937D1FF9A310B0501BAD54EC72A6DE28EC42C741

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1513 7ffd3442c13a-7ffd3442c149 1515 7ffd3442c19e-7ffd3442c21b 1513->1515 1516 7ffd3442c14b-7ffd3442c163 1513->1516 1525 7ffd3442c27f-7ffd3442c2a0 1515->1525 1526 7ffd3442c21d-7ffd3442c23f 1515->1526 1528 7ffd3442c2a7-7ffd3442c2b2 1525->1528 1529 7ffd3442c377-7ffd3442c37b 1528->1529 1530 7ffd3442c2b8-7ffd3442c2c4 1528->1530 1532 7ffd3442c40f-7ffd3442c42f 1529->1532 1533 7ffd3442c380-7ffd3442c382 1530->1533 1534 7ffd3442c2ca-7ffd3442c2ce 1530->1534 1556 7ffd3442c431-7ffd3442c434 1532->1556 1557 7ffd3442c44a-7ffd3442c45e 1532->1557 1536 7ffd3442c3b4-7ffd3442c3ba 1533->1536 1537 7ffd3442c384-7ffd3442c397 1533->1537 1534->1533 1535 7ffd3442c2d4-7ffd3442c2d6 1534->1535 1538 7ffd3442c308-7ffd3442c30e 1535->1538 1539 7ffd3442c2d8-7ffd3442c2eb 1535->1539 1540 7ffd3442c408-7ffd3442c40d 1536->1540 1541 7ffd3442c3bc-7ffd3442c3c4 1536->1541 1543 7ffd3442c39d-7ffd3442c3ae 1537->1543 1544 7ffd3442c7ca-7ffd3442c814 1537->1544 1548 7ffd3442c310-7ffd3442c340 1538->1548 1549 7ffd3442c354-7ffd3442c35d 1538->1549 1539->1544 1546 7ffd3442c2f1-7ffd3442c302 1539->1546 1540->1532 1550 7ffd3442c436-7ffd3442c43a 1540->1550 1541->1544 1547 7ffd3442c3ca-7ffd3442c3f5 1541->1547 1543->1536 1545 7ffd3442c5b7-7ffd3442c5f9 1543->1545 1564 7ffd3442c816-7ffd3442c825 1544->1564 1574 7ffd3442c668-7ffd3442c6c8 1545->1574 1546->1538 1546->1545 1567 7ffd3442c43f-7ffd3442c448 1547->1567 1568 7ffd3442c3f7-7ffd3442c404 1547->1568 1569 7ffd3442c342-7ffd3442c350 1548->1569 1570 7ffd3442c36c-7ffd3442c375 1548->1570 1549->1535 1553 7ffd3442c363-7ffd3442c367 1549->1553 1550->1533 1553->1532 1562 7ffd3442c464-7ffd3442c4ab 1556->1562 1557->1562 1557->1574 1606 7ffd3442c4ad-7ffd3442c4b3 1562->1606 1607 7ffd3442c4b8-7ffd3442c4cf 1562->1607 1571 7ffd3442c907-7ffd3442c909 1564->1571 1572 7ffd3442c82b-7ffd3442c837 1564->1572 1567->1540 1568->1540 1569->1549 1570->1549 1571->1564 1579 7ffd3442c90f-7ffd3442c91f 1571->1579 1576 7ffd3442c8a5-7ffd3442c8ac 1572->1576 1577 7ffd3442c839-7ffd3442c840 1572->1577 1615 7ffd3442c6cf-7ffd3442c71b 1574->1615 1580 7ffd3442c920-7ffd3442c935 1576->1580 1581 7ffd3442c8ae-7ffd3442c8c0 1576->1581 1577->1576 1582 7ffd3442c842-7ffd3442c849 1577->1582 1598 7ffd3442c93f-7ffd3442c967 1580->1598 1599 7ffd3442c937-7ffd3442c93e 1580->1599 1585 7ffd3442c900-7ffd3442c905 1581->1585 1586 7ffd3442c8c2-7ffd3442c8d2 1581->1586 1582->1580 1587 7ffd3442c84f-7ffd3442c861 1582->1587 1585->1571 1585->1576 1586->1580 1589 7ffd3442c8d4-7ffd3442c8dc 1586->1589 1590 7ffd3442c863-7ffd3442c874 1587->1590 1591 7ffd3442c89c-7ffd3442c8a1 1587->1591 1589->1580 1595 7ffd3442c8de-7ffd3442c8fb 1589->1595 1590->1580 1596 7ffd3442c87a-7ffd3442c897 1590->1596 1591->1582 1597 7ffd3442c8a3 1591->1597 1595->1585 1596->1591 1597->1571 1599->1598 1606->1607 1609 7ffd3442c4b5-7ffd3442c4b6 1606->1609 1607->1615 1616 7ffd3442c4d5-7ffd3442c504 1607->1616 1609->1607 1626 7ffd3442c722-7ffd3442c754 1615->1626 1623 7ffd3442c506-7ffd3442c518 1616->1623 1624 7ffd3442c53a-7ffd3442c54c 1616->1624 1631 7ffd3442c525 1623->1631 1632 7ffd3442c51a-7ffd3442c523 1623->1632 1628 7ffd3442c54e-7ffd3442c57f 1624->1628 1629 7ffd3442c581 1624->1629 1643 7ffd3442c75b-7ffd3442c764 1626->1643 1633 7ffd3442c583-7ffd3442c59a 1628->1633 1629->1633 1634 7ffd3442c52a-7ffd3442c530 1631->1634 1632->1634 1641 7ffd3442c5a6-7ffd3442c5b6 1633->1641 1642 7ffd3442c59c-7ffd3442c5a0 1633->1642 1634->1626 1637 7ffd3442c536 1634->1637 1637->1624 1642->1641 1642->1643 1643->1544
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4630606157.00007FFD34410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34410000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd34410000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: HA4$HA4$HA4$HA4$HA4$HA4$_
                                              • API String ID: 0-2051887990
                                              • Opcode ID: 5c07ba787f7d0b66856e35d287c48a59ee4c750c930bd880c53e6bdad0df86aa
                                              • Instruction ID: 890456829e226843b23ce05bab818ea82a8cd74524a3cf558836a49403071475
                                              • Opcode Fuzzy Hash: 5c07ba787f7d0b66856e35d287c48a59ee4c750c930bd880c53e6bdad0df86aa
                                              • Instruction Fuzzy Hash: 86326931B1CA464FE765DB6884A56B977D0FF96340F0585BDD58EC318ADE2EF8028381

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1646 7ffd3442b7e1-7ffd3442b844 1649 7ffd3442b8a5-7ffd3442b8a9 1646->1649 1650 7ffd3442b846-7ffd3442b8a0 1646->1650 1651 7ffd3442b8ab-7ffd3442b8b3 call 7ffd34419fd0 1649->1651 1652 7ffd3442b8ba 1649->1652 1692 7ffd3442be7f-7ffd3442be92 1650->1692 1656 7ffd3442b8b8 1651->1656 1655 7ffd3442b8bc-7ffd3442b8c5 1652->1655 1657 7ffd3442b8cb-7ffd3442b8d0 1655->1657 1658 7ffd3442b9fa-7ffd3442b9ff 1655->1658 1656->1655 1660 7ffd3442be93-7ffd3442bec5 1657->1660 1661 7ffd3442b8d6-7ffd3442b8db 1657->1661 1662 7ffd3442ba01-7ffd3442ba13 call 7ffd34413830 1658->1662 1663 7ffd3442ba65-7ffd3442ba69 1658->1663 1672 7ffd3442becc-7ffd3442befe 1660->1672 1665 7ffd3442b8ef-7ffd3442b905 call 7ffd34419bf0 1661->1665 1666 7ffd3442b8dd-7ffd3442b8e9 1661->1666 1681 7ffd3442ba18-7ffd3442ba1f 1662->1681 1667 7ffd3442ba6b-7ffd3442ba87 call 7ffd34414180 1663->1667 1668 7ffd3442baba-7ffd3442bae5 1663->1668 1678 7ffd3442b90a-7ffd3442b9f5 call 7ffd3441a890 1665->1678 1666->1665 1666->1672 1697 7ffd3442ba8d-7ffd3442bab5 1667->1697 1698 7ffd3442bf05-7ffd3442bf21 1667->1698 1694 7ffd3442baf4 1668->1694 1695 7ffd3442bae7-7ffd3442baf2 1668->1695 1672->1698 1678->1692 1682 7ffd3442ba21-7ffd3442ba42 call 7ffd3442b680 1681->1682 1683 7ffd3442ba15-7ffd3442ba16 1681->1683 1701 7ffd3442ba47-7ffd3442ba60 1682->1701 1683->1681 1702 7ffd3442baf6-7ffd3442bb25 1694->1702 1695->1702 1697->1692 1715 7ffd3442bf28-7ffd3442bf53 1698->1715 1701->1692 1712 7ffd3442bd07-7ffd3442bd0a 1702->1712 1713 7ffd3442bb2b-7ffd3442bb4a call 7ffd34417b40 1702->1713 1714 7ffd3442bc1a-7ffd3442bc1c 1712->1714 1725 7ffd3442bcff-7ffd3442bd02 1713->1725 1726 7ffd3442bb50-7ffd3442bb67 call 7ffd34417220 1713->1726 1718 7ffd3442bcd1-7ffd3442bcda 1714->1718 1719 7ffd3442bc22-7ffd3442bc41 call 7ffd34417b40 1714->1719 1747 7ffd3442bf81 1715->1747 1748 7ffd3442bf55-7ffd3442bf77 1715->1748 1723 7ffd3442bce0-7ffd3442bce5 1718->1723 1724 7ffd3442bdb7-7ffd3442bdbc 1718->1724 1719->1718 1738 7ffd3442bc47-7ffd3442bc5e call 7ffd34417220 1719->1738 1732 7ffd3442bd0f 1723->1732 1733 7ffd3442bce7-7ffd3442bcf5 1723->1733 1730 7ffd3442bdbe-7ffd3442bde2 1724->1730 1731 7ffd3442be0a-7ffd3442be74 1724->1731 1725->1714 1741 7ffd3442bb80-7ffd3442bb8a 1726->1741 1742 7ffd3442bb69-7ffd3442bb7e 1726->1742 1749 7ffd3442bde4-7ffd3442bdfb 1730->1749 1750 7ffd3442be02-7ffd3442be03 1730->1750 1754 7ffd3442be7b-7ffd3442be7c 1731->1754 1737 7ffd3442bd11-7ffd3442bd13 1732->1737 1733->1737 1743 7ffd3442bd15-7ffd3442bd18 1737->1743 1744 7ffd3442bd1a-7ffd3442bd1f 1737->1744 1768 7ffd3442bc60-7ffd3442bc75 1738->1768 1769 7ffd3442bc77-7ffd3442bc7e 1738->1769 1756 7ffd3442bbb6-7ffd3442bbbd 1741->1756 1757 7ffd3442bb8c-7ffd3442bbb0 1741->1757 1742->1741 1758 7ffd3442bd52-7ffd3442bd5e 1743->1758 1759 7ffd3442bd21-7ffd3442bd43 1744->1759 1760 7ffd3442bd4a-7ffd3442bd4f 1744->1760 1752 7ffd3442bf83-7ffd3442bfc0 1747->1752 1753 7ffd3442bfe2-7ffd3442c028 1747->1753 1763 7ffd3442bf7e 1748->1763 1749->1750 1750->1731 1770 7ffd3442bfc2-7ffd3442bfc9 1752->1770 1771 7ffd3442bfcb-7ffd3442bfd6 1752->1771 1754->1692 1756->1763 1764 7ffd3442bbc3-7ffd3442bbda 1756->1764 1757->1715 1757->1756 1785 7ffd3442bd60-7ffd3442bd63 1758->1785 1786 7ffd3442bdaa-7ffd3442bdb1 1758->1786 1759->1760 1760->1758 1763->1747 1774 7ffd3442bbfb-7ffd3442bc14 call 7ffd34417b40 1764->1774 1775 7ffd3442bbdc-7ffd3442bbf9 1764->1775 1768->1769 1769->1763 1779 7ffd3442bc84-7ffd3442bc9a 1769->1779 1770->1771 1782 7ffd3442bfd7-7ffd3442bfe0 1770->1782 1774->1714 1803 7ffd3442bcf7-7ffd3442bcfa 1774->1803 1775->1774 1780 7ffd3442bcb3-7ffd3442bccb call 7ffd34417b40 1779->1780 1781 7ffd3442bc9c-7ffd3442bc9d 1779->1781 1780->1718 1780->1738 1793 7ffd3442bca4-7ffd3442bcac 1781->1793 1782->1753 1790 7ffd3442bd88-7ffd3442bda6 call 7ffd344153c0 1785->1790 1791 7ffd3442bd65-7ffd3442bd80 1785->1791 1786->1723 1786->1724 1790->1786 1791->1790 1793->1780 1803->1726
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4630606157.00007FFD34410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34410000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd34410000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (/.4$(/.4$HA4$HA4$HA4$g&_H
                                              • API String ID: 0-742983036
                                              • Opcode ID: 6c09def7807422b611d4384ee98a29c69f7c0855abb72a4bffd1ffa9904c0f3b
                                              • Instruction ID: ea34311b40cc17a6c3b7a703ce866e15ce6ce983257532610755ff97ad5b9419
                                              • Opcode Fuzzy Hash: 6c09def7807422b611d4384ee98a29c69f7c0855abb72a4bffd1ffa9904c0f3b
                                              • Instruction Fuzzy Hash: D852E231B18E494BEBA8DF5C84A5675B3D1FF99340F41067ED54EC328ADE68F8428781
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4630606157.00007FFD34410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34410000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd34410000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $ $HA4$HA4$HA4
                                              • API String ID: 0-1122398365
                                              • Opcode ID: bd3f500d702175007ec2d9188c815ca1e0fd2e25009289805a1e2653a3e82a08
                                              • Instruction ID: 83bea30f7695635da5b3d8dccfae755d42f11f299e3d2677a66440c77581e7f6
                                              • Opcode Fuzzy Hash: bd3f500d702175007ec2d9188c815ca1e0fd2e25009289805a1e2653a3e82a08
                                              • Instruction Fuzzy Hash: E982E631B08A4D4FEBA8EB1CC4B5A7437D1FF5A700B1601BAD18DC72AADE68EC419741
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4630606157.00007FFD34410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34410000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd34410000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: *M4$HA4$HA4$pUA4
                                              • API String ID: 0-2735955535
                                              • Opcode ID: 502bd11ee031c380226b446588d1ddcb1956f0d0f6b2601876e24ef512a10bd8
                                              • Instruction ID: 123a9d5564b27c0a153a1a62132ab59b5e85c60a1daad9237f3b17cda83bde54
                                              • Opcode Fuzzy Hash: 502bd11ee031c380226b446588d1ddcb1956f0d0f6b2601876e24ef512a10bd8
                                              • Instruction Fuzzy Hash: B2F28F70B18A098FDB98EF18C494BA977E1FF99300F5541B9D44ED72A6DE39E881CB40

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2677 7ffd3442eb29-7ffd3442eb6b 2681 7ffd3442ebbf-7ffd3442ec2f call 7ffd34415070 2677->2681 2682 7ffd3442eb6d-7ffd3442eb8c 2677->2682 2687 7ffd3442ec31-7ffd3442ec36 2681->2687 2688 7ffd3442ec39-7ffd3442ec49 2681->2688 2682->2681 2687->2688 2689 7ffd3442ec4f-7ffd3442ec5f call 7ffd3441ac60 2688->2689 2690 7ffd3442f172-7ffd3442f17d 2688->2690 2694 7ffd3442ec64-7ffd3442ec69 2689->2694 2691 7ffd3442f17f-7ffd3442f184 2690->2691 2692 7ffd3442f187-7ffd3442f1e7 call 7ffd34414780 2690->2692 2691->2692 2701 7ffd3442f1ed-7ffd3442f1f6 2692->2701 2702 7ffd3442f111-7ffd3442f16d 2692->2702 2696 7ffd3442f07f-7ffd3442f0d1 2694->2696 2697 7ffd3442ec6f-7ffd3442ec7a 2694->2697 2717 7ffd3442f0d8-7ffd3442f10a 2696->2717 2699 7ffd3442ec97-7ffd3442ecd0 call 7ffd34414780 2697->2699 2700 7ffd3442ec7c-7ffd3442ec8d 2697->2700 2715 7ffd3442ecd2-7ffd3442ecf6 call 7ffd3441a990 call 7ffd3441aae0 2699->2715 2716 7ffd3442ecfb-7ffd3442edd9 call 7ffd34414780 2699->2716 2700->2699 2714 7ffd3442ec8f-7ffd3442ec94 2700->2714 2705 7ffd3442f3eb-7ffd3442f437 2701->2705 2706 7ffd3442f1fc-7ffd3442f207 2701->2706 2731 7ffd3442f43e-7ffd3442f485 2705->2731 2706->2705 2712 7ffd3442f20d-7ffd3442f210 2706->2712 2712->2717 2718 7ffd3442f216-7ffd3442f2b7 2712->2718 2714->2699 2715->2716 2780 7ffd3442eddf-7ffd3442ede3 2716->2780 2781 7ffd3442f046-7ffd3442f04f 2716->2781 2717->2702 2752 7ffd3442f2bd-7ffd3442f2c5 2718->2752 2753 7ffd3442f504-7ffd3442f50d 2718->2753 2743 7ffd3442f4a2-7ffd3442f4ab 2731->2743 2744 7ffd3442f487-7ffd3442f496 2731->2744 2747 7ffd3442f4ae-7ffd3442f4f5 2743->2747 2749 7ffd3442f49d-7ffd3442f4a0 2744->2749 2751 7ffd3442f4fc-7ffd3442f4ff 2747->2751 2749->2747 2754 7ffd3442f391-7ffd3442f3ac 2751->2754 2757 7ffd3442f2d4-7ffd3442f2eb 2752->2757 2758 7ffd3442f2c7-7ffd3442f2cc 2752->2758 2753->2754 2759 7ffd3442f513-7ffd3442f51b 2753->2759 2760 7ffd3442f3de-7ffd3442f3e6 2754->2760 2761 7ffd3442f3ae-7ffd3442f3bf 2754->2761 2757->2731 2768 7ffd3442f2f1-7ffd3442f374 2757->2768 2758->2757 2759->2754 2762 7ffd3442f521-7ffd3442f532 2759->2762 2770 7ffd3442ef57-7ffd3442ef63 2761->2770 2771 7ffd3442f3c5-7ffd3442f3dc 2761->2771 2762->2754 2772 7ffd3442f538-7ffd3442f543 2762->2772 2768->2754 2782 7ffd3442f012-7ffd3442f019 2770->2782 2783 7ffd3442ef69-7ffd3442ef81 2770->2783 2771->2760 2779 7ffd3442f56d-7ffd3442f585 2772->2779 2791 7ffd3442f023-7ffd3442f02c 2779->2791 2792 7ffd3442f58b-7ffd3442f5ca 2779->2792 2786 7ffd3442f01e 2780->2786 2787 7ffd3442ede9-7ffd3442ee4f 2780->2787 2781->2696 2790 7ffd3442f5d1-7ffd3442f5f1 call 7ffd3442f5f2 2782->2790 2783->2779 2794 7ffd3442ef87-7ffd3442efb2 2783->2794 2786->2791 2787->2770 2791->2781 2792->2790 2805 7ffd3442efb9-7ffd3442efcd 2794->2805 2809 7ffd3442efcf-7ffd3442efe0 2805->2809 2810 7ffd3442efe2-7ffd3442f010 2805->2810 2809->2782 2809->2810 2810->2782
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4630606157.00007FFD34410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34410000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd34410000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: HA4$HA4$HA4$p-4
                                              • API String ID: 0-3295367865
                                              • Opcode ID: 2a8a511f047c7213c5f3864846db4ad4e411a9ac5dd1e7fb7ea555de64098390
                                              • Instruction ID: 9395eb5a5b073ff51aed93af83e5716a083385581e9ee3015c673c57d146e071
                                              • Opcode Fuzzy Hash: 2a8a511f047c7213c5f3864846db4ad4e411a9ac5dd1e7fb7ea555de64098390
                                              • Instruction Fuzzy Hash: 1362BF31B18A4A4FEB98DF5C84A16B973E2FF99340F5501B9E45AC7286CE38EC42D741

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2816 7ffd34419271-7ffd34419295 2818 7ffd344192df-7ffd344192e2 2816->2818 2819 7ffd34419297-7ffd344192bc 2816->2819 2820 7ffd344192be-7ffd344192ce 2819->2820 2821 7ffd344192d0-7ffd344192de 2819->2821 2820->2821 2823 7ffd344192e3-7ffd34419314 2820->2823 2821->2818 2826 7ffd34419363-7ffd34419388 call 7ffd34417e00 2823->2826 2827 7ffd34419316-7ffd34419335 call 7ffd34413950 2823->2827 2832 7ffd3441938e-7ffd3441939c call 7ffd34414e50 2826->2832 2833 7ffd344195f2-7ffd34419605 call 7ffd34418d80 2826->2833 2827->2826 2834 7ffd34419337-7ffd34419357 call 7ffd34413830 2827->2834 2841 7ffd3441939e-7ffd344193b2 2832->2841 2842 7ffd344193b6-7ffd344193b9 2832->2842 2843 7ffd34419632-7ffd34419634 2833->2843 2844 7ffd34419607-7ffd34419628 2833->2844 2834->2826 2845 7ffd34419359-7ffd34419360 2834->2845 2841->2842 2848 7ffd344193bf-7ffd344193c2 2842->2848 2849 7ffd34419583-7ffd3441958e 2842->2849 2846 7ffd34419643-7ffd344196c6 2843->2846 2847 7ffd34419636-7ffd3441963a 2843->2847 2844->2843 2856 7ffd3441962a-7ffd3441962f 2844->2856 2845->2826 2864 7ffd344196ce-7ffd344196cf 2846->2864 2847->2846 2852 7ffd3441963c-7ffd3441963e 2847->2852 2853 7ffd344195c5-7ffd344195d0 2848->2853 2854 7ffd344193c8 2848->2854 2849->2853 2857 7ffd344196d5-7ffd344196d8 2852->2857 2853->2833 2854->2833 2856->2843 2860 7ffd344196de-7ffd34419751 call 7ffd34418060 2857->2860 2861 7ffd34419ac7-7ffd34419ada 2857->2861 2871 7ffd34419753-7ffd34419774 2860->2871 2872 7ffd34419776 2860->2872 2864->2857 2871->2872 2873 7ffd34419778-7ffd3441978b 2871->2873 2872->2873 2876 7ffd3441978d-7ffd344197b6 2873->2876 2877 7ffd344197bb-7ffd344197f4 2873->2877 2884 7ffd34419870-7ffd34419877 2876->2884 2882 7ffd344197fe-7ffd3441982a 2877->2882 2883 7ffd344197f6-7ffd344197f7 2877->2883 2882->2884 2891 7ffd3441982c-7ffd34419860 2882->2891 2883->2882 2885 7ffd34419893-7ffd344198f4 2884->2885 2886 7ffd34419879-7ffd34419885 2884->2886 2896 7ffd344198f6-7ffd3441990b 2885->2896 2897 7ffd34419915-7ffd34419937 2885->2897 2886->2885 2887 7ffd34419887-7ffd3441988c 2886->2887 2887->2885 2891->2884 2900 7ffd34419862-7ffd34419869 2891->2900 2896->2897 2901 7ffd34419953-7ffd34419954 2897->2901 2902 7ffd34419939-7ffd34419945 2897->2902 2900->2884 2903 7ffd34419956-7ffd34419971 2901->2903 2904 7ffd3441994d-7ffd34419951 2902->2904 2903->2861 2906 7ffd34419977-7ffd3441998d call 7ffd34418d80 2903->2906 2904->2903 2906->2861 2909 7ffd34419993-7ffd344199b4 2906->2909 2911 7ffd34419a01-7ffd34419a22 2909->2911 2912 7ffd344199b6-7ffd344199e4 2909->2912 2916 7ffd34419a64-7ffd34419a85 2911->2916 2917 7ffd34419a24-7ffd34419a56 2911->2917 2912->2911 2918 7ffd344199e6-7ffd344199fc 2912->2918 2916->2861 2923 7ffd34419a87-7ffd34419ab9 2916->2923 2917->2916 2924 7ffd34419a58-7ffd34419a61 2917->2924 2918->2861 2923->2861 2928 7ffd34419abb-7ffd34419ac4 2923->2928 2924->2916 2928->2861
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4630606157.00007FFD34410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34410000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd34410000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Po-4$Po-4$Po-4$Po-4
                                              • API String ID: 0-791248503
                                              • Opcode ID: 867b6606417faf3a68c34d4516ed02bda276064d36bf9d971e58190e9130aaf7
                                              • Instruction ID: 43b200d9de3e3321d4a9fd1c656504307afca697e976713185110692a88799b9
                                              • Opcode Fuzzy Hash: 867b6606417faf3a68c34d4516ed02bda276064d36bf9d971e58190e9130aaf7
                                              • Instruction Fuzzy Hash: FB228F31B18A094FEB98EA1884A57B977E2FF99300F15017DD54FD3296CE78E882CB41

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 10851 7ffd34433af9-7ffd34433afd 10852 7ffd34433aff-7ffd34433b01 10851->10852 10853 7ffd34433b02-7ffd34433b2f 10851->10853 10852->10853 10856 7ffd34433b31-7ffd34433b4d 10853->10856 10857 7ffd34433b52-7ffd34433b56 10853->10857 10864 7ffd34433c4f-7ffd34433c51 10856->10864 10858 7ffd34433bbd-7ffd34433bca 10857->10858 10859 7ffd34433b58-7ffd34433bb8 call 7ffd344306c0 call 7ffd3442fe80 10857->10859 10866 7ffd34433beb-7ffd34433c4d call 7ffd344306c0 call 7ffd3442fe80 10858->10866 10867 7ffd34433bcc-7ffd34433bd0 10858->10867 10859->10864 10868 7ffd34433c53-7ffd34433cac call 7ffd3442d8c0 call 7ffd34431360 call 7ffd3442fe80 10864->10868 10869 7ffd34433cb1-7ffd34433cb6 10864->10869 10866->10864 10867->10866 10873 7ffd34433bd2-7ffd34433be2 10867->10873 10868->10869 10871 7ffd34433cb8-7ffd34433cc2 10869->10871 10872 7ffd34433cfa-7ffd34433d01 10869->10872 10871->10872 10878 7ffd34433cc4-7ffd34433ccb 10871->10878 10879 7ffd34433be9 10873->10879 10882 7ffd34433ccd-7ffd34433cf8 10878->10882 10883 7ffd34433d02-7ffd34433d13 10878->10883 10879->10864 10882->10872 10882->10878 10891 7ffd34433d55-7ffd34433d59 10883->10891 10892 7ffd34433d15-7ffd34433d29 10883->10892 10896 7ffd34433dad-7ffd34433dbd 10891->10896 10897 7ffd34433d5b-7ffd34433d5f 10891->10897 10900 7ffd34433d73 10892->10900 10901 7ffd34433d2b-7ffd34433d59 10892->10901 10899 7ffd34433dbf-7ffd34433dcb 10896->10899 10897->10896 10904 7ffd34433d61-7ffd34433d71 10897->10904 10915 7ffd34433dcc-7ffd34433dd6 10899->10915 10907 7ffd34433de4-7ffd34433deb 10900->10907 10908 7ffd34433d75-7ffd34433d77 10900->10908 10901->10896 10901->10897 10904->10900 10909 7ffd34433df3-7ffd34433dfe 10908->10909 10910 7ffd34433d79 10908->10910 10920 7ffd34433e00-7ffd34433e4f 10909->10920 10910->10899 10914 7ffd34433d7b-7ffd34433d7f 10910->10914 10918 7ffd34433df0-7ffd34433df2 10914->10918 10919 7ffd34433d81-7ffd34433d84 10914->10919 10925 7ffd34433dd8-7ffd34433de3 10915->10925 10926 7ffd34433dec-7ffd34433ded 10915->10926 10918->10909 10919->10920 10922 7ffd34433d86 10919->10922 10933 7ffd34433e91-7ffd34433eb5 call 7ffd34430000 10920->10933 10934 7ffd34433e51-7ffd34433e8f 10920->10934 10922->10915 10924 7ffd34433d88-7ffd34433dac 10922->10924 10925->10907 10926->10918 10939 7ffd34433eb7-7ffd34433eb9 10933->10939 10940 7ffd34433f26 10933->10940 10934->10933 10946 7ffd34433eef-7ffd34433efc 10934->10946 10943 7ffd34433f35 10939->10943 10944 7ffd34433ebb 10939->10944 10941 7ffd34433f52-7ffd34433f5b 10940->10941 10942 7ffd34433f28-7ffd34433f31 10940->10942 10952 7ffd34433f32 10942->10952 10950 7ffd34433f37-7ffd34433f4f 10943->10950 10951 7ffd34433f36 10943->10951 10948 7ffd34433ebd-7ffd34433ec1 10944->10948 10949 7ffd34433f01-7ffd34433f0d 10944->10949 10946->10949 10948->10952 10953 7ffd34433ec3-7ffd34433ec8 10948->10953 10956 7ffd34433f0f-7ffd34433f22 10949->10956 10957 7ffd34433f0e 10949->10957 10950->10941 10951->10950 10952->10943 10953->10957 10959 7ffd34433eca-7ffd34433eee 10953->10959 10956->10940 10957->10956
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4630606157.00007FFD34410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34410000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd34410000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0d-4$HA4$HA4
                                              • API String ID: 0-2373844608
                                              • Opcode ID: adb96fd5483f4ead344b9c13a4c0312522c910bef812e9f01e7f84c4dfb44031
                                              • Instruction ID: 6bf734f6b40a6ced398eea5b2c13ebeefe9cc9eb980c946cee073e2c9c4a1238
                                              • Opcode Fuzzy Hash: adb96fd5483f4ead344b9c13a4c0312522c910bef812e9f01e7f84c4dfb44031
                                              • Instruction Fuzzy Hash: 4DF13431B0CA494FEBA5EB2C84B56B477E2FF9A700B0901B9D14DC7296DE6DE8528740
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4630606157.00007FFD34410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34410000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd34410000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: *M4
                                              • API String ID: 0-1367679375
                                              • Opcode ID: 8408cec4d5291c9c2416987020bece86cb54219199199160e22b17d37467b7b4
                                              • Instruction ID: a2eb2114e0019f3d397598fb49a5c2b923023e65b1c7717b3dcd0099a987ac1a
                                              • Opcode Fuzzy Hash: 8408cec4d5291c9c2416987020bece86cb54219199199160e22b17d37467b7b4
                                              • Instruction Fuzzy Hash: FA025C30A18A1A8FEB98DF18C4957B9B7E1FF59301F1141BAD54ED32A5DA78F881CB40
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4630606157.00007FFD34410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34410000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd34410000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: HH.4
                                              • API String ID: 0-736005679
                                              • Opcode ID: ef5249f0bd95c445e9643f396ba1fafa45d271c7d0248de17897abdb37703740
                                              • Instruction ID: a91ca551804232cad54d51e6c678defb18f2497c82a1c33f8fd0a667a1e6f997
                                              • Opcode Fuzzy Hash: ef5249f0bd95c445e9643f396ba1fafa45d271c7d0248de17897abdb37703740
                                              • Instruction Fuzzy Hash: E2D18A72B0D98D0FF765EA2C88A92B877D0EF96310F0601BAD14DC7296ED6CAC46C740
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4627251365.00007FFD341A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd341a0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: w+4
                                              • API String ID: 0-757429887
                                              • Opcode ID: ea3ff61feded55f97cc014854701a02d85ffeba2fb723f92f475f17ed36725e8
                                              • Instruction ID: 64b5d3b8477012816f61d9135e37df00cce9ff88befb57070dfaae276ce89b89
                                              • Opcode Fuzzy Hash: ea3ff61feded55f97cc014854701a02d85ffeba2fb723f92f475f17ed36725e8
                                              • Instruction Fuzzy Hash: EDA11C2B70D9A64AE712B67EB8652E97B50EFC2677718057BD2C8CD083D914588F83F0
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4630606157.00007FFD34410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34410000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd34410000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b6cae3c6fce39e7bb553fb409bf1058a6020a7e3500bf951da25ba1b9a7c4220
                                              • Instruction ID: 6e8b5a04cbeeb11b79a1245d0496d69c592e16579e911422aa0b7ec29ebe8e1e
                                              • Opcode Fuzzy Hash: b6cae3c6fce39e7bb553fb409bf1058a6020a7e3500bf951da25ba1b9a7c4220
                                              • Instruction Fuzzy Hash: 66524E30B08A498FEBA8EB2CC4A8B6577E1FF99300F1545B9E44DC72A6DE75E841C741
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4630606157.00007FFD34410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34410000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd34410000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: def8db18c5232f68e715d2b76ff958c1ff32e1213cea9538302a819d36733380
                                              • Instruction ID: fa306ab54f58b136000f2d6c7fad8cb6f8644f4e6ea4fc4d786256386ee3f18a
                                              • Opcode Fuzzy Hash: def8db18c5232f68e715d2b76ff958c1ff32e1213cea9538302a819d36733380
                                              • Instruction Fuzzy Hash: 00025431B1890D4FDB98EF6CC4A5AA977E2FFA9340F514179E50DC329ACE68EC518780
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4630606157.00007FFD34410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34410000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd34410000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6c4831378c06536c96eb1f23531fbea79625b70237ce7a56e552ba431086654c
                                              • Instruction ID: 4ee90e8029ef95577e3a09d73e71aa4ff84965b85fe70805d3f88493eb82e486
                                              • Opcode Fuzzy Hash: 6c4831378c06536c96eb1f23531fbea79625b70237ce7a56e552ba431086654c
                                              • Instruction Fuzzy Hash: 4EF1B330618A4D8FEBA8DF68C8957F977E1FF55350F04427AE80DC7295DB7898418B82
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4630606157.00007FFD34410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34410000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd34410000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 439d9b9d8c1067d6f3cf2d3ef89badacf75c35bbd2d7e46d1f9c97eab4d9c26c
                                              • Instruction ID: d9b419e2ad7610f386fe259c23e847e435b575eeb176ad1aa65ccff9c411918c
                                              • Opcode Fuzzy Hash: 439d9b9d8c1067d6f3cf2d3ef89badacf75c35bbd2d7e46d1f9c97eab4d9c26c
                                              • Instruction Fuzzy Hash: 03C1B917B0D1A65AEB22F6FCB4B21EB7B94DF426397080177D1DC8E093DD18644E82A5
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4630606157.00007FFD34410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34410000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd34410000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a20399567cda3a4f228238d0e421b12f45e20d174a4d35568ad1828d5a7999c9
                                              • Instruction ID: 0ae867517111cec0c26e39cd7cd347317d7b373fd1ac5a37951b31c06e1bcc4e
                                              • Opcode Fuzzy Hash: a20399567cda3a4f228238d0e421b12f45e20d174a4d35568ad1828d5a7999c9
                                              • Instruction Fuzzy Hash: 4FC1B917B0D1A65AEB22F6FCB4B20EB7B94DF4263970C01B7D1DC8E093DD18644E82A5
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4630606157.00007FFD34410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34410000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd34410000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8bc403eac100a7f9f63a5af3e3c7063b819a7e53c952bba75c8d47ec88d96faf
                                              • Instruction ID: fd09f85b0ac146c43c98f06f5dba891a5632650b51b0959489ea5db49230d9c3
                                              • Opcode Fuzzy Hash: 8bc403eac100a7f9f63a5af3e3c7063b819a7e53c952bba75c8d47ec88d96faf
                                              • Instruction Fuzzy Hash: 96E18170A08A4D8FEBA8DF68C8957E977D1FB55350F00423EE80DC7295DF78A9458B81
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4630606157.00007FFD34410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34410000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd34410000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5a7598b6935e3b8457e7fc47326c57f03378dd18253c5e5948f942f94726d904
                                              • Instruction ID: cda1bfe1e365c4bbced74661a404bf8b6e4be26ca22af5c24b039c2100eedd60
                                              • Opcode Fuzzy Hash: 5a7598b6935e3b8457e7fc47326c57f03378dd18253c5e5948f942f94726d904
                                              • Instruction Fuzzy Hash: 5EC1B917B0D1A65AEB22F6FCB4B20EB7B94DF4263D70801B7D1DC8A093DD18604E82A5
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4630606157.00007FFD34410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34410000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd34410000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 90c8a7bd1fea099c7e977c6f9ce5468ab0bca5312033583f21ced622bcdc9361
                                              • Instruction ID: 8759e057f972a3aaea780bf99ff6382758d415e8728431f3f9f4e751bf077189
                                              • Opcode Fuzzy Hash: 90c8a7bd1fea099c7e977c6f9ce5468ab0bca5312033583f21ced622bcdc9361
                                              • Instruction Fuzzy Hash: F5C1B817B0D1A65AEB22F6FCB4B20EB7B94DF4263970C01B7D1DC8E093DD18604E82A5
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4630606157.00007FFD34410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34410000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd34410000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0fb0ee2c1251514e212b4a9e6a7822621c856a5414e5920901dd571a255257e1
                                              • Instruction ID: bc0300f716b7d63552434a7d38b3da3a0e722c068c2754bcfdf2b8602c9612a2
                                              • Opcode Fuzzy Hash: 0fb0ee2c1251514e212b4a9e6a7822621c856a5414e5920901dd571a255257e1
                                              • Instruction Fuzzy Hash: 30A1B717B0D1A65AEB22F7FCB4B21EB7FA4DF4263970801B7D1DC8A093DD18544E82A5
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4630606157.00007FFD34410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34410000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd34410000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b6212463a996b6c635d70bbfc6f2955276145bb24682c1e603b2377002065e14
                                              • Instruction ID: 5b91ce57d4bf48be9925349deea797579c1751cf4ada8e2ac68923b248f54fde
                                              • Opcode Fuzzy Hash: b6212463a996b6c635d70bbfc6f2955276145bb24682c1e603b2377002065e14
                                              • Instruction Fuzzy Hash: 64412D33B0C6154BE768EEACB4A66EEB7D0EF95335B08013FD14DC6182CE2998468394
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4631372092.00007FFD344E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD344E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd344e0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: X704$X704$X704$W+4
                                              • API String ID: 0-3017591796
                                              • Opcode ID: 65a8a72b7b91d31874a5f6b6823def41d1dc76e76e17806f688384d388ac3c94
                                              • Instruction ID: 419d8e1ecf3cced09c46bd26ff572fb9dc70e4571ef5a99c5b0290b04a283934
                                              • Opcode Fuzzy Hash: 65a8a72b7b91d31874a5f6b6823def41d1dc76e76e17806f688384d388ac3c94
                                              • Instruction Fuzzy Hash: 7521E652B09D4B0FF7E6A62C04F523667C2EF99600B5E017AD65EC328AEC5CEC826341
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4631372092.00007FFD344E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD344E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd344e0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: XG04$XG04$XG04$W+4
                                              • API String ID: 0-2349584376
                                              • Opcode ID: fd44ff92bffa59cbfda9b2f96a70cff86e2c5102da9e8d75cb686cc0fa6c34ac
                                              • Instruction ID: 68c8446a3772ae355594255abd057fa059ceb041fa12143599498284fed06be5
                                              • Opcode Fuzzy Hash: fd44ff92bffa59cbfda9b2f96a70cff86e2c5102da9e8d75cb686cc0fa6c34ac
                                              • Instruction Fuzzy Hash: 5F21F612B09D4A0FF7E5A62C14F423663C2EFDA55075E01BAD51DC72CADC6CEC826340
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4631372092.00007FFD344E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD344E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd344e0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 504$ 504$ 504$W+4
                                              • API String ID: 0-818557063
                                              • Opcode ID: 34729a3a402320ae44469e9fa53dc7afa07e1efa0dd19420adc39f2077442703
                                              • Instruction ID: 3dead9c67c6b607d9b28f3f6bd90e589ee93fcb297dfeb9d2e85ecde54110c89
                                              • Opcode Fuzzy Hash: 34729a3a402320ae44469e9fa53dc7afa07e1efa0dd19420adc39f2077442703
                                              • Instruction Fuzzy Hash: C0210A12B0ED4A0FF7E6A62C04F427662C2EFDA65075D11BAD15DC72DAED6CEC825340
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4631372092.00007FFD344E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD344E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd344e0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (R04$(R04$(R04$W+4
                                              • API String ID: 0-4172039301
                                              • Opcode ID: 79c3971f594418d6ba6281bec30471a254f1270bc2cc1879a46cce7afd89e392
                                              • Instruction ID: a87bde642d7bace7a9242fc6d9a3382955a4ecc5d1ed1b6a8a4ca13e2abe0b40
                                              • Opcode Fuzzy Hash: 79c3971f594418d6ba6281bec30471a254f1270bc2cc1879a46cce7afd89e392
                                              • Instruction Fuzzy Hash: 1B21F812B09E4A0FF7E6A66C04F423566C2DF9A610B9D01BAD55DC32CBDD6CEC825340
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4631372092.00007FFD344E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD344E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd344e0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: p>04$p>04$p>04$W+4
                                              • API String ID: 0-726580395
                                              • Opcode ID: c9cd1ac4f85968a518c8f4af00d280dcf84c4f814fabdffa7f9ecca5ceefcba7
                                              • Instruction ID: c2103e2ae2799ebf0af51dd20b1a41149fcb41b7af3998c08fbd5c88758067b6
                                              • Opcode Fuzzy Hash: c9cd1ac4f85968a518c8f4af00d280dcf84c4f814fabdffa7f9ecca5ceefcba7
                                              • Instruction Fuzzy Hash: DE210512B0DD4A0FF7E5A62C14B523663C2EF9A654B5E01BAD54EC32CBDD6CEC826340
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4631372092.00007FFD344E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD344E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd344e0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: H.04$H.04$p/04$p/04
                                              • API String ID: 0-1075630546
                                              • Opcode ID: 643a4ac68a9bcf1ae33fbfd8e6d1f8a5cc3603773df90492ec0ab14e13e3b9a9
                                              • Instruction ID: 99909e871a0807188a73a0829ccebd39c0955e5f929f026716f0d776791b20f3
                                              • Opcode Fuzzy Hash: 643a4ac68a9bcf1ae33fbfd8e6d1f8a5cc3603773df90492ec0ab14e13e3b9a9
                                              • Instruction Fuzzy Hash: 7B212C22B1DD470BF7A6A72C04B513966C2DF96200B6E11BDC64EC76DAED5DEC825340
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4631372092.00007FFD344E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD344E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd344e0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 8]04$8]04$W+4
                                              • API String ID: 0-95130122
                                              • Opcode ID: 5e8250ffb5c5bbdfb1ce364292b9b66d38f66597b7f12e13f50bb24b49d0da05
                                              • Instruction ID: 6f94a599385a3de76cf4ff7eb4932d1ed64dbf1548452e14441eb8aacd161227
                                              • Opcode Fuzzy Hash: 5e8250ffb5c5bbdfb1ce364292b9b66d38f66597b7f12e13f50bb24b49d0da05
                                              • Instruction Fuzzy Hash: 4021F512B0AE0A0FF7E5A66C04B423A62C2DF99110B6D05BED51EC32CBEC6CDC826344
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4631372092.00007FFD344E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD344E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd344e0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (Z04$(Z04$W+4
                                              • API String ID: 0-883391548
                                              • Opcode ID: 905ec5719efea5ce4223fdd2c4604b705c27c92fde7d356dc97fcae24fe06fb1
                                              • Instruction ID: d209ae85b778b79b5c046cab37a303efed2f36cf7a82c5bf0a2ae7eabdcf066d
                                              • Opcode Fuzzy Hash: 905ec5719efea5ce4223fdd2c4604b705c27c92fde7d356dc97fcae24fe06fb1
                                              • Instruction Fuzzy Hash: 1F21F852B19E0B0FF7E5A66C04F527A62C2DF99210B5D01BAD55DC328BED6DEC425340
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4631372092.00007FFD344E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD344E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd344e0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: H.04$H.04$W+4
                                              • API String ID: 0-783351214
                                              • Opcode ID: 08ca5c7feb065e78878a7b231baf170560ec073d3eb43b1cb5dd3a3dc7c469d8
                                              • Instruction ID: 3638550695db9443e056f2b17e295b0d51f976b0154b8d24f1e58b80128dc6ae
                                              • Opcode Fuzzy Hash: 08ca5c7feb065e78878a7b231baf170560ec073d3eb43b1cb5dd3a3dc7c469d8
                                              • Instruction Fuzzy Hash: 6121C512B0DD0A0FF7E6A62C04B527A62C2DFD9610B6D11BAD61EC769AED6CDC825340
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4631372092.00007FFD344E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD344E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd344e0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: p/04$p/04$W+4
                                              • API String ID: 0-1747664269
                                              • Opcode ID: 67b5542a894b8ac6f457ebaa6c16585c38859c77c078a584c75588ecbfd98f56
                                              • Instruction ID: 2f74ea770cc12b7813cc7dbe05d653d734f3a14195c6e370fc68188fb7044cbb
                                              • Opcode Fuzzy Hash: 67b5542a894b8ac6f457ebaa6c16585c38859c77c078a584c75588ecbfd98f56
                                              • Instruction Fuzzy Hash: 0F219812B0DD4A0BF7E6A62C04F527662C2DFD9650B5D11BED11DC32DAED6CDC826340
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4631372092.00007FFD344E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD344E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd344e0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: H104$H104$W+4
                                              • API String ID: 0-3909057305
                                              • Opcode ID: 1781e543abb58d28f5fe2a4d05f567e4c9ffad076cf31258c2a9ad004bb8e66d
                                              • Instruction ID: 483f5e0835ac111524f1792e5da969b0b085367c3c05fa4d500256c2f919d2a6
                                              • Opcode Fuzzy Hash: 1781e543abb58d28f5fe2a4d05f567e4c9ffad076cf31258c2a9ad004bb8e66d
                                              • Instruction Fuzzy Hash: 6221DA13B0DD4A0FF7E6A22C04B527566C2DF8951076E01BAD51DC728BEC6DDC825340
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4631372092.00007FFD344E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD344E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd344e0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (Z04$(Z04$(Z04
                                              • API String ID: 0-3525749543
                                              • Opcode ID: fb9ba029737cd37493dbd6663896402006dba335f466229f6c43a8fca243481b
                                              • Instruction ID: cd568b8375d1c80508d870606687e72d7c4b25a923d3ddc1b54bd1f63e37edb8
                                              • Opcode Fuzzy Hash: fb9ba029737cd37493dbd6663896402006dba335f466229f6c43a8fca243481b
                                              • Instruction Fuzzy Hash: DB110A52B1DE0B0BF7E6A66C14F123662C2EF95210B9E017AD55EC32CAED6CDC825300
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4630606157.00007FFD34410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34410000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd34410000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4587ce164f5a400b4f476d05bc443bd633f77ad52b4ad0e159506bf5f1afcc24
                                              • Instruction ID: f7edb944155042fad966ffa40c2ea4e6ccc21a1405960ca1d2d488d976aadcb8
                                              • Opcode Fuzzy Hash: 4587ce164f5a400b4f476d05bc443bd633f77ad52b4ad0e159506bf5f1afcc24
                                              • Instruction Fuzzy Hash: 10710631B1CA594FEB58EB6C98A65B97BE0EF59310B14417FD05ED3283DE28A842C781
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4627251365.00007FFD341A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd341a0000_Clienty.jbxd
                                              Similarity
                                              • API ID: DeleteFile
                                              • String ID:
                                              • API String ID: 4033686569-0
                                              • Opcode ID: 2a5b41c59dc7f1392d93ed98d4af11e626aa2d5498eab06eb9c07d2d4ae63837
                                              • Instruction ID: 3f09e6d8796fdf3f9886bd9f74bb3958013ed6033929d2fc725b4e7d4d6defd6
                                              • Opcode Fuzzy Hash: 2a5b41c59dc7f1392d93ed98d4af11e626aa2d5498eab06eb9c07d2d4ae63837
                                              • Instruction Fuzzy Hash: 5941143190DB4C8FDB59DF6888596E9BFF0FF56310F0442ABC049D3692DA28A805C791
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4627251365.00007FFD341A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd341a0000_Clienty.jbxd
                                              Similarity
                                              • API ID: DeleteFile
                                              • String ID:
                                              • API String ID: 4033686569-0
                                              • Opcode ID: 69056ee7071f165133155e72a9ae508da65c2a47db105dc5af069e03b2523ebc
                                              • Instruction ID: 9f0108b6bb5e3e4004e721da9284b702b2ddf072d311a1fe1fbf40c588154a24
                                              • Opcode Fuzzy Hash: 69056ee7071f165133155e72a9ae508da65c2a47db105dc5af069e03b2523ebc
                                              • Instruction Fuzzy Hash: EB31F03190CB5C8FDB59DB9888596E9BBF0FF66320F04426FC049D3292CB74A805CB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4631372092.00007FFD344E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD344E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd344e0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: "&_L
                                              • API String ID: 0-1442238171
                                              • Opcode ID: 7be10c99ede2b022fe0a461fe5e281533003581ef1ae704ffa1039d0aa649c8d
                                              • Instruction ID: 1787440c8da1ee4292b3938f5d4fa24d3d63130d5ea22e669fb7673e76a22fcd
                                              • Opcode Fuzzy Hash: 7be10c99ede2b022fe0a461fe5e281533003581ef1ae704ffa1039d0aa649c8d
                                              • Instruction Fuzzy Hash: 98312662B0CA990FE799EB6C5876275B7C1EB56310F0901BED4ADC32D3DD59AC828342
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4631372092.00007FFD344E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD344E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd344e0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: W+4
                                              • API String ID: 0-359149727
                                              • Opcode ID: dbf82f76d7671daa2921a0b92c0d7e7ca82e121445367c89560313e3e73eb149
                                              • Instruction ID: 75c439c347b83e1a2511d85612c02aab6358ec0ce7c960063719c7c9e8a01574
                                              • Opcode Fuzzy Hash: dbf82f76d7671daa2921a0b92c0d7e7ca82e121445367c89560313e3e73eb149
                                              • Instruction Fuzzy Hash: 1E21E712B09D0A0FF7E5A62C04B527562C2FF9A650B5D01BED55EC32DADD6DEC826340
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4631372092.00007FFD344E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD344E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd344e0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: W+4
                                              • API String ID: 0-359149727
                                              • Opcode ID: 0d9a33f6538fc0b371f9939f671cfbb1f37e7c89127405c2508425aeeb1cb9d8
                                              • Instruction ID: b682614bb87396cce3e4488740b157087c49a2cb8462a5fcd081f7f30a1965b5
                                              • Opcode Fuzzy Hash: 0d9a33f6538fc0b371f9939f671cfbb1f37e7c89127405c2508425aeeb1cb9d8
                                              • Instruction Fuzzy Hash: 34213A12B09D4A0FFBE6A62C04F027562C2DF89600B5D01BED55DC32CAED6DEC825340
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4631372092.00007FFD344E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD344E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd344e0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: W+4
                                              • API String ID: 0-359149727
                                              • Opcode ID: f9d46f49126dbac814e193521427bf6224ee05bc90f068dea905ae505f96a00c
                                              • Instruction ID: 2ebe38269de3e757d7fb8ee2d142a82e1e50100705ededebd362590b2afc0b66
                                              • Opcode Fuzzy Hash: f9d46f49126dbac814e193521427bf6224ee05bc90f068dea905ae505f96a00c
                                              • Instruction Fuzzy Hash: 8321C712B19E0B0BF7E9A62C14B527A62C3EFD9250B5D02BBD15EC328ADC5CDC876341
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4631372092.00007FFD344E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD344E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd344e0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: W+4
                                              • API String ID: 0-359149727
                                              • Opcode ID: f6f771ff68fe66dadfd20e2460b11e92f67b5a11e704c4075dc7c85694849d7f
                                              • Instruction ID: ec2b58f4f584cbe69e5ecf2ac7483a65d0d5a12979f0441f7f20bcd562740a0d
                                              • Opcode Fuzzy Hash: f6f771ff68fe66dadfd20e2460b11e92f67b5a11e704c4075dc7c85694849d7f
                                              • Instruction Fuzzy Hash: F021B652B0AE4A0FF7E5A66C04F527962C2EF99110B5E01BED51DC379BDC6CEC826340
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4631372092.00007FFD344E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD344E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd344e0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: W+4
                                              • API String ID: 0-359149727
                                              • Opcode ID: e8db771a18baff56f2111194ca9f764a3886f230d1e5c5d608df997ac500ea4d
                                              • Instruction ID: 33e8306c9f44559da6634f75ce68a3977cc9adada74d17ea4f8f811547ddd9ef
                                              • Opcode Fuzzy Hash: e8db771a18baff56f2111194ca9f764a3886f230d1e5c5d608df997ac500ea4d
                                              • Instruction Fuzzy Hash: E1210A12B09D4A0FF7E6A66C04B523A62C2FFD9600B5D01BED55EC328BDD6DEC426340
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4631372092.00007FFD344E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD344E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd344e0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: W+4
                                              • API String ID: 0-359149727
                                              • Opcode ID: 5cdc2013169ec4fb3f2120e489fd95b8c4018dba5a79f58f1c254a6f7d28e152
                                              • Instruction ID: 43d11c6183b60b21210792f46940ab8e9a3b543fc4a23ce49a690c50a349f854
                                              • Opcode Fuzzy Hash: 5cdc2013169ec4fb3f2120e489fd95b8c4018dba5a79f58f1c254a6f7d28e152
                                              • Instruction Fuzzy Hash: 8321DA13B0DD0A0FF7E6A62C04B523562C2EFD9210B6E11BAD11DC329AED6CDC425341
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4631372092.00007FFD344E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD344E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd344e0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: W+4
                                              • API String ID: 0-359149727
                                              • Opcode ID: bfee6eed0264693dcca19859c3cf3660a003fa6ab2a0692a20f86f174da845b1
                                              • Instruction ID: 145e84da586921e9b9126a9b81741ab67ddfd5fa9e00fd86f13e3dcaeca2ae09
                                              • Opcode Fuzzy Hash: bfee6eed0264693dcca19859c3cf3660a003fa6ab2a0692a20f86f174da845b1
                                              • Instruction Fuzzy Hash: EB21C222B0AE4A0BF3E5A62C04B527662C3EFC9110B5D41BAD61DC329ADC6CEC866240
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4631372092.00007FFD344E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD344E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd344e0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f78f992f9775ef3e0c3790eafb8f023faa4ec6720dc0e0e54436fbb0b73829d3
                                              • Instruction ID: 589684afd4134a2b593304170bcecddda8da53e73a80e1f9b6da7c011f25ee01
                                              • Opcode Fuzzy Hash: f78f992f9775ef3e0c3790eafb8f023faa4ec6720dc0e0e54436fbb0b73829d3
                                              • Instruction Fuzzy Hash: 17818E12B19EAB0BE7869B6C44F53766696FF9A700F4A407AD20DC72CBCD5CEC055382
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4631372092.00007FFD344E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD344E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd344e0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ff33752fdd54d1ee384dd4e7ff38645da7dd373d646c78f832bde295c7abae6e
                                              • Instruction ID: 6230d09529f3f25f80fb670c149158d7e528a073499a84a93a678e45230e29ca
                                              • Opcode Fuzzy Hash: ff33752fdd54d1ee384dd4e7ff38645da7dd373d646c78f832bde295c7abae6e
                                              • Instruction Fuzzy Hash: E351C022A0EBD50FE76787285CB56663FA0EF23210F0E01FBC499CB1E3D94CA8459352
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4626594518.00007FFD3408D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD3408D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd3408d000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 013c7b525b94f10b6a4ce9c82fe35c6fa3a92d505718eb6bceb091781c611a91
                                              • Instruction ID: 25f769435e01bd1aa77aaf52405b6587468370d4d739be55657d306cac16a749
                                              • Opcode Fuzzy Hash: 013c7b525b94f10b6a4ce9c82fe35c6fa3a92d505718eb6bceb091781c611a91
                                              • Instruction Fuzzy Hash: D441C33150DBC45FD796DB28D8959623FF0EF57320B1506DFD088CB1A3D629A84AC7A2
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4631372092.00007FFD344E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD344E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd344e0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1f8b837c6f502b765be4975400060c49a3f0fa88b76258a1a55af26c5ede3938
                                              • Instruction ID: b2b700add2d8d6604ebc54aa954e76624587426aba661745254fc32aa2491987
                                              • Opcode Fuzzy Hash: 1f8b837c6f502b765be4975400060c49a3f0fa88b76258a1a55af26c5ede3938
                                              • Instruction Fuzzy Hash: DF312862B0DA890FE798DA1C58662B9B7C1EF5A310F4901BED09EC3293DD1DAC428342
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4631372092.00007FFD344E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD344E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd344e0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: df90c55aa47c72b812ce368069c667c663c4d14d483acbfbfc1aa9a661a2f8f9
                                              • Instruction ID: c32e3ac5ef26bbf739493537a1905e960a3564b1bd2f3f3d972786ab6f078e33
                                              • Opcode Fuzzy Hash: df90c55aa47c72b812ce368069c667c663c4d14d483acbfbfc1aa9a661a2f8f9
                                              • Instruction Fuzzy Hash: 4411C812B09E4A0FF7EAA62C04B163563C2EF99210B6E017ED51DC32DADD6DEC825340
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4631372092.00007FFD344E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD344E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd344e0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2d76894b3688c49c9aeee4ef3b8aef4ba73d7558aeaab9e6907abe1f10fe02ac
                                              • Instruction ID: dcd471917937a1f80eb581eb0da2c9360ac7f002576897bdcc0babfe13ff5edd
                                              • Opcode Fuzzy Hash: 2d76894b3688c49c9aeee4ef3b8aef4ba73d7558aeaab9e6907abe1f10fe02ac
                                              • Instruction Fuzzy Hash: 5CD0C91376A91207F684218C68A23F9B285DB89710F54513AE619C22CBC8CEADC152C3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4627251365.00007FFD341A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd341a0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (|+4$8{+4$}+4$~+4
                                              • API String ID: 0-394687215
                                              • Opcode ID: a513d6bf1549b20396f7e808193c2b4526c27ce00dd3591669a433e5bd7f7448
                                              • Instruction ID: e74e7988ca07b30f40546b540c1211613b94fce3391817eaa753529cf7762a79
                                              • Opcode Fuzzy Hash: a513d6bf1549b20396f7e808193c2b4526c27ce00dd3591669a433e5bd7f7448
                                              • Instruction Fuzzy Hash: EDA1FB47A0FEC10FFBA2866C28651B96F90AF9336471C01F7D5D8DA1DB990CAC0DA356
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4627251365.00007FFD341A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd341a0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4$N_^
                                              • API String ID: 0-238985750
                                              • Opcode ID: 8c5217fa31bfad5bd2fcd54e9ae0d7ffb11a3806e99a5f46913ec42b7d2e99bf
                                              • Instruction ID: ef49bb2ab766f4eeabc805e0c56d3cf68f4489e806b3c9984db7b35ed17e536c
                                              • Opcode Fuzzy Hash: 8c5217fa31bfad5bd2fcd54e9ae0d7ffb11a3806e99a5f46913ec42b7d2e99bf
                                              • Instruction Fuzzy Hash: 77426317B0D6A286F662B6BCB4F61EB3F54CF4263E70841B7D2DCD9093AC0C544E92A5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4630606157.00007FFD34410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34410000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd34410000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: ?(_^$B(_^
                                              • API String ID: 0-1559863765
                                              • Opcode ID: 0511481ca227489a4a62e807b8d190b4bed2e3670aaf2bce9c672be367aa593a
                                              • Instruction ID: 699443b19a721669d4137c08a4fab39c61be1c19e7d1df26b19a90811412ff19
                                              • Opcode Fuzzy Hash: 0511481ca227489a4a62e807b8d190b4bed2e3670aaf2bce9c672be367aa593a
                                              • Instruction Fuzzy Hash: 53124E17A0E2D25AEB23F3B964B20EA7F64DF0362E71D01F7D1DC89493D90C644E92A5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4630606157.00007FFD34410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34410000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd34410000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: !(_^
                                              • API String ID: 0-3194240375
                                              • Opcode ID: 90859071c33ea71aef9ba472011cd445ca3e12b45fb55774e02dc7b042d3318e
                                              • Instruction ID: 1885e0f55a37899618b4f03ddd3c7bab02da58af3b25b1b7de0a08f8d14b90a1
                                              • Opcode Fuzzy Hash: 90859071c33ea71aef9ba472011cd445ca3e12b45fb55774e02dc7b042d3318e
                                              • Instruction Fuzzy Hash: 4202E217A0D3D26AE712F7FCA4B60E63F54EF0332E71841B7D1989A493DD1D604AC2A5
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4630606157.00007FFD34410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34410000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd34410000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f07836aeaaf8edf3a345e73375adb67e390902f25e223e1a4f3e2001e4905812
                                              • Instruction ID: 9f14c4ddf78895d6f5bf6c5caf7f98e5bae366b410963636e88143e33accb647
                                              • Opcode Fuzzy Hash: f07836aeaaf8edf3a345e73375adb67e390902f25e223e1a4f3e2001e4905812
                                              • Instruction Fuzzy Hash: F1F1C617A0E2E25BE622F3BDB4B20E63F54DF4322D71901B7D1D89E493DD1C618AC2A5
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4631372092.00007FFD344E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD344E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd344e0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9a607fda3ab303adba8004ed0a2f3e75865f7484be453ba3aa0b2321dde8ca43
                                              • Instruction ID: 31dfa34554c2120b623588fbe5ce165b29fd14fe9fe6b48330b380ad36d52c06
                                              • Opcode Fuzzy Hash: 9a607fda3ab303adba8004ed0a2f3e75865f7484be453ba3aa0b2321dde8ca43
                                              • Instruction Fuzzy Hash: C7D1272170CA890FE765EB2C88A56767BD1FF56310F0902BED19DC72D7DE58AC829381
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4630606157.00007FFD34410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34410000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd34410000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4c54a6c93bf68e03d9e030fe5a89fe15ffff78c1473a38d7a4a81b1c492550ca
                                              • Instruction ID: 615135fd8862b03b79bd4cba55fd3a98417725777ae677f8915b62f5c3565a7c
                                              • Opcode Fuzzy Hash: 4c54a6c93bf68e03d9e030fe5a89fe15ffff78c1473a38d7a4a81b1c492550ca
                                              • Instruction Fuzzy Hash: 24918107A0D2E25AFA23F7BC64B60EB7F58DF0332E71941B7D1DC9A4539D0C204A92A5
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4627251365.00007FFD341A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd341a0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0ca7ceeb96ca68e2ce27d98bb0af801a5c2a1f243abaca6c88b421bd366e1e6d
                                              • Instruction ID: 920e74eb417e4572e56d0bef1aefc8ec3c134b7d49a87545851a7bff8db1cfe0
                                              • Opcode Fuzzy Hash: 0ca7ceeb96ca68e2ce27d98bb0af801a5c2a1f243abaca6c88b421bd366e1e6d
                                              • Instruction Fuzzy Hash: 2281B827B0D6A24BE723E7BCBCB51D57B90DF4267E70841B7C298CA093DD18604A87A5
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4630606157.00007FFD34410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34410000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd34410000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 307ffb26de06f605e2c0c552a4a2425e9c1054579c486640f853ade6e0ad1541
                                              • Instruction ID: 0766587f4c8d5742e17098ee49e189b2e53805fc57754c368cac3a4d1993a9d3
                                              • Opcode Fuzzy Hash: 307ffb26de06f605e2c0c552a4a2425e9c1054579c486640f853ade6e0ad1541
                                              • Instruction Fuzzy Hash: 1E818307A0D2E25AFA23F7FC64B60EB7F58DF0322E71941B7D1DC9A4539D09204A92A5
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4627251365.00007FFD341A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd341a0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c5680492b8f7367f1e99446aa82b19174858b7960f8f06f03ab17d1d5ab9edd2
                                              • Instruction ID: 3c0721e512f8791ed563595d7b29b380b007b87757ee82e379b4a859172de7f6
                                              • Opcode Fuzzy Hash: c5680492b8f7367f1e99446aa82b19174858b7960f8f06f03ab17d1d5ab9edd2
                                              • Instruction Fuzzy Hash: E18162275092D246EB16F7BDA8F64E73F54DF0262DB0901BBD6DD8D053ED08214AC3A6
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4630606157.00007FFD34410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34410000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd34410000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ef0add74981ba757365f1b2da597737d994e912b0c8a9a3bb01ead380a8fc49e
                                              • Instruction ID: f75adcf0ad95cc29c30e11c8919bd7eba38f6f9cfb3b05c0d138c4613cf696a0
                                              • Opcode Fuzzy Hash: ef0add74981ba757365f1b2da597737d994e912b0c8a9a3bb01ead380a8fc49e
                                              • Instruction Fuzzy Hash: 21618207A0D2D25AFA23F7BC64B60EB7F58DF0332E71D41B7D1DC9A4539C09244A92A5
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4627251365.00007FFD341A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd341a0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 086b004d0ba3e4668d31ac5e14c8de76fd8828b929fd2f3f9b1824332f41c4e3
                                              • Instruction ID: 7f7c081527991b58935b907c516dc43aa602a569641c6ceebdb8cd364783f153
                                              • Opcode Fuzzy Hash: 086b004d0ba3e4668d31ac5e14c8de76fd8828b929fd2f3f9b1824332f41c4e3
                                              • Instruction Fuzzy Hash: 8651802790D2D19BE726E7ACA8B60E77F54DF1222D71D02FAC2DC8D153ED09214AC396
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4630606157.00007FFD34410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34410000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd34410000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c65bd3113e4e5a454ea4cc05639362aebb294c0331b26248b646bbc30c61a224
                                              • Instruction ID: fef7859bf00fd1a63f1f5bba52e91e45c36a2bfd9c41040827789e2f8d7759ec
                                              • Opcode Fuzzy Hash: c65bd3113e4e5a454ea4cc05639362aebb294c0331b26248b646bbc30c61a224
                                              • Instruction Fuzzy Hash: 5A41C357B1DAD22BE363566E78F60D52BE4EF932B070A04B3C6C4CB097EE0D184B5261
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4630606157.00007FFD34410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34410000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd34410000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 56c067427ff0be904a10791b0684c03cd17ab19b1afe67fe8ae7cfd4835c1d94
                                              • Instruction ID: 950082371dafc5ddc9a00b55c18b054dc1317968d54f3aae1a7481d1c0347c29
                                              • Opcode Fuzzy Hash: 56c067427ff0be904a10791b0684c03cd17ab19b1afe67fe8ae7cfd4835c1d94
                                              • Instruction Fuzzy Hash: 1131654BB0DAD21AF7A2516D69B71DA2BD4EF932F170A10B3C7C4C7097AE4D0C4B6291
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4627251365.00007FFD341A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd341a0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 62906d9daef1d1c305430d2485b55b774a25cbb4d308c348371bc6185efb049e
                                              • Instruction ID: 653f3f941cd8e77f83792a89dc22f8dc03adbee371540ed752e505d6cd61fe0c
                                              • Opcode Fuzzy Hash: 62906d9daef1d1c305430d2485b55b774a25cbb4d308c348371bc6185efb049e
                                              • Instruction Fuzzy Hash: 4431231BA0D1A156FA22F3FCB4B20EB3B54DF5267E70841B3D29C9D4539C18548E86E5
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4627251365.00007FFD341A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd341a0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5cd6373230cc95bf826495cf659ba7de2ebab09d11fc6134300c381f0ac6b5d5
                                              • Instruction ID: 3d5fbe5ed5b1728bebd12a38bffb0e16515f77f5acfbc330ce125d4be8a32349
                                              • Opcode Fuzzy Hash: 5cd6373230cc95bf826495cf659ba7de2ebab09d11fc6134300c381f0ac6b5d5
                                              • Instruction Fuzzy Hash: 4BD0C927E092A28BFA62F6B874B21DB33949F0262D75841B2D0989A083EE1D64495155
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4631372092.00007FFD344E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD344E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ffd344e0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 04$04$04$04
                                              • API String ID: 0-2611335706
                                              • Opcode ID: 3eca21e7686257ad32056ab06cd334298ced0d4f9805168ecb1944805f3994dc
                                              • Instruction ID: beb965af470b50e009a96dc0e30c18ec0552a103697509c79b4f795312303823
                                              • Opcode Fuzzy Hash: 3eca21e7686257ad32056ab06cd334298ced0d4f9805168ecb1944805f3994dc
                                              • Instruction Fuzzy Hash: 2241F522B0EEC60FE7E2937804B11B62BE19F87120B1E01FAD18CC71C7DD6DA8829351
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2227526097.00007FFD341D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7ffd341d0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0W.4$8B.4$H].4$XA.4$X.4
                                              • API String ID: 0-2580930554
                                              • Opcode ID: 9f0bd2a3fd4592af57e914337342072e933b276026a99d287da94d54c5eee02c
                                              • Instruction ID: bd7344fabe9f4a4c7411d84297ef48e904765dbd92575845177c3707b2552d25
                                              • Opcode Fuzzy Hash: 9f0bd2a3fd4592af57e914337342072e933b276026a99d287da94d54c5eee02c
                                              • Instruction Fuzzy Hash: ADA1E5A3F0AD8A0FEBD5EB2884A56B977D1EF97340F0401BAD55DC7197CE2CA8429341
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2227526097.00007FFD341D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7ffd341d0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: H
                                              • API String ID: 0-2852464175
                                              • Opcode ID: bc02f5046f8a8b0bcdbbe9be8f8aeb7130f9b4ccbeffc922e29b5539b242a6e5
                                              • Instruction ID: 3d9f61e270036213eb898e020201c55e9e092f4678b385826b3a82d9eec0db92
                                              • Opcode Fuzzy Hash: bc02f5046f8a8b0bcdbbe9be8f8aeb7130f9b4ccbeffc922e29b5539b242a6e5
                                              • Instruction Fuzzy Hash: A1716D62F19D0D4FEB98EB5884A57BCB3E2EF9A310F540579D51ED32C2CE28AC029740
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2227526097.00007FFD341D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7ffd341d0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: ;L_I
                                              • API String ID: 0-1305308343
                                              • Opcode ID: d870cb4bfb5c4889a22e6a36d262d4432a8fd081993f47062e98f6f56b6c2186
                                              • Instruction ID: d4e98ea94ce28253e15ca87e4c839e43678d6910085f3a6d36b964ddd1140173
                                              • Opcode Fuzzy Hash: d870cb4bfb5c4889a22e6a36d262d4432a8fd081993f47062e98f6f56b6c2186
                                              • Instruction Fuzzy Hash: A3813567B1E9814BF795E7AC94B51F53FA0EF43308F9480FAD4C88729BD928A845C385
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2227526097.00007FFD341D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7ffd341d0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: `.4
                                              • API String ID: 0-1228617679
                                              • Opcode ID: 9d10527ea4541ff623f7ea747e7ba4a63cac76e67c3c4ee8d725a52eb47c4eb9
                                              • Instruction ID: b0e8cd11f89b748a1721bcb28716a51d81f573c88d4a4ff69bd7660cbbf3fa88
                                              • Opcode Fuzzy Hash: 9d10527ea4541ff623f7ea747e7ba4a63cac76e67c3c4ee8d725a52eb47c4eb9
                                              • Instruction Fuzzy Hash: 9D519056F5DE560BFBD6B3B840B56F92BD2AB87250B9481B5D008C7297CD1C9C42C385
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2227526097.00007FFD341D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7ffd341d0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: XA.4
                                              • API String ID: 0-1947656767
                                              • Opcode ID: 6dafb6ec134dde6fa8dcea61f6d7f99cba3bd15eb3ee6b6678bca8d3a6d4baae
                                              • Instruction ID: bdc245f0d18ae2e161035c2559899f2a512208e2372c2bcc162f3c45d9a08f08
                                              • Opcode Fuzzy Hash: 6dafb6ec134dde6fa8dcea61f6d7f99cba3bd15eb3ee6b6678bca8d3a6d4baae
                                              • Instruction Fuzzy Hash: E3410463F0D9894FEB92EB6884B1AF977A1EF97310F0400B6E15DC7183CE2CA8419742
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2227526097.00007FFD341D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7ffd341d0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: .L_^
                                              • API String ID: 0-2849591005
                                              • Opcode ID: 0531e5763babfe534dab1a8cfc178ff1c69e08c4802e928a8d793ddea18e6399
                                              • Instruction ID: 0924d9f5e4dbd58e18475fb8fe64a4295a061b635e5a5d4185802f0d70567526
                                              • Opcode Fuzzy Hash: 0531e5763babfe534dab1a8cfc178ff1c69e08c4802e928a8d793ddea18e6399
                                              • Instruction Fuzzy Hash: 5B21AE67B0DA590FE795A62CACA61F53BD1EF9723170901B7C248C7153CC1C5C0A9396
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2227526097.00007FFD341D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7ffd341d0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0w*4
                                              • API String ID: 0-3457049077
                                              • Opcode ID: ff23f44d5aaae8a7ef3f52c5f7d2815d544ea91b0abd7d4b4675fcfc6c480bb2
                                              • Instruction ID: 45477efac5effc1054c70dac80e32b159df218045b2200ae4165d90c2627dc12
                                              • Opcode Fuzzy Hash: ff23f44d5aaae8a7ef3f52c5f7d2815d544ea91b0abd7d4b4675fcfc6c480bb2
                                              • Instruction Fuzzy Hash: 8B21B192E1EE854FF795A77858752B56B90EF97244F4805BEC089CB1D7DC0C68058391
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2227526097.00007FFD341D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7ffd341d0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: cb1c356903a549cac2e589c3cedefa3903a04b7609133a84c98341696f8e841d
                                              • Instruction ID: 0458c6f444a326928878de487c151175345954af2921f47aface60650d2c351c
                                              • Opcode Fuzzy Hash: cb1c356903a549cac2e589c3cedefa3903a04b7609133a84c98341696f8e841d
                                              • Instruction Fuzzy Hash: 8941F962B1DE454FE768A75894667BEB7D1EF9A314F04017EE05EC32C2CD2C68428392
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2227526097.00007FFD341D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7ffd341d0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: cc99da702a45bd78acd495b07da0ffe306bc850e8380c36c29b3d173c56d1a72
                                              • Instruction ID: b452456c9429c49b6ae6d846b310a58b04f2f7db69d48619ff8179790d3bb4be
                                              • Opcode Fuzzy Hash: cc99da702a45bd78acd495b07da0ffe306bc850e8380c36c29b3d173c56d1a72
                                              • Instruction Fuzzy Hash: 90210532E099424FEB88DF58C4D15B573A1EF57310B2482B5D10CCB1ABEA2CEC86C780
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2227526097.00007FFD341D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7ffd341d0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: cc8cfea4c634458fe8476d3863a676a4465246234656a79048e4c42661197d5d
                                              • Instruction ID: a32943015074af39943af2a6299dde863b23921f5d2c63bec26ac5d16f3aedbf
                                              • Opcode Fuzzy Hash: cc8cfea4c634458fe8476d3863a676a4465246234656a79048e4c42661197d5d
                                              • Instruction Fuzzy Hash: BD31B83A7696454FF358F75C80B62E53FA2AB85304FE0856DD418837C6CE7C6540C791
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2227526097.00007FFD341D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7ffd341d0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1028db9fc50a0a2c1610476fa5a634577a3bd61a9d41fa7e19c59ce4eabf1e5d
                                              • Instruction ID: b911c950beb7950fc156c0fa24bcdf624338329ea6dd3ecfd0c0110cd4e62657
                                              • Opcode Fuzzy Hash: 1028db9fc50a0a2c1610476fa5a634577a3bd61a9d41fa7e19c59ce4eabf1e5d
                                              • Instruction Fuzzy Hash: 5921A131F19A594FE795FB6884A96B973E1FF5A301B4504BAE40DC72A2DE28EC40C780
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2227526097.00007FFD341D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7ffd341d0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 31ebfa2e474191d06eee1ea1b26d25125b22216390965c531aa76420ba242d1e
                                              • Instruction ID: 0406c4d888cfd2d129cb5cb95ea3a708ef0700d4602b5575d8b90f6c0fabbd38
                                              • Opcode Fuzzy Hash: 31ebfa2e474191d06eee1ea1b26d25125b22216390965c531aa76420ba242d1e
                                              • Instruction Fuzzy Hash: BA115072F0EE850FE356E67868994F67BD1DF9622470842BBD44DC31A3CD0D99868351
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2227526097.00007FFD341D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7ffd341d0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d3536228ab0c2dc71954f0c62ed3d59e7f5764aa5f8b03ffa38a8fc85924525e
                                              • Instruction ID: bdcaf6aadcd75e3800b433969503ba349c29fc1840816e2165035e30e6e0af80
                                              • Opcode Fuzzy Hash: d3536228ab0c2dc71954f0c62ed3d59e7f5764aa5f8b03ffa38a8fc85924525e
                                              • Instruction Fuzzy Hash: 2E11E521B0EAC80FE347E33858A8BB47FE1AF87211B0901F7E088CB1A3C95D4845C342
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2227526097.00007FFD341D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7ffd341d0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6ed08fccea15859cc18379cba88557e77a89475f4112a0fca05d78354f2b309d
                                              • Instruction ID: 76cb980401491c0502935247727337cb5dbf34d54d90164b78279c526110a456
                                              • Opcode Fuzzy Hash: 6ed08fccea15859cc18379cba88557e77a89475f4112a0fca05d78354f2b309d
                                              • Instruction Fuzzy Hash: 10016D53F2AC870EE795A22C54E55FA2BD1EF97310B04057BD44ED3186DC086C824381
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2227526097.00007FFD341D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7ffd341d0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b123134e7845bac698a5e052c261b89184ccacaa2b08ef5006481fcea0712fd9
                                              • Instruction ID: 6317b0c464e10a77b27866e85d8d0a6e996c6776b737e244e6991cd7ebb85097
                                              • Opcode Fuzzy Hash: b123134e7845bac698a5e052c261b89184ccacaa2b08ef5006481fcea0712fd9
                                              • Instruction Fuzzy Hash: 43F0B422B19C1D0FE794F2AD54E9AFA67D5DBAD22671401B7E40CC72A3DC1898428391
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2227526097.00007FFD341D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7ffd341d0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: cf2fcb768ab3a1872187fcdbb8022f921e44b6d07f0cb8218b4d4bf76eaae054
                                              • Instruction ID: b239492807b849f28662e7fbf9e7cd3818fbd8ac7d8b4317bf6a1c8a9ccc7eef
                                              • Opcode Fuzzy Hash: cf2fcb768ab3a1872187fcdbb8022f921e44b6d07f0cb8218b4d4bf76eaae054
                                              • Instruction Fuzzy Hash: FFE09232F19C1D1FABA8F6AD44D9B7962D6EBAD21171006B6E80CC73A6DC199C419380
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2227526097.00007FFD341D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7ffd341d0000_Clienty.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3821f6940dd39a6fbf2b227f744f565f90f44156a17ac0bdf24e285a0af1ddea
                                              • Instruction ID: 7ac8f857d82e7ffcd041edf9876ee45cecd9540ab270be116c1f9bf6efd0345c
                                              • Opcode Fuzzy Hash: 3821f6940dd39a6fbf2b227f744f565f90f44156a17ac0bdf24e285a0af1ddea
                                              • Instruction Fuzzy Hash: 41E08663F1AD1607E5DA323C64721BD13C0DF9A695B40147AE60DD6687DC2E6C829285