Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
EasyWay.exe

Overview

General Information

Sample name:EasyWay.exe
Analysis ID:1630777
MD5:8c40e1b46c424cff6504ef00ae2da835
SHA1:f9dfa95368e73e702206c81705c57bac6b1b1cc1
SHA256:88a50f28710dfe08f6ca8f47f44b8689ba38edacdf92e32b0ae705fbf8faf97a
Tags:exeLummaStealertrojanuser-edv
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to modify clipboard data
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • EasyWay.exe (PID: 3704 cmdline: "C:\Users\user\Desktop\EasyWay.exe" MD5: 8C40E1B46C424CFF6504EF00AE2DA835)
    • EasyWay.exe (PID: 7140 cmdline: "C:\Users\user\Desktop\EasyWay.exe" MD5: 8C40E1B46C424CFF6504EF00AE2DA835)
    • WerFault.exe (PID: 7092 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3704 -s 784 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
{"C2 url": ["sdfwfsdf.icu", "explorebieology.run", "moderzysics.top", "seedsxouts.shop", "codxefusion.top", "farfinable.top", "techspherxe.top"], "Build id": "LPnhqo--qnhtzqcrazyg"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000001.00000002.3400846481.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
        00000000.00000002.2223996706.0000000003829000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
          Process Memory Space: EasyWay.exe PID: 7140JoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
            SourceRuleDescriptionAuthorStrings
            1.2.EasyWay.exe.400000.0.raw.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
              1.2.EasyWay.exe.400000.0.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
                0.2.EasyWay.exe.3829550.0.raw.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
                  No Sigma rule has matched
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-06T09:26:32.672032+010020283713Unknown Traffic192.168.2.649710149.154.167.99443TCP
                  2025-03-06T09:26:34.654997+010020283713Unknown Traffic192.168.2.649713188.114.97.3443TCP
                  2025-03-06T09:26:36.273445+010020283713Unknown Traffic192.168.2.649715188.114.97.3443TCP
                  2025-03-06T09:26:38.508992+010020283713Unknown Traffic192.168.2.649723188.114.97.3443TCP
                  2025-03-06T09:26:41.420886+010020283713Unknown Traffic192.168.2.649729188.114.97.3443TCP
                  2025-03-06T09:26:44.300501+010020283713Unknown Traffic192.168.2.649735188.114.97.3443TCP
                  2025-03-06T09:26:47.102970+010020283713Unknown Traffic192.168.2.649742188.114.97.3443TCP
                  2025-03-06T09:26:49.996841+010020283713Unknown Traffic192.168.2.649749188.114.97.3443TCP
                  2025-03-06T09:26:52.941602+010020283713Unknown Traffic192.168.2.649755188.114.97.3443TCP
                  2025-03-06T09:26:57.164673+010020283713Unknown Traffic192.168.2.649763188.114.97.3443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-06T09:26:36.725078+010020546531A Network Trojan was detected192.168.2.649715188.114.97.3443TCP
                  2025-03-06T09:26:39.488598+010020546531A Network Trojan was detected192.168.2.649723188.114.97.3443TCP
                  2025-03-06T09:26:58.066502+010020546531A Network Trojan was detected192.168.2.649763188.114.97.3443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-06T09:26:36.725078+010020498361A Network Trojan was detected192.168.2.649715188.114.97.3443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-06T09:26:34.654997+010020606231Domain Observed Used for C2 Detected192.168.2.649713188.114.97.3443TCP
                  2025-03-06T09:26:36.273445+010020606231Domain Observed Used for C2 Detected192.168.2.649715188.114.97.3443TCP
                  2025-03-06T09:26:38.508992+010020606231Domain Observed Used for C2 Detected192.168.2.649723188.114.97.3443TCP
                  2025-03-06T09:26:41.420886+010020606231Domain Observed Used for C2 Detected192.168.2.649729188.114.97.3443TCP
                  2025-03-06T09:26:44.300501+010020606231Domain Observed Used for C2 Detected192.168.2.649735188.114.97.3443TCP
                  2025-03-06T09:26:47.102970+010020606231Domain Observed Used for C2 Detected192.168.2.649742188.114.97.3443TCP
                  2025-03-06T09:26:49.996841+010020606231Domain Observed Used for C2 Detected192.168.2.649749188.114.97.3443TCP
                  2025-03-06T09:26:52.941602+010020606231Domain Observed Used for C2 Detected192.168.2.649755188.114.97.3443TCP
                  2025-03-06T09:26:57.164673+010020606231Domain Observed Used for C2 Detected192.168.2.649763188.114.97.3443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-06T09:26:33.659536+010020606221Domain Observed Used for C2 Detected192.168.2.6613621.1.1.153UDP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-06T09:26:42.410317+010020480941Malware Command and Control Activity Detected192.168.2.649729188.114.97.3443TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: EasyWay.exeAvira: detected
                  Source: moderzysics.topAvira URL Cloud: Label: malware
                  Source: https://sdfwfsdf.icu/&Avira URL Cloud: Label: malware
                  Source: https://sdfwfsdf.icu/apiAvira URL Cloud: Label: malware
                  Source: https://sdfwfsdf.icu/ckGAvira URL Cloud: Label: malware
                  Source: https://sdfwfsdf.icu/apiIgmAvira URL Cloud: Label: malware
                  Source: https://sdfwfsdf.icu/apiZAvira URL Cloud: Label: malware
                  Source: https://sdfwfsdf.icu/PAvira URL Cloud: Label: malware
                  Source: https://sdfwfsdf.icu/Avira URL Cloud: Label: malware
                  Source: sdfwfsdf.icuAvira URL Cloud: Label: malware
                  Source: https://sdfwfsdf.icu/apiGAvira URL Cloud: Label: malware
                  Source: https://sdfwfsdf.icu/LAvira URL Cloud: Label: malware
                  Source: seedsxouts.shopAvira URL Cloud: Label: malware
                  Source: https://sdfwfsdf.icu/apiUjAvira URL Cloud: Label: malware
                  Source: farfinable.topAvira URL Cloud: Label: malware
                  Source: https://sdfwfsdf.icu/3Avira URL Cloud: Label: malware
                  Source: 00000000.00000002.2223996706.0000000003829000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["sdfwfsdf.icu", "explorebieology.run", "moderzysics.top", "seedsxouts.shop", "codxefusion.top", "farfinable.top", "techspherxe.top"], "Build id": "LPnhqo--qnhtzqcrazyg"}
                  Source: EasyWay.exeVirustotal: Detection: 52%Perma Link
                  Source: EasyWay.exeReversingLabs: Detection: 57%
                  Source: 00000000.00000002.2223996706.0000000003829000.00000004.00000800.00020000.00000000.sdmpString decryptor: sdfwfsdf.icu
                  Source: 00000000.00000002.2223996706.0000000003829000.00000004.00000800.00020000.00000000.sdmpString decryptor: explorebieology.run
                  Source: 00000000.00000002.2223996706.0000000003829000.00000004.00000800.00020000.00000000.sdmpString decryptor: moderzysics.top
                  Source: 00000000.00000002.2223996706.0000000003829000.00000004.00000800.00020000.00000000.sdmpString decryptor: seedsxouts.shop
                  Source: 00000000.00000002.2223996706.0000000003829000.00000004.00000800.00020000.00000000.sdmpString decryptor: codxefusion.top
                  Source: 00000000.00000002.2223996706.0000000003829000.00000004.00000800.00020000.00000000.sdmpString decryptor: farfinable.top
                  Source: 00000000.00000002.2223996706.0000000003829000.00000004.00000800.00020000.00000000.sdmpString decryptor: techspherxe.top
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0041BBD9 CryptUnprotectData,1_2_0041BBD9
                  Source: unknownHTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.6:49710 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49715 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49723 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49729 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49735 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49742 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49749 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49755 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49763 version: TLS 1.2
                  Source: EasyWay.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: System.Windows.Forms.pdb source: WEREB0E.tmp.dmp.5.dr
                  Source: Binary string: Thrones.pdb source: WEREB0E.tmp.dmp.5.dr
                  Source: Binary string: mscorlib.pdb source: WEREB0E.tmp.dmp.5.dr
                  Source: Binary string: System.ni.pdbRSDS source: WEREB0E.tmp.dmp.5.dr
                  Source: Binary string: C:\Users\Event\source\repos\Thrones\Thrones\obj\Release\Thrones.pdb source: EasyWay.exe
                  Source: Binary string: System.pdb) source: WEREB0E.tmp.dmp.5.dr
                  Source: Binary string: mscorlib.ni.pdb source: WEREB0E.tmp.dmp.5.dr
                  Source: Binary string: mscorlib.ni.pdbRSDS source: WEREB0E.tmp.dmp.5.dr
                  Source: Binary string: System.ni.pdb source: WEREB0E.tmp.dmp.5.dr
                  Source: Binary string: System.pdb source: WEREB0E.tmp.dmp.5.dr
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+0Ch]1_2_0040C8E0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-67915A82h]1_2_0044989A
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], F7D6D3F6h1_2_0044D0B0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx ebp, byte ptr [esp+ecx-2DA3129Fh]1_2_0042B920
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then mov word ptr [eax], cx1_2_0042B920
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+741DDFE2h]1_2_00447AC0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+778E6F5Ch]1_2_00412AEF
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+00000268h]1_2_00412AEF
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then mov byte ptr [esi], cl1_2_0043633B
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then mov dword ptr [esp+04h], ecx1_2_00443BD0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-144FFED6h]1_2_0042EDB0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx esi, byte ptr [edi+eax]1_2_0040FFFC
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then mov word ptr [esi], cx1_2_0042E030
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx]1_2_0044B030
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 93A82FD1h1_2_004260D0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx edx, byte ptr [edi+ecx-19ACD460h]1_2_0042C8E5
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx edx, byte ptr [ebx+eax+0Ah]1_2_0042C8E5
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then push ebp1_2_00432093
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then mov word ptr [ebx], cx1_2_0041D898
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then jmp eax1_2_00444940
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+18h]1_2_0040D167
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 93A82FD1h1_2_0041F176
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then mov dword ptr [esp+28h], ecx1_2_00436103
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+10h]1_2_00421900
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then mov word ptr [eax], cx1_2_00421900
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+08h]1_2_00432100
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx]1_2_0044B120
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx eax, byte ptr [esp+ebx+0Eh]1_2_0040C130
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx]1_2_0044B139
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx]1_2_0044B13B
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then mov byte ptr [esi], cl1_2_00436986
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then mov byte ptr [esi], cl1_2_0043633B
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx edx, byte ptr [ebp+eax+00h]1_2_00410A60
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]1_2_0040A220
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]1_2_0040A220
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then cmp byte ptr [esi+eax+01h], 00000000h1_2_00430220
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx esi, byte ptr [esp+ebp+02h]1_2_00428AC0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-0CFF799Ah]1_2_004482C0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-0CFF799Ah]1_2_004482C0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx ebx, byte ptr [esp+eax-03FFFFF3h]1_2_00426A80
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx]1_2_0044B2A0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movsx eax, byte ptr [ebp+ecx+00h]1_2_0044AAB1
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+34h]1_2_0042F340
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx edi, byte ptr [esp+ebx]1_2_00445B1F
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then mov word ptr [eax], cx1_2_00431BC6
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-467C15BAh]1_2_004353CF
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx]1_2_0044B3E0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then mov word ptr [edx], ax1_2_0042E3ED
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx eax, byte ptr [esp+ecx+14h]1_2_0040C440
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then mov byte ptr [ebx], cl1_2_0042241C
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+04h]1_2_00444CD0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+74h]1_2_00435CAD
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 1ED597A4h1_2_00447D60
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]1_2_0041AD70
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 93A82FD1h1_2_00428570
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 7A542AABh1_2_0044C500
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-56h]1_2_0041FDD0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+09h]1_2_0041FDD0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then mov byte ptr [esi], al1_2_004375E8
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then mov byte ptr [esi], al1_2_004375EE
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then mov word ptr [eax], cx1_2_00431D9A
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then mov eax, dword ptr [esp+50h]1_2_00422E60
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then mov word ptr [ecx], di1_2_00422E60
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then cmp word ptr [eax+ecx+02h], 0000h1_2_0041E6F5
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then mov byte ptr [ebx], cl1_2_00436F43
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-66C9643Ah]1_2_0040EF50
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movsx eax, byte ptr [edx+ecx]1_2_0040EF50
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-0CFF798Ah]1_2_00420750
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-0CFF7966h]1_2_00420750
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 93A82FD1h1_2_00447F70
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx ebx, byte ptr [esp+esi+6BB68D3Fh]1_2_00425F10
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then cmp word ptr [eax+ecx+02h], 0000h1_2_0041DCC1
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx+000002A0h]1_2_00427F20
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then mov word ptr [esi], cx1_2_00427F20
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]1_2_00432F20
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 4x nop then mov word ptr [eax], dx1_2_0041C7C0

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2060622 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (sdfwfsdf .icu) : 192.168.2.6:61362 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2060623 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (sdfwfsdf .icu in TLS SNI) : 192.168.2.6:49723 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2060623 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (sdfwfsdf .icu in TLS SNI) : 192.168.2.6:49729 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2060623 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (sdfwfsdf .icu in TLS SNI) : 192.168.2.6:49742 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2060623 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (sdfwfsdf .icu in TLS SNI) : 192.168.2.6:49735 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2060623 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (sdfwfsdf .icu in TLS SNI) : 192.168.2.6:49713 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2060623 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (sdfwfsdf .icu in TLS SNI) : 192.168.2.6:49749 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2060623 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (sdfwfsdf .icu in TLS SNI) : 192.168.2.6:49755 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2060623 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (sdfwfsdf .icu in TLS SNI) : 192.168.2.6:49763 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2060623 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (sdfwfsdf .icu in TLS SNI) : 192.168.2.6:49715 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.6:49715 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49715 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49723 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.6:49729 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49763 -> 188.114.97.3:443
                  Source: Malware configuration extractorURLs: sdfwfsdf.icu
                  Source: Malware configuration extractorURLs: explorebieology.run
                  Source: Malware configuration extractorURLs: moderzysics.top
                  Source: Malware configuration extractorURLs: seedsxouts.shop
                  Source: Malware configuration extractorURLs: codxefusion.top
                  Source: Malware configuration extractorURLs: farfinable.top
                  Source: Malware configuration extractorURLs: techspherxe.top
                  Source: global trafficTCP traffic: 192.168.2.6:64940 -> 162.159.36.2:53
                  Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                  Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                  Source: Joe Sandbox ViewIP Address: 149.154.167.99 149.154.167.99
                  Source: Joe Sandbox ViewIP Address: 149.154.167.99 149.154.167.99
                  Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                  Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49729 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49723 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49742 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49735 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49713 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49710 -> 149.154.167.99:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49749 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49755 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49763 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49715 -> 188.114.97.3:443
                  Source: global trafficHTTP traffic detected: GET /kz_prokla1 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: t.me
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: sdfwfsdf.icu
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedCookie: __cf_mw_byp=i5mW1fATjs4MUxlnPduqj21Ft4eT24RjB1JhZQyWRc4-1741249596-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 55Host: sdfwfsdf.icu
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=RHDT08YSTOFJ95FUZCookie: __cf_mw_byp=i5mW1fATjs4MUxlnPduqj21Ft4eT24RjB1JhZQyWRc4-1741249596-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12862Host: sdfwfsdf.icu
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=YUF9CS4AKWV1Cookie: __cf_mw_byp=i5mW1fATjs4MUxlnPduqj21Ft4eT24RjB1JhZQyWRc4-1741249596-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15078Host: sdfwfsdf.icu
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=S3TS9Q87ETI5OOWTWCookie: __cf_mw_byp=i5mW1fATjs4MUxlnPduqj21Ft4eT24RjB1JhZQyWRc4-1741249596-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 19966Host: sdfwfsdf.icu
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=RXKYOMADS0OQFQJUCookie: __cf_mw_byp=i5mW1fATjs4MUxlnPduqj21Ft4eT24RjB1JhZQyWRc4-1741249596-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 2414Host: sdfwfsdf.icu
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=0B789H4H37Cookie: __cf_mw_byp=i5mW1fATjs4MUxlnPduqj21Ft4eT24RjB1JhZQyWRc4-1741249596-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 587930Host: sdfwfsdf.icu
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedCookie: __cf_mw_byp=i5mW1fATjs4MUxlnPduqj21Ft4eT24RjB1JhZQyWRc4-1741249596-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 89Host: sdfwfsdf.icu
                  Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                  Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                  Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                  Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficHTTP traffic detected: GET /kz_prokla1 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: t.me
                  Source: global trafficDNS traffic detected: DNS query: t.me
                  Source: global trafficDNS traffic detected: DNS query: sdfwfsdf.icu
                  Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: sdfwfsdf.icu
                  Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Thu, 06 Mar 2025 08:26:36 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeX-Frame-Options: SAMEORIGINReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=WgyLBGjlo4feIpm34hq6oN4nqFpM%2FbxlabtmvsRMdox8ctX84ZLekqk%2Fh3x%2FaOh1l5ow3FUHCO%2FF7z5vYoWAtYXqGcU7EBbfwwYRzepdVNQzGIzF4Y0Pq%2Bdl3cgB6xI%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91c0781a5c189ad2-MIA
                  Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
                  Source: EasyWay.exe, 00000001.00000002.3401387170.0000000001379000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sdfwfsdf.icu/
                  Source: EasyWay.exe, 00000001.00000002.3401387170.0000000001379000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sdfwfsdf.icu/&
                  Source: EasyWay.exe, 00000001.00000002.3401387170.0000000001379000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sdfwfsdf.icu/3
                  Source: EasyWay.exe, 00000001.00000002.3401387170.0000000001379000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sdfwfsdf.icu/L
                  Source: EasyWay.exe, 00000001.00000002.3401387170.0000000001379000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sdfwfsdf.icu/P
                  Source: EasyWay.exe, 00000001.00000002.3401424007.000000000138B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sdfwfsdf.icu/api
                  Source: EasyWay.exe, 00000001.00000002.3401424007.000000000138B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sdfwfsdf.icu/apiG
                  Source: EasyWay.exe, 00000001.00000002.3401449424.00000000013A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sdfwfsdf.icu/apiIgm
                  Source: EasyWay.exe, 00000001.00000002.3401449424.00000000013A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sdfwfsdf.icu/apiUj
                  Source: EasyWay.exe, 00000001.00000002.3401424007.000000000138B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sdfwfsdf.icu/apiZ
                  Source: EasyWay.exe, 00000001.00000002.3401387170.0000000001379000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sdfwfsdf.icu/ckG
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
                  Source: unknownHTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.6:49710 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49715 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49723 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49729 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49735 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49742 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49749 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49755 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49763 version: TLS 1.2
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0043E2F0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowRect,GlobalUnlock,CloseClipboard,1_2_0043E2F0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_039F1000 EntryPoint,GetClipboardSequenceNumber,Sleep,Sleep,OpenClipboard,GetClipboardData,GlobalLock,GlobalAlloc,GlobalLock,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,GlobalUnlock,CloseClipboard,GetClipboardSequenceNumber,1_2_039F1000
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0043E2F0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowRect,GlobalUnlock,CloseClipboard,1_2_0043E2F0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 0_2_026026080_2_02602608
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0044A0061_2_0044A006
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0044C8801_2_0044C880
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0043D8971_2_0043D897
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0040B9401_2_0040B940
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0042B9201_2_0042B920
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004102771_2_00410277
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_00447AC01_2_00447AC0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_00415AE41_2_00415AE4
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_00443BD01_2_00443BD0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0041BBD91_2_0041BBD9
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004364D91_2_004364D9
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0044BCF01_2_0044BCF0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004275D01_2_004275D0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0042EDB01_2_0042EDB0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0041167D1_2_0041167D
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004176201_2_00417620
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0041AE301_2_0041AE30
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004437401_2_00443740
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_00449FFF1_2_00449FFF
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0040F78A1_2_0040F78A
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0040E7B01_2_0040E7B0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004010401_2_00401040
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0043C0601_2_0043C060
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004168151_2_00416815
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0043581A1_2_0043581A
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0042E0301_2_0042E030
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0044B0301_2_0044B030
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0042C0C01_2_0042C0C0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0043B0C11_2_0043B0C1
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004260D01_2_004260D0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004418E11_2_004418E1
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0042C8E51_2_0042C8E5
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004258F01_2_004258F0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0041D8981_2_0041D898
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004358A51_2_004358A5
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004449401_2_00444940
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0044C1601_2_0044C160
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0041F1761_2_0041F176
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0044B1201_2_0044B120
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004429351_2_00442935
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0044B1391_2_0044B139
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0044B13B1_2_0044B13B
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004111C01_2_004111C0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004239C01_2_004239C0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004491C61_2_004491C6
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004421F81_2_004421F8
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004369861_2_00436986
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0041718D1_2_0041718D
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0044B9B01_2_0044B9B0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_00410A601_2_00410A60
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004499BC1_2_004499BC
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0040A2201_2_0040A220
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004302201_2_00430220
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_00408A301_2_00408A30
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004482C01_2_004482C0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_00426A801_2_00426A80
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0044B2A01_2_0044B2A0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0041D2AF1_2_0041D2AF
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0040DAB01_2_0040DAB0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0044AAB11_2_0044AAB1
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0042F3401_2_0042F340
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004343501_2_00434350
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004243601_2_00424360
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_00437B701_2_00437B70
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_00402B101_2_00402B10
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_00445B1F1_2_00445B1F
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_00449B3B1_2_00449B3B
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0044B3E01_2_0044B3E0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0042E3ED1_2_0042E3ED
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0043ABEC1_2_0043ABEC
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0040BBF01_2_0040BBF0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004453901_2_00445390
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004094401_2_00409440
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0040C4401_2_0040C440
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0042E4441_2_0042E444
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_00442C601_2_00442C60
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0042AC0E1_2_0042AC0E
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_00444CD01_2_00444CD0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0042DCF21_2_0042DCF2
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0041CC891_2_0041CC89
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004285701_2_00428570
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_00423D001_2_00423D00
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0044C5001_2_0044C500
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004035101_2_00403510
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_00407D301_2_00407D30
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004245E01_2_004245E0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004395AB1_2_004395AB
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0041E64E1_2_0041E64E
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_00421E591_2_00421E59
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_00422E601_2_00422E60
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004456701_2_00445670
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0043A6011_2_0043A601
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004236201_2_00423620
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_00442EC01_2_00442EC0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0043168D1_2_0043168D
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0042F69C1_2_0042F69C
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_00408EA01_2_00408EA0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_00403EB01_2_00403EB0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0040EF501_2_0040EF50
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004207501_2_00420750
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0043576D1_2_0043576D
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_00447F701_2_00447F70
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_00427F201_2_00427F20
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0044B7301_2_0044B730
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_00430FC01_2_00430FC0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004327C01_2_004327C0
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0041BFD91_2_0041BFD9
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004307DB1_2_004307DB
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_00406F861_2_00406F86
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0044278C1_2_0044278C
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_004047921_2_00404792
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: String function: 0040B210 appears 50 times
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: String function: 0041AE20 appears 105 times
                  Source: C:\Users\user\Desktop\EasyWay.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3704 -s 784
                  Source: EasyWay.exe, 00000000.00000000.2155592214.00000000002C6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameThrones.exe0 vs EasyWay.exe
                  Source: EasyWay.exe, 00000000.00000002.2222563227.00000000007EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs EasyWay.exe
                  Source: EasyWay.exe, 00000000.00000002.2223996706.0000000003829000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameThrones.exe0 vs EasyWay.exe
                  Source: EasyWay.exeBinary or memory string: OriginalFilenameThrones.exe0 vs EasyWay.exe
                  Source: EasyWay.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: EasyWay.exeStatic PE information: Section: .CSS ZLIB complexity 1.0003245881088825
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/5@2/2
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_00443BD0 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,1_2_00443BD0
                  Source: C:\Users\user\Desktop\EasyWay.exeMutant created: NULL
                  Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3704
                  Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\3098a526-7007-4096-90fb-e3f4164e5f56Jump to behavior
                  Source: EasyWay.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: EasyWay.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\EasyWay.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: EasyWay.exeVirustotal: Detection: 52%
                  Source: EasyWay.exeReversingLabs: Detection: 57%
                  Source: C:\Users\user\Desktop\EasyWay.exeFile read: C:\Users\user\Desktop\EasyWay.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\EasyWay.exe "C:\Users\user\Desktop\EasyWay.exe"
                  Source: C:\Users\user\Desktop\EasyWay.exeProcess created: C:\Users\user\Desktop\EasyWay.exe "C:\Users\user\Desktop\EasyWay.exe"
                  Source: C:\Users\user\Desktop\EasyWay.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3704 -s 784
                  Source: C:\Users\user\Desktop\EasyWay.exeProcess created: C:\Users\user\Desktop\EasyWay.exe "C:\Users\user\Desktop\EasyWay.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: EasyWay.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: EasyWay.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: EasyWay.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: System.Windows.Forms.pdb source: WEREB0E.tmp.dmp.5.dr
                  Source: Binary string: Thrones.pdb source: WEREB0E.tmp.dmp.5.dr
                  Source: Binary string: mscorlib.pdb source: WEREB0E.tmp.dmp.5.dr
                  Source: Binary string: System.ni.pdbRSDS source: WEREB0E.tmp.dmp.5.dr
                  Source: Binary string: C:\Users\Event\source\repos\Thrones\Thrones\obj\Release\Thrones.pdb source: EasyWay.exe
                  Source: Binary string: System.pdb) source: WEREB0E.tmp.dmp.5.dr
                  Source: Binary string: mscorlib.ni.pdb source: WEREB0E.tmp.dmp.5.dr
                  Source: Binary string: mscorlib.ni.pdbRSDS source: WEREB0E.tmp.dmp.5.dr
                  Source: Binary string: System.ni.pdb source: WEREB0E.tmp.dmp.5.dr
                  Source: Binary string: System.pdb source: WEREB0E.tmp.dmp.5.dr
                  Source: EasyWay.exeStatic PE information: 0xC12B1A4D [Sun Sep 11 13:51:09 2072 UTC]
                  Source: EasyWay.exeStatic PE information: section name: .CSS
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_00455894 push ds; iretd 1_2_0045589F
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_0044F443 push cs; iretd 1_2_0044F446
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_00451C66 push 00000000h; retf 1_2_00451C6C
                  Source: C:\Users\user\Desktop\EasyWay.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\EasyWay.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\EasyWay.exeSystem information queried: FirmwareTableInformationJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeMemory allocated: 2560000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeMemory allocated: 2820000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeMemory allocated: 2560000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeWindow / User API: threadDelayed 5758Jump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exe TID: 2104Thread sleep time: -150000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exe TID: 6532Thread sleep count: 5758 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                  Source: C:\Users\user\Desktop\EasyWay.exeLast function: Thread delayed
                  Source: C:\Users\user\Desktop\EasyWay.exeLast function: Thread delayed
                  Source: Amcache.hve.5.drBinary or memory string: VMware
                  Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
                  Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
                  Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
                  Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
                  Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                  Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                  Source: Amcache.hve.5.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
                  Source: EasyWay.exe, 00000001.00000002.3401245063.000000000131A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                  Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                  Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: Amcache.hve.5.drBinary or memory string: vmci.sys
                  Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
                  Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
                  Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: Amcache.hve.5.drBinary or memory string: VMware20,1
                  Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
                  Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
                  Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                  Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                  Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                  Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                  Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
                  Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
                  Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
                  Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                  Source: EasyWay.exe, 00000001.00000002.3401065793.00000000012DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWpV2
                  Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                  Source: C:\Users\user\Desktop\EasyWay.exeAPI call chain: ExitProcess graph end nodegraph_1-22833
                  Source: C:\Users\user\Desktop\EasyWay.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 1_2_00449770 LdrInitializeThunk,1_2_00449770
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 0_2_02822159 mov edi, dword ptr fs:[00000030h]0_2_02822159
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 0_2_028222D6 mov edi, dword ptr fs:[00000030h]0_2_028222D6
                  Source: C:\Users\user\Desktop\EasyWay.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\EasyWay.exeCode function: 0_2_02822159 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_02822159
                  Source: C:\Users\user\Desktop\EasyWay.exeMemory written: C:\Users\user\Desktop\EasyWay.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeProcess created: C:\Users\user\Desktop\EasyWay.exe "C:\Users\user\Desktop\EasyWay.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeQueries volume information: C:\Users\user\Desktop\EasyWay.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                  Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
                  Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                  Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                  Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
                  Source: C:\Users\user\Desktop\EasyWay.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 1.2.EasyWay.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.EasyWay.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.EasyWay.exe.3829550.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.3400846481.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2223996706.0000000003829000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                  Source: Yara matchFile source: Process Memory Space: EasyWay.exe PID: 7140, type: MEMORYSTR
                  Source: EasyWay.exe, 00000001.00000002.3401387170.0000000001379000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \Electrum\\wallets","m":["*"],"z":"Wallets/Electrum","d":0,"fs":20971520},{"
                  Source: EasyWay.exe, 00000001.00000002.3401387170.0000000001379000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: 20971520},{"t":0,"p":"%appdata%\\ElectronCash\\wallets","m":["*"],"z":"Walle<
                  Source: EasyWay.exe, 00000001.00000002.3401387170.0000000001379000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: tore.json",".finger-print.fp","simple-storage.json","window-state.json"],"z"
                  Source: EasyWay.exe, 00000001.00000002.3401387170.0000000001379000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: s/Binance","d":1,"fs":20971520},{"t":0,"p":"%appdata%\\com.liberty.jaxx\\Indt
                  Source: EasyWay.exe, 00000001.00000002.3401270371.000000000132A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Ethereum
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\logins.jsonJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cert9.dbJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs.jsJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqliteJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\formhistory.sqliteJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqliteJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.dbJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
                  Source: C:\Users\user\Desktop\EasyWay.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 1.2.EasyWay.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.EasyWay.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.EasyWay.exe.3829550.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.3400846481.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2223996706.0000000003829000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                  Source: Yara matchFile source: Process Memory Space: EasyWay.exe PID: 7140, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  211
                  Process Injection
                  23
                  Virtualization/Sandbox Evasion
                  1
                  OS Credential Dumping
                  1
                  Query Registry
                  Remote Services1
                  Archive Collected Data
                  21
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  LSASS Memory231
                  Security Software Discovery
                  Remote Desktop Protocol31
                  Data from Local System
                  3
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)211
                  Process Injection
                  Security Account Manager23
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin Shares3
                  Clipboard Data
                  4
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                  Deobfuscate/Decode Files or Information
                  NTDS1
                  Process Discovery
                  Distributed Component Object ModelInput Capture115
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
                  Obfuscated Files or Information
                  LSA Secrets1
                  Application Window Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                  Software Packing
                  Cached Domain Credentials1
                  File and Directory Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Timestomp
                  DCSync22
                  System Information Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                  DLL Side-Loading
                  Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.